摘要:
Systems and methods for switching among networks (e.g., heterogeneous) and inter-working between a source access system and a target access system, by implementing tunneling from the AT to the target access system via the source access system. An inter-system handoff control component can facilitate setting tunneling by the mobile unit to the target access and/or between the source access system and the target access system—wherein signaling/packeting associated with the target system can be transferred over the source system.
摘要:
Systems and methods for switching among networks (e.g., heterogeneous) and inter-working between a source access system and a target access system, by implementing tunneling from the AT to the target access system via the source access system. An inter-system handoff control component can facilitate setting tunneling by the mobile unit to the target access and/or between the source access system and the target access system—wherein signaling/packeting associated with the target system can be transferred over the source system.
摘要:
In a wireless communication system having multiple access nodes, a home agent (HA) maintains home address (HoA) for a mobile node so that an IP session can be established. As the mobile node moves within a coverage area of various access nodes, the mobile node can establish a secure relationship with a local access gateway and thereby register a local IP address, referred to as a care-of-address (CoA), with the HA. Mobile IP protocol can be established so that multiple sessions can be conducted. In maintaining policy and charging control (PCC), HA informs a policy and charging rules function (PCRF), which in turn can then send the appropriate PCC rules (e.g., IP flows and related policies) to a policy and charging enforcement function (PCEF) for a particular access gateway. Coordination necessary to associate CoA and HoA can further include filter information as to application can run on a particular interface.
摘要:
In a wireless communication system having multiple access nodes, a home agent (HA) maintains home address (HoA) for a mobile node so that an IP session can be established. As the mobile node moves within a coverage area of various access nodes, the mobile node can establish a secure relationship with a local access gateway and thereby register a local IP address, referred to as a care-of-address (CoA), with the HA. Mobile IP protocol can be established so that multiple sessions can be conducted. In maintaining policy and charging control (PCC), HA informs a policy and charging rules function (PCRF), which in turn can then send the appropriate PCC rules (e.g., IP flows and related policies) to a policy and charging enforcement function (PCEF) for a particular access gateway. Coordination necessary to associate CoA and HoA can further include filter information as to application can run on a particular interface.
摘要:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
摘要:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
摘要:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
摘要:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
摘要:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
摘要:
A method and apparatus for providing policy control in a wireless communication system. A mobile station generates a resource request for a communication service, where the resource request includes an identifier uniquely identifying a type of communication service. A packet data serving node receives the resource request for the communication service and selects a policy control entity to process the resource request. The selection by the packet data serving node is based at least on the identifier. The selected policy control entity performs policy control on the resource request.