EP2020159A2 - Profile modification for roaming in a communications environment - Google Patents

Profile modification for roaming in a communications environment

Info

Publication number
EP2020159A2
EP2020159A2 EP07761671A EP07761671A EP2020159A2 EP 2020159 A2 EP2020159 A2 EP 2020159A2 EP 07761671 A EP07761671 A EP 07761671A EP 07761671 A EP07761671 A EP 07761671A EP 2020159 A2 EP2020159 A2 EP 2020159A2
Authority
EP
European Patent Office
Prior art keywords
profile
services
network
access
home network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP07761671A
Other languages
German (de)
English (en)
French (fr)
Inventor
Vince Park
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of EP2020159A2 publication Critical patent/EP2020159A2/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/1853Satellite systems for providing telephony service to a mobile station, i.e. mobile satellite service
    • H04B7/18539Arrangements for managing radio, resources, i.e. for establishing or releasing a connection
    • H04B7/18541Arrangements for managing radio, resources, i.e. for establishing or releasing a connection for handover of resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/24Negotiating SLA [Service Level Agreement]; Negotiating QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/18TPC being performed according to specific parameters
    • H04W52/28TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • H04W84/045Public Land Mobile systems, e.g. cellular systems using private Base Stations, e.g. femto Base Stations, home Node B
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/12Mobility data transfer between location registers or mobility servers

