TW200939809A - Method and apparatus for handoff between source and target access systems - Google Patents

Method and apparatus for handoff between source and target access systems Download PDF

Info

Publication number
TW200939809A
TW200939809A TW097133505A TW97133505A TW200939809A TW 200939809 A TW200939809 A TW 200939809A TW 097133505 A TW097133505 A TW 097133505A TW 97133505 A TW97133505 A TW 97133505A TW 200939809 A TW200939809 A TW 200939809A
Authority
TW
Taiwan
Prior art keywords
access system
target
target access
source
ran
Prior art date
Application number
TW097133505A
Other languages
Chinese (zh)
Other versions
TWI375477B (en
Inventor
Fatih Ulupinar
Peerpol Tinnakornsrisuphap
Parag Arun Agashe
Ravindra Patwardhan
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US12/047,234 external-priority patent/US8289920B2/en
Priority claimed from US12/143,044 external-priority patent/US8576795B2/en
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of TW200939809A publication Critical patent/TW200939809A/en
Application granted granted Critical
Publication of TWI375477B publication Critical patent/TWI375477B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/086Access security using security domains
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • H04W36/144Reselecting a network or an air interface over a different radio air interface technology
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/16Gateway arrangements

Abstract

Systems and methods for switching among heterogeneous networks and inter-working between a source access system and a target access system. An inter-system handoff control component can facilitate setting an IP tunneling by the mobile unit, wherein IP addresses for inter-working security gateway and Radio Access Network of the target access system can be identified. The inter-system handoff control component can then implement tunneling between the source system and the target system, wherein signaling/packeting associated with the target system can be transferred over the source system.

Description

200939809 九、發明說明: 【發明所屬之技術領域】 以下描述一般而言係關於無線通信,且更特定而言係關 於用於異質網路中之對話交遞程序的方法和裝置。200939809 IX. INSTRUCTIONS: FIELD OF THE INVENTION The following description relates generally to wireless communications, and more particularly to methods and apparatus for dialog handover procedures in heterogeneous networks.

此申請案主張2007年7月18日申請之題為"UMB TO DO - HANDOFF"之美國臨時專利申請案第60/950, 583號之權力’This application claims the right of U.S. Provisional Patent Application No. 60/950, 583, filed on July 18, 2007, entitled "UMB TO DO - HANDOFF"

