摘要:
The present invention relates to a method for controlling access to a private base station. An identifier indicating an operation area previously accessed or detected by a communications device requesting communication with a private base station is received. The access to the private base station is controlled on the basis of the identifier.
摘要:
A method for communication systems configured to provide wireless data communications for users is disclosed. The disclosed method includes communicating information with a node of a radio access part of the communication system. The information includes a first set of quality of service information and a second set of quality of service information. The second set of quality of service information is indicative of the nature of the information of the first set of quality of service information.
摘要:
A method, a system and a network element for performing a handover of a mobile equipment from a source network to a target network in a mobile telecommunication system, wherein data, which may be transferred via the source network to the mobile equipment when it is linked to the source network, are going to be buffered in a network element in case a need for a handover arises, and the data buffered in the network element are forwarded from the network element to the target network for transferring them to the mobile equipment after it has been linked to the target network.
摘要:
A method, apparatus and system of network congestion notification is disclosed. A source node sends a destination node a data packet. Upon receipt of the data packet if network congestion is detected, the destination node introduces a congestion indication into a data packet. The data packet, including the congestion indication, is sent to the source node.
摘要:
The invention is directed to a method for controlling delays in a cellular telecommunications network. The delay control method according to the invention is based on a hierarchical structure of delay controlling entities, which preferably communicate only with entities directly above or below them in the hierarchy. In the downlink direction, an entity receiving data, such as a base station or a splitting unit, sends a timing report to the entity sending the data if the data is received too early or too late, whereafter the sending entity may adjust the sending time of data. The same reporting and adjusting process may be repeated through all levels of the control hierarchy, resulting in a collective control of delays from the top of the hierarchy, for example from a RNC, to the bottom, for example to a base station. In the uplink direction, a higher level entity receiving data from a lower level entity may command the lower level entity to adjust the sending time, if the data is received too early or too late. When the same action is repeated in all levels of the hierarchy, a collective control of delays is achieved for the link between the lowest level, e.g. the base station, and the highest level, e.g. a RNC.
摘要:
A method carries out statistical multiplexing in a telecommunications network comprising a transmitting unit for transferring channels containing information from at least two traffic sources, a receiving unit and a transmission link between them. The information to be transmitted in the telecommunication system is transferred over the transmission link in transmission frames. The method is characterized by assembling a variable-length transmission frame comprising an allocation field and an information field, identifying an active channel, allocating an information field transmission block from the transmission frame to the active channel's information to be transferred, inserting the information to be transferred into the allocated transmission block, adding the channel allocation information into the allocation field of the transmission frame in which the channel's information is for the first time continuously transferred, maintaining the channel's allocation for as long as the channel is continuously active, and transmitting the transmission frame to the receiving unit.
摘要:
In accordance with an example embodiment of the present invention, a user equipment establishes a connection to a local area network, transmits information relating to the local area network to a gateway selection function, the gateway selection function determines whether a method to configure the local area network can be obtained, and the gateway selection function configures the local area network and local route parameters in the user equipment either via the local area network or via a cellular network.
摘要:
A channel inverse multiplexer/multiplexer (IMUX/MUX) (14a) of a MAC sublayer (14) of a UTRAN RNC (11) for providing to a UE (18) traffic (communication signals including in general both control and user data) at a higher rate than the UE can accept over a single channel. The channel IMUX/MUX performs inverse multiplexing of traffic for downlink, and multiplexing of traffic on uplink, and does so in a way that is transparent to all other layers/entities of the UTRAN (11 17) and to the UE (18).
摘要:
The fundamental idea in the invention is as follows. Instead of setting up and releasing a bearer, e.g. an AAL2 connection, the connection is maintained and only modified to have either a zero bandwidth or the required bandwidth. The zero bandwidth corresponds to a release in the conventional case and the required bandwidth corresponds to the setup of the connection. The invention is especially applicable in the cases where it is reasonable to assume that a connection once established and currently/no longer needed, that usually can be an AAL2 connection, will be needed again after a reasonably short period of time. However, the invention is applicable also in the general case where the AAL2 connections are initially set up with zero or small resources and then modified afterwards to an appropriate bandwidth on demand.
摘要:
The present invention relates to a method, tunnel protocol layer, and network device for securing a data packet on a network link. A security layer is provided in the tunneling protocol layer of the wireless network, and a secured data packet is generated by adding to the data packet a header in accordance with said security layer of the tunneling protocol. The secured data packet is then transmitted over the link by using a link layer connection.