Definitions

  • the following description relates generally to communications systems, and more particularly to enabling profile modifications to support services when roaming between networks.
  • Communication networks such as wireless communication networks, broadband networks, and other suitable networks are utilized in connection with transferring data, wherein data can include word processing files, streaming video, multimedia files, voice data, and/or the like.
  • data can include word processing files, streaming video, multimedia files, voice data, and/or the like.
  • QoS quality of service
  • a first individual may subscribe to a Digital Subscriber Line (DSL) network and be provided with first upload and download speeds, while a second individual subscribed to the DSL network may pay a different subscription rate than the first individual and be provided with different upload and download speeds.
  • DSL Digital Subscriber Line
  • the first subscriber may pay a first rate for 1 Megabyte/second download connection speed while the second subscriber may pay a second rate for 512 Kilobyte/second download connection speed.
  • users of networks can be provided with different services.
  • wireless network subscribers can purchase subscriptions that enable web- browsing, text message delivery and receipt, voice calls, data transmittal (e.g., video, pictures, sound clips, ...), gaming, etc.
  • QoS parameters e.g., latency, bandwidth, .
  • traditional communication networks have only supported a relatively small set of services
  • emerging communication networks based on the Internet Protocol enable a potentially limitless set of services. This exposes a need for improvements in controlling services and managing associated QoS support.
  • Some communication networks support the capability to roam, where a subscriber obtains access via a visited network that is administratively different from the home network with which the subscriber is affiliated.
  • the visited and home networks are based on similar technologies, thus the visited network simply allows the subscriber to utilized services offered by its home network.
  • the visited network simply allows the subscriber to utilized services offered by its home network.
  • the profile can be sent to the visited network upon receiving an access grant for services from the home network.
  • the visited network can selectively offer similar services specified by the profile, a subset of services specified in the profile, and/or provide a superset of services in addition to those originally specified by the profile.
  • the profile can be modified where services can be added or deleted from those originally specified by the home network.
  • Services can include Quality of Service considerations that are related to a plurality of differing communications considerations such as bandwidth, latency, loss tolerances, and so forth.
  • FIG. 1 is a high level block diagram of a system that is provided to illustrate profile modification for roaming in a communications environment.
  • FIG. 2 is a block diagram of an example network access system.
  • FIGS. 3 and 4 is a block diagram that illustrates an example authentication and authorization system.
  • FIG. 5 illustrates example contents of a profile.
  • FIG. 6 illustrates an example format for a subscriber service set.
  • FIG. 7 illustrates an example format for a service class type.
  • FIG. 8 illustrates an example subscriber service type.
  • FIG. 9 illustrates a general roaming example.
  • FIG. 10 illustrates a virtual homing example.
  • FIG. 11 illustrates a virtual homing and roaming example.
  • FIG. 12 is a representative flow diagram illustrating a methodology for roaming and profile processing.
  • FIG. 13 and 14 is a high level block diagram of a system for providing profile support during roaming operations.
  • FIG. 15 is a block diagram of system that is provided to illustrate an example network that can support profile modifications.
  • FIG. 16 is a block diagram of an apparatus to process profile and/or QoS parameters.
  • FIG. 17 illustrates an example communications system.
  • FIG. 18 illustrates an example end node.
  • FIG. 19 illustrates an example access node.
  • FIG. 20 illustrates an example end node communicating with an example access node.
  • a method for roaming between networks includes receiving a request for network access at a visited network and receiving a profile from a home network in response to the request. Upon receiving the profile, selectively offering services to one or more access terminals based at least in part on the profile.
  • the profile can be modified by the visited network to offer similar services, a subset of services, and/or a superset of services than originally specified by the home network.
  • a terminal can also be called a system, a user device, a subscriber unit, subscriber station, mobile station, mobile device, remote station, remote terminal, access terminal, user terminal, user agent, or user equipment.
  • a user device can be a cellular telephone, a cordless telephone, a Session Initiation Protocol (SIP) phone, a wireless local loop (WLL) station, a PDA, a handheld device having wireless connection capability, a module within a terminal, a card that can be attached to or integrated within a host device (e.g., a PCMCIA card) or other processing device connected to a wireless modem.
  • SIP Session Initiation Protocol
  • WLL wireless local loop
  • aspects of the claimed subject matter may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer or computing components to implement various aspects of the claimed subject matter.
  • article of manufacture as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media.
  • computer readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips%), optical disks (e.g., compact disk (CD), digital versatile disk (DVD)...), smart cards, and flash memory devices (e.g., card, stick, key drive).
  • a carrier wave can be employed to carry computer-readable electronic data such as those used in transmitting and receiving voice mail or in accessing a network such as a cellular network.
  • a carrier wave can be employed to carry computer-readable electronic data such as those used in transmitting and receiving voice mail or in accessing a network such as a cellular network.
  • a system 100 illustrates profile modifications for roaming to facilitate communications in a wireless network.
  • a wireless terminal 102 also referred to as host
  • the access node 104 may also be considered part of the visited network or domain 106.
  • the access node 104 is also referred to as a base station or an access router and employs various nodes, elements, and/or systems included in the visited network 106 for such services as authenticating a service request, authorizing a service, establishing a session, and so forth as will be described in more detail below.
  • the visited network 106 receives a request for network access from the wireless terminal 102. After some handshaking with the home network 110 to determine available services for the wireless terminal 102, an access grant 114 is generated by the home network where a profile 120 describing services from the home network is transmitted in response to the request.
  • the visited network 106 can selectively offer services to one or more access terminals 102 based at least in part on the received profile 120.
  • the services specified by the profile can relate to Quality of Service (QoS) parameters for the respective wireless terminal and the communications session established by the request to the visited network 106.
  • QoS Quality of Service
  • the visited network 106 processes, modifies, deletes, or adds services to the profile 120. This enables the visited network 106 to selectively offer a subset of services from the profile 120 and/or to offer additional services than specified by the profile.
  • the visited network can dynamically tailor its offerings based on current resource conditions or other considerations.
  • the system 100 allows for controlling services and Quality of Service (QoS) support associated with a subscriber, and/or subscriber device 102, when roaming, e.g., obtaining access via a visited, as opposed to the home, operator's network 110.
  • QoS Quality of Service
  • the subscriber profile 120 can be included in the access grant message 114 sent from, e.g., a home network 110 authentication and authorization server (AAS) to a visited network AAS. It is to be appreciated, that the profile 120 can be exchanged between other network components as well. Subsequently, the access grant message 114 is generated, where the subscriber profile 120, is sent e.g., from the visited AAS to the access node 104 through which the subscriber device 102 is requesting access.
  • the subscriber profile 120 prescribes the configuration of one or more QoS parameters and/or or includes pre-authorization information for subsequent QoS configuration changes as needed to provide service differentiation between subscribers and/or between various application services authorized for use by a given subscriber.
  • the subscriber profile 120 as provided by the home AAS or other network component can be modified by one or more components in the visited network 106, e.g., the visited AAS and/or the access node.
  • the visited network operator can modify the subscriber profile 120 to be consistent with services offered in the visited operator's network 106, e.g., add, modify, or delete a service.
  • the system 100 enables flexibility in controlling services and QoS when roaming. This allows subscriber services to be changed, e.g., added, modified, deleted, by the visited network operator.
  • This approach of changing the profile at the visited network 106 also enables evolution of offered service definitions due to flexibility of using XML (or other structure) to define services in the subscriber profile 120.
  • the terminal 102 which can be, for instance, a module such as an SD card, a network card, a wireless network card, a computer (including laptops, desktops, personal digital assistants PDAs), mobile phones, smart phones, or any other suitable terminal that can be utilized to access a network.
  • Terminal 102 accesses the network by way of an access node 104.
  • terminal 102 can be communicatively coupled to access node 104 by way of a wired connection, such as an Ethernet cable, a USB connection, etc.
  • a connection between terminal 102 and access node 104 may be wireless in nature, in which access node 104 may be a base station and terminal 102 may be a wireless terminal.
  • terminal 102 and access node 104 may communicate by way of any suitable wireless protocol, including but not limited to Time Divisional Multiple Access (TDMA), Code Division Multiple Access (CDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiplexing (OFDM), FLASH OFDM, Orthogonal Frequency Division Multiple Access (OFDMA), or any other suitable protocol.
  • access node 104 can be an access node associated with a wired network or a wireless network.
  • access node 104 can be, for instance, a router, a switch, or the like.
  • the access node 104 can include one or more interfaces, e.g., communication modules, for communicating with other network nodes.
  • access node 104 may be a base station (or wireless access point) in a cellular type network, wherein base stations (or wireless access points) are utilized to provide wireless coverage areas to a plurality of subscribers. Such base stations (or wireless access points) can be arranged to provide contiguous areas of coverage to one or more cellular phones and/or other wireless terminals.
  • the system 100 can also include an authentication and authorization server (AAS) at 106 and at 110, which aids in enabling terminal 102 to send/receive data over a network through use of access node 104. While shown as being a separate entity, it is understood that AAS 106 can be included within access node 104.
  • AAS authentication and authorization server
  • terminal 102 can provide data that is indicative of identity of such terminal 102 and/or a subscriber associated therewith to AAS 106 by way of access node 104.
  • the access node 104 can relay the identifying data to AAS 106 without modification or can modify such data according to any suitable data format/protocol.
  • AAS 106 can authenticate terminal/subscriber identity and determine whether terminal 102 (and/or a subscriber) is authorized for one or more services.
  • the process of authentication/authorization may, and in some embodiments does, include the exchange of one or more signals between terminal 102, access node 104, and/or AAS 106. If terminal 102 and/or a subscriber associated therewith is authorized for services, AAS 106 can relay a modified profile assigned to terminal 102 (or the associated subscriber) to access node 104, wherein the profile includes at least description of QoS parameters associated with one or more traffic flows relating to terminal 102, wherein a data flow can be defined as a series of related data packets (e.g., as identified based on inspection of packet headers and/or packet payloads).
  • the profile 120 can also include filter rules that facilitate association of data packets to traffic flows and associating prescribed QoS treatments to certain traffic flows and/or data packets.
  • filter rules that facilitate association of data packets to traffic flows and associating prescribed QoS treatments to certain traffic flows and/or data packets.
  • data packets with headers indicating that such packets relate to voice data can be collectively referred to as a traffic flow.
  • data packets indicating that such packets relate to video data can be a separate traffic flow.
  • Access node 104 upon receipt of the profile, can monitor and enforce
  • a parameter that can be utilized in connection with described QoS treatment may relate to acceptable latency associated with a traffic flow, and access node 104 can perform scheduling with respect to the traffic flow to maintain an acceptable latency as described within the profile provided from AAS 106.
  • Other QoS parameters within the received profile can relate to minimum acceptable data rate with respect to a particular traffic flow type, maximum acceptable data rate with respect to a particular traffic flow type, etc. Such parameters can be defined numerically (e.g., a minimum data rate with respect to a first traffic flow type is 128 Kb/sec) and/or relatively defined (e.g., latency with respect to a first traffic flow type is to be 1 A of latency with respect to a second traffic flow type).
