Abstract:
PROBLEM TO BE SOLVED: To provide an access node that provides communication of state information associated with an end node. SOLUTION: The access node 300 for providing communication of state information includes: an interface 330 which receives a request message from the end node; a memory 310 which stores the latest state information associated with the end node; and a processor 304 coupled to the memory. When the access node 300 receives the request message from the end node at the interface 330, the processor 304 retrieves the latest state information associated with the end node from the memory 310, generates an update message including an end node identifier, the latest state information, and a time stamp based upon the request message, and transmits the update message to a management node, which updates the state information of the end node. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a management node that stores state information associated with an end node. SOLUTION: The management node 400 for storing state information includes: an interface 420 which receives and transmits the state information associated with the end node; a processor 404; and a memory 410, coupled to the processor, for storing the state information and a computer-readable instruction. When the management node 400 receives the state information, the management node determines whether the state information stored in the memory 410 should be updated, and overwrites the state information with latest state information when it is determined that the state information should be updated. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
Un procedimiento para identificar un agente propio de protocolo de Internet móvil (212) en un sistema de comunicación inalámbrica, que comprende: identificar (702) una pasarela de red de paquetes de datos (244) que sirve como un punto de anclaje de un protocolo de movilidad basado en red usado para la comunicación en el sistema de comunicación inalámbrica; comunicar (704) uno o más mensajes a la pasarela de red de paquetes de datos identificada (244) que contienen peticiones respectivas para una dirección de agente propio de protocolo de Internet móvil (212); y recibir (706) información relacionada con la dirección del agente propio de protocolo de Internet móvil (212) en respuesta al uno o más mensajes, en el que la información relacionada con la dirección del agente propio de protocolo de Internet móvil (212) se proporciona por la pasarela de red de paquetes de datos (244) cuando el agente propio de protocolo de Internet móvil (212) se coloca con la pasarela de red de paquetes de datos (244), y en el que la información relacionada con la dirección del agente propio de protocolo de Internet móvil (212) comprende información proporcionada por un dispositivo diferente cuando el agente propio de protocolo de Internet móvil (212) no está colocado con la pasarela de red de paquetes de datos (244); y desconectar de la pasarela de red de paquetes de datos (244) y unir de nuevo a una pasarela de red de paquetes de datos diferente asociada al dispositivo diferente si la información relacionada con la dirección del agente propio de protocolo de Internet móvil indica que el agente propio de protocolo de Internet móvil (212) está colocado con el dispositivo diferente.
Abstract:
Systems and methodologies are described that facilitate inter-system handover in a wireless communication system. Various aspects described herein provide for handover techniques that enable a target system to be prepared by a mobile device via a source system in order to minimize specific changes required to source system and/or target system. Techniques are described herein in which the radio link of a source system can be utilized to tunnel signaling messages which are in a format understood by a destination node in a target system. Further, fast inter-access handover can be facilitated by establishing a simple generic transmission tunnel between respective network nodes in source and target systems that handle intra-system mobility and providing a Layer 2 (L2) tunneling mechanism over the radio interface of each involved system technology.
Abstract:
Methods and apparatus for routing messages between an end node and an access node via another access node are described. Physical layer identification information is used when identifying a remote, e.g., adjacent, access node as a message destination. Thus, when a connection identifier based on one or more physical layer identifiers is available to a wireless terminal, e.g., from one or more downlink signals received from a destination access node, the wireless terminal can use the connection identifier corresponding to the destination node to route a message via an access node with which it has an established uplink connection. Such connection identifier information can be used even when other addressing information, e.g., network layer address information, associated with the destination access node, may not be available to the wireless terminal.
Abstract:
Methods and apparatus for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a end node controlling the transfer of state from a first access node to a second access node during a handoff operation thereby eliminating any need for state transfer messages to be transmitted between the second access node and the first access node during handoff or the use of a core network node to support state transfer. As part of a handoff state information is obtained by an end node from the current access node in encrypted form and then communicated to the new access node to which the handoff operation is to be completed. The new access node, e.g., base station decrypts the state information and then uses it to support communications with the end node. While the information is communicated to and from the end node over wireless links, since it is encrypted by the first access node it is secure and can be trusted by the receiving, e.g., target, access node.
Abstract:
Methods and apparatus for using end nodes, e.g., wireless terminals, to discover base stations and communicate information about discovered access nodes, e.g., base stations, to other access nodes in a system are described. As the wireless terminal roams in the system and new access nodes are encountered, one or more physically adjacent access nodes will be informed of the presence of the new access node as a result of communications with the wireless terminal. A message indicating an access node's inability to route a message to another access node which is known to a wireless terminal may trigger the wireless terminal to begin the process of updating access node routing and neighbor information.
Abstract:
Methods and apparatus related to message compression/decompression are described. A compressed message is generated by indicating what changes are to be made to a previous message to produce the message sought to be transmitted. The required change, in the form of at least one command and corresponding parameter, is transmitted as a compressed version of the message being communicated. This approach takes advantage of the fact that messages sent over time often include much of the same message content and only one or a few fields may have changed. The techniques are general and involve including a command in the compressed message along with at least one parameter. The command indicates processing to be performed on a previous message to generate the uncompressed message. The parameter may be, e.g., data to be inserted into the previous message or specify a location in the previous message where the change is to be made.