摘要:
The packets generated by each of multiple packet data applications are provided to a single Point-to-Point Protocol (PPP) stack and a single High-level Data Link Control (HDLC) framing layer to convert data packets into byte streams suitable for transmission through Radio Link Protocol (RLP) connections. Each of the resultant multiple byte streams is then provided to one of multiple RLP connections having different retransmission and delay properties. The RLP connection selected for sending data from each application is based on the grade of service most appropriate for the application. At the receiver, the data from the multiple RLP connections is provided to a single PPP stack.
摘要:
A communication session between a node seeking network access and a NAS (Network Access Server) is established by having only few exchanges of messages. Upon detecting a physical link between the node and the NAS, the NAS immediately sends an authentication request message to the node. In response, the node sends a request message which includes all parameters options, in addition to responding to the authentication request message, for link configuration and network access control. The NAS then picks and chooses the parameter options and sends back the selected options in a reply message to the node. If the selected options in the reply message meet a threshold, the node straightforwardly transmits user data for network access via the NAS.
摘要:
This disclosure describes techniques for establishing a PPP data session between a user terminal (UT) and an Interworking Function (IWF). The process involves establishing a PPP2 link with the IWF in response to detecting a mobile IP data session request from the UT, detecting a PPP1 link with the UT in response to the PPP2 link being established, detecting that a PPP2 link failure has occurred, and reconfiguring at least one of the WCD and the UT to an initial state.
摘要:
A technique is described for determining configuration options negotiated for a wireless communications link employing a network model. The technique receives an input data stream from a wireless communications link employing a network model. The input data stream includes one or more framed data packets containing information. The wireless communications link employing the network model is based on configuration options negotiated. The framed data packet(s) from the input data stream are detected and at least a portion of the information of the detected framed data packet(s) is examined when the configuration options of the wireless communications link employing the network model have been negotiated.
摘要:
Techniques for minimizing dormant reactivations to receive IPv6 Router Advertisements are described. In a first scheme, a timer is used to trigger a wireless terminal to solicit a Router Advertisement. The timer is set to a threshold time period computed based on the current prefix lifetime. When the timer expires, a Router Solicitation is sent. In a second scheme, after the timer expires, a Router Solicitation is sent whenever the terminal is active. In a third scheme, a Router Solicitation is sent when the timer expires if solicitation is triggered and at any time thereafter whenever the terminal is active. In a fourth scheme, two timers are set to two threshold time periods. After the first timer expires, a Router Solicitation is sent whenever the terminal is active. When the second timer expires, a Router Solicitation is sent if solicitation is triggered by a predefined event or condition regardless of the terminals state.
摘要:
Methods and apparatus are presented herein for allowing a wireless communication device to perform a proxy authentication on behalf of a tethered device.
摘要:
Techniques for maintaining packet data connectivity in a wireless communications network are presented. A mobile station detects a change from a first packet control function (PCF) to a second PCF. The first PCF is connected to a first packet data service node (PDSN). The second PCF is connected to a second PDSN. The mobile station consults a database configured to map at least one previously visited PCF to a servicing PDSN. Based at least in part on the consulting, the mobile station observes one from among a plurality of predetermined origination patterns, wherein an origination pattern defines origination functions to be performed by the mobile station. As such, zombie PPP and mobile IP instances may be detected and handled.
摘要:
The disclosure is directed to techniques for supporting failover between different network protocol addressing families in a wireless communication network. The techniques may be implemented in a mobile wireless communication device. A logical interface selects a physical interface for access to the network in response to a request from an application module. The network access request issued by the application module need not specify a network protocol type. Instead, upon selection of the physical interface, the logical interface notifies the application of the network protocol type associated with the physical interface. The logical interface may select a physical interface corresponding to a particular network protocol when available, based on connection preferences specified by the application module or a global setting within the device. If a physical interface corresponding to the network protocol is not available, however, the logical interface selects a physical interface corresponding to a different network protocol.
摘要:
To initiate dormancy early, a wireless device receives an IP packet from a wireless network and determines whether the received IP packet is an unsolicited IP packet. An unsolicited IP packet may be declared if the received IP packet causes the wireless device to reactivate from dormancy or is not delivered to an application or service running at the wireless device. The wireless device transitions to dormancy early if the received IP packet is deemed to be an unsolicited IP packet and no other events prevent transition to dormancy. The wireless device may use (1) a shortened value for an inactivity timer for a predetermined time duration if an unsolicited IP packet is detected and (2) a nominal value for the inactivity timer thereafter. The wireless device resets the inactivity timer whenever an IP packet is sent or received and transitions to dormancy upon expiration of the inactivity timer.
摘要:
This disclosure describes a key update scheme for use in a mobile IP network. The update scheme may be implemented to facilitate key updates between a mobile device and a server computer that authenticates the mobile device. The techniques described herein can facilitate key updates in a manner that accounts for potential message loss during the update routine, mobile device failure during the update routine, or other problems typically encountered in a mobile network settings. In this manner, the techniques can provide a robust scheme for key updates and may improve network security.