  • definition of parameters can be contingent upon certain system or network state(s).
  • a particular parameter may be relatively defined until reaching a threshold and thereafter numerically defined (e.g., a minimum data rate with respect to a first traffic flow should be twice as much as a second traffic flow, but not to exceed 1 Megabyte/second).
  • the profile provided to access node 104 from AAS 106 can support object instances therein, thereby reducing duplication of parameter definitions within the profile.
  • a gaming application that is authorized for use with respect to terminal 102 may use three parallel traffic flows to support such application.
  • a definition can be created for a single traffic flow and instances of such definition can be utilized for related traffic flows.
  • the profile can include filter (e.g., classification) rules, which can be employed in connection with identifying a particular traffic flow and associating such flow with an instance that determines QoS treatment to assign to the traffic flow.
  • the access node 104 upon receipt of the profile, can be configured to provide QoS treatment to terminal 102 as prescribed in the profile and the pre- authorized data set 120.
  • access node 104 can provide different QoS treatment with respect to various traffic flows and multiple users, thereby enhancing system performance and user experience.
  • the system 200 includes a Wireless Terminal (WT) 210 with a connection to a Base Station (BS) 216 via a FLASH Air Interface at 220.
  • the BS 216 communicates with a Local Authentication and Authorization (AAL) Server 224 via network links.
  • the AAL 224 can be provided as part of a Mobile Network Server (MNS).
  • MNS Mobile Network Server
  • the AAL 224 communicates with other AA servers, such as a Home AA server (AAH) 230 and a Foreign AA server (AAF) 234.
  • a Home Network 240 can be served by the AA server 230 that includes the original service establishment records of the WT 210.
  • a Local or visited Network 244 is the network where the WT 210 happens to gain network connectivity.
  • the connection to the Home Network would include, e.g., communication between a BS, a MNS/ AAL, and AAH that are all located in the Home Network (unlike what is shown in the Fig. 2).
  • the WT 210 is Local to the Visited network 244 when roaming (as shown in Fig. 2), and local to the Home network 240 when not.
  • the system 200 also depicts the following example protocols that be employed when controlling network access. These can include a Connection Control Protocol (CCP), a Secure Association Protocol (SAP), a Remote Dial-In User Service (RADIUS) protocol, and/or an Extensible Authentication Protocol (EAP).
  • CCP Connection Control Protocol
  • SAP Secure Association Protocol
  • RADIUS Remote Dial-In User Service
  • EAP Extensible Authentication Protocol
  • other protocols can also be employed to control network access.
  • Fig. 3 and 4 a two tiered authentication protocol is illustrated.
  • two phases of authentication for network access can be employed using one or two different Extensible Authorization Protocol (EAP) methods.
  • the first phase shown in Fig. 3 involves authentication between a wireless terminal (WT) 310 and a Home network AA server (AAH) 320 through base station 330 and a Local network AA server (AAL) 340.
  • a second phase achieves authentication between the WT 310 and the Local network AA server 340, as shown in Fig. 4.
  • the two-phase authentication procedure generally takes place regardless of whether the WT 310 is located in its Home operator network or roaming in another operator's network.
  • the WT 310 is expected to be served locally by the AAL 340, which is independent of its AAH 320.
  • Two-phase authentication enables scalable roaming, as well as provides for proper handling of key material and services in the Local network, be that network Home or Visited.
  • the two phases of EAP should be independent of each other. In other words, different mechanisms may be used in each phase as long as mutual authentication of the WT 310 and AA server 320, 340 is attainable.
  • the AAL 340 acts as a
  • the second phase achieves authentication between the WT 310 and the Local network (AAL Server) 340, where the AAH is not involved as shown in Fig. 4.
  • the addition of a second phase of authentication with the Local network allows the WT 310 to establish trust locally.
  • the Local network may be part of a Foreign operator's network (i.e., not Home operator), or part of the Home operator's administrative domain.
  • Local trust establishment can be employed for several reasons including to shield the AAF/ AAH from local mobility impacts (regardless of whether the WT is roaming or not), to enable the use of the AAL 340 as a trusted third party for other protocols, and to provide a greater degree of subscriber identity privacy.
  • the authentication phase with the Local network allows for subscriber anonymity support.
  • the AAL 340 allocates a temporary identifier to the WT 310, which cannot be linked to a permanent identifier of the WT by "listening" to the air interface. This is due in part to mechanisms that are in place such that the temporary WT identifier is communicated securely to the WT 310, ensuring confidentiality. Then, the WT 310 can use this temporary identifier to obtain future network access in this Local network, or for other host configuration purposes as required if the WT was present in the Home network. In addition establishing trust, profiles can be exchanged to further define services.
  • the profile 500 is a logical grouping of parameters that prescribe aspects of services authorized for use by a subscriber (a particular mobile terminal). It is understood, however, that field/elements within profile 500 can be altered, such that how elements are prescribed can be altered, logical arrangements can be altered, number of elements can be altered, and names of elements can be altered while in accordance with the subject claims.
  • the profile 500 can be associated with a flash service element 502, which is a logical grouping of parameters associated with establishing and maintaining connectivity by way of an interface, such as an air interface, including a FLASH air interface.
  • the flash service element 502 can be associated with a location constraint element 504, which is a collection of parameters that prescribe locations (or points of attachment) through which the subscriber may be granted access for services.
  • location constraint element 504 is included within the profile 500, access can be limited as prescribed by elements included within location constraint element 504. Omission of location constraint element 504 indicates that access is not restricted to a list of prescribed locations, but can be restricted by other means, such as a roaming agreement.
  • the profile 500 can additionally include a network element 506, which can be a collection of parameters associated with a particular network through which a subscriber (terminal) may be granted access for services. Access can be limited to a set of indicated networks and, if desired, may not be granted through other networks.
  • Network element 506 can be associated with a network identifier element 508, which can be a globally unique identifier of a network through which the subscriber can be granted access for services.
  • Network element 506 can additionally be associated with a zone element 510, which can be defined as a collection of parameters associated with a particular zone within a network through which the subscriber can be granted access for services. Access within a network can be limited to the set of indicated zones within zone element 510. Absence of zone element 510 can indicate that access within the network identified within network identifier element 508 is not restricted to a set of prescribed zones.
  • Zone element 510 can be related to a zone identifier element 512, which can be a locally unique identifier of a zone within a network through which the subscriber may be granted access for services.
  • Zone element 510 can also be related to a base station element 514, which can be defined as a collection of parameters associated with a particular base station or access node (within a zone of a network) through which the subscriber may be granted access for services. Access within a zone can be limited to a set of indicated base stations within base station element 514. Absence of a base station element 514 can indicate that access within an identified zone is not restricted to a set of particular base stations.
  • Base station element 514 can be associated with a base station identifier
  • Base station element 514 can additionally be related to a link element 518, which can be a collection of parameters associated with a particular link (corresponding to an identified base station within a zone of a network) through which a subscriber may be granted access for services. For example, access by way of a base station can be limited to a set of links prescribed within the link element 518, and absence of a link element 518 within a profile can indicate that access by way of the corresponding base station is not restricted to a certain set of links.
  • Link element 518 can be associated with a logical link control identifier element 520, which can be a locally unique identifier of a link corresponding to a base station within a zone of a network through which the subscriber can be granted access for services.
  • Link element 518 can also be associated with a connection element 522, which is a collection of parameters associated with a particular connection through which the subscriber can be granted access for services. For example, access by way of a link can be limited to a set of indicated connections. Absence of a connection element can indicate that access by way of the corresponding link is not restricted to a set of prescribed connections. Thus, if access by way of a particular link is not further constrained, then it may be desirable to not include connection element 522 within profile 500.
  • Connection element 522 can be associated with a connection identifier element 524, which can be a locally unique identifier of a connection corresponding to a link and base station within a zone of a network through which the subscriber may be granted access for services.
  • Profile 500 can additionally include a location update interval element
  • Profile 500 can additionally include a service set element 530 (described in detail below), which can include a set of service class and subscriber service logical data constructs that pertain to enabling and controlling services.
  • service set element 530 can include QoS parameters relating to certain traffic flows associated with a particular terminal (e.g., wireless terminal).
  • the element 530 also includes pre-authorization templates or data for dynamic quality of service configuration from an access node.
  • the information comprising the profile, including the QoS parameters, can be conveyed using XML and the structure and other characteristics, e.g., data types, formats, and/or value restrictions, of the information can be defined by an associated XML schema.
  • an example service set element 600 (such as service set element 530 of Fig. 5) is shown and described. It is to be understood, however, that such element is merely provided as an example, and that elements therein and/or logical associations between elements can be deleted, altered, and the like and remain in accordance with the claimed subject matter.
  • QoS definition and control can be based at least in part upon two data constructs within service set element 600: a service class element 602 and a subscriber service element 604. While shown as a "subscriber" service element, it is understood that such element can relate to a subscriber device, e.g., wireless terminal. Thus, a subscriber service element can be included within a profile as a consequence of identifying indicia of a terminal and/or identifying indicia of a subscriber. Depending on the services to be provided the profile may include multiple occurrences of either or both of these data constructs.
  • Service class element 602 (data construct) can provide a common mechanisms for prescribing QoS treatment of a traffic flow associated with an instance of a particular service class. For example, packets provided to/from a host device are classified into one or more traffic flows, where a given traffic flow may include only a specific packet stream corresponding to a particular application or may include an aggregation of packet streams corresponding to multiple applications.
  • Each identified traffic flow can then be associated with an instance of one or more service class elements (602).
  • An associated service class of each identified traffic flow can provide a basis for admission control, scheduling, and traffic conditioning functions of a host device and/or an access node (access router, base station, etc.).
  • service class element 602 can pertain to QoS treatment
  • service set element 600 can pertain to policy control (e.g., authorization for services) and service definition (e.g., setting parameters values, association of identified traffic flows with instances of particular service classes to support QoS, ).
  • Each service set element can include zero or more service class elements and zero or more subscriber services elements.
  • service class element 700 is provided as an example of one particular manner for defining QoS treatment within a profile. Other manners for doing so are contemplated by the inventors and are intended to fall under the scope of the hereto appended claims.
  • Service class element 700 can include a service class identifier 702, which can be a globally unique identifier (e.g., 32 bit) of a defined service class, which can be represented using a notation x:y, where x and y can be hexadecimal values corresponding to a first number of bits (prefix) and a second number of bits (suffix), respectively, of service class identifier 702.
  • a set of service classed defined by a particular operator or standards organization can utilize a common service class identifier prefix.
  • the service class element 700 can also include an admission priority element 704.
  • admission priority element 704 indicates a relative ordering of such service classes for purpose of making resource allocation admission control decisions.
  • Specific use of admission priority can be implementation dependent, and possible uses include priority queuing of pending resource allocation requests and/or priority of preemption of resource allocations.
