Abstract:
The disclosure is directed to a mobile communication device that is capable of accessing different types of networks such as a circuit-switched network, or any cellular network, and a packet-switched network. During hand-over from the first network to the second network, the sender of packets/frames expands or compresses the packet-switched packets using well-known time-warping techniques. At the receiver end, the received time-warped packets and frames from the second network are appropriately selected so that no unwanted artifacts are introduced during playback.
Abstract:
The disclosure is directed to a mobile communication device that is capable of accessing different types of networks such as a circuit- switched network and a packet-switched network. While communicating over the packet-switched network, the device negotiates a sleep interval that is longer than the ordinary interval available using the packet- switched network. In this manner, the device wakes less frequently and thereby conservers power. A buffering system is included so that data directed towards the device while it is asleep may be buffered for later delivery when the device awakens.
Abstract:
Systems and methodologies are described that facilitate device-side access point list management. Blacklists of access points unsuitable for providing network access to a related mobile device can be maintained as well as whitelists of suitable access points. The lists can be managed using an interface provided at the mobile device. In addition, lists can be modified according to provisioned network updates. Also, the lists can be of maximum size such that older entries can be purged upon insertion of newer entries based on a number of factors; timed entry deletion is provided as well. Access points in the lists can be stored and presented according to various identifiers related to the access points.
Abstract:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive set-vice from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
Abstract:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier (402) for sets of one or more nodes such as restricted access points (102, 104) and access terminals (106, 108) that are authorized to receive service from the restricted access points (102, 104). Access control may be provided by operation of a restricted access point and/or a network node (110). In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
Abstract:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
Abstract:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.