摘要:
A method in one example has: establishing communication between two mobile terminals in a base station routing architecture network; and optimizing routing between the two mobiles terminals without requiring all traffic to traverse an anchor point in the base station routing architecture network. An IP base station transceiver architecture utilizes network controlled mobility to provide a transparent connection between a mobile terminal and an anchor point in the network. This transparency hides the mobility associated with changing IP base station transceivers from the mobile terminal and reduces over-the-air signaling.
摘要:
A method in one example has: establishing communication between two mobile terminals in a base station routing architecture network; and optimizing routing between the two mobiles terminals without requiring all traffic to traverse an anchor point in the base station routing architecture network. An IP base station transceiver architecture utilizes network controlled mobility to provide a transparent connection between a mobile terminal and an anchor point in the network. This transparency hides the mobility associated with changing IP base station transceivers from the mobile terminal and reduces over-the-air signaling.
摘要:
An exemplary method implements route optimization in an IP telecommunication network that supports wireless mobile stations (MSs). IP address information related to packet flow for MSs is identified and stored in records at a local mobility anchor point (LMAP). The records are compared to determine matching pairs, i.e. records that represent that a first MS is engaged in a communication session with a second MS. First and second points of attachment nodes are determined that support the first and second MS, respectively, based on IP address information contained in a matching pair of records associated with the first and second MS. A route optimization (RO) message is transmitted to the first and second point of attachment nodes, where the RO message includes an IP address of the other point of attachment node. The RO messages represent a request for the first and second point of attachment nodes to address packets sent between the first and second MS with a source address of one of the first and second point of attachment nodes and a destination address of the other of the first and second point of attachment nodes.
摘要:
An exemplary method implements route optimization in an IP telecommunication network that supports wireless mobile stations (MSs). IP address information related to packet flow for MSs is identified and stored in records at a local mobility anchor point (LMAP). The records are compared to determine matching pairs, i.e. records that represent that a first MS is engaged in a communication session with a second MS. First and second points of attachment nodes are determined that support the first and second MS, respectively, based on IP address information contained in a matching pair of records associated with the first and second MS. A route optimization (RO) message is transmitted to the first and second point of attachment nodes, where the RO message includes an IP address of the other point of attachment node. The RO messages represent a request for the first and second point of attachment nodes to address packets sent between the first and second MS with a source address of one of the first and second point of attachment nodes and a destination address of the other of the first and second point of attachment nodes.
摘要:
An apparatus in one example may have a functionality of a policy decision function divided into two parts; one part representing a home network application function and the other part representing visited network bearer resources and local policies. The one part of the policy decision function supports communications with the application function, and represents the home network and application in a request for QoS control to the visited network. The other part of the policy decision function supports visited network interactions with a policy enforcement function, and represents visited network local policy related to resource utilization and roaming agreement-based policy.
摘要:
Described are techniques for intermodule communication between a first code module and a second code module wherein one of the first and second code modules executing in user space and the other of the first and second code modules executing in kernel space. A shared memory portion includes storage for one or more commands. A first first-in-first-out (FIFO) structure is used to send a location in the shared memory portion from the first to the second code module. A second FIFO structure is used for sending a location in the shared memory portion from the second to the first code module. The first code module stores command data for a command at a first location in the shared memory portion. A command is issued from the first to the second code module by sending the first location using the first FIFO structure.
摘要:
This invention is a system and method for managing one or more data storage networks using a new architecture. A method for handling logical to physical mapping is included in one embodiment with the new architecture. A method for handling errors is included in another embodiment with the new architecture.
摘要:
Described are techniques for providing a logical device model. In one embodiment, a a method for providing a logical device model includes providing a plurality of logical devices, at least one of said plurality of logical devices being provided by a first provider executing in kernel space and at least one of said plurality of logical devices being provided by a second provider executing in user space, and establishing a relationship between the first provider and the second provider wherein the first provider is a consumer of a logical device provided by the second provider, said logical device model including said relationship.
摘要:
Described are techniques for performing remote procedure calls (RPCs). An RPC API is described which provides for using an optimized technique and an unoptimized technique for performing RPCs. The optimized technique includes a client container performing a call to obtain RPC configuration information which is then stored by the client container and may be used by the client container in connection with multiple RPC invocations. Techniques are also described for communicating parameter information between containers executing in different address spaces by forming parameter information on the client side using embedded lists, encoding the parameter information on the client side prior to transmission to the server, and transmitting the encoded parameter information to the server which determines output parameters and returns the output parameters to the client.
摘要:
A method for maintaining routing information for a wireless device includes determining, by a target communications controller, an original address of the wireless device handed over from a source communications controller, where the original address is assigned by an original communications controller. The method also includes updating, by the target communications controller, routing information associated with the wireless device using a border gateway protocol message if the original address lies within a range of addresses managed by a communications system including the target communications controller and an aggregation router, where the routing information is stored at the aggregation router.