  • a max rate element 706 can indicate a maximum data rate that can be provided to a traffic flow associated with an instance of a particular service class.
  • Maximum rate element 706 can be further defined by token bucket parameters, such as described within a token rate element 708 and a bucket depth element 710.
  • Token rate element 708 can be in units of kilobits/second (where kilo indicates 1000), and bucket depth element 710 can be in units of byes, for instance.
  • a minimum rate element 712 can indicate a target minimum data rate to be provided to a traffic flow associated with an instance of a service class.
  • Minimum rate element 712 can be further defined by a token rate element 714, a bucket depth element 716, a peak rate element 718, a minimum policed unit element 720, and a max packet size element 722.
  • Token rate element 714 and peak rate element 718 can be in units of kilobits/second (where kilo indicates 1000), while bucket depth element 716, minimum policed unit element 720, and max packet size element 722 can be in units of bytes.
  • a sharing weight element 724 can be utilized to indicate a relative proportion of service (e.g., rate or resources) that a traffic flow associated with an instance of a service class should receive when competing for service with traffic flows associated with other service class instances.
  • a relative proportion of service e.g., rate or resources
  • any remaining service capacity should be distributed among competing service class instances that are not otherwise limited (e.g., by indicating maximum rate) proportionally to their corresponding sharing weights.
  • a latency tolerance element 726 indicates an acceptable access link latency for packets belonging to a traffic flow associated with an instance of a service class, where access link latency includes delays associated with queuing, scheduling, and transmission. With high probability, packets belonging to a traffic flow associated with an instance of the service class should be delivered over the access link with latency below the indicated tolerance. As an example, latency tolerance element 726 can be associated with units of milliseconds.
  • a loss tolerance element 728 can indicate an acceptable probability of loss for packets belonging to a traffic flow associated with an instance of a service class, where sources of loss include queue management and unrecoverable transmission errors. Packets belonging to a traffic flow associated with an instance of an identified service class should be delivered over the access link with loss probability below an indicated tolerance.
  • the loss tolerance element 728 can include data relating to number of loss packets per 100,000 packets, for example.
  • a differentiated services (DS) codepoint 730 can indicate a DS codepoint with which packets in a traffic flow associated with an instance of an identified service class should be marked.
  • a compression hint element 732 can indicate that header compression is likely applicable to packets belonging to a traffic flow associated with a particular instance of a service class. Compression hint element 732 can include information to assist in determining the applicable type of compression and/or parameters needed for compression.
  • the subscriber service element 800 can include a subscriber service identifier element 804, which can be a globally unique identifier of a certain subscriber service, which can be represented using notation x:y, where x and y can be hexadecimal values corresponding to a first set of bits (prefix) and a last set of bits (suffix), respectively, of subscriber service identifier element 804.
  • a subscriber service identifier element 804 can be a globally unique identifier of a certain subscriber service, which can be represented using notation x:y, where x and y can be hexadecimal values corresponding to a first set of bits (prefix) and a last set of bits (suffix), respectively, of subscriber service identifier element 804.
  • a set of subscriber services defined by a particular operator or standards body can use a common subscriber service identifier prefix.
  • a realm element 806 can indicate a domain with which a subscriber service is associated, wherein absence of realm element 806 can indicate that the subscriber service is associated with a local domain. This provides a basis for better controlling services when roaming between various network operators.
  • Subscriber service element 800 can include a Policy Decision Point
  • PDP PDP identifier element 810
  • a PDP identifier element 810 can be an identifier, such as an IP address or host name, of the PDP to be used for QoS configuration change requests associated with a particular subscriber service.
  • the subscriber service element 800 can additionally include an egress element 812, which is a logical grouping of service class instances, filter rules, and service class instance templates applicable to egress traffic from an access router to a subscriber over a corresponding access link, and an ingress element 814, which is a logical grouping of service class instances, filter rules, and service class instance templates that are applicable to ingress traffic to an access router from a subscriber over a corresponding access link.
  • Egress element 812 and ingress element 814 can each include one or more service class instance elements 816 and 818, respectively.
  • Service class instance elements 816 and 818 can define static service class instances, e.g., identify a particular service class element of which an instance is required and with which a traffic flow will be associated by one or more filter rules.
  • a static service class instance can conceptually be viewed as a persistently requested instance of a particular service class.
  • an admission control decision may be required.
  • a static service class instance may or may not be acted (e.g., admitted), depending upon resource availability and admission priority, but should be made active whenever possible.
  • Egress element 812 and ingress element 814 can also each include one or more filter rule elements 820 and 822, respectively.
  • Filter rule elements 820 and 822 define a classifier filter rule for the purpose of mapping packets belonging to a traffic flow with a defined service class instance.
  • Each filter rule element can include a priority indicating the order in which it should be applied with respect to other filter rule elements, specification of packet matching criteria (e.g., values or ranges of values corresponding to one or more packet header or payload fields), and an indication of the service class instance with which matching packets should be associated.
  • Filter rule elements 820 and 822 can also be used to discard packets belonging to a traffic flow by mapping them to an instance of a null service class.
  • Egress element 812 and ingress element 814 can also each include one or more service class instance template elements 830 and 840, respectively.
  • Service class instance template elements 830 and 840 prescribe pre-authorization for dynamic service class instances, e.g., identify a particular service class element of which an instance may be dynamically requested as well as prescribe policy constraints regarding the requested service class instance and/or the filter rules used to associate traffic flows with the requested service class instance.
  • FIG. 9 an example roaming system 900 is illustrated that can employ the modifiable profiles described above.
  • the system 900 illustrates a roaming scenario, where a subscriber host (SH) 910 obtains access via a visited network 920, i.e., a network other than its home network 930.
  • a roaming agreement 940 between the home network and visited network operators.
  • the home network operator can typically be involved with authentication of the SH 910 and granting authorization for access. Assuming that the home operator grants access to the SH 910, the visited network operator can enable the SH to obtain services via its local access network.
  • basic network service and higher layer services could be provided by either network operator or both.
  • the dashed lines in the system 900 conceptually represent basic network services and/or higher layer services.
  • the SH 910 When roaming, it is possible for the SH 910 to receive services from the visited/local domain 920, home network or domain 930, or both.
  • subscriber service mechanisms e.g., a subscriber profile indicating authorization for services
  • the scenario system 900 may also represent one example of a Mobile Virtual Network Operator (MVNO), e.g., the case where the home network 930 is an MVNO.
  • MVNO Mobile Virtual Network Operator
  • the MVNO may include the required network elements and software to support "roaming", but not include an access network.
  • SH 910 while SH 910 is administratively associated with the MVNO, it can not directly access the home network 930 and appears to be roaming via the visited network 920.
  • a system 1000 illustrates a virtual homing scenario.
  • the virtual homing scenario depicted by the system 1000 represents another example of supporting an MVNO, e.g., the case where the virtual home 1030 is an MVNO, and also represents an example of supporting a Virtual Private Network (VPN), e.g., the case where the virtual home 1030 is a private network.
  • VPN Virtual Private Network
  • an SH 1010 is administratively associated with a local network 1020 through which it obtains access, i.e., the local network 1020 is the home network.
  • the local/home network operator would typically be involved with authentication of the SH 1010 and granting authorization for access.
  • the SH 1010 also has an association with a depicted virtual home 1030, which could be a MVNO or a private, e.g., corporate, entity for which a VPN service is to be provided.
  • a depicted virtual home 1030 which could be a MVNO or a private, e.g., corporate, entity for which a VPN service is to be provided.
  • dashed lines are depicted, indicating that basic network service, e.g., addressing/routing, as well as potentially higher layer services may be provided by the home/local domain 1020, the virtual home domain 1030, or both.
  • a system 1100 illustrates a virtual homing and roaming scenario. The system 1100 represents a combination of those depicted in the systems 900 and 1000 described above.
  • an SH 1110 is associated with a home network 1120 and a virtual home 1130 while obtaining access via a visited network 1140.
  • a home network operator would typically be involved with authentication of the SH 1110 and granting authorization for access.
  • three dashed arrow are depicted, indicating that basic network service, e.g., addressing/routing, as well as potentially higher layer services may be provided by the visited/local domain 1140, the home domain 1120, the virtual home domain 1130, or a combination of the three domains.
  • a methodology 1200 relating to profile modification and roaming is illustrated. While, for purposes of simplicity of explanation, the methodology is shown and described as a series of acts, it is to be understood and appreciated that the methodology is not limited by the order of acts, as some acts may, in accordance with one or more embodiments, occur in different orders and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all illustrated acts may be utilized to implement a methodology in accordance with the claimed subject matter.
  • the methodology 1200 begins at 1202, where a request is generated at 1204 for services from a visited network.
  • a mobile terminal may have initially been authorized through a home network and now due to its location, the mobile terminal is now requesting access from a subsequent network sometimes referred to as the visited network or domain.
  • a profile is requested from the home network. Such request can be generated by the visited network in response to the request for services at 1204.
  • the profile may currently specify services such as Quality of Service parameters for example that are supported when the terminal was authorized by the home network.
  • the profile is transmitted from the home network to the visited network upon generating an access grant by the home network.
  • the home network can include virtual aspects such as provided by Mobile Virtual Network Operator (MVNO) or other virtual private network component.
  • MVNO Mobile Virtual Network Operator
  • the access grant may occur after handshaking signals or codes have been exchanged between the home network and the visited network.
  • the received profile can be left unchanged or modified if desired. Profile modifications can include adding services to the profile, deleting services from the profile, and/or adjusting parameters relating to a respective service within the profile.
  • the visited network can offer similar services to the home network in view of the received profile, a reduced set of services if the profile has one or more services deleted from the profile, or a superset of services, if the visited network adds services to the received profile.
  • the profile is employed to offer a desired set of services to the wireless access terminal.
  • Figs. 13 and 14 collectively, systems are provided that relate to profile modification and roaming with respect to a terminal, operator networks, access nodes, and traffic flows therewith.
  • the systems are represented as a series of interrelated functional blocks, which can represent functions implemented by a processor, software, hardware, firmware, or any suitable combination thereof.
  • a system 1300 that facilitates communications from a visited network.
  • the system 1300 includes a logical module 1302 for receiving subscriber profile generated from a home network.
  • a logical module 1304 is employed for modifying the subscriber profile and a logical module 1306 is utilized for offering services based in part on the modified subscriber profile. Modifying the subscriber profile can include adding or deleting services from the profile or modifying/editing parameters within the profile.
  • a system 1400 that facilitates communications from a home network in a roaming environment.
  • the system 1400 includes a logical module 1402 for generating a subscriber profile from a home network. This includes a logical module 1404 for annotating the subscriber profile to enable modifications to the profile and a logical module 1406 for granting access to the home network.
