摘要:
An intermediate node in a wireless communication system transmits application layer messages between first and second nodes. To do so, the intermediate node receives a request to activate a packet data protocol (PDP) context for the first node. The request, as generated by the first node, indicates the first node is capable of using a first protocol stack that excludes one or more particular layers included in a second protocol stack used by the second node. The intermediate node activates a PDP context for the first node in accordance with the request. The intermediate node thereafter forwards application layer messages supported by the activated PDP context between the first node and the second node, forwarding application layer messages destined for the first node in accordance with the first protocol stack and forwarding application layer messages destined for the second node in accordance with the second protocol stack.
摘要:
User Equipment (UE) receiving non-voice packet switched services in an Evolved Universal Mobile Telecommunications System Terrestial Radio Access Network (eUTRAN) cell undergoes handover to a circuit switched GSM/Edge Radio Access Network (GERAN)/UTRAN cell in response to a voice service page. An eNodeB of the active eUTRAN cell uses a measurement report history for the UE to select an available circuit switched cell for handover. The voice service is established in the circuit switched domain of a GERAN/UTRAN cell to ensure service continuity regardless of UE mobility that would otherwise not be possible if the voice service was established in the eUTRAN cell. A Gs-like interface between a Mobile Switching Center (MSC) of the CS Core Network and the Mobility Management Entity (MME) of the Evolved Packet Core provides an interface for page requests and location update procedures to be performed.
摘要:
A layered approach to access control is used where each access control layer implements a set of access control rules. The access control rules in each layer are applied in order beginning with the first access control layer. To gain access to the network, the access attempt must not be barred by any access control layer.
摘要:
When a wireless terminal attaches to the network, the wireless terminal is assigned a temporary identifier. Different sets of access restrictions are associated with different blocks of temporary identifiers. When a message and a corresponding temporary identifier is received by the network from a requesting wireless terminal, an access controller identifies the block to which the assigned temporary identifier belongs and determines the access restrictions associated with that block.
摘要:
In one aspect, the invention provides apparatuses and methods for wirelessly transmitting application data utilizing priority information for each radio link control (RLC) data block transmitted. Advantageously, the application data with a relatively high transmission priority is not substantially delayed by the transmission of application data with substantially lower transmission priorities.
摘要:
User Equipment (UE) receiving non-voice packet switched services in an Evolved Universal Mobile Telecommunications System Terrestial Radio Access Network (eUTRAN) cell undergoes handover to a circuit switched GSM/Edge Radio Access Network (GERAN)/UTRAN cell in response to a voice service page. An eNodeB of the active eUTRAN cell uses a measurement report history for the UE to select an available circuit switched cell for handover. The voice service is established in the circuit switched domain of a GERAN/UTRAN cell to ensure service continuity regardless of UE mobility that would otherwise not be possible if the voice service was established in the eUTRAN cell. A Gs-like interface between a Mobile Switching Center (MSC) of the CS Core Network and the Mobility Management Entity (MME) of the Evolved Packet Core provides an interface for page requests and location update procedures to be performed.
摘要:
A method and device are provided for of supporting a plurality of mobile station operation modes in a wireless communication system by user control. Presently, communication protocols exist for supporting end user equipment which operates in a single mode of operation. However, it is desirable to combine protocols from various technologies to form end user equipment which operates in multiple modes of operation. Thereby, the present method allows the mobile station to operate in a multi-mode environment where a user can invoke a certain mode.
摘要:
A method for increasing throughput capacity of a mobile station transmitting a plurality of consecutive bursts to a base station in a communication system is disclosed. The first burst is transmitted using a normal burst format while succeeding consecutive bursts are transmitted using an auxiliary burst format wherein the auxiliary bursts contain larger data fields than normal bursts.
摘要:
When a wireless terminal attaches to the network, the wireless terminal is assigned a temporary identifier. Different sets of access restrictions are associated with different blocks of temporary identifiers. When a message and a corresponding temporary identifier is received by the network from a requesting wireless terminal, an access controller identifies the block to which the assigned temporary identifier belongs and determines the access restrictions associated with that block.
摘要:
A layered approach to access control is used where each access control layer implements a set of access control rules. The access control rules in each layer are applied in order beginning with the first access control layer. To gain access to the network, the access attempt must not be barred by any access control layer.