摘要:
Quality of service information can be used to facilitate wireless communication. A network entity, such as a terminal, as well as a network can initialize an authorization to establish a link using quality of service information. Various features can be integrated with the use of quality of service information, such as having quality of service reservation before a call and supplying a permanent identity for use in correlation.
摘要:
Quality of service information can be used to facilitate wireless communication. A network entity, such as a terminal, as well as a network can initialize an authorization to establish a link using quality of service information. Various features can be integrated with the use of quality of service information, such as having quality of service reservation before a call and supplying a permanent identity for use in correlation.
摘要:
A method and apparatus for providing policy control in a wireless communication system. A mobile station generates a resource request for a communication service, where the resource request includes an identifier uniquely identifying a type of communication service. A packet data serving node receives the resource request for the communication service and selects a policy control entity to process the resource request. The selection by the packet data serving node is based at least on the identifier. The selected policy control entity performs policy control on the resource request.
摘要:
In a communications system where a mobile node seeks to establish contact with a server node within or outside the home network of the mobile node by first providing the general location information and the server type of the server node to a DHCP (Dynamic Host Configuration Protocol) server. The DHCP server then matches the provided information with its record in storage to arrive at an IP (Internet Protocol) address of the sought server node. The DHCP server then sends the IP address to the mobile node, thereby allowing the mobile node to directly access the server node.
摘要:
Methods and apparatus for efficient routing in communication networks. In an aspect, a method is provided for traffic routing between first and second nodes in a communication network. The method includes detecting traffic transmitted between the first and second nodes, transmitting a request to a mobility agent associated with the first node to request authorization for a route optimization between the first and second nodes, receiving a response that authorizes the route optimization, and establishing an optimized route. In an aspect, an apparatus includes detector logic for detecting traffic transmitted between the first and second nodes, transmitting logic for transmitting a request to a mobility agent associated with the first node to request authorization for a route optimization between the first and second nodes, receiving logic for receiving a response that authorizes the route optimization, and connection logic for establishing an optimized route.
摘要:
In a communication session in which data flows with encrypted data packets pass through a monitoring intermediary for data traffic control. The encrypted data packets include SPIs (Secured Parameter Indexes) which are used to identify SAs (Security Associations) for data decryption. During the initial signaling process for the communication session, the nodes seeking the communication session include the SPIs in the signaling messages and send the signaling messages through the monitoring intermediary which in turn matches the SPIs of the signaling messages with the corresponding SPIs extracted from the data packets. In enforcing data traffic control, the monitoring intermediary allows data flows to pass through if comparison matches in the SPIs are found. Otherwise, the data flows are rejected.
摘要:
Methods and apparatus for efficient routing in communication networks. In an aspect, a method is provided for traffic routing between first and second nodes in a communication network. The method includes detecting traffic transmitted between the first and second nodes, transmitting a request to a mobility agent associated with the first node to request authorization for a route optimization between the first and second nodes, receiving a response that authorizes the route optimization, and establishing an optimized route. In an aspect, an apparatus includes detector logic for detecting traffic transmitted between the first and second nodes, transmitting logic for transmitting a request to a mobility agent associated with the first node to request authorization for a route optimization between the first and second nodes, receiving logic for receiving a response that authorizes the route optimization, and connection logic for establishing an optimized route.
摘要:
In a wireless communications system in which a mobile node seeks a communication session with a correspondent node by first signaling for initialization of the communication session through a first data path via an intermediate node. Thereafter, contents of the communication is established through a second data path in which the mobile node and the correspondent node communicate straightforwardly without going through the intermediate node.
摘要:
Disclosed is a method for efficient transport of packets between a mobile station and a secure gateway over a wireless local area network for accessing home services. In the method, a first encryption security association is established for transporting first-type packets from the secure gateway to the mobile station, and a second encryption security association is established for transporting first-type packets from the mobile station to the secure gateway. Next, a first null-encryption security association is established for transporting second-type packets from the secure gateway to the mobile station, and a second null-encryption security association is established for transporting second-type packets from the mobile station to the secure gateway. Second-type packets are selected for transport using the second null-encryption security association based on a traffic selector. Also, second-type packets may be selected for transport using the first null-encryption security association based on a traffic selector. The traffic selector may be preconfigured.
摘要:
Systems and techniques are disclosed relating to wireless communications. The systems and techniques involve wireless communications wherein a packet data session may be established between a wireless communications device and a packet data serving node to support a network connection to a packet-switched network. The wireless communications device may be configured to receive a notification of an incoming call from a circuit-switched network even when the network connection is active.