摘要:
Systems and methodologies are described that facilitate fetching a native security context between network nodes in a core network after an inter-system handover of a mobile device. For instance, a mobility message that is integrity protected by a security context (e.g., the native security context, a mapped security context, . . . ) can be obtained at a network node from the mobile device. Further, the network node can send a request to a disparate network node within a core network. The request can include information that can be used by the disparate network node to establish that the mobile device is authenticated. Moreover, the native security context can be received from the disparate network node in response to the request. Accordingly, the native security context need not be recreated between the network node and the mobile device.
摘要:
Systems and methodologies are described that facilitate fetching a native security context between network nodes in a core network after an inter-system handover of a mobile device. For instance, a mobility message that is integrity protected by a security context (e.g., the native security context, a mapped security context, . . . ) can be obtained at a network node from the mobile device. Further, the network node can send a request to a disparate network node within a core network. The request can include information that can be used by the disparate network node to establish that the mobile device is authenticated. Moreover, the native security context can be received from the disparate network node in response to the request. Accordingly, the native security context need not be recreated between the network node and the mobile device.
摘要:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
摘要:
Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service.
摘要:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
摘要:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
摘要:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
摘要:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
摘要:
Local breakout is provided by one or more nodes (e.g., a local access point and/or a local gateway) in a wireless network to facilitate access to one or more local services. In conjunction with local breakout, multiple IP points of presence relating to different levels of service may be provided for an access point. For example, one point of presence may relate to a local service while another point of presence may relate to a core network service.
摘要:
Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service.