摘要:
Siloxacycles are synthesized in high yield and purity by reaction of acyloxymethyl (alkoxy) silanes in the presence of a catalyst which is a metal from groups 3 to 15 of the periodic table, or a compound thereof.
摘要:
A method for routing traffic within a network for allowing an efficient offloading of LIPA/SIPTO traffic from the core network even upon handoff of a UE to a new cell, wherein the network includes a core network and a LIPA/SIPTO (Local IP Access/Selected IP Traffic Offload) enabled network, wherein traffic between a UE (User Equipment) and the LIPA/SIPTO enabled network—a so called LIPA/SIPTO traffic—is broken out at a local breakout point and wherein a mobility support for ongoing broken out LIPA/SIPTO traffic will be provided by an MMF (Mobility Management Function) for realizing a continuation of the LIPA/SIPTO traffic upon a handoff of the UE from one cell to another cell. The continuation of the LIPA/SIPTO traffic will be performed by a forwarding mechanism providing direct LIPA/SIPTO traffic between local breakout points of different cells. A network for carrying out the method is also described.
摘要:
A visited policy controlling device decides the amount of a visited network bearer resource that is provided by a visited user plane device for an end-to-end service based on the amount of a bearer service resource requested to be used in the end-to-end service. A home policy controlling device decides the amount of a core network bearer resource that a home gateway device provides for the end-to-end service based on the amount of the bearer service resource requested to be used in the end-to-end service. Further, a home policy controlling device performs processing to match the amount of the core network bearer resource decided by itself and the amount of the visited network bearer resource decided by visited policy controlling device, if they do not match.
摘要:
A PUCI system is designed to process an incoming call originated by the user equipment toward the counterpart user equipment via an EMS node having a PUCI-light functionality, which includes an IBCF/I-CSCF, a S-CSCF, and a database storing the PUCI-light information. Through a query to the database indicating a suspicious session in relation to the incoming call, the IMS node immediately blocks the suspicious session or simply marks the suspicious session for the further processing at a subsequent node. The reason for rejection is included in a SIP BYE/ERROR message of an original session setup message, which is interpreted by a previous IMS node so as to obtain the relevant information from a SIP header. The relevant information is stored in either a global operator policy database or a local database, thus enabling a PUCI-negating IMS node to reject an unsolicited call related to the blocked session.
摘要:
A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached.
摘要:
A method for supporting quality of service (QoS) mechanisms during a handover process or in preparation of a handover process, wherein a user equipment (UE) attaches to an access network (AN) via points of attachment (PoA), wherein the handover process supports changing connection of the UE from one of the points of attachment—current PoA—to another one of the points of attachment—target PoA—while maintaining all ongoing connections of the UE, wherein signalling messages are exchanged between the current PoA and a second PoA during or in preparation of the handover process, the second PoA including the target PoA or a candidate for the target PoA, and wherein the AN supports inner QoS mechanisms on a communication path within the AN, the communication path being used for communication between one of the PoA and a core network (CN) or between one of the PoA and a network entity within the AN, is characterized in that a triggering message is sent to the second PoA by the current PoA, the triggering message being received by an UE proxy located on the second PoA, wherein the UE proxy, in reaction to the triggering message, controls the inner QoS mechanisms to ensure QoS on the communication path.
摘要:
A visited policy controlling device decides the amount of a visited network bearer resource that is provided by a visited user plane device for an end-to-end service based on the amount of a bearer service resource requested to be used in the end-to-end service. A home policy controlling device decides the amount of a core network bearer resource that a home gateway device provides for the end-to-end service based on the amount of the bearer service resource requested to be used in the end-to-end service. Further, a home policy controlling device performs processing to match the amount of the core network bearer resource decided by itself and the amount of the visited network bearer resource decided by visited policy controlling device, if they do not match.
摘要:
A hand-hand power tool (2), particularly in the form of a hammer drill or chisel hammer, has a driving unit (10) for applying blows to a working tool receptacle (20) along an operational direction (R), an outer housing (8) in which the driving unit (10) is received at least partially, and two handles (30) which are provided at opposite sides (26, 28) of the outer housing (8) and which are displaceable between different positions relative to the tool receptacle (20) for adjusting a gripping height (H), and are locked in a selected position.
摘要:
In a risk exposure system and method, a processor may receive from an external system exposure records having data elements mapped to data elements of an internal representation of an exposure record. The system and method may generate new exposure data objects based on the mapped data, automatically assign exposure data objects to exposures versions, and automatically assign exposure data objects of versions to exposure groups based on criteria defined by planning profiles. Further, the system and method may automatically generate for an exposure group and transmit to a marketplace an electronic purchase order requesting a hedging instrument to offset risk presented by the exposure group and identifying the exposure group, and, responsive to a transaction confirmation message that is received from the marketplace and that identifies the exposure group or purchase order, generate a hedging instrument data object and associate it with the exposure group.
摘要:
A method for authorization of service requests to service hosts within a network, wherein the communication within the network is based on a routing mechanism, according to which user terminals within the network are associated with routable network addresses, is characterized in that the service host sends a nonce included in a request message to the network address of a requesting user terminal, and that the user terminal resends the nonce or a value inferable from the nonce by the service host as well as by the user terminal included in a response message to the network address of the service host.