摘要:
Systems, methods, and instrumentalities are disclosed to determine quality of service information. A device, such as a user equipment (UE), may receive a policy. The policy may indicate a level of inspection relating to application identification for a session. The device may receive information associated with the session. For example, the information may include application provided information, packet data, operating system provided information, etc. The device may perform an inspection of the received information at the level indicated by the policy. The device may perform the inspection in order to identify an application associated with the session.
摘要:
Systems, methods, and instrumentalities are disclosed to communicate traffic flow information to a network. A user equipment (UE) may detect a traffic flow (e.g., using one or more of the traffic detection implementations described herein). A 5-tuple associated with the traffic flow may be unknown by the network. The UE may issue an alert to the network. The alert may indicate to the network that the traffic flow has been detected. The UE may determine the 5-tuple associated with the traffic flow. The UE may report the 5-tuple to the network. The report may be in response to one or more of: a request received from the network requesting traffic flow information; or, a determination that a first policy condition has been met.
摘要:
Systems, methods, and instrumentalities are disclosed to communicate traffic flow information to a network. A user equipment (UE) may detect a traffic flow (e.g., using one or more of the traffic detection implementations described herein). A 5-tuple associated with the traffic flow may be unknown by the network. The UE may issue an alert to the network. The alert may indicate to the network that the traffic flow has been detected. The UE may determine the 5-tuple associated with the traffic flow. The UE may report the 5-tuple to the network. The report may be in response to one or more of: a request received from the network requesting traffic flow information; or, a determination that a first policy condition has been met.
摘要:
Systems and methods for integrating bandwidth management (BWM) equipment into a network in order to manage the use of bandwidth over multiple radio access technologies (RATs) relating to communications between a wireless transmit receive unit and a mobile core network (MCN). When integrating itself into the network, a BWM server may be placed between a MCN and an femto access point. In order for WTRUs to communicate with the MCN through the femto access point and a BWM server, a BWM server may need deep packet inspection capabilities.
摘要:
Systems and methods for providing a converged gateway (CGW) may be disclosed. A policy may be by the CGW to make routing decisions (e.g. segregation and/or aggregation of flows or traffic associated with data) for various interfaces and/or radio access technologies (RATs) that may be included in a LAN, device, and/or communication system. The policy may be locally stored within the CGW. Dynamic flow management, load balancing, offloading, PDF context establishment, prioritization, detection of devices, and the like may also be provided and/or implemented in the CG W and may be used to route flows and/or traffic associated with data.
摘要:
Systems and methods for integrating bandwidth management (BWM) equipment into a network in order to manage the use of bandwidth over multiple radio access technologies (RATs) relating to communications between a wireless transmit receive unit and a mobile core network (MCN). When integrating itself into the network, a BWM server may be placed between a MCN and an femto access point. In order for WTRUs to communicate with the MCN through the femto access point and a BWM server, a BWM server may need deep packet inspection capabilities.
摘要:
A user may point a control device at a controllable device for which control is desired, and the control device may detect the targeted controllable device. Additionally, the control device may detect a plurality of wireless nodes and list the available wireless nodes. For example, the control device may identify wireless nodes associated with a particular room in the house, or the control device may detect the wireless nodes within a certain range. The list may be a selectable list and a user may select the desired device to control from the list. Upon detection or user selection, the control device may establish control of the wireless node and initiate actions associated with the selected device.
摘要:
A user may point a control device at a controllable device for which control is desired, and the control device may detect the targeted controllable device. Additionally, the control device may detect a plurality of wireless nodes and list the available wireless nodes. For example, the control device may identify wireless nodes associated with a particular room in the house, or the control device may detect the wireless nodes within a certain range. The list may be a selectable list and a user may select the desired device to control from the list. Upon detection or user selection, the control device may establish control of the wireless node and initiate actions associated with the selected device.
摘要:
A device and method for registering devices on advanced networks as well as providing operative communications between a legacy device and a advanced network. The legacy device may contain data, such as sensor data, which is being collected on a network outside the communication range/abilities of the legacy device. An intermediary device may receive the data via a first communication scheme and send the device to a server collecting the data via a second communication scheme.
摘要:
A device and method for registering devices on advanced networks as well as providing operative communications between a legacy device and a advanced network. The legacy device may contain data, such as sensor data, which is being collected on a network outside the communication range/abilities of the legacy device. An intermediary device may receive the data via a first communication scheme and send the device to a server collecting the data via a second communication scheme.