. 且係2008年3月12日申請之題為&quot;METHOD AND APPARATUS FOR HANDOFF BETWEEN ACCESS SYSTEMS&quot;之美國專利申請 © 案第12/047,234號之一部分接續申請案,其進一步主張2007 年3 月 16 日申請之題為&quot;INTERTECHNOLOGIES INTERWORKING&quot; 之美國臨時專利申請案第60/895,365號之權力,該等專利 申請案皆受讓與其受讓人,且藉此以參考方式明確地併入 本文中。 【先前技術】 無線網路系統已變成一種在世界範圍内與其它人進行通 信之普遍方法。無線通信器件(例如,蜂巢式電話、個人 ❿ 數位助理及類似器件)已變得更小且更強大以滿足消費者 需要並改良可攜性及便利性。消費者已變得依賴於該等器 - 件,因而需要可靠的服務、擴展之涵蓋面積、額外服務 . (例如,網絡瀏覽能力),且不斷降低此等器件之大小及花 費。 特定而言,隨著無線技術之演化繼續前進,行動服務之 進行將繼續演化成不斷更豐富、更引入注目之行動及聚集 服務。隨著最終使用者在所有環境中需要更多且較高品質 133629.doc 200939809 的多媒體内容,器件技術之演化將繼續增強資料使用之增 加消耗。舉例而言,在最近數年,無線通信技術已自類比 驅動型系統演化為數位系統。通常,在習用類比系統中, 類比信號在一正向鏈路及一反向鏈路上轉接並需要一相當 數I之頻寬以使得將能夠傳輸及接收信號同時與使其適宜 之品質相關聯。由於類比信號在時間及空間上連績,因 此,無狀態訊息(例如,指示收到或未收到資料之訊息)產 生。相反,封包交換式系統允許經類比信號轉換為資料封 包並經由一存取終端機與一基地台、路由器及類似物之間 之一實體通道傳輸。另外,可經由採用一封包交換式網路 以其自然形式(例如,文本、姆摩:鍔路資#及廨似形式)轉 接數位資料。 照此,廣泛部署無線通信系統以提供各種通信服務,例 如,電話、視訊、資料、訊發訊、廣播及類似服務。此等 系統一般採用一藉由共享可用網路資源將多個存取終端機 ❹ 連接至廣域網路(wan)之存取網路。該存取網路通常構建 有多個散佈於一地理涵蓋區域各處之存取點。此外,該地 理涵蓋區域可劃分成多個小區,其中每一小區中具有一存 取點。同樣地,該小區可進一步劃分成扇區。然而,在此 . 系統架構中,在不共享相同的通信程序及策略之存取系統 之間供應一有效父遞變成一具有挑戰性的任務。 【發明内容】 下文呈現一簡要摘要以提供對所描述之態樣之一基本理 解。此摘要並非一廣泛概述,且既不意欲識別此等態樣之 133629.doc 200939809 主要或關鍵元件亦不意欲刻化此等態樣之範_。其目的係 以簡化形式呈現所述態樣之某些概念,作為稍後呈現之更 詳細描述之一前序。 該等所描述之態樣達成行動單元在異質網路中之交遞, 且進一步在一來源存取系統與一目標存取系統之間經由採 用一系統間交遞控制組件結合其之間之一對話交遞供應一 交互工作》照此,該系統間交遞控制組件可預先供應隧穿 Ο ❹ 作為AT與該目標存取系統之間之對話協商之一部分·其中 封包係經由該來源存取系統輸送(例如,以減夕交遞期間 之中斷並減輕一在交遞期間實施對話建立之需要。)可自 該AT至該目k存取系統建立隨道,(其中自肖之觀點來 看,&quot;行動-目標存取系統,,之發訊僅有此隧道進行。此隧穿 可進一步伴隨有端視所涉及之隧穿類型(例如,隧穿是否 發生在資料鏈路層處)來建立到達該目標存取系統之其它 随道。該來源存取系統可進—步基於導頻報告表示該目標 存取系統’其中該AT可接著與該目標存取系統進行通信 並建立一協商過程。 在—相關態樣中’可結合該行動單元與該目標存取系統 之間的1⑽穿利用現有行動性模型以確保信任及隱私-由 異質網路中達成安全無縫交遞(例如,器件跨越網路 域移D此等異質存取系統之間之例示性交遞可 二料ΓηΙ之間之—交遞:超行動寬頻(umb)與高速率封包 (咖);wiMax/HRPD;長期演化(L尋HRPD,其 中系統架構可❹W端行動IP實施網際網路協定(IP)行 133629.doc 200939809 動性,以使該行動主動地參與到交遞準備中。另一選擇 為,該系統可採用較該行動單元自身更受網路控制之系 統。此交互工作使得一行動單元能夠在不同存取系統之間 交遞’其中一呼叫可繼續而不半途停止。 根據一相關方法,可在該來源存取系統與該目標存取系 統之間建立一建立,為交遞對話做準備。此建立可包含發 現確保所傳輸之封包之安全之交互工作安全閘道器(IWSG) 之一 ip位址。該建立可進一步包含發現無線電存取網路 (RAN)或該目標存取系統之尺八义丨七之巧位址。通常該 RAN-lite係一僅含有協定堆疊而無無線電收發機功能之 RAN。其亦支援到達核心網路源極及真實RAN之現有ran 介面。在已藉助RAN-lite預先建立對話之後,可透過現有 RAN介面(其用於支援技術内ran間交遞)將其傳送至真實 RAN。舉例而言,此使得將能夠執行到達目標系統之技術 間交遞,而不需要提高至現有真實RAN(以支援自AT之L3 隧穿)。 根據一進一步態樣,該RAN_Hte係與一協定相關聯(例 如’含在行動及/或IWSG内),其使得該行動能夠發現一 Ip 位址並建立一隧道以預先建立該目標無線電系統之對話。 在需要經由空中傳輸交遞時,則在該RAN-lite中協商之該 對話可經由一衆所周知之現有介面傳送。因此,自一無線 電存取網路觀點來看,交遞之後之存取可來自相同的無線 電技術’且因此不需要修改該目標無線電存取系統以支援 異質系統無線電技術交遠。該RAN-lite可在邏輯上用作任 133629.doc -9- 200939809 其匕真實RAN(例如,一基地台控制器而不實際控制任 實體基地台。只要一行動藉助該尺八义丨丨^建立隧道,此 行動即可與該RAN_nte協商一對話以便該行動可獲得目標 無線電技術之對話,且該尺八^^丨丨^可儲存該目標無線電技 術之該對話之一副本,其中該行動仍可以來源無線電技術 . 運作。 ,、、、此’在一來自該行動之交遞經由空中傳輸到達該目標 ❹ 無線電技術時,該行動可接著存取該目標存取系統之真實 RAN-例如,該行動存取,且該目標存取系統問詢該行動 疋否存在欲協商技術之對話。該行動單元可進一步供應可 用於尋找該對話之一單播存取終端機識別符(UATI)或一等 效識別符’其中來自該行動之該^^^可指向該RAN lite, 其中該真實RAN可用於將該對話自該RAN lite擷取至該真 實RAN。在提取一對話時,該行動可接著與該目標無線電 系統中之真實RAN進行通信。應瞭解,該真實尺^^可表示 〇 包含到達該基地台之真實連接之基地台控制器。 該系統間交遞控制組件可接著在該AT與該目標系統之 間實施隨穿,其中可經由該來源系統傳送與該目標系統相 關聯之發訊/封包。根據一進一步態樣,該L3隧穿提供在 • 異質系統之間傳送可變長度資料序列之功能及程序過程, 通知維持服務品質及錯誤控制功能。不管方向(例如,自 LTE至HRPD或自HRPD至LTE)如何,此隧穿可進一步對基 礎存取系統透明(例如,不改變ιρ封包之來源)。 在一相關態樣中,供應一電腦可讀媒體,其具-有用於執 133629.doc 200939809 之碼或電腦可執行指令:發現目標存取系統及 來源存取系統之 器及/或異質位址;建立到達安全閘道 系統中之任一者之安全隧道。 包’提供―處理11 ’其執行指令及/或 ^發現安全間道器之位址;在—_來源或目標存 取系統之間建立随道有關之模組。 二成述及相關目的’在本文中結合以下描述及隨附And the application filed on March 12, 2008, entitled "METHOD AND APPARATUS FOR HANDOFF BETWEEN ACCESS SYSTEMS", US Patent Application No. 12/047,234, which further claims March 16, 2007 </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; [Prior Art] Wireless network systems have become a common method of communicating with others around the world. Wireless communication devices (e.g., cellular phones, personal digital assistants, and the like) have become smaller and more powerful to meet consumer needs and to improve portability and convenience. Consumers have become dependent on these devices and therefore need reliable services, expanded coverage, additional services (eg, web browsing capabilities), and continue to reduce the size and cost of such devices. In particular, as the evolution of wireless technology continues, mobile services will continue to evolve into increasingly richer, more focused actions and aggregation services. As end users demand more and higher quality 133629.doc 200939809 