摘要:
An ordered list of precedence values includes a number of blocks of precedence values. An operating system receives filters from an application. The operating system assigns a precedence value to each filter from the available block of precedence values that has the highest priority. Precedence values are assigned to maintain a precedence order specified by the application. Filters and their assigned precedence values are communicated to an entity that filters packets by applying the filters in the order of their precedence values. Filters for an application can be added, deleted, or modified without affecting the precedence values of other filters for other applications. If an assignment is to be made when the lowest priority block is not available, then a repacking operation is performed to fill unused blocks in the list. The repacking is performed to reduce signaling associated with communicating reassigned precedences values to the filtering entity.
摘要:
An apparatus and method for determining an authorized IP service for an access terminal during an establishment of a PPP connection. In an aspect of the disclosure, a data link is established with the access terminal, and a request to authenticate the access terminal is provided to an authentication/authorization server. During authentication, an IP Service Authorized Parameter is provided by the authentication/authorization server, the IP Service Authorized Parameter for indicating the authorized IP service for the access terminal. Thereby, a network layer protocol and a mobility protocol are each configured according to the authorized IP service that corresponds to the IP Service Authorized Parameter.
摘要:
For Mobile IP supporting inter-technology handoffs, a logical interface is provided at an abstraction layer, which resides between a network layer and a link layer. The logical interface performs processing to provide an interface between the network layer and the link layer, but communicates with physical interfaces instead of directly with the link layer. One physical interface is provided for each communication network (e.g., each radio network of a different wireless technology). Each physical interface performs technology-dependent processing for the associated communication network and communicates with a respective link layer module. Each link layer module performs link layer processing for the associated communication network. The logical interface is associated with one physical interface at any given moment. The logical interface is also associated with an IP address that does not change and is used by IP in the network layer for communication with the multiple communication networks.
摘要:
Techniques for performing system selection based on a usage model that uses “access strings”, “profiles”, and “activation strings” are described. Access strings are defined for wireless data services and provide a highly intuitive user interface. Each access string is associated with one or more profiles. Each profile includes various parameters needed to establish a specific data call. Each profile is further associated with an activation string that contains connection information for the data call. System selection is performed in two parts. In the first part, a wireless user views access strings for available data services, selects the access string for the desired data service, and returns the selected access string. In the second part, the wireless device selects a profile for a system most suited to provide the desired data service, from among all profiles associated with the selected access string.
摘要:
A majority of the IP packets sent from an IP network over a wireless network to a mobile station which is tethered to an electronic device, such as a laptop computer, are destined for applications running on the electronic device. The embodiments are for snooping and filtering incoming IP packets to delineate only those packets destined for mobile station applications, which greatly improves the processing efficiency of the mobile station. In particular, the CID fields of TCP/IP packets utilizing Van Jacobson compression techniques are snooped and filtered.
摘要:
Techniques for performing system selection based on a usage model that uses “access strings”, “profiles”, and “activation strings” are described. Access strings are defined for wireless data services and provide a highly intuitive user interface. Each access string is associated with one or more profiles. Each profile includes various parameters needed to establish a specific data call. Each profile is further associated with an activation string that contains connection information for the data call. System selection is performed in two parts. In the first part, a wireless user views access strings for available data services, selects the access string for the desired data service, and returns the selected access string. In the second part, the wireless device selects a profile for a system most suited to provide the desired data service, from among all profiles associated with the selected access string.
摘要:
A wireless network assigns a single IP address to the wireless device, which assigns this IP address over to a TE2 device coupled to the wireless device. The wireless device derives a private IP address for communication with the TE2 device. The wireless device forwards packets exchanged between the TE2 device and the wireless network using the single IP address. The wireless device exchanges packets with the TE2 device by (1) using the private IP address for outbound packets sent to the TE2 device and (2) performing either address-based routing or packet filtering on inbound packets received from the TE2 device. The wireless device exchanges packets with the wireless network by (1) using the single IP address for outbound packets sent to the wireless network and (2) performing packet filtering on inbound packets received from the wireless network.
摘要:
A generic quality of service (QoS) model that is not dependent on network technology is used to support QoS for communication networks utilizing different network technologies. The generic QoS model may include a superset of all QoS parameters for all network technologies being supported, e.g., 3GPP and 3GPP2. An application at a device may specify QoS for a traffic flow based on the generic QoS parameters in the superset. The generic QoS parameters may be converted to QoS parameters that are specific to a serving network. The converted QoS parameters are exchanged with the serving network and are used while exchanging traffic with the serving network.
摘要:
The disclosure is directed to techniques for supporting failover between different network protocol addressing families in a wireless communication network. The techniques may be implemented in a mobile wireless communication device. A logical interface selects a physical interface for access to the network in response to a request from an application module. The network access request issued by the application module need not specify a network protocol type. Instead, upon selection of the physical interface, the logical interface notifies the application of the network protocol type associated with the physical interface. The logical interface may select a physical interface corresponding to a particular network protocol when available, based on connection preferences specified by the application module or a global setting within the device. If a physical interface corresponding to the network protocol is not available, however, the logical interface selects a physical interface corresponding to a different network protocol.
摘要:
Techniques to efficiently filter fragmented datagrams and route fragments are described. For each fragmented datagram, a filtering node obtains filter parameters as fragments for the datagram are received. When all filter parameters are available, the node applies one or more filters on the filter parameters to obtain a filter result for the datagram and stores the filter result in an entry in a routing table. Prior to obtaining the filter result, the node stores all fragments received for the datagram in a memory. When the filter result becomes available, the node processes all fragments already received for the datagram in accordance with the filter result. As each remaining fragment for the datagram is received, the node immediately processes the fragment in accordance with the filter result. When the last fragment is received, the node clears the memory and the routing table entry for the datagram.