摘要:
Gathering location information from a first wireless network to determine whether to anchor a communication session in a second wireless network, a mobile node capable of communicating with both the first wireless network and the second wireless network, includes receiving location information from the first wireless network as the mobile node moves through one or more service areas of the first wireless network. It is determined whether a triggering event occurs. If the triggering event occurs, the location information is stored to determine whether to anchor a session in the second wireless network.
摘要:
Anchoring a communication session for a target mobile phone includes identifying a current access node operable to provide the target mobile phone access to a first network of a first network type. Potential access nodes operable to provide a mobile phone access to a second network of a second network type are identified. Whether the communication session can be handed off to a potential access node of the one or more potential access nodes is established. Anchoring of the communication session is initiated in the second network only if the communication session can be handed off to a potential access node of the one or more potential access nodes.
摘要:
An apparatus for providing connectivity is provided that includes a mobility server operable to coordinate a communication session between a first and a second end-user device. The first end-user device is associated with a first call leg and the second end-user device is associated with a second call leg. A handoff is executed in transferring the communication session from the first end-user device to the second end-user device. In more particular embodiments, the mobility server is operable to receive signal strength information from the first end-user device and to execute the handoff based on the signal strength information. In addition, the handoff is executed based on an end-user preference that is provided in a subscription that is accessed by the mobility server.
摘要:
Systems and methods are provided to facilitate efficient routing of unlicensed mobile access (UMA) communications. In one implementation, a method of providing a communication link between a first mobile station and a second mobile station through a customer premises equipment (CPE) device includes intercepting a call setup request provided by the first mobile station and received at a security gateway of the CPE device. An address associated with the second mobile station may be extracted from the call setup request and the address may be compared with a plurality of records maintained by the CPE device. A call setup request may be forwarded to the second mobile station if the address corresponds to at least one of the records. The first and second mobile stations may be in communication with the CPE device over a wireless local access network (WLAN) in accordance with an unlicensed mobile communication standard.
摘要:
Systems and methods are provided to facilitate efficient routing of unlicensed mobile access (UMA) communications. In one implementation, a method of providing a communication link between a first mobile station and a second mobile station through a customer premises equipment (CPE) device includes intercepting a call setup request provided by the first mobile station and received at a security gateway of the CPE device. An address associated with the second mobile station may be extracted from the call setup request and the address may be compared with a plurality of records maintained by the CPE device. A call setup request may be forwarded to the second mobile station if the address corresponds to at least one of the records. The first and second mobile stations may be in communication with the CPE device over a wireless local access network (WLAN) in accordance with an unlicensed mobile communication standard.
摘要:
Network operators are striving to find ways to provide stable video services amid a rapid increase in video data traffic. In order to provide stable video services with constrained network resources, network operators attempted to deploy multiple communication networks in parallel. However, network operators failed to effectively balance data traffic across parallel communication networks. This disclosure provides systems and methods for effectively balancing data traffic across parallel communication networks.
摘要:
A method is provided in one example embodiment and includes receiving a request to authenticate an end user in a service provider network, and evaluating the request to identify the end user as belonging to an enterprise network. A tag is generated for a packet associated with a flow for the end user in the enterprise network. Routing occurs for subsequent packets associated with the flow between the enterprise network and the end user. The subsequent packets associated with the flow are not routed through the service provider network. In more particular embodiments, the end user is authenticated in the enterprise network after being authenticated in the service provider network. In addition, traffic for the end user can be separated based on one or more tags identified within the flow. A plurality of flows can be classified based on a customer identification (CID). The tag can be a virtual local area network (VLAN) tag generated at a base station.
摘要:
A method is provided in one example embodiment and includes creating a service flow with an endpoint over a wireless link coupled to a backhaul; notifying a mobility anchor of a location associated with the endpoint; relaying control packets between the endpoint and an access gateway; and relaying bearer packets between the endpoint and the mobility anchor, where the bearer packets are exchanged with the endpoint over a locally terminated bearer tunnel and the bearer packets are exchanged with the mobility anchor using Proxy Mobile Internet Protocol.
摘要:
A method is provided in one example embodiment and includes identifying an Internet protocol (IP) address for a serving gateway; establishing a link between the serving gateway and a congestion notification element; monitoring packets in order to identify whether a differentiated services code point (DSCP) bit has been set in the packets; determining that a threshold associated with congestion in a network has been exceeded; and communicating a signal to the serving gateway associated with the congestion. The serving gateway can be configured to correlate the congestion with identifiers associated with end users operating in the network, where the serving gateway communicates a signal to a network element to reduce the congestion.
摘要:
Systems and/or methods of selectively terminating security in mobile networks are presented. User equipment (UE) can specify cipher termination location capabilities for encrypting/decrypting data packets to a base station in a mobile network. The mobile network can subsequently determine at which node in the network to terminate the cipher in part according to the capabilities provided and deliver the determined location to the UE. The determined cipher termination location can be provided in response to a request to initiate communications, the initial request can specify the capabilities. The UE can utilize the location to support disparate types of networks and to intelligently deal with hand-offs and other functions of the mobile network.