multimedia content in all environments, the evolution of device technology will continue to increase the increased consumption of data. For example, in recent years, wireless communication technology has evolved from analog-driven systems to digital systems. Typically, in conventional analog systems, the analog signal is switched over a forward link and a reverse link and requires a bandwidth of a significant number I to enable transmission and reception of signals while correlating with appropriate quality. . Since analog signals are consistent in time and space, stateless messages (for example, messages indicating receipt or non-receipt of data) are generated. In contrast, packet switched systems allow analog signals to be converted into data packets and transmitted over a physical channel between a base station, router and the like via an access terminal. In addition, digital data can be transferred in a natural form (e.g., text, mmo: 锷路资#, and similar forms) using a packet switched network. As such, wireless communication systems are widely deployed to provide a variety of communication services, such as telephony, video, data, messaging, broadcast, and the like. Such systems typically employ an access network that connects multiple access terminals to a wide area network (wan) by sharing available network resources. The access network typically has a plurality of access points scattered throughout a geographic coverage area. In addition, the geographic coverage area can be divided into multiple cells with an access point in each cell. Likewise, the cell can be further divided into sectors. However, in this system architecture, it is a challenging task to provision an effective parental effort between access systems that do not share the same communication procedures and policies. SUMMARY OF THE INVENTION A brief summary is presented below to provide a basic understanding of one of the described aspects. This summary is not an extensive overview and is not intended to identify such features. 133629.doc 200939809 Main or critical components are also not intended to be an elaboration of these modalities. Its purpose is to present some concepts of the aspects in a simplified The described aspects achieve the handover of the mobile unit in the heterogeneous network, and further combine between the source access system and a target access system via the use of an intersystem handover control component Dialogue delivery provides an interactive work. As such, the inter-system handover control component can pre-provision tunneling 之一 as part of the dialog negotiation between the AT and the target access system. The packet is accessed via the source access system. Delivering (for example, interrupting during the day of the eve of the eve and reducing the need for a dialogue to be established during the handover.) The patrol can be established from the AT to the target access system (from the perspective of Xiao, &quot;Action-target access system, the transmission is only carried out by this tunnel. This tunneling can be further accompanied by the type of tunneling involved in the end view (for example, whether tunneling occurs at the data link layer) Reaching the other access channel of the target access system. The source access system can further indicate the target access system based on the pilot report, wherein the AT can then communicate with the target access system and establish Negotiation process. In the relevant context, '1' can be used in conjunction with the target access system to leverage the existing mobility model to ensure trust and privacy - secure seamless handover from heterogeneous networks (eg The device crosses the network domain D. The exemplary handover between these heterogeneous access systems can be between Γ Ι 交 - handover: ultra-mobile broadband (umb) and high-rate packets (coffee); wiMax / HRPD; long-term Evolution (L HRPD, where the system architecture can implement the Internet Protocol (IP) line 133629.doc 200939809 mobility to enable the action to actively participate in handover preparation. Another option is that the system A system that is more network controlled than the mobile unit itself can be employed. This interaction