摘要:
The claimed subject matter relates to systems and methods for authorizing services. A method includes receiving a set of data relating to Quality of Service (QoS) pre-authorization, and conditionally processing subsequent QoS configuration requests based at least in part on the pre-authorization information. Depending on the pre-authorization information corresponding to a QoS configuration request, the request may be granted, denied, or result in sending of a request for authorization.
摘要:
The claimed subject matter relates to performing quality of service management in a mobile wireless communications system. In more detail, in some wireless environments a wireless terminal can be connected to multiple access nodes by way of links, and the wireless terminal can move between various access nodes changing its points of attachment to the network, including its primary point of attachment. Requesters of resources with respect to the wireless terminal can be notified when the primary point of attachment alters, such that subsequent requests are provided to a correct access node (e.g., base station).
摘要:
Methods and apparatus for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the transfer of state from a first access node to a second access node during a handoff operation thereby eliminating any need for state transfer messages to be transmitted between the second access node and the first access node during handoff. Other features of the invention are directed to the use of a core network node to store state information. State information stored in the core node can be accessed and used by access nodes in cases where a mobile node does not send a state transfer message during a handoff, e.g., because communication with the first access node is lost or because such messages are not supported.
摘要:
The claimed subject matter relates to providing quality of service treatment to a subscriber (e.g., wireless terminal) based upon requests made on behalf of the subscriber by a plurality of logically separate entities from the subscriber. For instance, two network infrastructure devices, such as application servers, can initiate separate requests for quality of service treatment on behalf of the subscriber. Additionally or alternatively, a subscriber-side device can initiate a request for quality of service treatment on behalf of the subscriber. A provider of the quality of service treatment can provide appropriate treatment to one or more traffic flows based at least in part upon the requests.
摘要:
In an ad hoc peer-to-peer type network during peer discovery, information relating to users of various devices is broadcast to other devices in the network, which can compromise privacy of the users. Instead of announcing a public identifier that might be known by a multitude of individuals, the user device announces a private identifier that might be known to, or determined by, a select few individuals. The individuals selected can be given a key to determine the private identifier associated with a public identifier, or vice versa, wherein that key can have a validity range or a period of time, after which the key expires. Prior to the expiration of the key, the selected individuals, through their respective devices, can detect a corresponding user and/or device by the current private identifier being announced, thus mitigating the number of people that are aware of the user's presence.
摘要:
Methods and apparatus for wireless communications in regional networks, e.g., ad hoc peer to peer networks, are described. Wireless communications devices transmit and monitor for presence indicator signals broadcast from other peer communications devices in its local vicinity. A wireless communications device maintains a list of discovered devices in its vicinity. A first wireless communications device transmits a paging signal directly over an airlink to a second communications device, which is on its list and to which it desires to send data units, e.g., user data in a peer to peer traffic segment. In response to a received paging response signal from the second device, the first device transmits data units, intended for the second device, to a third device, which acts as an intermediary node. The power level for the data unit signal is controlled to be lower than the power level used for the paging signal. FIG. 4
摘要:
A method, an apparatus, and a computer program product are provided in which information is exchanged through peer-to-peer communication with a second wireless device using a first radio technology. The information regards at least one additional radio technology. In addition, whether to utilize a second radio technology of the at least one additional radio technology for peer-to-peer communication with the second wireless device rather than the first radio technology is determined. Furthermore, the first radio technology is utilized to exchange control information for the second radio technology.
摘要:
Methods and apparatus related to a peer to peer wireless communications system supporting secure advertisement of identification and/or discovery information e.g., upper layer discovery information, are described. Air interface timing and/or other information received from a third device, e.g., a beacon or GPS transmitter is incorporated in the computation of identification/discovery information which is communicated from a first device to a second device. The second device stores some identification/discovery credentials corresponding to the first device, which have been communicated out of band from the first device to the second device. Upon receipt of a identifier from a first device, the second device determines if the stored information corresponds to the device that transmitted the identifier. Various embodiments facilitate secure advertisement of identification and/or discovery information and discovery, e.g., selective discovery by trusted peers.
摘要:
Methods and apparatus supporting enhanced discovery operations in peer to peer networks are described. Peer discovery, based on direct peer to peer discovery between two mobile nodes can be somewhat limited, e.g., due to power limitations, processing power, and/or channel conditions. An access point, e.g., base station, monitors for and receives peer discovery signals conveying a set of identifiers from a wireless communications device. The access point retransmits at least one identifier in the set in a wireless peer to peer communications channel. Thus the access point effectively extends the peer discovery range for wireless communications devices utilizing the peer to peer network. Wireless communications devices can monitor for and recover the rebroadcast peer discovery signals from access points. Thus, via access point signaling a wireless communications device can be made situationally aware of other devices of interest which would be otherwise outside its discovery detection range.
摘要:
A method, a computer program product, and an apparatus are provided. The apparatus may be equipped to obtain one or more application identifiers from one or more applications on a wireless device, generate a super identifier (SID) having elements corresponding to the one or more applications and a base that identifies one or more common properties of the one or more applications, and broadcast the SID during one or more peer discovery slots allocated for the wireless device. In another example, a UE may be equipped to receive the SID broadcast by another UE, determine a match between at least one of the one or more common properties in the base, and determine whether an element associated with one or more applications is present in the SID.