摘要:
A femtocell may be initialized on a network by automatically contacting a network service provider. The access point then automatically downloads an initial configuration from a bootstrap server belonging to the network service provider. In some cases, a femtocell access point may automatically determine, after boot up, whether it was pre-provisioned with credentials to authenticate itself with the network service provider. If so, it may use a domain name service to obtain an address of a bootstrap server. Otherwise, it may use dynamic host configuration protocol to discover the bootstrap server's Internet Protocol address.
摘要:
Embodiments of the present disclosure describe techniques and configurations for triggering transmission of data payloads in a wireless communication network. An apparatus may include one or more computer-readable media having instructions and one or more processors coupled with the one or more computer-readable media and configured to execute the instructions to implement an interworking function (IWF) to receive, from a Machine Type Communication (MTC) server, a trigger request to trigger sending of a data payload over a wireless communication network, the data payload being smaller than a preconfigured threshold, and send, in response to the trigger request over a reference point to a module including a Mobility Management Entity (MME) or a Serving GPRS (General Packet Radio Service) Support Node (SGSN), a trigger notification to trigger sending of the data payload over the wireless communication network.
摘要:
Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security services controller and one or more NFV security services agents. The NFV security services controller is configured to transmit a security monitoring policy to the NFV security services agents and enforce the security monitoring policy at the NFV security services agents. The NFV security services agents are configured to monitor telemetry data and package at least a portion of the telemetry for transmission to an NFV security monitoring analytics system of the NFV security architecture for security threat analysis. Other embodiments are described and claimed.
摘要:
Technology is discussed for capturing performance measurements from Wireless Wide Area Network (WWAN) transmission points and Wireless Local Area Network (WLAN) Access Points (AP). The performance measurements can provide information about the interworking a WWAN and one or more WLANs that can be used to offload traffic from the WWAN. Also, an illustrative example of the collection of performance measurements at a WWAN is explained. Furthermore, the correlation, analysis, and general harnessing of performance measurements to optimize and/or maintain combinations between a WWAN and one or more WLANs is discussed, among other topics.
摘要:
Embodiments of a mobile device, a User Equipment (UE), and method for supporting emergency calls on a packet-switched network are generally described herein. In some embodiments, the UE may be configured to support emergency calls in accordance with a 3GPP protocol and with eCall in an IP Multimedia Subsystem (IMS) session. The UE may comprise hardware processing circuitry configured to transmit traffic packets to an Evolved Node-B (eNB) for forwarding to a receiving station, which may be a Public Safety Answer Point (PSAP). In some embodiments, the transmission of traffic packets during a packetization period may be restricted to one of transmission of voice packets or transmission of data packets. In some embodiments, at least some of the data packets may include Minimum Set of Emergency Related Data (MSD), and the IMS session may be configured in accordance with Real Time Transport Protocol (RTP).
摘要:
A network apparatus comprises a controller to determine a first base station for transmitting data and to determine a second different base station for receiving data. In one embodiment, the network apparatus further comprises a transceiver to transmit data to the first base station while associated with the second base station. The transceiver is operable to receive data from the second base station while associated with the first base station.
摘要:
Techniques are described that can be used to assign identifiers to carriers of a multi-carrier mobile station. In some cases, each carrier of the mobile station is assigned the same identifiers. In some cases, each carrier of the mobile station is assigned a unique identifier on each channel.
摘要:
Embodiments of methods and apparatus to manage MTC device trigger load in a wireless network are described herein. Other embodiments may be described and claimed.
摘要:
An embodiment of the present invention provides an apparatus, comprising a transceiver operable in a wireless network, wherein the transceiver is configured to enable wireless interception by a predetermined third party without the knowledge of a user of said transceiver, wherein the apparatus uses a secure external interface that is beyond the scope of the 802.16 wireless network, and wherein the operation of the wireless interception includes interception by a law enforcement agency by using a law interception server (LIS), Authentication Authorization and Accounting (AAA), Anchor Auth, Target lawful interception agent LIA and Serving lawful interception agent (LIA) and wherein the LIS first identifies a mobile station (MS) based on input from the law enforcement agency and once the MS is identified, the LIA for the MS is then identified by the LIS and once the LIA is identified, the LIA sends the security association for the MS session to the LIS which then sends this to the law enforcement.