Abstract:
An apparatus operable in a communication system and having the capability to discard an internet protocol address is described. The apparatus is configured to receive an assignment of a first internet protocol address of a first type for a first application and a second internet protocol address of a second type for a second application for a data connection to a network. The apparatus is also configured to determine that the apparatus is currently not able to handle both the first internet protocol address and the second internet protocol address. The apparatus is further configured to determine an internet protocol address to discard, and discard the determined internet protocol address.
Abstract:
Methods and apparatus for resolving incompatible network configurations are described herein. A mobile device having peripheral devices connected thereto receives a request from a peripheral device, determines whether the address configuration protocol associated with the peripheral device is compatible with the network to which the mobile device is connected, and if not compatible, the mobile device translates the address configuration protocol of the peripheral device to one compatible with the network.
Abstract:
Commonly, when a mobile device tethers to a computer, one Internet Protocol address is provided. When an embedded application runs continuously, such as with a Internet Protocol Multimedia Subsystem application, tethered applications can be prohibited from operating. If the continuous application is not active, then the continuous application can be disconnected and thus the tethered application can function.
Abstract:
A wireless data network delivers packets from a network router to a mobile station so that each application running on the mobile station receives an adequate quality of service (QoS). The mobile station sends configuration messages to the network router containing prioritized filters associated with each application. The router filters incoming IP packets into IP flows having the appropriate QoS for the corresponding application. The configuration messages consume valuable air interface resources. Network resources are conserved by assigning precedence values to filters in such a way that fewer configuration messages are needed to reorder the filters when new filters are added. Precedence values for existing filters are spread out in one portion of the precedence space. When the precedence values in that portion are insufficient to accommodate new filters with the correct priority, both new and existing filters are reassigned precedence values in an unassigned portion of the precedence space.
Abstract:
One or more Shadow Register Files (SRF) are interposed between a Physical Register File (PRF) and a Backing Store (BS) in a shadow register file system. The SRFs comprise dual-port registers connected serially in a chain of arbitrary depth from the PRF. A Register Save Engine has random access to one port of the registers in the final SRF in the chain, and saves/restores data between the final SRF and the BS, e.g., RAM. As PRF registers are deallocated from calling procedures for use by called procedures, data are serially shifted from multi-port registers in the PRF through successive corresponding dual-port registers in SRFs, and are serially shifted back toward the multi-port registers as the PRF registers are reallocated to calling procedures. Since no procedure can access more than the number of registers in the PRF, the effective size of the PRF is increased, using less costly dual-port registers.
Abstract:
Systems and methodologies are described herein that facilitate efficient transfer of quality of service (QoS) context during inter-radio access technology (RAT) handovers. In particular, techniques are described herein for establishing rules for whether a user equipment unit (UE) or an associated network should establish QoS for a mixed-mode application, identifying flow to bearer mappings when translating QoS across an inter-RAT handover, mapping QoS parameters of respective RATs, mitigating QoS depreciation upon multiple handovers, performing one or more actions if QoS is not acceptable in a new RAT, maintaining QoS during tunnel mode, and handling scenarios in which a UE moves between a RAT using network-initiated QoS and a RAT using UE-initiated QoS.
Abstract:
A system and method for configuring a data communication between a terminal computing device and a communication network, wherein the terminal computing device connects to the communication network via a mobile device is tethered to a terminal computing device and acts as a wireless modem. A second handshake operation between the computing device and mobile device occurs after a handshake operation between the mobile device and network occurs to negotiate a variety of communication protocol parameters controlling the data communication. The variety of communication protocol parameters negotiated between the mobile device and network are used in the negotiation of communication protocol parameters during the second handshake operation between the computing device and mobile device.
Abstract:
Apparatus and methods are described for establishing a connection to a wireless subscriber network over a wireless LAN. A secure tunnel is established between a PDIF and a mobile station. Both voice and data calls are exchange via the tunnel. Voice calls are forwarded to a SIP GW while data calls are routed to the Internet.
Abstract:
To enable applications to share an established data connection, communication configuration parameters identified by a new application are compared to the parameters requested by applications already sharing the data connection. If there are no conflicts with exclusive configuration parameter(s) required by a new application, a union rule is applied to each shareable configuration parameter of the new and currently executing applications using the data connection to determine a mutually acceptable configuration. Also determined is a measure of the degree to which all applications are supported by a compromise parameter determined by the union rule. The data connection best supporting the sharable parameters of the new and executing applications is assigned to the new application. When an application terminates, the union rules may be applied to parameters requested by the remaining applications to reconfigure the data connection. A similar process may be used when an application requests changes to configuration parameters.
Abstract:
Methods and systems for solving the problem of special processing required by various communication network subsystems (e.g., QOS, security, tunneling, etc). In some cases the processing by one communication subsystem may result in modified IP data packets which may affect the application of additional processing of such packets. The methods and systems solve problem by translating filters and setting up additional tunnels or other procedures based on the use case so that all the end and intermediate nodes can do the required processing on modified packets. The methods and systems may take into consideration an overlap or intersection of two or more different types of packet filters. A first set of packet filters is translated to provide the desired packet classification for modified packets. The second set of packet filters may be translated based upon the translation applied to the first set of packet filters.