摘要:
Systems and methods are provided for supporting multiple access point names for trusted wireless local area network (LAN.) In one method, the method includes receiving a packet at a mobile access gateway from a UE operating in a trusted wireless LAN, determining at the mobile access gateway an access point name (APN) associated with the received packet, and analyzing a binding update list (BUL) table to identify an IP address of the UE used by the determined APN. The method further includes modifying a source IP address of the received packet to the IP address of the UE used by the determined APN, and transmitting the packet to a home network associated with the APN.
摘要:
In one example embodiment, an apparatus includes a policy repository for storing a policy for application interaction. The policy defines, for a subscriber, a priority associated with a set of specific application identifiers. The priority further defines establishment priority and retention priority for an application identified by a selected application identifier. Another example embodiment includes an apparatus including a processor operable to evaluate a policy for application interaction. The policy defines, for a subscriber, a priority associated with a set of specific application identifiers. The priority further defines establishment priority and retention priority for an application identified by a selected application identifier. The processor is further operable to execute a decision for the subscriber based on the evaluation of the policy.
摘要:
In one embodiment, a method includes receiving a message associated with a device in a first domain. An identifier is determined for the device. The message is then sent to a load balancer where the message includes the identifier. The load balancer is then configured to send the message to a network device in a plurality of network devices. The network device is configured to process messages from the device. A second message may be received at the load balancer from a second domain. The second message may include the identifier for the device. The load balancer may then send the second message to the selected network device such that the first message and the second message are processed by the same network device.
摘要:
A system for facilitating persistent communications between entities in a network. In a specific embodiment, the system is adapted to facilitate fast reauthentication of a client performed by a server, such as an Authentication, Authorization, and Accounting (AAA) server, that is coupled to the client via a load balancer. The system includes a first message to be exchanged between the server and the client, wherein the first message includes a field identifying the server and/or the client. A matching module communicates with or is otherwise incorporated within the load balancer. The matching module includes one or more routines for employing the field to selectively route the first message to the client and/or server. In a more specific embodiment, the server a fast reauthentication module adapted to append the field in the message. The field includes sub-realm information identifying the server.
摘要:
An example method includes receiving data from a femto access point; evaluating resources being used by a macro network in which the femto access point resides; determining whether the femto access point is operating in a constrained bandwidth mode; and reserving particular resources for the femto access point to use for its communications, where the particular resource is allocated from available resources within the macro network. In a more particular embodiment, where those resources refer to spectrum resources, the method includes allocating spectrum resources between femto and macrocellular systems. In other embodiments, the method includes identifying a total throughput associated with the femto access point and one or more macro network cells, where a change in reserving particular frequencies is executed based on determining the total throughput being higher than a current throughput. The data from the femto access point can include path loss data and geolocation data.
摘要:
A method is provided in one example embodiment and includes identifying a bandwidth parameter associated with a network link. The method includes evaluating a bandwidth request associated with user equipment, the bandwidth request is associated with a session, which involves the user equipment and which implicates the network link. The bandwidth request can be modified based on the bandwidth parameter that was identified. In more detailed embodiments, one or more header extensions in one or more packets are evaluated in order to assist in identifying the bandwidth parameter. The one or more header extensions can include a selected one of packet sequence numbers, an average packet transmission rate, an average packet receiving rate, and a packet reception error rate. In other examples, modifying the bandwidth request can include downgrading the bandwidth request to lower a bit rate based on the bandwidth parameter identified for the network link.
摘要:
Techniques are provided for coordinated neighbor discovery in a wireless network served by radio access point devices that provide service in relatively small coverage areas in the wireless network. A controller apparatus sends to radio access point devices, data identifying a group of radio access point devices to which each radio access point device is assigned. The controller apparatus sends coordinating data for a neighbor discovery session during which a particular radio access point device in the group is configured to transmit a signal at maximum power during a time interval while all other radio access point devices in the group are configured to attempt to receive the signal, and to repeat the same during other time intervals during the neighbor discovery session when a different particular radio access point is configured to transmit a signal at maximum power until all of the radio access point devices in a group have transmitted. Each radio access point device generates discovery results data for signals received from one or more other radio access point devices during the neighbor discovery session. A neighbor list is generated for each radio access point device based on the discovery results. The neighbor list comprises a list of identifiers of radio access point devices that are candidates for handover of service.
摘要:
In one embodiment, while being connected to the network, a security issue may be detected and associated with the device. The device may be placed on a blacklist for the security issue. The blacklist is a list that is used to deny service for the device when it attempts to connect. Thus, the device is disconnected from the network. Identification information for the device is added to the blacklist at the authentication server. If the device attempts to reconnect to the network, the request is received at the authentication server. The authentication server can then check the blacklist and deny the request for access to the network if the identification information is on the blacklist. This denial is determined without sending the request to the HLR. Accordingly, the HLR is protected in that requests from a device that may be considered a security issue are not sent to the HLR.
摘要:
In one embodiment, techniques for authorizing a mobile device are provided. A registration request is received for the mobile device. The registration request may include location identifier information. For example, a cell ID may be provided. Static location information is then determined based on the location identifier information. The static location information may be spatial coordinates. The registration request is then authorized based on the static location information. For example, a cell ID may be received and then spatial coordinates may be determined based on the cell ID. The registration request is then authorized based on the spatial coordinates. A response to the registration request is then sent.
摘要:
An example method is provided and includes receiving a packet associated with a flow, determining a tunnel identifier for the flow, and determining a flow identifier for the flow. The method includes associating the flow identifier and the tunnel identifier to an Internet protocol (IP) address to generate a binding to be used for a network address and port translation (NAPT). In other embodiments, a routing decision is executed based on the binding between the identifiers and the IP address. The flow identifier can be a context identifier (CID), and the tunnel identifier can be a softwire tunnel ID. In yet other embodiments, the packet can be tagged as part of an encapsulation operation, which includes providing information about a network location at which the network address and port translation is to be executed.