  • a logical module 1404 for annotating the subscriber profile to enable modifications to the profile
  • a logical module 1406 for granting access to the home network.
  • an example network 1500 is illustrated that can employ profile data for roaming between networks.
  • the system 1500 depicts an operator's inter-network 1510 with two Access Routers (ARs) 1514 and 1518, through which a Subscriber Host (SH) 1520 may obtain access, and several additional network elements.
  • ARs Access Routers
  • SH Subscriber Host
  • the ARs 1514-1518 are network elements in the context of service control, since they are positioned to control access to services available via the operator's infrastructure and to directly control QoS for such services over the access links. However, a number of other network elements likely also play a role in a complete solution, e.g., to control the operation of the ARs 1514-1518.
  • the following description addresses each of the logical interfaces, as well as the associated network elements, shown in the system 1500.
  • a trusted indication of subscriber identity is fundamental to the notion of controlling services on an individual subscriber basis.
  • a subscriber's indicated identity is authenticated, e.g., using an Extensible Authentication Protocol (EAP), prior to being granted access to the network and higher layer services.
  • EAP Extensible Authentication Protocol
  • This initial authentication and authorization process commonly involves communication between the element through which access is being requested, e.g., the AR 1514-1518, and a separate Authentication and Authorization Server (AAS) 1530, e.g., using a Remote Dial-In User Service (RADIUS) protocol.
  • AAS 1530 e.g., using a Remote Dial-In User Service (RADIUS) protocol.
  • RADIUS Remote Dial-In User Service
  • the AR 1514-1518 may begin sending accounting information, e.g., packet/byte counts, to an Accounting Server (ACS) 1540.
  • Accounting for traditional IP best effort service often consists of only simple aggregate packet/byte counts for traffic sent/received.
  • ACS Accounting Server
  • accounting information e.g., collected/reported by the AR 1514-1518, should include details regarding the services used and/or the level of QoS provided.
  • the SH 1520 may change its point of attachment from one AR to another, a process generally referred to as handoff.
  • Mobile IP MIP
  • a mechanism for Context Transfer (CT) can be employed to minimize service disruption upon handoff.
  • CTR Context Transfer
  • a resource control interface 1550 employs a signaling protocol by which the SH 1550 may request QoS configuration changes following initial access grant. As noted above, this may include a set of available QoS data and parameters that can be requested by the SH 1520 as dynamic conditions require. In general, one cannot assume that end-to-end QoS is supported between the SH 1520 and another host with which the SH is communicating. However, the system 1500 provides a QoS architecture wherein, for a wide range of services, resource reservation is only required in the AR 1514-1518 and not along the entire data path. In cases where resource reservation is required in additional nodes along the data path, alternative or additional resource control signaling may be used.
  • the SH 1520 should be able to request resources for traffic both sent and received. While the system 1500 depicts the resource control interface 1550 between the SH 1520 and AR, it is also possible to support QoS configuration, via an equivalent or similar resource control interface, from elements in the operator's inter-network 1510, an operator host (OH) or application server, on behalf of the SH.
  • OH operator host
  • a policy control interface 1554 represents a mechanism by which authorization may be checked for QoS configuration changes, e.g., requested via the resource control interface 1550.
  • the policy control interface 1554 is depicted between the AR 1514 and a non-specific network element functioning as a PDP 1560, where the PDP function could be located in a dedicated policy server, an application server, or some other network element, for example.
  • a possible reason for this distinction is that the appropriate placement of the PDP function 1560 may be dependent on a particular service. In general, different services may even be associated with different PDPs, thus in accordance with some embodiments of the invention a service definition includes an indication of the associated PDP.
  • Communications apparatus 1600 can be a wireless communications apparatus, for instance, such as a wireless terminal. Additionally or alternatively, communications apparatus 1600 can be resident within a wired network. Communications apparatus 1600 can include memory 1602 that can retain instructions for configuring such apparatus with respect to QoS data for a terminal (and traffic flows associated therewith). Additionally, communications apparatus 1600 may include a processor 1604 that can execute instructions within memory 1602 and/or instructions received from another network device, wherein the instructions can relate to configuring communications apparatus 1600 or a related communications apparatus. [0083] The memory 1602 retains instructions for receiving a profile associated with one or more services, where the profile can be associated with a home network component and modifiable via a visited network component, the profile employed to offer services to a roaming access terminal.
  • the memory retains instructions for generating a profile associated with one or more services, where the profile can be associated with a home network component and modifiable via a services description component.
  • the profile can be employed to offer services to a roaming access terminal, for example.
  • Fig. 17 is provided to illustrate an example communication system 1700 that comprises a plurality of nodes interconnected by communications links.
  • the system 1700 may use Orthogonal Frequency Division Multiplexing (OFDM) signals to communicate information over wireless links.
  • OFDM Orthogonal Frequency Division Multiplexing
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • Nodes in the communication system 1700 exchange information using signals, e.g., messages, based on communication protocols, e.g., the Internet Protocol (IP).
  • IP Internet Protocol
  • the communications links of the system 1700 may be implemented, for example, using wires, fiber optic cables, and/or wireless communications techniques.
  • the system 1700 includes a plurality of end nodes 1702-1712, which access the communication system 1700 by way of a plurality of access nodes 1714-1718.
  • End nodes 1702-1712 may be, e.g., wireless communication devices or terminals
  • the access nodes 1714- 1718 may be, e.g., wireless access routers or base stations.
  • Communication system 1700 also includes a number of other nodes 1720-1730 that are used to provide interconnectivity or to provide specific services or functions.
  • Communications system 1700 depicts a network 1760 that includes access control node 1720, mobility support node 1722, policy control node 1724, and application server node 1726, all of which are connected to an intermediate network node 1728 by a corresponding network link 1732-1738, respectively.
  • the access control node e.g., a Remote Authentication Dial In User Service (RADIUS) or Diameter server, supports authentication, authorization, and/or accounting of end nodes and/or services associated with end nodes.
  • RADIUS Remote Authentication Dial In User Service
  • Diameter server supports authentication, authorization, and/or accounting of end nodes and/or services associated with end nodes.
  • mobility support node 1722 e.g., a Mobile IP home agent and/or context transfer server, supports mobility, e.g., handoff, of end nodes between access nodes, e.g., by way of redirection of traffic to/from end nodes and/or transfer of state associated with end nodes between access nodes.
  • policy control node 1724 e.g., a policy server or Policy Decision Point (PDP)
  • PDP Policy Decision Point
  • application server node 1726 e.g., a Session Initiation Protocol server, streaming media server, or other application layer server, supports session signaling for services available to end nodes and/or provides services or content available to end nodes.
  • Intermediate network node 1728 in network 1760 provides interconnectivity to network nodes that are external from the perspective of network 1760 by way of network link 1734.
  • Network link 1734 is connected to intermediate network node 1730, which provides further connectivity to access nodes 1714, 1716, and 1718 by way of network links 1736-1740, respectively.
  • Each access node 1714- 1718 is depicted as providing connectivity to end nodes 1702-1712, respectively, by way of corresponding access links 1742-1752, respectively.
  • each access node 1714-1718 is depicted as using wireless technology, e.g., wireless access links, to provide access. Wired technology may also be utilized, however, in connection with provision of access.
  • a radio coverage area, e.g., communications cells 1754-1758 of each access node 1714-1718 is illustrated as a circle surrounding the corresponding access node.
  • Communication system 1700 can be used as a basis for the description of various embodiments described herein.
  • Alternative embodiments include various network topologies, where a number and type of nodes (including network nodes, access nodes, end nodes, as well as various control, support, and server nodes), a number and type of links, and interconnectivity between various nodes may differ from that of communication system 1700. Additionally, some of the functional entities depicted in communication system 1700 may be omitted or combined. Location or placement of these functional entities may also be varied.
  • Fig. 18 provides an illustration of an example end node 1800, e.g., wireless terminal. End node 1800 is a representation of an apparatus that may be used as any one of end nodes 1702-1712 (Fig. 17).
  • End node 1800 includes a processor 1802, a wireless communication interface module 1804, a user input/output interface 1806 and memory 1808 coupled together by a bus 1810. Accordingly, by way of bus 1810, the various components of the end node 1800 can exchange information, signals and data. Components 1802-1808 of end node 1800 can be located inside a housing 1812.
  • Wireless communication interface module 1804 provides a mechanism by which the internal components of end node 1800 can send and receive signals to/from external devices and network nodes, e.g., access nodes.
  • Wireless communication interface module 1804 includes, e.g., a receiver module 1814 with a corresponding receiving antenna 1816 and a transmitter module 1818 with a corresponding transmitting antenna 1820 used for coupling end node 1800 to other network nodes, e.g., by way of wireless communications channels.
  • End node 1800 also includes a user input device 1822, e.g., keypad, and a user output device 1824, e.g., display, which are coupled to bus 1810 through user input/output interface 1806.
  • user input/output devices 1822 and 1824 can exchange information, signals and data with other components of end node 1800 by way of user input/output interface 1806 and bus 1810.
  • User input/output interface 1806 and associated devices 1822 and 1824 provide mechanisms by which a user can operate end node 1800 to accomplish various tasks.
  • user input device 1822 and user output device 1824 provide functionality that allows a user to control end node 1800 and applications, e.g., modules, programs, routines and/or functions, that execute in memory 1808 of end node 1800.
  • Processor 1802 under control of various modules, e.g., routines, included in memory 1808 controls operation of end node 1800 to perform various signaling and processing.
  • the modules included in memory 1808 are executed on startup or as called by other modules. Modules may exchange data, information, and signals when executed. Modules may also share data and information when executed.
  • Memory 1808 of end node 1800 includes a control signaling module 1826, an application module 1828, and a traffic control module 1830, which further includes configuration information 1832 and various additional modules.
  • Control signaling module 1826 controls processing relating to receiving and sending signals, e.g., messages, for controlling operation and/or configuration of various aspects of end node 1800 including, e.g., traffic control module 1830 as well as configuration information 1832 and various additional modules included.
  • control signaling module 1826 can include state information, e.g., parameters, status and/or other information, relating to operation of end node 1800 and/or one or more signaling protocols supported by control signaling module 1826.
  • control signaling module 1826 may include configuration information, e.g., end node identification information and/or parameter settings, and operational information, e.g., information about current processing state, status of pending message transactions, etc.
  • Application module 1828 controls processing and communications relating to one or more applications supported by end node 1800.
  • application module 1828 processing can include tasks relating to input/output of information by way of the user input/output interface 1806, manipulation of information associated with an application, and/or receiving or sending signals, e.g., messages, associated with an application.
  • application module 1828 includes state information, e.g., parameters, status and/or other information, relating to operation of one or more applications supported by application module 1828.
  • application module 1828 may include configuration information, e.g., user identification information and/or parameter settings, and operational information, e.g., information about current processing state, status of pending responses, etc.
  • Applications supported by application module 1828 include, e.g., Voice over IP (VoIP), web browsing, streaming audio/video, instant messaging, file sharing, gaming, etc.
  • VoIP Voice over IP
  • Traffic control module 1830 controls processing relating to receiving and sending data information, e.g., messages, packets, and/or frames, through wireless communication interface module 1804.
  • the example traffic control module 1830 includes configuration information 1832 as well as various additional modules that control various aspects of QoS for packets and/or traffic flows, e.g., associated sequences of packets.
