Abstract:
Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices are authorized to use the spectrum, which can be determined automatically. Aspects relate to distribution of authorization tickets by an authorization server as a result of validating a device's credentials and services to which the device is entitled. An exchange and verification of authorization tickets can be performed by devices as a condition for enabling a validated wireless link using the spectrum.
Abstract:
Systems and methodologies are described that facilitate tunneling within wireless communication systems. Flow identification information is dynamically generated for data flows within a communication system. This flow identification information assists in determining appropriate flow specific policies to be applied with respective data flows. The flow identification information along with the flow specific policies can be communicated to an access mechanism which transmits the data flows in accordance with the flow specific policies. Different aspects relate to using source addresses in combination with the flow identification information for identifying different IP flows originating at a plurality of sources. The flow identification information also facilitates in verifying if different flows are transmitted in accordance with appropriate rules. The generated data flows are transmitted with respective flow identification information in order to facilitate the verification process.
Abstract:
Systems and methodologies are described that facilitate obtaining an Internet Protocol (IP) address of a node with multiple IP addresses using address redirection in a wireless communication environment. A wireless communication component can retrieve a previously registered IP address corresponding to the node from an Authentication, Accounting, and Authorization / Home Subscriber Server (AAA/HSS). Further, a reverse query of a Domain Name Server (DNS) and a forward query of the DNS can be performed. The reverse query can be constructed based upon the previously registered IP address of the node and can resolve a name (e.g., string, …). Further, the forward query can be formed based upon the name and can return a differing IP address of the node.
Abstract:
Methods and apparatus related to selecting advertisements for presentation based on, e.g., received signals from devices in the proximity to a user's communications device, are described. In various embodiments a mobile device monitors for signals, e.g., peer discovery or other signals, from other devices which transmit, e.g., broadcast, advertisement related information. In various embodiments a device receives advertising information from an advertising device, e.g., AdPoint. In the case of peer to peer signaling, the AdPoint may be in close proximity to the user device receiving the advertising information. Advertising information received from devices in proximity to the user device are used in selecting an advertisement for presentation. Distance from the user device to the AdPoint transmitting an advertisement or advertisement identifier, distance to a store to which an advertisement relates, and/or distance to a location to which an advertisement relates, are taken into consideration when selecting an advertisement for presentation.
Abstract:
Various embodiments are directed to the transmission, e.g., broadcast, of identification information and corresponding control information in discovery signals by a wireless communications device as part of a discovery process. In some embodiments, the identifier identifies one of: an advertisement, a user, or a module. In one embodiment the identifier identifies an advertisement, and the corresponding control information communicates a bid factor used in determining the value of a bid for an ad display opportunity. In another embodiment, the identifier identifies a dynamically modifiable advertisement, and the corresponding control information communicates information that is used to set and/or modify the dynamically modifiable portion of the advertisement. In still another embodiment, the identifier identifiers a user and the control information communicates status information. In yet another embodiment, the identifier identifies a module, e.g., a software application, and the control information communicates a command for the module to perform a particular operation.
Abstract:
Aspects relate to allowing peer nodes that establish a communication through a home agent to move that session to a directly connected link. Thus, the directly connected nodes can exchange packets natively without encapsulation. Further aspects allow a node that does not have any home agent entity to switch from a local network to a global network without losing ongoing sessions.
Abstract:
Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices are authorized to use the spectrum, which can be determined automatically. Aspects relate to distribution of authorization tickets by an authorization server as a result of validating a device's credentials and services to which the device is entitled. An exchange and verification of authorization tickets can be performed by devices as a condition for enabling a validated wireless link using the spectrum.
Abstract:
Certain aspects of the present disclosure provide methods for detecting a routing loop between at least two home agents utilizing the mobile internet protocol (MIPv6) standard. In a first method, the home agent sends a test message to the last care of address associated with a mobile node and receives a reply if there is no loop. In a second method, the home agent parses a packet and checks if the address of any of the inner headers matches the address of the home agent to find a loop between home agents.
Abstract:
Systems and methods for quality of service control over multiple accesses, more particularly quality of service control over multiple accesses via enhanced quality of service rules. A policy rules and charging function, or similar network entity, can include an indicator in a set of quality of service rules that instructs an access gateway to either setup the quality of service resources / initiate bearer setup immediately, or store the quality of service rules until a request for the quality of service resources s received from the UE or another predetermined event occurs.
Abstract:
Systems and methodologies are described that facilitate communicating encapsulation information for a related mobility protocol type utilized in communicating over a data flow with reduced specific implementation on the policy server to support different mobility protocol types. In this regard, encapsulation information can be transmitted to the policy server from a network gateway such that the policy server can forward the encapsulation information to a serving gateway along with policy rules related to a data flow type. The serving gateway can utilize the encapsulation information to detect and interpret the encapsulated data flow according to the policy rules. In this regard, the serving gateway can provide support (e.g., quality of service support) for the flow. The encapsulation information can relate to a mobility protocol type, an encapsulation header, an indication that encapsulation is required, parameters regarding locating an encapsulation header in a message, and/or the like.