摘要:
A single USB interrupt endpoint is usable by two different active logical devices in a USB device. If a first logical device is to interrupt a USB host, then the first logical device writes a notification into the endpoint. The notification carries a number that identifies a first device object. If, however, a second logical device is to interrupt the host, then the second logical device writes a notification into the endpoint, but the notification carries a number that identifies a second device object. The USB host reads the notification. In one example, if the number and a Device ID indicate that the notification is for the first object, then the first object processes the notification. If the number and Device ID indicate that the notification is for the second object, then the first object notifies the second object so that the second object processes the notification.
摘要:
A single USB interrupt endpoint is usable by two different active logical devices in a USB device. If a first logical device is to interrupt a USB host, then the first logical device writes a notification into the endpoint. The notification carries a number that identifies a first device object. If, however, a second logical device is to interrupt the host, then the second logical device writes a notification into the endpoint, but the notification carries a number that identifies a second device object. The USB host reads the notification. In one example, if the number and a Device ID indicate that the notification is for the first object, then the first object processes the notification. If the number and Device ID indicate that the notification is for the second object, then the first object notifies the second object so that the second object processes the notification.
摘要:
An interface architecture and protocol are provided for transferring messages between a plurality of devices. The architecture provides the capability to generate a plurality of service messages according to a single message format, and to transfer the service messages between a plurality of control points or service entities according to an efficient multiplexing protocol. The control points can be software applications or device drivers running on a terminal equipment device, and the service entities can be communication services such as network access services or device management services running on an attached data communication device such as a modem or a cellular phone.
摘要:
Techniques for performing flow control in Universal Serial Bus (USB) are described. In one design, a USB host sends token packets to a USB device to initiate data exchanges with the USB device. The USB device determines that it is incapable of exchanging data with the USB host, e.g., because there is no data to send or because its buffer is full or near full. The USB device then sends a “flow off” notification to the USB host to suspend data exchanges. The USB host receives the flow off notification and suspends sending token packets to the USB device. Thereafter, the USB device determines that it is capable of exchanging data with the USB host. The USB device then sends a “flow on” notification to the USB host to resume data exchanges. The USB host receives the flow on notification and resumes sending token packets to the USB device.
摘要:
Methods and apparatus are presented herein for allowing a keyless access terminal (AT) to access a packet serving data node (PSDN) over a service network stream without deactivating the authentication functions of the authentication network stream.
摘要:
Methods and apparatus are presented herein for allowing a keyless access terminal (AT) to access a packet serving data node (PSDN) over a service network stream without deactivating the authentication functions of the authentication network stream.
摘要:
Methods and apparatus are presented to support the mobile Internet Protocol (mobile IP) across different air interface standards. In particular, mechanisms are provided that will allow a mobile device to selectively force a Point-to-Point Protocol (PPP) session resynchronization when the mobile device moves from the support of one air interface standard to another.
摘要:
Methods and apparatus are presented herein for allowing a wireless communication device to perform a proxy authentication on behalf of a tethered device and ensure the authentication is encrypted.
摘要:
According to the invention an embodiment, a network node for communicating using a MAC address is disclosed. The network node includes a point-to-point interface, a bridge and a MAC address register. The point-to-point interface uses a first protocol. The bridge is coupled to the point-to-point interface and provides a fixed route for the Ethernet interface. The first protocol encapsulates the data of a second protocol. The MAC address register stores the MAC address for the second protocol, were the MAC address is dynamically determined in the field and written to the MAC address register. The MAC address is used when communicating with the network node through the point-to-point interface.
摘要:
Methods and apparatus are presented for enabling data connectivity when a handoff occurs between one communication network and another communication network, wherein the communication networks belong to different air interface standards. The mobile station triggers a Compression Control Protocol (CCP) request message to a tethered device if the mobile station determines that a new PDSN is not enabled to perform the CCP protocol. The tethered device then responds with a CCP request message with or without new negotiation parameters. The mobile station forwards the CCP request message to the new PDSN. Since the new PDSN is not enabled with CCP, the new PDSN responds with a CCP rejection message. The rejection message is passed from the mobile station back to the tethered device. The tethered device then sends uncompressed data packets to the PDSN.