  • Various additional modules are included, in some embodiments, to perform particular functions and operations as needed to support specific aspects of traffic control. Modules may be omitted and/or combined as needed depending on the functional requirements of traffic control. A description of each additional module included in traffic control module 1830 follows.
  • An admission control module 1834 maintains information relating to resource utilization/availability and determines if sufficient resources are available to support QoS parameters desirably associated with particular traffic flows.
  • Resource availability information maintained by admission control module 1834 includes, e.g., packet and/or frame queuing capacity, scheduling capacity, as well as processing and memory capacity needed to support one or more traffic flows.
  • Control signaling module 1826, application module 1828, and/or other modules included in end node 1800 may query admission control module 1834 to determine if sufficient resources are available to support a new or modified traffic flow, where the admission control determination is a function of QoS parameters of the particular traffic flow and QoS parameters defined within a profile.
  • Configuration information 1832 can include configuration information, e.g., parameters settings, that affect the operation of admission control module 1834, e.g., an admission control threshold value that indicates percentage of resource that may be allocated prior to rejecting additional requests.
  • An uplink scheduler module 1836 controls processing relating to transmission scheduling, e.g., order and/or timing, and allocation of transmission resources, e.g., information coding rate, transmission time slots, and/or transmission power, for data information, e.g., messages, packets, and/or frames, to be sent by way of wireless communication interface module 1804, e.g., from end node 1800 to an access node.
  • Uplink scheduler module 1836 can schedule transmissions and allocate transmission resources as a function of QoS parameters associated with one or more traffic flows. In some embodiments, scheduling and/or resource allocation operations performed by uplink scheduler module 1836 are additionally a function of channel conditions and other factors, e.g., power budget.
  • An uplink PHY/MAC module 1838 controls physical (PHY) layer and
  • MAC layer processing relating to sending data information, e.g., messages, packets, and/or frames, by way of wireless communication interface module 1804, e.g., from end node 1800 to an access node.
  • operation of uplink PHY/MAC module 1838 includes both sending and receiving control information, e.g., signals or messages, to coordinate sending of data information, e.g., messages, packets, and/or frames.
  • Configuration information 1832 can include configuration information, e.g., parameters settings, that affect the operation of uplink PHY/MAC module 1838, e.g., a frequency, band, channel, spreading code or hoping code to be used for transmissions, an identifier associated with end node 1800, a request dictionary prescribing use of an assignment request channel, etc.
  • An uplink LLC (ARQ) module 1840 controls Logical Link Control
  • Uplink LLC (ARQ) module 1840 includes processing associated with Automatic Repeat Request (ARQ) capabilities, e.g., retransmission of lost packets or frames.
  • Uplink LLC (ARQ) module 1840 can, for instance, further include processing relating to addition of an LLC header and/or trailer to higher layer messages, e.g., packets, to provide additional functionality, e.g., multi-protocol multiplexing/demultiplexing by way of a type field or error detection through utilization of a checksum field.
  • Uplink LLC (ARQ) module 1840 can additionally perform fragmentation of higher layer messages, e.g., packets, into multiple sub-portions, e.g., frames to be sent by uplink PHY/MAC module 1840.
  • Configuration information 1832 can include configuration information that affect operation of uplink LLC (ARQ) module 1840, e.g., an ARQ window size, maximum number of retransmissions, a discard timer, etc.
  • An uplink queue management module 1842 maintains information and controls processing relating to storage of data information to be sent by way of wireless communication interface module 1804, e.g., from end node 1800 to an access node.
  • Uplink queue management module 1842 can, for example, control storage of data information awaiting transmission and maintain state information regarding data information awaiting transmission on a per traffic flow basis, e.g., packets associated with each traffic flow may be stored in separate queues.
  • uplink queue management module 1842 supports a variety of queue management techniques and/or capabilities, e.g., head drop, tail drop, as well as various Active Queue Management (AQM) mechanisms such as Random Early Detection (RED).
  • AQM Active Queue Management
  • Configuration information 1832 can include configuration information that affects operation of uplink queue management module 1842, such as a queue limit, drop strategy, and/or AQM thresholds associated with one or more traffic flows.
  • An uplink classifier module 1844 controls processing relating to identification of data information as belonging to particular traffic flows prior to being sent by way of the wireless communication interface module 1804, e.g., from end node 1800 to an access node.
  • messages, packets, and/or frames to be sent through utilization of wireless communication interface module 1804 are classified as belonging to one of a variety of traffic flows by uplink classifier module 1844 based on inspection of one or more header and/or payload fields.
  • Results of classification by uplink classifier module 1844 can affect the treatment of classified data information by uplink queue management module 1842 as well as other modules within memory 1808. For example, the results may determine a particular queue the message, packet, and/or frame will be associated with for storage and further affect subsequent processing such as scheduling.
  • Configuration information can include configuration information that affect operation of uplink classifier module 1844, e.g., a set of one or more classifier filter rules that prescribe criteria used to associate data information, e.g., messages, packets, and/or frames, as belonging to one or more traffic flows.
  • a downlink PHY/MAC module 1846 controls PHY layer and MAC layer processing relating to receiving data information by way of wireless communication interface module 1804.
  • Operation of downlink PHY/MAC module 1846 can include both sending and receiving control information to coordinate receiving of data information.
  • Configuration information 1804 can include configuration information that affect operation of downlink PHY/MAC module 1846, e.g., a frequency, band, channel, spreading code or hoping code to be used for reception, an identifier associated with end node 1800, etc.
  • a downlink LLC (ARQ) module 1848 controls LLC layer processing relating to receiving data information by way of wireless communication interface module 1804.
  • Downlink LLC (ARQ) module 1848 includes processing associated with ARQ capabilities, e.g., retransmission of lost packets or frames.
  • downlink LLC (ARQ) module 1848 can further include processing relating to an LLC header and/or trailer that encapsulates higher layer messages, which provides additional functionality, e.g., multi-protocol multiplexing/demultiplexing through a type field or error detection by way of a checksum field.
  • Downlink LLC (ARQ) module 1848 can also perform reassembly of frames received by the downlink PHY/MAC module 1846 into higher layer messages.
  • Configuration information 1832 can, and in some embodiments does, include configuration information, e.g., parameters settings, that affect operation of downlink LLC (ARQ) module 1848, e.g., an ARQ window size, maximum number of retransmissions, a discard timer, etc.
  • configuration information e.g., parameters settings, that affect operation of downlink LLC (ARQ) module 1848, e.g., an ARQ window size, maximum number of retransmissions, a discard timer, etc.
  • ARQ downlink LLC
  • Fig. 19 provides a detailed illustration of an example access node 1900 implemented in accordance with the present invention.
  • the access node 1900 is a detailed representation of an apparatus that may be used as any one of the access nodes 1714-1718 depicted in Fig. 17.
  • access node 1900 includes a processor 1902, memory 1904, a network/internetwork interface module 1906 and a wireless communication interface module 1908, coupled together by bus 1910. Accordingly, by way of bus 1910 the various components of access node 1900 can exchange information, signals and data.
  • the components 1902-1910 of access node 1900 are located inside a housing 1912.
  • Network/internetwork interface module 1906 provides a mechanism by which the internal components of access node 1900 can send and receive signals to/from external devices and network nodes.
  • Network/internetwork interface module 1906 includes a receiver module 1914 and a transmitter module 1916 used for coupling node 1900 to other network nodes, e.g., through copper wires or fiber optic lines.
  • Wireless communication interface module 1908 also provides a mechanism by which the internal components of access node 1900 can send and receive signals to/from external devices and network nodes, e.g., end nodes.
  • Wireless communication interface module 1908 includes, e.g., a receiver module 1918 with a corresponding receiving antenna 1920 and a transmitter module 1922 with a corresponding transmitting antenna 1924.
  • Wireless communication interface module 1908 is used for coupling access node 1900 to other nodes, e.g., by way of wireless communication channels.
  • Processor 1902 under control of various modules, e.g., routines, included in memory 1904 controls operation of access node 1900 to perform various signaling and processing.
  • the modules included in memory 1904 are executed on startup or as called by other modules. Modules may exchange data, information, and signals when executed. Modules may also share data and information when executed.
  • memory 1904 of access node 1900 includes a control signaling module 1926 and a traffic control module 1928, which further includes configuration information 1930 and various additional modules 1932-1954.
  • Control signaling module 1926 controls processing relating to receiving and sending signals, e.g., messages, for controlling operation and/or configuration of various aspects of access node 1900 including, e.g., traffic control module 1928 as well as configuration information 1930 and the various additional modules included therein 1932-1954.
  • control signaling module 1926 includes state information, e.g., parameters, status and/or other information, relating to operation of access node 1900 and/or one or more signaling protocols supported by control signaling module 1926.
  • control signaling module 1926 may include configuration information, e.g., access node identification information and/or parameter settings, and operational information, e.g., information about current processing state, status of pending message transactions, etc.
  • Traffic control module 1928 controls processing relating to receiving and sending data information, e.g., messages, packets, and/or frames, by way of wireless communication interface module 1908.
  • traffic control module can include configuration information 1930 as well as various additional modules 1932-1954 that control various aspects of quality of service for packets and/or traffic flows, e.g., associated sequences of packets.
  • traffic control module 1928 includes state information, e.g., parameters, status and/or other information, relating to operation of access node 1900, traffic control module 1928, and/or one or more of the various additional modules included therein 1932-1954.
  • Configuration information 1930 determines, affects and/or prescribes operation of traffic control module 1928 and/or the various additional modules included therein 1932-1954.
  • the various additional modules are included, in some embodiments, to perform particular functions and operations as needed to support specific aspects of traffic control. In various embodiments, modules may be omitted and/or combined as needed depending on the functional requirements of traffic control. A description of each additional module included in traffic control module 1928 follows. [00108] Admission control module 1932 maintains information relating to resource utilization/availability and determines if sufficient resources are available to support quality of service requirements of particular traffic flows.
  • Resource availability information maintained by admission control module 1932 includes, e.g., packet and/or frame queuing capacity, scheduling capacity, as well as processing and memory capacity needed to support one or more traffic flows.
  • Control signaling module 1926 and/or other modules included in access node 1900 can query admission control module 1932 to determine if sufficient resources are available to support a new or modified traffic flow, where the admission control determination is a function of the quality of service requirements of the particular traffic flow and/or the available resources.
  • Configuration information 1930 can include configuration information, e.g., parameters settings, that affect the operation of admission control module 1932, e.g., an admission control threshold value that indicates the percentage of resource that may be allocated prior to rejecting additional requests.
  • Uplink scheduler module 1934 controls processing relating to transmission scheduling, e.g., order and/or timing, and allocation of transmission resources, e.g., information coding rate, transmission time slots, and/or transmission power, for data information, e.g., messages, packets, and/or frames, to be sent from one or more end nodes to the access node by way of wireless interface module 1908.
  • Uplink scheduler module 1934 can schedule transmissions and allocate transmission resources as a function of the quality of service requirements and/or constraints associated with one or more traffic flows and/or one or more end nodes.
  • Configuration information 1930 can include configuration information that affect the operation of uplink scheduler module 1934, e.g., a priority, rate bound, latency bound, and/or sharing weight associated with one or more traffic flows and/or end nodes.
