Abstract:
A system and method for optimizing robust header compression between a compressor (residing at AN/AT) and a decompressor (residing at AT/AN), the method comprising initializing the compressor with an estimated jitter value before the compressor; notifying the decompressor of the estimated jitter value before the compressor; estimating various threshold limits at the decompressor based on the sum of the jitter between the compressor and the decompressor (JITTER_CD) and that before the compressor (JITTER_BC); the decompressor sending a JITTER option whenever the threshold limits are exceeded; and the compressor adjusting a packet size in response the received JITTER option. The estimated jitter value before the compressor may be based on simulations or channel characteristics. Notification to the decompressor of the jitter value before the compressor may be achieved by signaling or hard-coding a same value at the compressor and the decompressor.
Abstract:
A system and method for configuring a data communication between a terminal computing device and a communication network, wherein the terminal computing device connects to the communication network via a mobile device is tethered to a terminal computing device and acts as a wireless modem. A second handshake operation between the computing device and mobile device occurs after a handshake operation between the mobile device and network occurs to negotiate a variety of communication protocol parameters controlling the data communication. The variety of communication protocol parameters negotiated between the mobile device and network are used in the negotiation of communication protocol parameters during the second handshake operation between the computing device and mobile device.
Abstract:
Methods, apparatus, and computer-readable media for management and arbitration of dedicated mobile communication resources for mobile applications are provided. Mobile applications can be given a priority level that establishes an importance with respect to one or more other mobile applications and at least one mobile resource. If competing applications attempt to access the mobile resource concurrently, access can be provided to an application having higher priority level. Furthermore, control of a resource can be taken away from an application having lower priority in order to affect control of such resource for a higher priority application. In one aspect, a privilege code of an application can be verified prior to establishing control of the resource for the application, to mitigate a likelihood of inappropriate transfer of resources. Accordingly, the subject disclosure provides for management of dedicated resources for a mobile processing environment to effect important device functions with minimum delay.
Abstract:
An apparatus operable in a communication system and having the capability to discard an internet protocol address is described. The apparatus is configured to receive an assignment of a first internet protocol address of a first type for a first application and a second internet protocol address of a second type for a second application for a data connection to a network. The apparatus is also configured to determine that the apparatus is currently not able to handle both the first internet protocol address and the second internet protocol address. The apparatus is further configured to determine an internet protocol address to discard, and discard the determined internet protocol address.
Abstract:
A wireless data network delivers packets from a network router to a mobile station so that each application running on the mobile station receives an adequate quality of service (QoS). The mobile station sends configuration messages to the network router containing prioritized filters associated with each application. The router filters incoming IP packets into IP flows having the appropriate QoS for the corresponding application. The configuration messages consume valuable air interface resources. Network resources are conserved by assigning precedence values to filters in such a way that fewer configuration messages are needed to reorder the filters when new filters are added. Precedence values for existing filters are spread out in one portion of the precedence space. When the precedence values in that portion are insufficient to accommodate new filters with the correct priority, both new and existing filters are reassigned precedence values in an unassigned portion of the precedence space.
Abstract:
An ordered list of precedence values includes a number of blocks of precedence values. An operating system receives filters from an application. The operating system assigns a precedence value to each filter from the available block of precedence values that has the highest priority. Precedence values are assigned to maintain a precedence order specified by the application. Filters and their assigned precedence values are communicated to an entity that filters packets by applying the filters in the order of their precedence values. Filters for an application can be added, deleted, or modified without affecting the precedence values of other filters for other applications. If an assignment is to be made when the lowest priority block is not available, then a repacking operation is performed to fill unused blocks in the list. The repacking is performed to reduce signaling associated with communicating reassigned precedences values to the filtering entity.
Abstract:
A system and method for configuring a data communication between a terminal computing device and a communication network, wherein the terminal computing device connects to the communication network via a mobile device is tethered to a terminal computing device and acts as a wireless modem. A second handshake operation between the computing device and mobile device occurs after a handshake operation between the mobile device and network occurs to negotiate a variety of communication protocol parameters controlling the data communication. The variety of communication protocol parameters negotiated between the mobile device and network are used in the negotiation of communication protocol parameters during the second handshake operation between the computing device and mobile device.
Abstract:
Commonly, when a mobile device tethers to a computer, one Internet Protocol address is provided. When an embedded application runs continuously, such as with a Internet Protocol Multimedia Subsystem application, tethered applications can be prohibited from operating. If the continuous application is not active, then the continuous application can be disconnected and thus the tethered application can function.
Abstract:
Methods and apparatus for resolving incompatible network configurations are described herein. A mobile device having peripheral devices connected thereto receives a request from a peripheral device, determines whether the address configuration protocol associated with the peripheral device is compatible with the network to which the mobile device is connected, and if not compatible, the mobile device translates the address configuration protocol of the peripheral device to one compatible with the network.
Abstract:
Apparatus and methods are described for establishing a connection to a wireless subscriber network over a wireless LAN. A secure tunnel is established between a PDIF and a mobile station. Both voice and data calls are exchange via the tunnel. Voice calls are forwarded to a SIP GW while data calls are routed to the Internet.