摘要:
Systems and methodologies are described that facilitate enhanced data service functionality for data services operating in a multi-processor computing environment. As described herein, respective processors and/or other components can be utilized to form a Smart Peripheral Subsystem (SPS). As further described herein, the SPS can operate in association with a modem processor and an application processor at a mobile computing device in order to reduce loading at the application processor and improve memory usage efficiency. In the case of a mobile computing device sharing a network connection with a tethered computing device, the SPS can couple a modem interface associated with the mobile computing device and an interface through which the disparate computing device is tethered to the mobile computing device such that operations such as Layer 2 (L2) framing and/or de-framing, Network Address Translation (NAT), or the like can be offloaded to the SPS under various circumstances.
摘要:
A method and system that provides for efficient re-synchronization of a PPP link on a Um interface is provided. When the PPP link is connected, if an indication that the communications of the mobile station is associated with a new network server is detected, only the Um interface will undergo PPP configuration renegotiation. The method and system does not require the examination of all data packets for determining whether PPP configuration renegotiation is required.
摘要:
A method and system that provides for efficient re-synchronization of a PPP link on a Um interface is provided. When the PPP link is connected, if an indication that the communications of the mobile station is associated with a new network server is detected, only the Um interface will undergo PPP configuration renegotiation. The method and system does not require the examination of all data packets for determining whether PPP configuration renegotiation is required.
摘要:
Methods and apparatus are presented herein for allowing a keyless access terminal (AT) to access a packet serving data node (PSDN) over a service network stream without deactivating the authentication functions of the authentication network stream.
摘要:
Methods and apparatus are presented herein for allowing a wireless communication device to perform a proxy authentication on behalf of a tethered device.
摘要:
Systems and techniques for establishing a communication link wherein a transmission source delimits frame boundaries of a payload, calculates a value as a function of a subset of the payload, and appends the value to the payload within the frame boundaries before transmission of the frame. A receiving source calculates a value as a function of a subset of the payload, compares the calculated value to the received value, and detects a valid payload as a function of the comparison. It is emphasized that this abstract is provided to comply with the rules requiring an abstract which will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or the meaning of the claims.
摘要:
The packets generated by each of multiple packet data applications are provided to a single Point-to-Point Protocol (PPP) stack and a single High-level Data Link Control (HDLC) framing layer to convert data packets into byte streams suitable for transmission through Radio Link Protocol (RLP) connections. Each of the resultant multiple byte streams is then provided to one of multiple RLP connections having different retransmission and delay properties. The RLP connection selected for sending data from each application is based on the grade of service most appropriate for the application. At the receiver, the data from the multiple RLP connections is provided to a single PPP stack.
摘要:
This disclosure describes techniques for establishing a PPP data session between a user terminal (UT) and an Interworking Function (IWF). The process involves establishing a PPP2 link with the IWF in response to detecting a mobile IP data session request from the UT, detecting a PPP1 link with the UT in response to the PPP2 link being established, detecting that a PPP2 link failure has occurred, and reconfiguring at least one of the WCD and the UT to an initial state.
摘要:
A technique is described for determining configuration options negotiated for a wireless communications link employing a network model. The technique receives an input data stream from a wireless communications link employing a network model. The input data stream includes one or more framed data packets containing information. The wireless communications link employing the network model is based on configuration options negotiated. The framed data packet(s) from the input data stream are detected and at least a portion of the information of the detected framed data packet(s) is examined when the configuration options of the wireless communications link employing the network model have been negotiated.
摘要:
Techniques for minimizing dormant reactivations to receive IPv6 Router Advertisements are described. In a first scheme, a timer is used to trigger a wireless terminal to solicit a Router Advertisement. The timer is set to a threshold time period computed based on the current prefix lifetime. When the timer expires, a Router Solicitation is sent. In a second scheme, after the timer expires, a Router Solicitation is sent whenever the terminal is active. In a third scheme, a Router Solicitation is sent when the timer expires if solicitation is triggered and at any time thereafter whenever the terminal is active. In a fourth scheme, two timers are set to two threshold time periods. After the first timer expires, a Router Solicitation is sent whenever the terminal is active. When the second timer expires, a Router Solicitation is sent if solicitation is triggered by a predefined event or condition regardless of the terminals state.