  • scheduling and/or resource allocation operations performed by uplink scheduler module 1934 are additionally a function of channel conditions and other factors, e.g., power budget.
  • Downlink scheduler module 1936 controls processing relating to transmission scheduling, e.g., order and/or timing, and allocation of transmission resources, e.g., information coding rate, transmission time slots, and/or transmission power, for data information, e.g., messages, packets, and/or frames, to be sent from access node 1900 to one or more end nodes through wireless interface module 1908.
  • Downlink scheduler module 1936 can schedule transmissions and allocate transmission resources as a function of the quality of service requirements and/or constraints associated with one or more traffic flows and/or one or more end nodes.
  • Configuration information 1930 can include configuration information that affects the operation of downlink scheduler module 1936, e.g., a priority, rate bound, latency bound, and/or sharing weight associated with one or more traffic flows and/or end nodes.
  • scheduling and/or resource allocation operations performed by the downlink scheduler module 1936 are additionally a function of channel conditions and other factors, e.g., power budget.
  • Uplink traffic conditioner module 1938 controls processing relating to traffic conditioning, e.g., metering, marking, policing, etc., for data information, e.g., messages, packets, and/or frames, received by way of wireless interface module 1908, e.g., from an end node to access node 1900.
  • Uplink traffic conditioner module 1938 can condition traffic, e.g., meter, mark and/or police, as a function of the quality of service requirements and/or constraints associated with one or more traffic flows and/or one or more end nodes.
  • Configuration information 1930 can include configuration information that affects the operation of uplink traffic conditioner module 1938, e.g., a rate bound, and/or marking value associated with one or more traffic flows and/or end nodes.
  • Uplink classifier module 1940 controls processing relating to identification of data information, e.g., messages, packets, and/or frames, received through wireless interface module 1908, e.g., from an end node to access node 1900, as belonging to particular traffic flows prior to being processed by uplink traffic conditioner module 1938.
  • messages, packets, and/or frames received through wireless communication interface module 1908 are classified as belonging to one of a variety of traffic flows by uplink classifier module 1940 based on inspection of one or more header and/or payload fields.
  • the results of classification by uplink classifier module 1940 can affect the treatment of the classified data information, e.g., messages, packets, and/or frames, by uplink traffic conditioner module 1938, e.g., the results may determine a particular data structure or state machine the message, packet, and/or frame will be associated with and further affect subsequent processing such as metering, marking, and/or policing.
  • Configuration information 1930 can include configuration information that affects the operation of uplink classifier module 1940, e.g., a set of one or more classifier filter rules that prescribe criteria used to associate data information, e.g., messages, packets, and/or frames, as belonging to one or more traffic flows.
  • Uplink LLC (ARQ) module 1942 controls LLC layer processing relating to receiving data information, e.g., packets and/or frames, by way of wireless communication interface module 1908, e.g., from an end node to access node 1900.
  • Uplink LLC (ARQ) module 1942 includes processing associated with ARQ capabilities, e.g., retransmission of lost packets or frames.
  • uplink LLC (ARQ) module 1942 further includes processing relating to an LLC header and/or trailer that encapsulates higher layer messages, e.g., packets, which provides additional functionality, e.g., multi-protocol multiplexing/demultiplexing through a type field or error detection by way of a checksum field.
  • Uplink LLC (ARQ) module 1942 can also perform reassembly of frames received by uplink PHY/MAC module 1944 into higher layer messages, e.g., packets.
  • the configuration information 1930 can include configuration information that affects the operation of uplink LLC (ARQ) module 1942, e.g., an ARQ window size, maximum number of retransmissions, a discard timer, etc.
  • Uplink PHY/MAC module 1944 controls PHY layer and MAC layer processing relating to receiving data information, e.g., packets and/or frames, by way of wireless communication interface module 1908, e.g., from an end node to access node 1900.
  • operation of uplink PHY/MAC module 1944 includes both sending and receiving control information, e.g., signals or messages, to coordinate receiving of data information, e.g., messages, packets, or frames.
  • Configuration information 1930 can include configuration information that affects the operation of uplink PHY/MAC module 1944, e.g., a frequency, band, channel, spreading code or hopping code to be used for reception, an identifier associated with access node 1900, etc.
  • Downlink classifier module 1946 controls processing relating to identification of data information, e.g., messages, packets, and/or frames, as belonging to particular traffic flows prior to being sent through wireless communication interface module 1908, e.g., from access node 1900 to an end node.
  • messages, packets, and/or frames to be sent by way of wireless communication interface module 1908 are classified as belonging to one of a variety of traffic flows by downlink classifier module 1946 based on inspection of one or more header and/or payload fields.
  • the results of classification by downlink classifier module 1946 can affect the treatment of the classified data information, e.g., messages, packets, and/or frames, by downlink queue management module 1950 and other modules 1948, 1952, and 1954, e.g., the results may determine a particular queue the message, packet, and/or frame will be associated with for storage and further affect subsequent processing such as scheduling.
  • Configuration information 1930 can include configuration information, e.g., parameters settings, that affect the operation of downlink classifier module 1946, e.g., a set of one or more classifier filter rules that prescribe criteria used to associate data information, e.g., messages, packets, and/or frames, as belonging to one or more traffic flows.
  • Downlink traffic conditioner module 1948 controls processing relating to traffic conditioning, e.g., metering, marking, policing, etc., for data information, e.g., messages, packets, and/or frames, to be sent by way of wireless interface module 1908, e.g., from access node 1900 to an end node.
  • Downlink traffic conditioner module 1948 can condition traffic, e.g., meter, mark and/or police, as a function of the quality of service requirements and/or constraints associated with one or more traffic flows and/or one or more end nodes.
  • Configuration information 1930 can include configuration information that affects the operation of downlink traffic conditioner module 1948, e.g., a rate bound, and/or marking value associated with one or more traffic flows and/or end nodes.
  • Downlink queue management module 1950 maintains information and controls processing relating to storage of data information, e.g., messages, packets, and/or frames, to be sent by way of wireless communication interface module 1908, e.g., from access node 1900 to an end node.
  • Downlink queue management module can control storage of data information awaiting transmission and maintain state information regarding data information awaiting transmission on a per traffic flow basis, e.g., packets associated with each traffic flow may be stored in separate queues.
  • Downlink queue management module 1950 supports a variety of queue management techniques and/or capabilities, e.g., head drop, tail drop, as well as various AQM mechanisms such as RED.
  • Configuration information 1930 can include configuration information that affects the operation of downlink queue management module 1950, e.g., a queue limit, drop strategy, and/or AQM thresholds associated with one or more traffic flows.
  • Downlink LLC (ARQ) module 1952 controls LLC layer processing relating to sending data information, e.g., messages, packets, and/or frames, by way of wireless communication interface module 1908, e.g., from access node 1900 to an end node.
  • Downlink LLC (ARQ) module 1952 includes processing associated with ARQ capabilities, e.g., retransmission of lost packets or frames.
  • downlink LLC (ARQ) module 1952 further includes processing relating to the addition of an LLC header and/or trailer to higher layer messages, e.g., packets, to provide additional functionality, e.g., multi-protocol multiplexing/demultiplexing through a type field or error detection by way of a checksum field.
  • Downlink LLC (ARQ) module 1952 can also perform fragmentation of higher layer messages, e.g., packets, into multiple sub-portions, e.g., frames to be sent by downlink PHY/MAC module 1954.
  • Configuration information 1930 can include configuration information that affects the operation of downlink LLC (ARQ) module 1952, e.g., an ARQ window size, maximum number of retransmissions, a discard timer, etc.
  • Downlink PHY/MAC module 1954 controls PHY layer and MAC layer processing relating to sending data information, e.g., messages, packets, and/or frames, by way of wireless communication interface module 1908, e.g., from access node 1900 to an end node.
  • operation of downlink PHY/MAC module 1954 includes both sending and receiving control information, e.g., signals or messages, to coordinate sending of data information, e.g., messages, packets, or frames.
  • Configuration information 1930 can include configuration information that affects the operation of downlink PHY/MAC module 1954, e.g., a frequency, band, channel, spreading code or hoping code to be used for transmissions, an identifier associated with the access node 1900, etc.
  • Fig. 20 illustrates example signaling and traffic flows between various modules included in example end node 1800 and example access node 1900.
  • the Fig. 20 end node 1800 and Fig. 20 access node 1900 are simplified representations of the Fig. 18 end node 1800 and Fig. 19 access node 1900, respectively.
  • the Fig. 20 example shows application module 1828 sending and receiving data information, e.g., traffic flows comprising a sequence of messages, packets, or frames.
  • the Fig. 20 end node 1800 may be any one of end nodes 1702-1712 depicted in Fig. 17 and the application module 1828 included in the Fig.
  • the 20 end node 1800 may be exchanging data information with another node in the system, e.g., another end node 1702-1712 or the application server node 1726 as depicted in Fig. 17.
  • another node in the system e.g., another end node 1702-1712 or the application server node 1726 as depicted in Fig. 17.
  • the node with which the Fig. 20 end node 1800 is exchanging data information is referred to as the corresponding node.
  • the data information e.g., traffic flows comprising a sequence of messages, packets, or frames, sent from the application module 1828 in the end node 1800 to a corresponding node is shown by a sequence of arrows 2002-2008 to proceed through a sequence of modules 1838-1844 included in end node 1800 for processing, after which the data information is sent from the end node 1800 to the access node 1900, e.g., by way of wireless communication interface module 1804.
  • the data information e.g., traffic flows comprising a sequence of messages, packets, or frames
  • the data information e.g., traffic flows comprising a sequence of messages, packets, or frames
  • the application module 1828 in end node 1800 is shown by a sequence of arrows 2010-2018 to proceed through a sequence of modules 1938-1944 included in access node 1900 for processing, prior to being forwarded from the access node 1900 toward the corresponding node, e.g., directed in accordance with routing information to an intermediate node connected to the access node by way of network/internetwork interface module 1906.
  • the data information e.g., traffic flows comprising a sequence of messages, packets, or frames, sent from a corresponding node to application module 1828 in end node 1828 is shown by a sequence of arrows 2020-2028 to be received by access node 1900, e.g., by way of network/internetwork interface module 1906, and then to proceed through a sequence of modules 1946-1954 included in access node 1900 for processing, after which the data information is sent from the access node 1900 to the end node 1800, e.g., via the wireless communication interface module 1908.
  • access node 1900 e.g., by way of network/internetwork interface module 1906
  • the data information e.g., traffic flows comprising a sequence of messages, packets, or frames, sent from the corresponding node to application module 1828 in end node 1800 is shown by a sequence of arrows 2030-2034 to proceed through a sequence of modules 1846 and 1848 included in end node 1800 for processing, prior to being delivered to the application module 1828 in end node 1800.
  • FIG. 20 also depicts the exchange of control information, e.g., signaling flows and/or communication interfaces.
  • control information e.g., signaling flows and/or communication interfaces.
  • the Fig. 20 example depicts the exchange of control information between control signaling module 1926 and traffic control module 1928 included in access node 1900.
  • the Fig. 20 example depicts the exchange of control information between control signaling module 1826 and the traffic control module 1830 included in the end node 1800.
  • control information e.g., signaling flows and/or communication interfaces
  • a) between another node and control signaling module 1926 in access node 1900 b) between application module 1828 in end node 1800 and control signaling module 1826 in end node 1800, and c) between the respective control signaling modules 1926/1826 in access node 1900 and end node 1800.
  • control information e.g., signaling flows and/or communication interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Physics & Mathematics (AREA)
  • Astronomy & Astrophysics (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • General Physics & Mathematics (AREA)
EP07761671A 2006-05-01 2007-05-01 Profile modification for roaming in a communications environment Withdrawn EP2020159A2 (en)

