摘要:
Embodiments described herein relate to connected-state radio session transfer in wireless communications. A source access network controller may lock a source radio session associated with an access terminal (e.g., in response to detecting a handoff condition associated with the access terminal), where the source access network controller may be in communication with a data network. The source access network controller may also instruct a target access network controller to create a target radio session corresponding with the source radio session, and to establish a communication route between the data network and the access network via the target ANC. The source access network controller may then freeze a state associated with the source radio session and transmits the frozen state to the target access network controller. The target access network controller may subsequently unfreeze the received state and further unlock the radio session, hence resuming control of the access terminal.
摘要:
Systems and methodologies are described herein that facilitate congestion control in a wireless communication system. As described herein, an access network and associated terminals can utilize a token bucket access control mechanism, through which respective terminals can be allotted access tokens and/or other units for access to the access network. For example, upon requesting access to a given network, a user of the network can determine whether sufficient access tokens have been accumulated, based on which the request can be selectively allowed or denied. As further described herein, multiple token bucket mechanisms can be utilized, which can correspond to respective packet flows or the like. Additionally, token bucket access control can be implemented as described herein in cooperation with conventional access persistence functionality. Further aspects described herein facilitate the adjustment of token bucket parameters for network access control based on network loading.
摘要:
Techniques for enhanced backhaul flow control are provided. In an exemplary embodiment, a backhaul control system is described that comprises a base station controller (BSC), a backhaul network, and a base transceiver station (BTS). Each is responsive to data and messaging transmitted and received. In one aspect, the BTS includes a queue and a controller. The amount of data in a queue is adjusted by a controller based upon calculating a target queue size value. The controller non-uniformly adjusts the amount of data in a queue based upon a target queue size value which is based upon communication system parameters. The target queue size and amount of data in a queue is adjusted so as to reduce buffer underrun, decrease system latency, and increase communication system throughput.
摘要:
Local IP access is provided in a wireless network to facilitate access to one or more local services. In some implementations, different IP interfaces are used for accessing different services (e.g., local services and operator network services). A list that maps packet destinations to IP interfaces may be employed to determine which IP interface is to be used for sending a given packet. In some implementations an access point provides a proxy function (e.g., a proxy ARP function) for an access terminal. In some implementations an access point provides an agent function (e.g., a DHCP function) for an access terminal. NAT operations may be performed at an access point to enable the access terminal to access local services. In some aspects, an access point may determine whether to send a packet from an access terminal via a protocol tunnel based on the destination of the packet.
摘要:
Local IP access is provided in a wireless network to facilitate access to one or more local services. In some implementations, different IP interfaces are used for accessing different services (e.g., local services and operator network services). A list that maps packet destinations to IP interfaces may be employed to determine which IP interface is to be used for sending a given packet. In some implementations an access point provides a proxy function (e.g., a proxy ARP function) for an access terminal. In some implementations an access point provides an agent function (e.g., a DHCP function) for an access terminal. NAT operations may be performed at an access point to enable the access terminal to access local services. In some aspects, an access point may determine whether to send a packet from an access terminal via a protocol tunnel based on the destination of the packet.
摘要:
Embodiments described herein relate to connected-state radio session transfer in wireless communications. A source access network controller may lock a source radio session associated with an access terminal (e.g., in response to detecting a handoff condition associated with the access terminal), where the source access network controller may be in communication with a data network. The source access network controller may also instruct a target access network controller to create a target radio session corresponding with the source radio session, and to establish a communication route between the data network and the access network via the target ANC. The source access network controller may then freeze a state associated with the source radio session and transmits the frozen state to the target access network controller. The target access network controller may subsequently unfreeze the received state and further unlock the radio session, hence resuming control of the access terminal.
摘要:
Systems and methodologies are described herein that facilitate congestion control in a wireless communication system. As described herein, an access network and associated terminals can utilize a token bucket access control mechanism, through which respective terminals can be allotted access tokens and/or other units for access to the access network. For example, upon requesting access to a given network, a user of the network can determine whether sufficient access tokens have been accumulated, based on which the request can be selectively allowed or denied. As further described herein, multiple token bucket mechanisms can be utilized, which can correspond to respective packet flows or the like. Additionally, token bucket access control can be implemented as described herein in cooperation with conventional access persistence functionality. Further aspects described herein facilitate the adjustment of token bucket parameters for network access control based on network loading.
摘要:
Techniques for enhanced backhaul flow control are provided. In an exemplary embodiment, a backhaul control system is described that comprises a base station controller (BSC), a backhaul network, and a base transceiver station (BTS). Each is responsive to data and messaging transmitted and received. In one aspect, the BTS includes a queue and a controller. The amount of data in a queue is adjusted by a controller based upon calculating a target queue size value. The controller non-uniformly adjusts the amount of data in a queue based upon a target queue size value which is based upon communication system parameters. The target queue size and amount of data in a queue is adjusted so as to reduce buffer underrun, decrease system latency, and increase communication system throughput.
摘要:
A multi-mode access point supports different radio access technologies (e.g., Wi-Fi and cellular) for serving multi-mode access terminals. To provide improved service for such an access terminal, the access point may redirect the access terminal from a first type of radio access technology to a second type of radio access technology under certain circumstances. A decision to invoke such a redirection may be based on, for example, at least one of: traffic conditions on the first type of radio access technology, traffic conditions on the second type of radio access technology, and whether a backhaul for the access point is currently a bottleneck for access point communication.
摘要:
Systems and methods for establishing secure communications between two network elements through a trusted intermediary when no direct communication path is available. Separate secure communication links are established between the network elements and the trusted intermediary to facilitate secure end to end communication.