Abstract:
A mobile station (100) and a compression/decompression node in a wireless network (5), preferably the GGSN 30 (30), agree on whether to apply compression/decompression, and what compression/decompression scheme to use either by pre-configuration (when the GGSN 30 is in the home network of the mobile terminal) or by signalling (when the GGSN 30 is in a visited or a roamed-to network). Additional information, such as a profile-specific dictionary, may be used to increase the compression efficiency, particularly during start-up. Dynamic data can also be accommodated. The compression/decompression may be turned on and off on a packet-by-packet basis, depending on whether the compression actually results in a smaller packet. A compressed/uncompressed indicator bit or bits can be inserted explicitly on a per packet basis, and/or the compressed/uncompressed indication can be derived implicitly. A desired data compression/decompression algorithm, or any desired Proprietary Feature, can be signaled, possible without requiring standardization changes, by using a Packet Data Protocol PDP Context Activation message with a predetermined Access Point Name (APN) message information element that is sent from a first network element to a second network element for at least identifying the desired compression/decompression algorithm. It another embodiment, for the case where Proprietary Feature capability is exchanged between a RAN and a UE network element, a transmission of an extension to a UE Capability Enquiry message is sent to the UE for identifying the Proprietary Feature.
Abstract:
Various example embodiments are disclosed relating to efficient techniques for error detection and authentication in wireless networks. For example, according to an example embodiment, an apparatus adapted for wireless communication in a wireless network may include a processor. The processor may be configured to transmit a message including a field to provide both authentication and error detection for the message. The field may include an authenticated checksum sequence.
Abstract:
The present invention provides an enhanced H-ARQ scheme that optimizes bandwidth utilization and spectrum efficiency. When an H-ARQ attempt is unsuccessful due to loss or error over a hop between the BS and MS/SS, then only the first node in the hop chain that fails to decode the packet transmits another H-ARQ attempt. The BS determines the first node that fails on decoding based on certain information such as the feedback information sent from the nodes on the path. The previous node of the failed node is then instructed to retransmit by the BS.
Abstract:
Disclosed are examples of a method, system, devices and nodes to conduct communications between a device coupled to a communication network and a network security enforcement node, such as a firewall. An illustrative method includes, with a device coupled to a network security enforcement node through a communication network, requesting from the network security enforcement node information comprised of at least one of supported and enabled features and, in response to receiving the request, sending information descriptive of at least one of network security enforcement node supported and enabled features. The method may further include requesting by the device that at least one network security enforcement node feature be one of enabled or disabled.
Abstract:
A method and equipment for accelerating throughput of communication segments from a sender (30) to a receiver (40) each of which include a protocol layer (30a 40a) for providing such segments, the method in case of TCP including a first step (20a) in which the sender protocol layer (30a) initializes a congestion window (cwnd) to some initial size (iwnd) and increases the congestion window by one segment each time it receives an ACK, but upon receiving an indication of low congestion, performs a step (20c) of accelerated start in which it sets a slow start threshold (SSTHRES) to a standard initial value (typically 65535) and re-initializes cwnd to a new value, and the sender protocol layer (30a) then increments cwnd at one or another predetermined rate—depending on whether the start immediately follows a new connection or instead follows a transfer of an existing connection to a new path—in respect to received ACKs.
Abstract:
A crawler program collects and stores application programs including application binaries and associated metadata from any number of sources such as official application marketplaces and alternative application marketplaces. An analysis including comparisons and correlations are performed among the collected data in order to detect and warn users about pirated or maliciously modified applications.
Abstract:
The invention proposes a method for controlling a packet transmission between a sender and a receiver sent via a packet transport protocol, the receiver being a mobile network element, comprising the steps of detecting whether a mobility event has occurred, detecting whether a downlink packet loss has occurred, and providing, in case a mobility event and a packet loss has been detected, an indication to the sender that a packet loss due to mobility has occurred.
Abstract:
Various example embodiments are disclosed relating to contention window management in relay networks. In an example embodiment, a data unit transmitted from a network node based on a first contention window associated with a first network station may be received, for example, by the first network station located, for example, on a first level. The data unit may be forwarded to a second network station based on a second contention window associated with the second network station. The second network station may, for example, be located on a second level. The first network station may, for example, include a relay station and the second network station may, for example, include a base station.
Abstract:
A method and equipment for accelerating throughput of communication segments from a sender (30) to a receiver (40) each of which include a protocol layer (30a 40a) for providing such segments, the method in case of TCP including a first step (20a) in which the sender protocol layer (30a) initializes a congestion window (cwnd) to some initial size (iwnd) and increases the congestion window by one segment each time it receives an ACK, but upon receiving an indication of low congestion, performs a step (20c) of accelerated start in which it sets a slow start threshold (SSTHRES) to a standard initial value (typically 65535) and re-initializes cwnd to a new value, and the sender protocol layer (30a) then increments cwnd at one or another predetermined rate—depending on whether the start immediately follows a new connection or instead follows a transfer of an existing connection to a new path—in respect to received ACKs.
Abstract:
A system, apparatus, and method for providing secure loss recovery for packet loss due to bit errors and other non-congestion-related packet loss occurring over the communication link. An intermediary node in a network between a sending node and a receiving node identifies packet loss due to bit errors (PLB), or other non-congestion-based packet loss, over a network connection between the sending module and the network node. A loss notification signal is sent from the network node to the sending module in response to identification of the non-congestion-based packet loss. The PLB is verified at the sending module. A first loss recovery procedure is performed, different from a second loss recovery procedure associated with congestion-based packet loss, if the PLB is verified at the sending module.