An apparatus in one example may have a functionality of a policy decision function divided into two parts; one part representing a home network application function and the other part representing visited network bearer resources and local policies. The one part of the policy decision function supports communications with the application function, and represents the home network and application in a request for QoS control to the visited network. The other part of the policy decision function supports visited network interactions with a policy enforcement function, and represents visited network local policy related to resource utilization and roaming agreement-based policy.
Method For Reducing Service Interruptions During A Hand Off In A Wireless System
Peter James McCann - Naperville IL, US Richard P. Ejzak - Wheaton IL, US Michael F. Dolan - Boilingbrook IL, US Frank M. Alfano - Wheaton IL, US
Assignee:
Alcatel-Lucent USA Inc. - Murray Hill NJ
International Classification:
H04L 12/66
US Classification:
370352, 370331, 455439
Abstract:
A method is provided for controlling communications to and from an access terminal during a hand off period. A smart packet filter is used to identify a packet flow, apply a first treatment to a packet flow based on its destination, and transmit the first treated packet flow along a first route to the access terminal. During a hand off, the packet stream is duplicated, a second treatment is applied to the packet flow and the second treated duplicate packet flow is transmitted to the access terminal via a second route.
Routing Optimization In A Wireless Network Using Ip Packets To Convey User Information
An exemplary method implements route optimization in an IP telecommunication network that supports wireless mobile stations (MSs). IP address information related to packet flow for MSs is identified and stored in records at a local mobility anchor point (LMAP). The records are compared to determine matching pairs, i. e. records that represent that a first MS is engaged in a communication session with a second MS. First and second points of attachment nodes are determined that support the first and second MS, respectively, based on IP address information contained in a matching pair of records associated with the first and second MS. A route optimization (RO) message is transmitted to the first and second point of attachment nodes, where the RO message includes an IP address of the other point of attachment node. The RO messages represent a request for the first and second point of attachment nodes to address packets sent between the first and second MS with a source address of one of the first and second point of attachment nodes and a destination address of the other of the first and second point of attachment nodes.
Network Controlled Mobility Route Optimization For An Ip Base Station Transceiver Architecture
Frank M. Alfano - Wheaton IL, US Peter Bosch - New Providence NJ, US Peter J. McCann - Naperville IL, US Patrick J. Walsh - Naperville IL, US
Assignee:
Alcatel Lucent - Paris
International Classification:
H04W 40/00
US Classification:
455445, 455560, 370349
Abstract:
A method in one example has: establishing communication between two mobile terminals in a base station routing architecture network; and optimizing routing between the two mobiles terminals without requiring all traffic to traverse an anchor point in the base station routing architecture network. An IP base station transceiver architecture utilizes network controlled mobility to provide a transparent connection between a mobile terminal and an anchor point in the network. This transparency hides the mobility associated with changing IP base station transceivers from the mobile terminal and reduces over-the-air signaling.
Emergency Call Handling In Accordance With Authentication Procedure In Communication Network
Alec Brusilovsky - Naperville IL, US Frank Alfano - Wheaton IL, US
International Classification:
H04M 11/04
US Classification:
379 46, 4554041
Abstract:
Techniques are provided for handling of an emergency call as it affects an authentication procedure in a communication network. For example, it is assumed that, in a communication network, a first computing device comprises user equipment and a second computing device comprises an authentication function. Thus, a method comprises the following steps. A first type call indicator message is received at the second computing device from the first computing device. A decision is made to proceed with or drop an authentication procedure for the first computing device at the second computing device based on the first type call indicator message. The second computing device may enable a first type call to be placed for the first computing device. The first type call may be an emergency call.
Mechanism For Wireless Access Networks To Throttle Traffic During Congestion
Deborah L. Barclay - Winfield IL, US Frank M. Alfano - Wheaton IL, US
International Classification:
H04W 28/02
US Classification:
370230
Abstract:
Exemplary methods and apparatuses are provided for throttling wireless traffic during congestion in radio access networks. Embodiments are provided that may assist service providers to reduce new requests for network resources during congestion and allow existing lower priority traffic to be pre-empted with a backoff time to allow a new request with higher priority traffic to be served. In response to a request for an additional connection to a radio access network from a terminal device that has one or more existing connections in the radio access network, an access network controller will compare a priority level of a requested connection to a priority level of other existing connections in the radio access network. The access network controller may reject or grant the request based on the comparison and send the terminal device a backoff time value and a congestion indicator.
Frank M. Alfano - Wheaton IL, US Deborah L. Barclay - Winfield IL, US
International Classification:
G06F 15/16
US Classification:
709217
Abstract:
An example method is executed on at least one of Serving GPRS Support Node (SGSN), an enhanced SGSN (eSGSN), a Packet Data Serving Node (PDSN), Serving Gateway (SG), or a computer network node and includes receiving a data message from a connectionless device, the data message comprising at least one of a device class identifier and an application class identifier. The method further includes forwarding the data message to an application wherein the data message is forwarded based on at least one of the device class identifier and application class identifier.
Frank Alfano - Naperville IL, US Satish Kanugovi - Bangalore, IN
International Classification:
H04W 72/04
US Classification:
370329
Abstract:
The present subject matter discloses systems and methods for uplink resource access in wireless communication networks. In one implementation, the method comprises identifying at least one communication device transmitting low characteristic data based on at least one device identification parameter, and transmitting a resource assignment message to the at least one identified communication device, wherein the resource assignment message is indicative of allocation of uplink resources. The method further comprises receiving data, from the at least one identified communication device, based on the allocation of the uplink resources.
Robert Perlitz, Leo Krasnahill, Mari Kuhtik, Dennis Cann, Debbie Granberg, Karen Malek, Patrick Flynn, Ronald Kinniburgh, E Engel, Joseph Chis, Nancy Reis
Leo Mansi, Margo Oliver, Dawn Lawrence, Mike Johnson, Donna Boyer, Mark Sousa, Nancy Silva, Joseph Cordeiro, Dennis Jacobs, Deborah Leiter, Ann Francis
Roger Lyons, Tom Suslavich, Brenda Wilcox, Becky Smith, Bob Mcquinn, Reggie Atkins, Owen Tucker, Cindy Thompson, Marcy Epps, Kevin Mikeworth, Betty Smith