Abstract:
A system and method for optimizing robust header compression between a compressor (residing at AN/AT) and a decompressor (residing at AT/AN), the method comprising initializing the compressor with an estimated jitter value before the compressor; notifying the decompressor of the estimated jitter value before the compressor; estimating various threshold limits at the decompressor based on the sum of the jitter between the compressor and the decompressor (JITTER_CD) and that before the compressor (JITTER_BC); the decompressor sending a JITTER option whenever the threshold limits are exceeded; and the compressor adjusting a packet size in response the received JITTER option. The estimated jitter value before the compressor may be based on simulations or channel characteristics. Notification to the decompressor of the jitter value before the compressor may be achieved by signaling or hard-coding a same value at the compressor and the decompressor.
Abstract:
An interface architecture and protocol are provided for transferring messages between a plurality of devices. The architecture provides the capability to generate a plurality of service messages according to a single message format, and to transfer the service messages between a plurality of control points or service entities according to an efficient multiplexing protocol. The control points can be software applications or device drivers running on a terminal equipment device, and the service entities can be communication services such as network access services or device management services running on an attached data communication device such as a modem or a cellular phone.
Abstract:
A method of signal transmission according to one embodiment includes requesting a packet data serving node to filter a specified traffic flow from among a stream of packets. The method also includes requesting a radio access network to provide an indicated quality-of-service (QoS) treatment for the flow over a wireless air interface. The method further includes rescinding the request to filter or the request to provide a QoS treatment in response to a failure of the other request.
Abstract:
Techniques for dynamically configuring IP and providing IP connectivity for a terminal equipment attached to a wireless device are described. The wireless device obtains from a wireless network a dynamically assigned IP address, an IP gateway's IP address, a subnet mask, or none or any combination thereof. Wireless device determines a host IP address (which may be the dynamically assigned IP address), a router IP address (which may be the gateway IP address or a spoofed IP address), a server IP address (which may be the router IP address), and a subnet mask (which may be obtained from the wireless network or spoofed by the wireless device). Wireless device, acting as a DHCP server, provides IP configuration for the terminal equipment, acting as a DHCP client. Wireless device thereafter forwards IP packets exchanged between the terminal equipment and wireless network and processes DHCP packets from the terminal equipment.
Abstract:
A majority of the IP packets sent from an IP network over a wireless network to a mobile station which is tethered to an electronic device, such as a laptop computer, are destined for applications running on the electronic device. The embodiments are for snooping and filtering incoming IP packets to delineate only those packets destined for mobile station applications, which greatly improves the processing efficiency of the mobile station. In particular, the CID fields of TCP/IP packets utilizing Van Jacobson compression techniques are snooped and filtered.
Abstract:
An apparatus and method for determining an authorized IP service for an access terminal during an establishment of a PPP connection. In an aspect of the disclosure, a data link is established with the access terminal, and a request to authenticate the access terminal is provided to an authentication/authorization server. During authentication, an IP Service Authorized Parameter is provided by the authentication/authorization server, the IP Service Authorized Parameter for indicating the authorized IP service for the access terminal. Thereby, a network layer protocol and a mobility protocol are each configured according to the authorized IP service that corresponds to the IP Service Authorized Parameter.
Abstract:
Techniques for modifying packet filters in a wireless communication network are described. In one scheme, packet filters may be performed with multiple operations, if needed. The operation(s) to be performed and the order of performing the operation(s) may be dependent on the number of existing packet filters to be replaced (N) and the number of new packet filters (M). If N=M, then N packet filters in a traffic filter template may be replaced with a single operation. If N>M, then M packet filters in the traffic filter template may be replaced first, and N−M packet filters may be deleted from the traffic filter template next. If N
Abstract:
For Mobile IP supporting inter-technology handoffs, a logical interface is provided at an abstraction layer, which resides between a network layer and a link layer. The logical interface performs processing to provide an interface between the network layer and the link layer, but communicates with physical interfaces instead of directly with the link layer. One physical interface is provided for each communication network (e.g., each radio network of a different wireless technology). Each physical interface performs technology-dependent processing for the associated communication network and communicates with a respective link layer module. Each link layer module performs link layer processing for the associated communication network. The logical interface is associated with one physical interface at any given moment. The logical interface is also associated with an IP address that does not change and is used by IP in the network layer for communication with the multiple communication networks.
Abstract:
Techniques for performing system selection based on a usage model that uses “access strings”, “profiles”, and “activation strings” are described. Access strings are defined for wireless data services and provide a highly intuitive user interface. Each access string is associated with one or more profiles. Each profile includes various parameters needed to establish a specific data call. Each profile is further associated with an activation string that contains connection information for the data call. System selection is performed in two parts. In the first part, a wireless user views access strings for available data services, selects the access string for the desired data service, and returns the selected access string. In the second part, the wireless device selects a profile for a system most suited to provide the desired data service, from among all profiles associated with the selected access string.
Abstract:
Techniques for performing system selection based on a usage model that uses “access strings”, “profiles”, and “activation strings” are described. Access strings are defined for wireless data services and provide a highly intuitive user interface. Each access string is associated with one or more profiles. Each profile includes various parameters needed to establish a specific data call. Each profile is further associated with an activation string that contains connection information for the data call. System selection is performed in two parts. In the first part, a wireless user views access strings for available data services, selects the access string for the desired data service, and returns the selected access string. In the second part, the wireless device selects a profile for a system most suited to provide the desired data service, from among all profiles associated with the selected access string.