Applications Claiming Priority (8)

Application Number Priority Date Filing Date Title
US79670406P 2006-05-01 2006-05-01
US79665306P 2006-05-01 2006-05-01
US79702906P 2006-05-01 2006-05-01
US79703806P 2006-05-01 2006-05-01
US79701006P 2006-05-01 2006-05-01
US79680806P 2006-05-01 2006-05-01
US83765606P 2006-08-14 2006-08-14
PCT/US2007/067922 WO2007130969A2 (en) 2006-05-01 2007-05-01 Profile modification for roaming in a communications environment

Publications (1)

Publication Number Publication Date
EP2020159A2 true EP2020159A2 (en) 2009-02-04

Family

ID=38565541

Family Applications (1)

Application Number Title Priority Date Filing Date
EP07761671A Withdrawn EP2020159A2 (en) 2006-05-01 2007-05-01 Profile modification for roaming in a communications environment

Country Status (5)

Country Link
EP (1) EP2020159A2 (ja)
JP (1) JP2009536006A (ja)
KR (1) KR20090007618A (ja)
TW (1) TW200820807A (ja)
WO (1) WO2007130969A2 (ja)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345990B (zh) * 2007-07-11 2011-12-28 华为技术有限公司 服务质量QoS配置文件生成方法、网元设备及系统
US20130276072A1 (en) * 2010-12-21 2013-10-17 Telefonaktiebolaget L M Ericsson (Publ) Method for Enabling Exchange of User Profiles Between a Visited Network and a Home Network
US8571549B2 (en) 2011-11-15 2013-10-29 Motorola Solutions, Inc. Access control for roaming radio devices
US9832719B2 (en) * 2014-10-17 2017-11-28 Qualcomm Incorporated Selection of a serving node in a wireless communication system
KR102507443B1 (ko) * 2016-06-29 2023-03-08 삼성전자 주식회사 무선통신 시스템에서 통신을 수행하는 방법 및 장치
CN107426194B (zh) * 2017-06-30 2021-07-20 北京金山安全软件有限公司 通话连接方法、装置、服务器、电子设备及存储介质
WO2019130047A1 (en) * 2017-12-28 2019-07-04 Telefonaktiebolaget Lm Ericsson (Publ) Method and system for enabling broadband roaming services

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI104608B (fi) * 1997-01-07 2000-02-29 Nokia Networks Oy Tilaajatietojen käsittely verkkokohtaisten lisäpalveluiden yhteydessä
FI107772B (fi) * 1998-12-16 2001-09-28 Nokia Networks Oy Menetelmä ja järjestelmä tiedonsiirron palvelunlaadun rajoittamiseksi
US6782253B1 (en) * 2000-08-10 2004-08-24 Koninklijke Philips Electronics N.V. Mobile micro portal
US20040037264A1 (en) * 2002-08-23 2004-02-26 Charbel Khawand Pre-negotiated quality of service
JP2004328727A (ja) * 2003-04-08 2004-11-18 Citizen Watch Co Ltd インターネット接続システム、インターネット接続システムにおけるデータ通信方法及びインターネット接続システムを利用する情報端末
US7773997B2 (en) * 2003-07-16 2010-08-10 Samsung Electronics Co., Ltd. System and method for controlling quality of service in a wireless network
WO2006020105A1 (en) * 2004-07-19 2006-02-23 Nortel Networks Limited Admission control and policing in wireless packet data communication system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2007130969A3 *

Also Published As

Publication number Publication date
JP2009536006A (ja) 2009-10-01
WO2007130969A2 (en) 2007-11-15
WO2007130969A3 (en) 2008-01-03
KR20090007618A (ko) 2009-01-19
TW200820807A (en) 2008-05-01

Similar Documents

Publication Publication Date Title
US7869803B2 (en) Profile modification for roaming in a communications environment
US7966648B2 (en) Dynamic quality of service pre-authorization in a communications environment
US7907970B2 (en) Providing quality of service for various traffic flows in a communications environment
EP2109985B1 (en) Multi-link support for network based mobility management systems
US11991775B2 (en) Message ordering for network based mobility management systems
EP1938531B1 (en) Packet routing in a wireless communications environment
EP1938528B1 (en) Provision of qos treatment based upon multiple requests
EP1938527A1 (en) Provision of a move indication to a resource requester
WO2007130969A2 (en) Profile modification for roaming in a communications environment

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20081201

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK RS

17Q First examination report despatched

Effective date: 20090318

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20111201