摘要:
A first and a second, different wireless access technology are supported (101 and 102) via an access gateway (200). The first wireless access technology, for example, can serve to facilitate provision of a wireless communication session with a given mobile station (104). Using (105) a received first identifier that correlates the mobile station to the first wireless access technology and a received second identifier that correlates the mobile station to the second wireless access technology, this access gateway can then, when appropriate, effect (106) a handover of that wireless communication session for that mobile station from the first wireless access technology to the second wireless access technology.
摘要:
Applications on a mobile radio device selectively communicate over a wireless network based on a dormancy of the air interface. Middleware is provided between the applications and drivers of the mobile radio device for facilitating communication sessions based on the dormancy status of the air interface. The middleware effects selective communication sessions, in one embodiment, by informing applications of the state of the air interface and, in another embodiment, to allow and disallow one or more communication sessions.
摘要:
An apparatus (30), upon receiving a data packet at a network element interface (31), which data packet corresponds to a given network element, can use an accounting information processor (33) to develop specific accounting information regarding network usage on behalf of the given network element. For example, discrete accounting information can be developed to indicate whether data packets are blocked for forwarded as per the operations of a data packet filter (32). As another example, discrete accounting information can be developed to indicate the quantity of data packets as are handled for each of a plurality of different quality of service levels as ascertained by a quality of service-based data packet processor (34).
摘要:
Method and apparatus for establishing a tunnel between a mobile node and a routing device. The method includes the steps of utilizing the mobile node to place a call over a cellular network and gaining access to a foreign agent of the cellular network. A Mobile IP link is established between the foreign agent and a home agent and the call is authenticated. A tunnel is initiated between the home agent and the routing device and call data is tunneled between the home agent and the routing device.
摘要:
A method and system for a mobile station to identify to a wireless network agent, an access point into a wireless network. The mobile station obtains an indication of an access point into the wireless network and inserts the indication into a mobile registration message. The access point identifier identifies an access point into the wireless network. Then, the mobile station sends the mobile registration message to the wireless network agent via the access point identified by the access point identifier. The wireless network agent receives the mobile registration message and provides the access point identifier to an authentication, authorization, and accounting (AAA) server. The AAA server uses the access point identifier to provide location-based services to the mobile station.
摘要:
While one node (such as a wireless mobile node) facilitates a point-to-multipoint communication via a communications network (10), communication requests from other nodes in the multipoint audience are queued in a node queue (17). At some point (in a preferred approach, at the conclusion of the transmission by the one node), and typically for a predetermined amount of time, communication requests are further noted. These more recent indicia of a desire to communicate are then utilized to modify the node queue. Subsequent communications are then arranged, at least in part, based upon the modified node queue.
摘要:
Level of service information for a given user of a radio access network (10) is determined at a Packet Data Serving Node (18) and provided to the radio access network for use in determining a particular level of service to provide to the given user. The level of service can comprise an absolute level of service (such as a maximum data rate to be accorded the user) or a dynamic relative level of service (such as information that is used to compare competing users to determine a particular current apportioning of communications resources). In one embodiment, the level of service information is provided to the radio access network via a modified A11 registration update message.
摘要:
Under at least some operating circumstances, when a temporary session parameter (such as, for example, a temporarily assigned Internet protocol address or a negotiated point-to-point protocol session parameter) is used during a first Internet protocol session for a given node, and that node initiates a new (or what appears to be a new) session within a limited period of time, that temporary session parameter is again used to facilitate the new session.
摘要:
A system for user-space packet modification, including a set of kernel code and a user-level application programming interface (API). The system facilitates creation of a special socket for passing packets between kernel space and user space. The system in turn facilitates creation and application of a packet filter associated with the socket, in order to trap incoming or outgoing packets being processed in the kernel at a designated point in a protocol stack. Once a packet is trapped, it is moved through the socket into user space, thereby at least temporarily preventing the protocol stack from further processing the packet. In user space, an application may operate on the packet, for instance, modifying aspects of the packet or deleting the packet altogether. The system in turn facilitates injection of a packet from user space into kernel space, and into a designated point in the protocol stack for desired stack processing.
摘要:
A network element (20), such as a PDSN or home agent, upon determining (11) a need to effect a call management operation, then determines (12) whether to constrain the facilitation of that call management operation. When determining that the call management operation should be constrained, the network element can facilitate (14) that call management operation while imposing an artificial facilitation constraint. For example, the rate at which the call management operation is executed with respect to a plurality of existing calls can be specified.