摘要:
A method and apparatus are disclosed for selectively accessing and independently sizing connection identification tables within a network switch. Upon receipt of a data unit, such as an asynchronous transfer mode cell at an input port of an Input Output Module, a plurality of selection bits are inserted into the cell header which are used to select one of a plurality of connection identifiers. The VPI/VCI addresses are mapped into a connection identifier and the connection identifier is also inserted within the respective cell header. The connection identifier may comprise an unicast connection identifier, a multicast connection identifier, or a redundant unicast identifier. The unicast, multicast and redundant identifiers are either stored in separate tables at call setup and the tables are independently selectable via use of the selection bits stored within the cell header. Alternatively, the selection bits are employed to specify a register which points to the first address for the respective type of identifiers. Thus, identifiers of a particular connection type are accessible via a base address plus an offset address. In the described manner, tables or portions of tables containing connection identifiers may be flexibly and independently sized.
摘要:
A method and apparatus for performing virtual connection merging in an output port of a network switch are disclosed. In the event no completely assembled packets have been received and scheduled for transmission, a partially received packet is selected for cut-through transmission prior to receipt of all cells comprising the packet. Transmission of the selected packet is initiated and a timer is started. If the timer expires prior to the receipt of an end of packet indication for the packet for which transmission has commenced, and end of packet signal is generated and transmitted and the transmission of additional cells for the cut-through packet is aborted. In this manner, delays associated with packet reassembly may be avoided and buffer sizes of reassembly buffers may be reduced.
摘要:
An apparatus and technique for facilitating mapping of a Multicast Circuit Identifier ("MID") to a Local Circuit Identifiers ("CID") is disclosed. Table entries for such mapping can be disposed in non-contiguous memory locations. A pointer is employed in ca h entry to indicate the location of any subsequent memory location associated with the MID. CIDs and associated memory locations are allocated only for ports that participate in a connection. To implement the apparatus and technique a first table provides an index into a second table based upon the MID. The second table includes entries having a port identification field, a pointer field and a CID field. The CID field indicates the CID associated with the port indicated by the port identification field. The CID is written to the header of the copy of the cell to be transmitted to the indicated port. The pointer indicates further entries in the second table that are associated with other copies of the cell to be transmitted in the multicast connection, if such entries exist. The CID is employed to obtain a Virtual Path Identifier ("VPI") and Virtual Circuit Identifier ("VCI") from a third table.
摘要:
A radio access network dynamically modifies a route update protocol of an access terminal in an active state that is in communication with the network, such that the access terminal reports a route update message upon satisfaction of a condition. The condition may be related to an inter-revision hard handoff, an inter-frequency hard handoff, a RF dragging prevention, a selective resource allocation, or some combination thereof.
摘要:
A device receives information about signals detected by an access terminal, a first one of the signals corresponds to a radio node with which the access terminal is in communication, and if a second signal detected by the access terminal does not correspond to signals in use by the radio node and the access terminal, and if a condition is met, the devise causes the access terminal to alter communication with the radio node.
摘要:
A proxy is in communication with an internet protocol network and a mobile operator network. The proxy receives first communications from access points via the internet protocol network, transmits content from the first communications to the mobile operator network, receives second communications from the mobile operator network, and transmits content from the second communications to the access points via the internet protocol network. The proxy may perform operations based on the first and second communications received from either the access points, or from the mobile operator network. The operations performed by the proxy may include modifying the communications, saving certain information regarding the communications, performing authentication, encryption, or decryption of the communications, determining a destination for the communications, or sending the communications to a destination.
摘要:
The radio node controller of one subnet sends a communication to an access terminal over a control channel through the infrastructure of another subnet. The radio node controller maintains an open traffic channel with an access terminal when the access terminal moves from a coverage area of the first subnet to a coverage area of the second subnet and when the access terminal uses a carrier in the first subnet that cannot be used in the second subnet. In a radio access network including a first and a second subnet, in which the first subnet includes both a first radio node controller and radio nodes that are configured in accordance with one 1xEV-DO standard and the second subnet includes radio nodes configured in accordance with another 1xEV-DO standard, the first radio node controller maintains an open traffic channel with an access terminal when the access terminal moves from the coverage area of the first subnet to the coverage area of the second subnet.
摘要:
In a radio access network, techniques for multicasting information from a radio network controller to radio nodes. The techniques further include broadcasting the information from the radio nodes to mobile access terminals. The information can include content to be delivered to the access terminals.
摘要:
In a radio access network, techniques for defining a non-circular paging area in which an access terminal is to be paged based on distance-based location updating information for a sector of the network.
摘要:
A proxy is in communication with an internet protocol network and a mobile operator network. The proxy receives first communications from access points via the internet protocol network, transmits content from the first communications to the mobile operator network, receives second communications from the mobile operator network, and transmits content from the second communications to the access points via the internet protocol network. The proxy may perform operations based on the first and second communications received from either the access points, or from the mobile operator network. The operations performed by the proxy may include modifying the communications, saving certain information regarding the communications, performing authentication, encryption, or decryption of the communications, determining a destination for the communications, or sending the communications to a destination.