摘要:
Techniques for supporting fault tolerance in communications systems are described. Fault notification messages are communicated which may be affected by a detected/reported service disruption. End nodes receiving a fault notification message determine if the message indicates a disruption in a node that is critical to the end node receiving the message. If the indicated disruption is in a critical node, the end node takes action to ameliorate the effect of the reported condition. Fault notification messages indicating disruptions in nodes which are not critical to the end node receiving the fault notification message may be ignored once it is determined that the indicated disruption is in a node which is not critical to the end node receiving the message. The invention described herein minimizes service disruption following fault, failure or outage of critical network nodes, improving overall system robustness and resiliency.
摘要:
A method and apparatus for providing uplink macro-diversity in packet-switched networks that allows packets and/or portions of packets, e.g., frames, to be selectively sent from an end node, e.g., wireless communication device or mobile terminal, over a set of multiple communication connections, e.g., physical-layer or link-layer connections, to one or more access nodes, e.g., base stations. Uplink macro-diversity is achieved in part through intelligent selective forwarding over multiple communication connections, where the forwarding decision is controlled by the end node based on a variety of factors, e.g., physical-layer channel conditions and/or higher layer policy. The forwarding decision is executed on a rapid timescale, e.g., on a per packet basis, to adapt to the dynamically varying conditions of the set of communication connections.
摘要:
The invention described herein enables a form of downlink macro-diversity in packet-switched cellular networks. It allows packets to be selectively delivered from a network/internetwork to an end node, e.g., a wireless communication device or terminal, over a set of available link-layer connections to/from the end node, through one or more access nodes, e.g., base stations. Downlink macro-diversity is particularly important when the link-layer connections between the end node and the corresponding access node, e.g., the access links, are subject to independent or partially correlated time variations in signal strength and interference. In accordance with the invention, the end node dynamically selects the downlink to be used out of a set of available access links on a per packet basis subject to prevailing channel conditions, availability of air-link resources and other constraints. The invention improves the robustness and efficiency of communication, overall utilization of air-link resources, and quality of service experienced by the end node.
摘要:
The invention described herein enables a form of downlink macro-diversity in packet-switched cellular networks. It allows packets to be selectively delivered from a network/internetwork to an end node, e.g., a wireless communication device or terminal, over a set of available link-layer connections to/from the end node, through one or more access nodes, e.g., base stations. Downlink macro-diversity is particularly important when the link-layer connections between the end node and the corresponding access node, e.g., the access links, are subject to independent or partially correlated time variations in signal strength and interference. In accordance with the invention, the end node dynamically selects the downlink to be used out of a set of available access links on a per packet basis subject to prevailing channel conditions, availability of air-link resources and other constraints. The invention improves the robustness and efficiency of communication, overall utilization of air-link resources, and quality of service experienced by the end node.
摘要:
A method and apparatus for providing uplink macro-diversity in packet-switched networks that allows packets and/or portions of packets, e.g., frames, to be selectively sent from an end node, e.g., wireless communication device or mobile terminal, over a set of multiple communication connections, e.g., physical-layer or link-layer connections, to one or more access nodes, e.g., base stations. Uplink macro-diversity is achieved in part through intelligent selective forwarding over multiple communication connections, where the forwarding decision is controlled by the end node based on a variety of factors, e.g., physical-layer channel conditions and/or higher layer policy. The forwarding decision is executed on a rapid timescale, e.g., on a per packet basis, to adapt to the dynamically varying conditions of the set of communication connections.
摘要:
Group communications methods and apparatus are described. Multiple modes of group communications signaling are supported. In a first mode, copies of packets are separately transmitted to each group member in a sector or cell. In a second mode a copy of a packet is directed to multiple group members at the same time. Transitions between the two modes may be determined as a function of the cost of operating in each of the modes in terms of system cost and/or the number of group members in a cell or sector being serviced by a transmitter.
摘要:
Signal, e.g., message, security techniques are described for wireless systems. A first signal is received by an access node via a wireless link. The signal includes a first authenticator that was generated by the transmitting device, e.g., wireless terminal. The access node determines from an attribute of the signal at least some information known to both the access node and transmitting device but which was not transmitted as part of the message content. The determined information was used by the wireless terminal in generating the first authenticator. The access node sends at least a portion of the first signal including the first authenticator and the determined information to another entity. The entity compares the first authenticator to a second authenticator it generates from the determined information and a secure key which it shares with the transmitting device to determine if the first and second authenticators match.
摘要:
Location update techniques are described. A dormant mobile node updates its location information by sending a first message over a wireless link to an access node. The access node generates a second update message in response to the first message. The second message includes a mobile node identifier and, in some embodiments is directed to the mobile node. The second message is received by a tracking agent, which updates location information corresponding to the mobile node. In the case where second message is an IP message and is routed to the mobile node using Mobile IP, a Mobile IP home agent routes the second message to the mobile node's last point of network attachment where the tracking agent is located and intercepts the message. The tracking agent may send a response message to the access node sending the second message.
摘要:
Signal, e.g., message, security techniques are described for wireless systems. A first signal is received by an access node via a wireless link. The signal includes a first authenticator that was generated by the transmitting device, e.g., wireless terminal. The access node determines from an attribute of the signal at least some information known to both the access node and transmitting device but which was not transmitted as part of the message content. The determined information was used by the wireless terminal in generating the first authenticator. The access node sends at least a portion of the first signal including the first authenticator and the determined information to another entity. The entity compares the first authenticator to a second authenticator it generates from the determined information and a secure key which it shares with the transmitting device to determine if the first and second authenticators match.
摘要:
Methods and apparatus for establishing communication links, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the establishment of initial links to a first access node and the establishment of new links from a first access node to a second access node during a handoff operation using highly efficient messages and signal.