摘要:
A method performed by a wireless node includes receiving a data flow associated with user devices; performing a packet inspection of the data flow; determining whether a network address of the wireless node matches another network address associated with the data flow; converting the other network address to a layer 2 identifier when the other network address matches the network address; establishing a bearer link within the wireless node based on the layer 2 identifier; and offloading the data flow from layers of a network, which are higher relative to the wireless node, to the bearer link, wherein the data flow does not traverse the layers.
摘要:
A method performed by a wireless node including receiving charging policies for data offloading; performing data offloading with respect to a user data flow; generating charging information associated with data offloading based on the charging policies; and sending the charging information to at least one of an on-line charging function or an off-line charging function.
摘要:
A method performed by a wireless node including receiving charging policies for data offloading; performing data offloading with respect to a user data flow; generating charging information associated with data offloading based on the charging policies; and sending the charging information to at least one of an on-line charging function or an off-line charging function.
摘要:
A method performed by a wireless node includes receiving a data flow associated with user devices; performing a packet inspection of the data flow; determining whether a network address of the wireless node matches another network address associated with the data flow; converting the other network address to a layer 2 identifier when the other network address matches the network address; establishing a bearer link within the wireless node based on the layer 2 identifier; and offloading the data flow from layers of a network, which are higher relative to the wireless node, to the bearer link, wherein the data flow does not traverse the layers.
摘要:
A method performed by a wireless node includes receiving policies for data offloading; identifying a user associated with a data flow to which a user device is attached; determining whether data offloading is permitted for the user based on the policies; and performing data offloading when it is determined that data offloading is permitted for the user, wherein data offloading includes routing the data flow away from at least one of a higher layer traffic aggregation device relative to the wireless node or a higher hierarchical controlling device relative to the wireless node.
摘要:
A method performed by a wireless node includes receiving policies for data offloading; identifying a user associated with a data flow to which a user device is attached; determining whether data offloading is permitted for the user based on the policies; and performing data offloading when it is determined that data offloading is permitted for the user, wherein data offloading includes routing the data flow away from at least one of a higher layer traffic aggregation device relative to the wireless node or a higher hierarchical controlling device relative to the wireless node.
摘要:
The invention is a flexible photovoltaic article having excellent environmental barrier and mechanical protection for the photovoltaic system. The article comprises top side protective layers that include a flexible thin film glass under a top side stress relieving layer and on the opposite side of the photovoltaic cell a backside stress relieving layer.
摘要:
A method including receiving a session request associated with a user equipment (UE); selecting one or more network address pool name lists based on a type of service to be provided to the UE; selecting one or more network address pool names from the one or more network address pool name lists based on a priority associated with the one or more network address pool names; selecting one or more network addresses from the one or more network address pool names; assigning the one or more network addresses to the UE; and establishing a session with the UE.
摘要:
The fluoropolymer compositions of the present invention generally incorporate ingredients comprising one or more fluoropolymers, an ultraviolet light protection component (hereinafter UV protection component), and optionally one or more additional ingredients if desired. The UV protection component includes a combination of at least one hindered tertiary amine (HTA) compound having a certain structure and a weight average molecular weight of at least 1000. This tertiary amine is used in combination with at least one organic, UV light absorbing compound (UVLA compound) having a weight average molecular weight greater than 500. When the HTA compound and the UVLA compound are selected according to principles of the present invention, the UV protection component provides fluoropolymer compositions with significantly improved weatherability characteristics for protecting underlying materials, features, structures, components, and/or the like. In particular, fluoropolymer compositions incorporating the UV protection component of the present invention have unexpectedly improved ability to resist blackening, coloration, or other de gradation that may be caused by UV exposure. As a consequence, devices protected by these compositions would be expected to have dramatically improved service life. The compositions have a wide range of uses but are particularly useful for forming protective layers in optoelectronic devices.
摘要:
Identification of radio coverage of a mobile station (MS) via a pico cell, such as an IP-BTS in a user premises (e.g. residence or business customer location), enables a mobile/wireless service provider to differentiate between coverage under a pico cell and coverage under a macro network. In a disclosed example, when the MS requests registration/authentication through a pico cell, a related signaling message includes a pico cell identifier (pID). A home location register (HLR) is provisioned with a pID, so that the HLR can decide to accept or reject the registration/authentication requests. For example, if the particular MS is provisioned for services from a specific pico cell, the HLR will grant the registration/authentication and allow the network to process calls for the mobile station through the identified pico cell. This enables the provider to allow discounted services through pico cell, e.g. as a replacement for a landline.