摘要:
A novel method and apparatus is disclosed for performing seamless handoff of a mobile station (MS) between Radio Access Networks (RANs) that use different types of wireless interfaces. The described embodiments enable an MS to handoff between different RANs without causing routing ambiguity, and without substantial loss of network data. Upon moving from the coverage area of a first RAN using a first wireless interface to the coverage area of a second RAN using a second wireless interface, an MS determines whether routing ambiguity may result from the change of RAN and, based on the determination, triggers a re-registration of its network address. A foreign agent (FA) within a packet data serving node (PDSN) monitors network address re-registrations in order to determine whether multiple RAN-PDSN (R-P) connections are being created for the same MS. Based on this determination, the PDSN terminates redundant R-P network connections resulting from movement of the MS between different RANs.
摘要:
Techniques to forward unsolicited messages from an (IS-2000) CDMA radio network via an HDR radio network to an access terminal. A session is first established between the access terminal and the HDR radio network. During session establishment or thereafter, the access terminal indicates to the HDR radio network an interest in receiving unsolicited messages from the CDMA radio network. The access terminal typically also registers with the CDMA radio network. Thereafter, unsolicited messages can be sent from a mobile station controller (MSC) to the HDR and CDMA radio networks, or sent from the MSC to the CDMA radio network, which then forwards the messages to the HDR radio network. The HDR radio network encapsulates the unsolicited messages and sends the encapsulated messages to the access terminal. The forwarding of unsolicited messages allows the CDMA radio network to communicate with an access terminal.
摘要:
Method and apparatus for encrypting transmission traffic at separate protocol layers L1, L2, and L3 so that separate encryption elements can be assigned to separate types of transmission traffic, which allows the implementation of different levels of encryption according to service requirements. Encryption elements use variable value inputs, called crypto-syncs, along with semi-permanent encryption keys to protect from replay attacks from rogue mobile stations. Since crypto-sync values vary, a method for synchronizing crypto-syncs at the mobile station and base station is also presented.
摘要:
Method and apparatus for data packet communications in a communication system. Packets are received at a gateway having an Internet Protocol (IP) destination address and Network Access Identifier (NAI). The gateway maps the received NAI to a local network, such as supported by a Network Address Translator (NAT). The gateway then converts the destination address to a NAT address of the local network. The gateway also adds a port number that allows the NAT to identify the target recipient. The mapping within the gateway is created and maintained as Mobile Stations send registration requests upon arrival within a local network. In one embodiment, the registration request is a Session Initiation Protocol (SIP) registration.
摘要:
Techniques for synchronization of stored service parameters are disclosed. In one aspect, a configuration identifier is transmitted from a mobile station to a base station, and compared with an identifier generated in the base station. If the identifiers match, the configuration is used for communication. In another aspect, the identifier is generated by selecting an identifier associated with a configuration from a configuration table. In yet another aspect, the identifier is generated by computing a cyclic redundancy check (CRC) of the configuration. Various other aspects are also presented. These aspects have the benefit of preventing attempted use of unsynchronized stored service parameters and associated call setup failures and subsequent renegotiation, with the net effect of reducing call setup time and more efficient use of system resources.
摘要:
Framing techniques for an improved radio link protocol used in a wireless communication system, such as EV-DO. In one embodiment scheduling of the generation of repair symbols encoded to be transmitted along with source data is described. In another embodiment acknowledgment messages from a receiver are used to control the trailing edge of the protection window offered by the repair symbols. In another embodiment, non-acknowledgment messages from a receiver are used to control the generation of extra repair symbols. In another embodiment, a length field is used to avoid transmission of padding bytes over the air. In yet another embodiment, a symbol auxiliary field is appended to source symbols to indicate the padding bytes needed for symbol aligning thus avoiding the transmission of padding bytes over the air.
摘要:
Local IP access is provided in a wireless network to facilitate access to one or more local services. In some implementations, different IP interfaces are used for accessing different services (e.g., local services and operator network services). A list that maps packet destinations to IP interfaces may be employed to determine which IP interface is to be used for sending a given packet. In some implementations an access point provides a proxy function (e.g., a proxy ARP function) for an access terminal. In some implementations an access point provides an agent function (e.g., a DHCP function) for an access terminal. NAT operations may be performed at an access point to enable the access terminal to access local services. In some aspects, an access point may determine whether to send a packet from an access terminal via a protocol tunnel based on the destination of the packet.
摘要:
Methods, apparatus and media for receiving emergency broadcast information in a broadcast-multicast service of a communication system. The methods, apparatus and media include scheduling a broadcast of emergency broadcast information in designated control channel cycles for designated subscriber stations. The control channel cycles are transmitted with the designated control channel cycles including the emergency broadcast information. Subscriber stations awake according to their designated control channel cycle and receive the transmission of their designated control channel cycle on a broadcast-multicast service. The subscriber station determines if emergency broadcast information is in the control channel cycle assigned to the subscriber station and responds accordingly.
摘要:
Techniques for generating and transmitting packets on multiple links in a wireless communication system are described. In one aspect, a transmitter generates new packets for the multiple links based on the likelihood of each link being available. The transmitter determines the likelihood of each carrier being available based on whether or not there is a pending packet on that carrier and, if yes, the number of subpackets sent for the pending packet. The transmitter generates new packets such that packets for links progressively less likely to be available contain data units with progressively higher sequence numbers. The transmitter determines whether each link is available and sends a packet on each link that is available. In another aspect, the transmitter generates and sends new packets in a manner to ensure in-order transmission. In one design, the transmitter generates new packets for each possible combination of links that might be available.