摘要:
Systems and methodologies are described that effectuate establishment of an IPSec tunnel for utilization in a wireless communication environment. IPSec establishment procedures on home base stations can be used to establish IPSec tunnels between home base stations situated on open access sectors of wireless communication environments and packet data interworking function components positioned at the contiguity of secured segments of the wireless communication environments. Moreover, high rate packet data point-to-point protocol challenge-handshake authentication protocols can be directed through the IPSec tunnels to facilitate authentication of access terminals associated with the home base stations in order to facilitate further communications with components dispersed within secure areas of wireless communication environments. Further, international mobile subscriber identities (IMSI) affiliated with access terminals associated with home base stations can be used to identify packet data serving nodes with which to establish communications between home base stations and packet data serving nodes.
摘要:
Systems and methodologies are described that effectuate establishment of an IPSec tunnel for utilization in a wireless communication environment. IPSec establishment procedures on home base stations can be used to establish IPSec tunnels between home base stations situated on open access sectors of wireless communication environments and packet data interworking function components positioned at the contiguity of secured segments of the wireless communication environments. Moreover, high rate packet data point-to-point protocol challenge-handshake authentication protocols can be directed through the IPSec tunnels to facilitate authentication of access terminals associated with the home base stations in order to facilitate further communications with components dispersed within secure areas of wireless communication environments. Further, international mobile subscriber identities (IMSI) affiliated with access terminals associated with home base stations can be used to identify packet data serving nodes with which to establish communications between home base stations and packet data serving nodes.
摘要:
When a user equipment engaged in mobile communications transfers from a network with one radio access technology (RAT) to another network with a different radio access technology, maintaining continuity of location based services can improve system performance. A user equipment may perform a series of checks when undergoing inter-RAT transfer to determine if a location based services protocol used with the source network is operable on the target network. The UE also determines if location based services sessions are at a point where they can be continued following inter-RAT transfer. Where possible, protocols and sessions are maintained to preserve location based services continuity.
摘要:
Techniques to detect for end of service using dynamic inactivity timer thresholds are described. An access terminal establishes a radio connection for one or more applications. Data and signaling for the application(s) may be sent on one or more first flows (e.g., RLP flows) that may carry any number of second flows (e.g., IP flows). The access terminal determines a dynamic inactivity timer threshold for each first flow, e.g., based on at least one inactivity timer threshold for at least one second flow mapped to that first flow. The access terminal determines whether each first flow is inactive based on the inactivity timer threshold for that first flow, e.g., declares each first flow to be inactive if no activity is detected on that first flow for a period exceeding the inactivity timer threshold. The access terminal closes the radio connection when all first flow(s) are determined to be inactive.
摘要:
Techniques to configure quality of service (QoS) for communication are described. An access terminal configures a first QoS profile prior to a call. This QoS profile is for a set of QoS parameters that provides certain QoS. The access terminal thereafter establishes (e.g., originates or terminates) a call with an access network. If the first QoS profile is appropriate for the call, then QoS is not reconfigured. However, the access terminal may determine that a second QoS profile is to be used for the call, e.g., based on a format or a rate set supported by a remote/other terminal for the call. The access terminal would then configure the second QoS profile during the call. The access terminal may exchange data in accordance with (a) the first QoS profile before the second QoS profile is configured and activated and (b) the second QoS profile after it is configured and activated.
摘要:
Techniques for managing resources on a wireless device are described. In an aspect, congestion of resources on the wireless device may be detected. If any resources are deemed to be congested, then congestion of the congested resources may be relieved by controlling utilization of the congested resources by at least one client. In one design, flow control may be performed for at least one data flow to relieve congestion of the congested resources. A pattern indicative of when to send messages enabling data transmission and when to send messages disabling data transmission may be selected. Messages may then be sent in accordance with the pattern to control transmission of data for the at least one data flow. Another pattern with a higher ON fraction or a lower ON fraction may be selected based on usage of the congested resources.
摘要:
Techniques to configure quality of service (QoS) for communication are described. An access terminal configures a first QoS profile prior to a call. This QoS profile is for a set of QoS parameters that provides certain QoS. The access terminal thereafter establishes (e.g., originates or terminates) a call with an access network. If the first QoS profile is appropriate for the call, then QoS is not reconfigured. However, the access terminal may determine that a second QoS profile is to be used for the call, e.g., based on a format or a rate set supported by a remote/other terminal for the call. The access terminal would then configure the second QoS profile during the call. The access terminal may exchange data in accordance with (a) the first QoS profile before the second QoS profile is configured and activated and (b) the second QoS profile after it is configured and activated.
摘要:
When a user equipment engaged in mobile communications transfers from a network with one radio access technology (RAT) to another network with a different radio access technology, maintaining continuity of location based services can improve system performance. A user equipment may perform a series of checks when undergoing inter-RAT transfer to determine if a location based services protocol used with the source network is operable on the target network. The UE also determines if location based services sessions are at a point where they can be continued following inter-RAT transfer. Where possible, protocols and sessions are maintained to preserve location based services continuity.
摘要:
Techniques for scheduling logical channels for data transmission are described. In one design, a user equipment (UE) is configured with a plurality of logical channels for sending data on the uplink. Each logical channel is associated with a priority and a data buffer size. The UE maintains a token bucket for each logical channel. In each scheduling interval or when an uplink grant is received, the UE determines a bucket level (which may be a positive value or a non-positive value) for each of the plurality of logical channels. The UE ascertains logical channels with bucket levels of the same polarity and then identifies logical channels of the same priority among all logical channels with the same bucket level polarity. The UE selects at least one identified logical channel for scheduling based on the data buffer size and/or the bucket level for each identified logical channel.
摘要:
Systems and methods for policing traffic in communications systems are described herein. According to systems and methods herein, tokens are generated for a packet data network based on a peak transmission rate associated with the packet data network. Packets are selected for transmission over the packet data network based on availability of tokens.