Abstract:
Methods and apparatus for proxying of devices and services using overlay networks. A method for operating a proxy includes obtaining meta-data associated with at least one of a device and a service, generating a searchable index of the meta-data, and publishing the searchable index on the overlay network as at least one of a distributed index and a centralized index. Another method includes receiving a request from a device or a service using a non overlay protocol to receive at least one of data and services from the overlay network, searching an index of meta-data on the overlay network based on the request, identifying a node associated with the at least one of data and services based on the index, establishing a direct connection with the node, and obtaining the at least one of data and services using the direct connection.
Abstract:
Systems and methods for establishing a limited group communication in a wireless communication system are disclosed. The method and system can include generating a group connection request for k respondents, where k is less than a total number of group members. Invite messages can be transmitted to the group members. Disinvite messages can be transmitted to remaining group members, upon receiving k responses from k respondents of the group.
Abstract:
A method and apparatus for implicit floor control in push-to-talk over cellular system. A message is generated by a client in a communication system and is then streamed to a push-to-talk server. The server checks to see if the floor is idle, and if so, distributes the message to at least one other participant in the communication session. If the floor is not idle, the new message is stored and queued for distribution after all other messages ahead of the last received message have been distributed.
Abstract:
A novel message exchange protocol is disclosed. In one example, a method of transmitting data includes generating, with a wireless device, an application data message for an application; evaluating one or more criteria for determining whether to send the application data message via a data radio bearer (DRB) channel or via a signaling radio bearer (SRB) channel that communicatively couples the wireless device to a network resource; and based on determining to send the application data message via the SRB channel, sending the application data message to the network resource via the SRB channel.
Abstract:
Various arrangements for managing wireless network communication are described. Two cells using different radio access technologies (RATs), such as a 3G cell and a 4G cell, may provide overlapping coverage. A first cell using a first RAT, under certain circumstances, may be permitted to enter a powered down state such that less power is consumed. User equipment may communicate with the cell using the second RAT as the preferred network and only communicate with the cell using the first RAT when a service available through the first RAT but not the second RAT has been requested. Upon a request from the second cell, the first cell may enter a powered up state.
Abstract:
Systems and methodologies are described that facilitate fetching a native security context between network nodes in a core network after an inter-system handover of a mobile device. For instance, a mobility message that is integrity protected by a security context (e.g., the native security context, a mapped security context,..) can be obtained at a network node from the mobile device. Further, the network node can send a request to a disparate network node within a core network. The request can include information that can be used by the disparate network node to establish that the mobile device is authenticated. Moreover, the native security context can be received from the disparate network node in response to the request. Accordingly, the native security context need not be recreated between the network node and the mobile device.
Abstract:
In the event an entity receives a message including an unknown quality of service parameter (e.g., class identifier) for a bearer, the entity may select a quality of service parameter for the bearer from a set of known quality of service parameters. Here, a guaranteed bit rate quality of service parameter may be selected from the set upon determining that the unknown quality of service parameter is associated with a guaranteed bit rate bearer. Conversely, a non-guaranteed bit rate quality of service parameter may be selected from the set upon determining that the unknown quality of service parameter is not associated with a guaranteed bit rate bearer.
Abstract:
This disclosure enables a radio access network to control media data rates and codec parameters selected during multimedia session establishment. As the load on a radio network changes, operators desire to have the ability to control what data rate new multimedia sessions (e.g., VoIP) are to utilize, thereby allowing the operator to conduct a trade-off between voice/video quality and capacity during heavy loading periods. The multimedia communication session may be initiated with a determined guaranteed bit rate, where the guaranteed bit rate is requested, negotiated as one of several acceptable guaranteed bit rates, or based upon maximum system capacity, to take advantage of maximum data rate for the equipment in use. The session may also be initiated with a determined Quality of Service based upon either a network or user equipment installed policy.
Abstract:
A method and apparatus for over-the-air provisioning of authentication credentials at an access device via a first access system, wherein the authentication credentials are for a second access system lacking an over-the-air provisioning procedure. For example, the second access system may be a 3GPP system using AKA authentication methods. The first access system may be CDMA, using an OTASP or IOTA procedure. Provisioning the authentication credentials may include provisioning any of a 3GPP AKA authentication root key (K), AKA authentication related parameters, an AKA authentication algorithm to be used in the 3GPP authentication, or authentication algorithm customization parameters.
Abstract:
Systems and methodologies are described that facilitate managing access control to Closed Subscriber Groups (CSGs) in a wireless communication environment. A user equipment (UE) can store an operator CSG list, which can be read only and controlled by an operator. Further, the operator CSG list can lack synchronization to a CSG subscription for the UE retained in the network. Thus, upon selecting to access a CSG cell associated with a CSG with a corresponding CSG Identifier (ID) included in the operator CSG list of the UE, a reject message that indicates that the UE lacks authorization for the CSG can be received. Moreover, the CSG ID can be stored as a forbidden CSG ID of the UE in a set of forbidden CSG IDs in response to receipt of the reject message when the CSG ID is included in the operator CSG list.