Abstract:
Multiple protocol tunnels (e.g., IPsec tunnels) are deployed to enable an access terminal that is connected to a network to access a local network associated with a femto access point. A first protocol tunnel is established between a security gateway and the femto access point. A second protocol tunnel is then established in either of two ways. In some implementations the second protocol tunnel is established between the access terminal and the security gateway. In other implementations the second protocol tunnel is established between the access terminal and the femto access point, whereby a portion of the tunnel is routed through the first tunnel.
Abstract:
Apparatus and methods of hand-in of a call from a macro node to a femto node include receiving, at a target interface to a plurality of access points, a handoff request to handoff a call of a mobile station, wherein the handoff request comprises a cellular identifier corresponding to a pilot identifier of a pilot signal. Further, the apparatus and methods include determining that the plurality of access points share the cell identifier, and forwarding the handoff request to the plurality of access points that share the cell identifier. Additionally, the apparatus and methods include generating a handoff request acknowledgement comprising a pre-reserved resource that is common to the plurality of access points, wherein the pre-reserved resource enables the mobile station to communicate with the plurality of access points, and transmitting the handoff request acknowledgement to initiate the hand-in to one of the plurality of access points.
Abstract:
Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal. In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal.
Abstract:
Seamless communication handoff is achieved by establishing a protocol tunnel to route leftover packets between network access nodes during the handoff. For example, in a mobile IP-based system, a mobile node may perform a handoff from a first access node that is associated with a first routing node to a second access node that is associated with a second routing node. To prevent the loss of any packets that may be in route for delivery to or from the first routing node during the handoff, the mobile node establishes a protocol tunnel with the first access node via the second access node. On the forward-link, packets being delivered from the first routing node are routed over the protocol tunnel to the second access node and then to the mobile node. On the reverse-link, packets being sent to the first routing node are routed over the protocol tunnel from the mobile node to the second access node and then to the first routing node. In conjunction with these operations, the mobile node concurrently maintains separate IP interfaces for the routing nodes. In addition, steps are taken to ensure that packets are routed to the appropriate IP interface during the handoff.
Abstract:
Methods, apparatus, systems and computer program products are defined that provide multiple bindings in a Mobile Internet Protocol (MIP) network environment. The multiple bindings that are established are independent of one another, such that a forward link binding is decoupled from, or otherwise does not affect, a reverse link binding and vice versa. Multiple reverse link-only bindings may be established within an active route set for an access terminal. Additionally a single primary binding may be established that provides a forward link binding and reverse link binding. At any point in time, the access terminal may maintain only one primary binding.
Abstract:
In a communication system in which a gateway entity is linked to a plurality of infrastructure entities which in turn are operable to communicate with an access terminal, the access terminal needs first to establish a data attachment point (DAP) with one of the infrastructure entities. Handoff of the DAP from one infrastructure entity to another infrastructure entity is initiated by the access terminal. The access terminal weighs factors such as the link conditions with the various infrastructure entities, the time since the last DAP handoff, and time duration communicating with the current infrastructure entity before proceeding with the DAP handoff.
Abstract:
Operations for a WLAN-capable remote control device and a controlled device are disclosed. A first network device (e.g., remote control) may receive a user input for controlling operation of a second network device (e.g., controlled device) of a communication network. The first network device may transition to an active operating state in response to receiving the user input. The first network device may transmit the first user input to the second network device. The first network device may exit the active operating state in response to successfully transmitting the first user input to the second network device.
Abstract:
Coverage holes are identified and appropriate action taken in response thereto. The identification of a coverage hole may be based on, for example, measurements taken at an access point, measurement report messages from an access terminal, idle user registrations, active user handovers, or handover history. Upon identification of a coverage hole, action may be taken to mitigate (e.g., reduce or eliminate) the coverage hole and/or avoid the coverage hole. For example, in some embodiments, access point resources such as power, frequency and time are allocated accordingly. The action to be taken may depend on whether a coverage hole is noise-limited or interference-limited. In some embodiments, the manner in which handovers are conducted is modified upon identification of a coverage hole. The above actions may be performed entirely at an access point.
Abstract:
An access point is identified for providing service for an access terminal. In some aspects, the identification of an access point is based on loading at one or more access points. In some implementations, an access terminal selects a cell (e.g., the cell that provides maximum throughput) based on the cell load at one or more cells. In some implementations, load estimation is based on information acquired by an access terminal from nearby access points.
Abstract:
An access point is identified for providing service for an access terminal. In some aspects, the identification of an access point is based on loading at one or more access points. In some implementations, an access terminal selects a cell (e.g., the cell that provides maximum throughput) based on the cell load at one or more cells. In some implementations, load estimation is based on information acquired by an access terminal from nearby access points.