摘要:
This paper proposes a new method and architecture for populating, updating and managing the NAB. It also proposes user's Contact Information Discovery (CID). In context of populating the NAB; since the NAB of each individual subscriber will be stored in the network in future, the paper proposes CI to flow from one NAB to another NAB within the core network, instead of CI flowing from Device to Network. Thus with the user authorization, his CI would shoot from one NAB to another NAB within the core network instead of from LAB to NAB through air interface. It would reduce huge amount of data traffic on the air that otherwise would be generated in updating and populating the NAB by all the NAB users. In context of CID, the paper proposes a query-response mechanism and introduces a NAB Manager. The new architecture will provide several benefits for example it will eliminate the need of “Number Portability,” “United States National Do Not Call Registry” and “411 Directory Assistance.”
摘要:
In some embodiments, a personal possession management system using a short range Internet Protocol (IP) based Personal Area Network (PAN) comprises a master device MD to be worn or held by a user, and an IP based RFID electronic tag ET to be attached to or contained within a personal possession desired to be managed. The electronic tag ET has communicability with the master device. The master device MD is configured to allot an IP address to the electronic tag ET in a registration mode using IEEE 802.11 protocols and sends probes to the electronic tag ET. The electronic tag ET is configured to receive messages from the master device MD and respond accordingly. The master device MD alerts a user when the communicability between the master device MD and the electronic tag Er is disrupted in a monitoring mode.
摘要:
In some of the preferred embodiments, a method for network discovery of a mobile device to use at least one of a plurality of access networks within an IP network includes: obtaining specified network information in the vicinity of a given location based on a set of criteria when a mobile is connected to the IP network from any location.
摘要:
Systems and methods are described for secure and seamless roaming between internal and external networks. Double and triple tunnels may be used to connect a mobile node to a correspondent host. A mobile node may include the ability to connect to two networks simultaneously to enable seamless roaming between networks.
摘要:
In some embodiments, a system and method for substantially real-time comparison of quality of interfaces by mobile devices over heterogeneous networks is disclosed. The method can be performed using a dynamic and rapid comparison by distributed hosts, using a minimal number of injected network packets, using minimal path quality metrics, which path quality metrics are independent of how a Qol is measured, and in a manner suitable for both wireline and wireless networks.
摘要:
This document describes a proactive mechanism to provide fast-handover involving PMIPv6. In particular, it describes how one can achieve fast handoff for PMIPv6 using Media-independent Pre-Authentication (MPA) technique. It discusses the need for a fast-handoff for PMIPv6 environment. It then describes how MPA techniques could be used during different steps involving both intra-domain and inter-domain handoff for PMIPv6. MPA-based fast-handover takes advantage of the pre-authentication mechanism so that the mobile can perform the access authentication while in the previous local mobility (PMA) domain and thus would be able to complete many of the handoff related operations while still in the previous network.
摘要:
A system and method for equalizing traffic between antenna beams is described. Aspects of the system and method may vary the beam widths to attempt to equalize traffic based on non-real-time communications and/or non-real-time communications.
摘要:
This application describes, among other things, a framework of Media-independent Pre-Authentication (MPA), a new handover optimization mechanism that has a potential to address issues on existing mobility management protocols and mobility optimization mechanisms. MPA is a mobile-assisted, secure handover optimization scheme that works over any link-layer and with any mobility management protocol. This application also shows, among other things, an initial implementation of MPA in our testbed and some performance results to show how existing protocols could be leveraged to realize the functionalities of MPA.
摘要:
This document describes a channel binding mechanism based on parameter binding in the key derivation procedure. The method cryptographically binds access network parameters to a key without need to carry those parameters in EAP methods.
摘要:
An access point station responds to a request from a user station for contention-based access of a new traffic flow to a wireless transmission medium by applying a model of the wireless local area network to estimate delay that data packets will experience when delivered through the wireless network, in order to admit the new flow upon determining that admission will not violate quality of service requirements of neither the new flow nor of already admitted flows. For example, the access point station applies the model by determining an average packet inter-arrival rate, solving a system of nonlinear equations to determine probabilities of successful transmission, applying network stability conditions, computing an upper bound on queuing delay for the packets, computing a service delay budget for the packets, and computing an expected fraction of missed packets from the service delay budget.