Abstract:
Apparatus and methods are described for establishing a connection to a wireless subscriber network over a wireless LAN. A secure tunnel is established between a PDIF and a mobile station. Both voice and data calls are exchange via the tunnel. Voice calls are forwarded to a SIP GW while data calls are routed to the Internet.
Abstract:
A method for configuring an IP address to receive broadcast or multicast data flow which modifies the bind() Application Programming Interface (API) to survey available local interfaces to determine their ability to be configured to receive data from a particular IP address, configure a interface to receive the IP address if it is so configurable, bind the IP address to that interface. The modified bind*() API may interact with one or more interfaces to see if each interface is capable of being configured to the IP address. Alternatively, the modified bind*() API determines the configurability of interfaces by consulting the access control list. Policy based routing rules may be implemented so that the modified bind*() operation configures the highest priority interface based upon policy parameters.
Abstract:
A system and method for optimizing robust header compression between a compressor (residing at AN/AT) and a decompressor (residing at AT/AN), the method comprising initializing the compressor with an estimated jitter value before the compressor; notifying the decompressor of the estimated jitter value before the compressor; estimating various threshold limits at the decompressor based on the sum of the jitter between the compressor and the decompressor (JITTER_CD) and that before the compressor (JITTER_BC); the decompressor sending a JITTER option whenever the threshold limits are exceeded; and the compressor adjusting a packet size in response the received JITTER option. The estimated jitter value before the compressor may be based on simulations or channel characteristics. Notification to the decompressor of the jitter value before the compressor may be achieved by signaling or hard-coding a same value at the compressor and the decompressor.
Abstract:
A method for generating privacy IP address includes pregenerating a first privacy address and generating a second privacy address when the first privacy address is allocated to an application. Addresses may be shared by applications or unique to a single application. A deprecation timer is started when an application binds to an allocated privacy address, now when the privacy address is generated. To minimize traffic flow disruptions a deprecated address is not deleted while the address remains in use. By pregenerating privacy addresses, an address can be promptly allocated to an application with out delays incurred by confirming that a new address is not a duplicate on the system. The method can be implicated on any device using privacy addresses, including mobile handset devices.
Abstract:
Methods and systems for telecommunication devices to share a network connection between a utility engine and an application. While the outgoing data of the utility engine and the application are merged over the shared network connection, incoming data is filtered via an IP data filter to route utility engine specific data to the utility engine while allowing all other data to pass through for use by the application. Numerous utilities may be supported by different forms of utility engines. Among such utilities include GPS service, where GPS related data may be received from a GPS server and utilized by applications which provide location specific information based on a location determined by the GPS server.
Abstract:
A single USB interrupt endpoint is usable by two different active logical devices in a USB device. If a first logical device is to interrupt a USB host, then the first logical device writes a notification into the endpoint. The notification carries a number that identifies a first device object. If, however, a second logical device is to interrupt the host, then the second logical device writes a notification into the endpoint, but the notification carries a number that identifies a second device object. The USB host reads the notification. In one example, if the number and a Device ID indicate that the notification is for the first object, then the first object processes the notification. If the number and Device ID indicate that the notification is for the second object, then the first object notifies the second object so that the second object processes the notification.
Abstract:
A method of transmitting and receiving data from a multi-homing network device to a data network is disclosed and includes defining a network policy and transmitting the network policy to a routing module. Further, the method includes receiving a route scope from the routing module. The route scope identifies a subset of data interfaces to the data network that satisfy the network policy wherein the subset of data interfaces are selected from a set of available data interfaces and wherein the subset of data interfaces includes at least one data interface.
Abstract:
To enable applications to share an established data connection, communication configuration parameters identified by a new application are compared to the parameters requested by applications already sharing the data connection. If there are no conflicts with exclusive configuration parameter(s) required by a new application, a union rule is applied to each shareable configuration parameter of the new and currently executing applications using the data connection to determine a mutually acceptable configuration. Also determined is a measure of the degree to which all applications are supported by a compromise parameter determined by the union rule. The data connection best supporting the sharable parameters of the new and executing applications is assigned to the new application. When an application terminates, the union rules may be applied to parameters requested by the remaining applications to reconfigure the data connection. A similar process may be used when an application requests changes to configuration parameters.
Abstract:
Methods and systems for solving the problem of special processing required by various communication network subsystems (e.g., QOS, security, tunneling, etc). In some cases the processing by one communication subsystem may result in modified IP data packets which may affect the application of additional processing of such packets. The methods and systems solve problem by translating filters and setting up additional tunnels or other procedures based on the use case so that all the end and intermediate nodes can do the required processing on modified packets. The methods and systems may take into consideration an overlap or intersection of two or more different types of packet filters. A first set of packet filters is translated to provide the desired packet classification for modified packets. The second set of packet filters may be translated based upon the translation applied to the first set of packet filters.
Abstract:
Techniques for modifying packet filters in a wireless communication network are described. In one scheme, packet filters may be performed with multiple operations, if needed. The operation(s) to be performed and the order of performing the operation(s) may be dependent on the number of existing packet filters to be replaced (N) and the number of new packet filters (M). If N = M, then N packet filters in a traffic filter template may be replaced with a single operation. If N > M, then M packet filters in the traffic filter template may be replaced first, and N - M packet filters may be deleted from the traffic filter template next. If N