摘要:
In a satellite mobile telecommunications system based on the GSM standard, and using a TDMA frame structure, discontinuous transmission (DTX) mode is used to take advantage of the substantial silences which occur during normal speech. In this mode, traffic channel (TCH) data is not sent, but control of the link between a ground station and a user terminal is maintained by sending control channel data bursts (SACCH) together with silence descriptor (SID) frames. To avoid high peak to mean values of transmission power at the satellite, the emission time of the bursts is controlled so as to be uniform over the available sending opportunities. Conventional techniques for doing this cannot be used in a system which includes diversity operation. Therefore, the burst transmission time at the ground station is set in dependence on a reference provided by the user terminal which is a modified version of the reference generated for contention resolution of random access requests.
摘要:
In a satellite communications system, where a user terminal 10, on the surface of the earth 12, can be in diversity communication to an earth station 18 via two orbiting satellites 14, 16 at once, and there is a need, at some time, when one of the two satellites 14, 16 orbits our of range, to engage another satellite 22 in its place, the user terminal 10 is operative to suppress TDMA timeslots in its communications with the two satellites 14, 16 to listen and report on broadcast messages from another satellite 22, the suppressed timeslots being based on an assessment of which of the two satellites has the largest path attenuation.
摘要:
In a satellite mobile telecommunication system, TDMF traffic is transmitted from a SAN 1 via a satellite 3 to a mobile user terminal UT1, over a duplex link 1, 2. The SAN 1 instructs the satellite 3a to transmit signals over link 1 to UT 1 at a power level dependent upon the quality of signal received by UT 1, so as to adaptively control the power to an efficient level. Similarly, the power level of signals transmitted by UT 1 to the satellite is controlled depending on the error rate. The power level required is computed as a function of the average of easured areas determined during a given measurement period together with a margin which is computed as an adaptive function of a deviation of the errors bout the average value.
摘要:
A method is provided in one example embodiment and includes receiving a request to authenticate an end user in a service provider network, and evaluating the request to identify the end user as belonging to an enterprise network. A tag is generated for a packet associated with a flow for the end user in the enterprise network. Routing occurs for subsequent packets associated with the flow between the enterprise network and the end user. The subsequent packets associated with the flow are not routed through the service provider network. In more particular embodiments, the end user is authenticated in the enterprise network after being authenticated in the service provider network. In addition, traffic for the end user can be separated based on one or more tags identified within the flow. A plurality of flows can be classified based on a customer identification (CID). The tag can be a virtual local area network (VLAN) tag generated at a base station.
摘要:
A method is provided in one example embodiment and includes creating a service flow with an endpoint over a wireless link coupled to a backhaul; notifying a mobility anchor of a location associated with the endpoint; relaying control packets between the endpoint and an access gateway; and relaying bearer packets between the endpoint and the mobility anchor, where the bearer packets are exchanged with the endpoint over a locally terminated bearer tunnel and the bearer packets are exchanged with the mobility anchor using Proxy Mobile Internet Protocol.
摘要:
A method is provided in one example embodiment and includes identifying an Internet protocol (IP) address for a serving gateway; establishing a link between the serving gateway and a congestion notification element; monitoring packets in order to identify whether a differentiated services code point (DSCP) bit has been set in the packets; determining that a threshold associated with congestion in a network has been exceeded; and communicating a signal to the serving gateway associated with the congestion. The serving gateway can be configured to correlate the congestion with identifiers associated with end users operating in the network, where the serving gateway communicates a signal to a network element to reduce the congestion.
摘要:
Systems and/or methods of selectively terminating security in mobile networks are presented. User equipment (UE) can specify cipher termination location capabilities for encrypting/decrypting data packets to a base station in a mobile network. The mobile network can subsequently determine at which node in the network to terminate the cipher in part according to the capabilities provided and deliver the determined location to the UE. The determined cipher termination location can be provided in response to a request to initiate communications, the initial request can specify the capabilities. The UE can utilize the location to support disparate types of networks and to intelligently deal with hand-offs and other functions of the mobile network.
摘要:
Routing a packet flow in a communication session includes facilitating a communication session between a first endpoint and a second endpoint. A permanent anchor of a home network receives path offers sent by the first endpoint. An optimized path offer corresponds to an optimized path passing through a transient anchor of a visited network and bypassing the permanent anchor. A default path offer corresponds to a default path passing through the permanent anchor. The permanent anchor determines whether packet flows between the first endpoint and the second endpoint are to be routed along the optimized path. The default path offer is removed if the packet flows are to be routed along the optimized path. The optimized path offer is removed if not. The remaining path offer is forwarded to the second endpoint.
摘要:
Techniques are provided for performing web authentication of mobile wireless devices that roam from a wireless wide area network to a wireless local area network. A redirect rule is invoked when a request is received from the mobile wireless device for world wide web access in order to obtain authentication for the mobile wireless device before permitting world wide web access. When a world wide web access request is received from the mobile wireless device, it is redirected to an authentication portal to allow a user of the mobile wireless device to enter user credentials to allow for world wide web access using the IP address.
摘要:
A method is provided in one example embodiment and includes creating a service flow with an endpoint over a wireless link coupled to a backhaul; notifying a mobility anchor of a location associated with the endpoint; relaying control packets between the endpoint and an access gateway; and relaying bearer packets between the endpoint and the mobility anchor, where the bearer packets are exchanged with the endpoint over a locally terminated bearer tunnel and the bearer packets are exchanged with the mobility anchor using Proxy Mobile Internet Protocol.