Abstract:
Un procedimiento para mejorar la eficacia del transporte de paquetes de datos durante una sesión multimedia, comprendiendo el procedimiento: enviar información desde un Nodo de Interoperación a un terminal conmutado por paquetes, comprendiendo la información un parámetro relacionado con un tamaño máximo de paquete negociado con el otro extremo de la sesión multimedia, comprendiendo el otro extremo de la sesión multimedia un terminal conmutado por circuitos; recibir la información en el terminal conmutado por paquetes desde el Nodo de Interoperación; y en respuesta a la recepción de la información, ajustar el procesamiento en el terminal conmutado por paquetes, PS, de tal manera que los paquetes generados no sean más grandes que el tamaño máximo de paquete negociado.
Abstract:
Techniques for signaling a packet size limitation of a circuit-switched terminal to a packet-switched terminal during a multimedia session such as a multimedia telephony session. In one aspect, an interworking node obtains information from the circuit-switched terminal during call setup, and signals to a packet-switched terminal that another end of the telephony session is a circuit-switched terminal. In a further aspect, the interworking node signals to the packet-switched terminal a maximum packet size limitation negotiated with the circuit-switched terminal. Further techniques for the packet-switched terminal to accommodate the maximum negotiated packet size to minimize data reformatting by the interworking node are described.
Abstract:
SYSTEM AND METHOD TO ADAPT TO NETWORK CONGESTIONIn a particular embodiment, a method is disclosed that includes receiving a feedback message at a transmitter, the feedback message including an indication of a magnitude of congestion and a sustainable rate of data transmission at a receiver. The method also includes determining a decongestion rate and a decongestion time based on at least one of the sustainable rate of data transmission and the magnitude of congestion when the magnitude of congestion satisfies a threshold value. The method further includes sending data at the decongestion rate from the transmitter to the receiver for the decongestion time. The method also includes adjusting a data transmission rate at the transmitter to the sustainable rate of data transmission after the decongestion time is ended.Figure 1
Abstract:
In a particular embodiment, a method is disclosed that includes receiving a feedback message at a transmitter, the feedback message including an indication of a magnitude of congestion and a sustainable rate of data transmission at a receiver. The method also includes determining a decongestion rate and a decongestion time based on at least one of the sustainable rate of data transmission and the magnitude of congestion when the magnitude of congestion satisfies a threshold value. The method further includes sending data at the decongestion rate from the transmitter to the receiver for the decongestion time. The method also includes adjusting a data transmission rate at the transmitter to the sustainable rate of data transmission after the decongestion time is ended.
Abstract:
Técnicas para señalizar una limitación de tamaño de paquete de una terminal de circuito conmutado a una terminal de paquete conmutado durante una sesión multimedia tal como una sesión de telefonía multimedia; en un aspecto, un nodo de interconexión obtiene información de la terminal de circuito conmutado durante el establecimiento de la llamada, y señaliza a una terminal de paquete conmutado que otro extremo de la sesión de telefonía es una terminal de circuito conmutado; en un aspecto adicional, el nodo de interconexión señaliza a la terminal de paquete conmutado una limitación de tamaño de paquete máximo negociada con la terminal de circuito conmutado; además de describen técnicas adicionales para que la terminal de paquete conmutado acomode el tamaño de paquete máximo negociado a fin de reducir el reformateo de datos por parte del nodo de interconexión.
Abstract:
Access control techniques enable an access terminal (102) to obtain service through an access point (104). In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point (104) to control whether an access terminal (102) obtains service through the access point. For example, a user may temporarily disable access control at an access point (104) to enable access terminals that register with the access point (104) while access control is disabled to thereafter be allowed to obtain service through the access point (104). As another example, a defined parameter may be provided to an access terminal (102) whereby, upon presenting the defined parameter to an access point (104), the access terminal (102) is allowed to obtain service through the access point.
Abstract:
Techniques for signaling a packet size limitation of a circuit-switched terminal to a packet-switched terminal during a multimedia session such as a multimedia telephony session. In one aspect, an interworking node obtains information from the circuit-switched terminal during call setup, and signals to a packet-switched terminal that another end of the telephony session is a circuit-switched terminal. In a further aspect, the interworking node signals to the packet-switched terminal a maximum packet size limitation negotiated with the circuit-switched terminal. Further techniques for the packet-switched terminal to accommodate the maximum negotiated packet size to minimize data reformatting by the interworking node are described.
Abstract:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.