摘要:
An apparatus and method are disclosed for tracking a large number of wireless terminals and for estimating the location of the terminals at each instant. Some embodiments of the present invention use a wide variety of factors to determine the order and frequency with which each wireless terminal is located. These factors include, but are not limited to, the history of the location of the wireless terminal, the time of day, and the weather.
摘要:
An apparatus and method are disclosed for tracking a large number of wireless terminals and for estimating the location of the terminals at each instant. Some embodiments of the present invention use a wide variety of factors to determine the order and frequency with which each wireless terminal is located. These factors include, but are not limited to, the history of the location of the wireless terminal, the time of day, and the weather.
摘要:
A type of network traffic associated with a packet received from a remote node of an access network is determined. A first interface logic routes the packet to a radio network controller (RNC) if the packet is received from an Internet protocol-basestation (IP-BTS) access network and destined to a packet core network. The RNC forwards the packet to a component of the packet core network. A second interface logic routes the packet to the component of the packet core network, including aggregating other packets of the same type received from other remote nodes, if the packet is received from a femto cell and destined to the packet core network. A breakout logic routes the packet to a destination of the Internet directly to enable the packet to reach the Internet without having to route the packet to the component of the packet core network, if the packet is destined to the Internet.
摘要:
An illustrative system and method for detecting a wireless terminal in a wireless network by ascertaining information about the wireless terminal's location, thus enabling individualized surveillance and tracking of certain wireless terminals. In some embodiments, the detection is triggered by a signal that is compliant with the Customized Applications for Mobile networks Enhanced Logic (“CAMEL”) protocol. Several kinds of mobile-telecommunications events can trigger detection, including events that do not involve call origination. Advantages include bypassing the home location register when obtaining a location estimate for the wireless terminal and when determining whether a wireless terminal is of interest.
摘要:
Techniques for bypassing a packet core network for Internet bound traffic from user equipment (UE) via a RAN are described herein. According to one embodiment, it is determined whether a packet of data is destined for the Internet, in response to receiving the packet from a radio network controller (RNC) of a radio access network (RAN). The packet is originated from user equipment (UE) over the RAN. The packet is routed directly to the Internet without sending the packet to an SGSN (serving GPRS support node) of a packet core network, if the packet is destined to the Internet. Other methods and apparatuses are also described.
摘要:
An illustrative system and method for detecting a wireless terminal in a wireless network by ascertaining information about the wireless terminal's location, thus enabling individualized surveillance and tracking of certain wireless terminals. In some embodiments, the detection is triggered by a signal that is compliant with the Customized Applications for Mobile networks Enhanced Logic (“CAMEL”) protocol. Several kinds of mobile-telecommunications events can trigger detection, including events that do not involve call origination. Advantages include bypassing the home location register when obtaining a location estimate for the wireless terminal and when determining whether a wireless terminal is of interest.
摘要:
Techniques for bypassing a packet core network for Internet bound traffic from user equipment (UE) via a RAN are described herein. According to one embodiment, it is determined whether a packet of data is destined for the Internet, in response to receiving the packet from a radio network controller (RNC) of a radio access network (RAN). The packet is originated from user equipment (UE) over the RAN. The packet is routed directly to the Internet without sending the packet to an SGSN (serving GPRS support node) of a packet core network, if the packet is destined to the Internet. Other methods and apparatuses are also described.
摘要:
A type of network traffic associated with a packet received from a remote node of an access network is determined. A first interface logic routes the packet to a radio network controller (RNC) if the packet is received from an Internet protocol-basestation (IP-BTS) access network and destined to a packet core network. The RNC forwards the packet to a component of the packet core network. A second interface logic routes the packet to the component of the packet core network, including aggregating other packets of the same type received from other remote nodes, if the packet is received from a femto cell and destined to the packet core network. A breakout logic routes the packet to a destination of the Internet directly to enable the packet to reach the Internet without having to route the packet to the component of the packet core network, if the packet is destined to the Internet.