enables an action unit to be handed over between different access systems. One of the calls can continue without stopping halfway. According to a related method, An establishment is established between the source access system and the target access system to prepare for the handover session. The establishment may include discovering an interworking security gateway (IWSG) that ensures the security of the transmitted packet. One of the ip addresses. The establishment may further include discovering the radio access network (RAN) or the target location of the target access system. Typically, the RAN-lite system only contains protocol stacks. RAN without radio transceiver function. It also supports the existing ran interface to the core network source and the real RAN. After the conversation has been pre-established with RAN-lite, the existing RAN interface can be used. Hand over) to transmit it to the real RAN. This, for example, makes it possible to perform inter-technology handover to the target system without the need to increase to the existing real RAN (to support L3 tunneling from AT). In the aspect, the RAN_Hte is associated with an agreement (e.g., contained within the action and/or IWSG) that enables the action to discover an IP address and establish a tunnel to pre-establish a conversation with the target radio system. When a handover needs to be transmitted over the air, the conversation negotiated in the RAN-lite can be transmitted via a well-known existing interface. Thus, from the perspective of a wireless access network, access after handover can come from the same radio technology&apos; and therefore there is no need to modify the target radio access system to support heterogeneous system radio technology. The RAN-lite can be used logically as any 133629.doc -9- 200939809 and then the real RAN (for example, a base station controller without actually controlling any physical base station. As long as an action is taken with the ruler 丨丨^ Establishing a tunnel, the action can negotiate a dialogue with the RAN_nte for the action to obtain a dialogue of the target radio technology, and the ruler can store a copy of the conversation of the target radio technology, wherein the action remains May be sourced from the radio technology. Operation, ,,,,,, upon the transfer from the action to the target ❹ radio technology over the air, the action can then access the real RAN of the target access system - for example, Mobile access, and the target access system queries the action for a dialog to negotiate technology. The mobile unit can further provide a unicast access terminal identifier (UATI) or first class that can be used to find the conversation. The identifier 'where the ^^^ from the action can point to the RAN lite, wherein the real RAN can be used to retrieve the conversation from the RAN lite to the real RAN. When extracting a conversation, the The action can then be communicated with the real RAN in the target radio system. It should be understood that the real scale can represent a base station controller that includes the real connection to the base station. The intersystem handover control component can then The AT and the target system implement a wearthrough, wherein the source/system can transmit a message/packet associated with the target system. According to a further aspect, the L3 tunneling provides for transmission between the heterogeneous systems. The function and procedure of the variable length data sequence is notified to maintain service quality and error control functions. This tunneling can be further transparent to the underlying access system regardless of direction (eg, from LTE to HRPD or from HRPD to LTE) (eg, Does not change the source of the ιρ packet.) In a related aspect, a computer readable medium is provided, which has a code for executing 133629.doc 200939809 or computer executable instructions: discovery target access system and source access system Device and/or heterogeneous address; establish a secure tunnel to any of the security gateway systems. Package 'Provide' Processing 11' its execution instructions and / or ^ Discover the address of the safe intercommunication device; establish a module related to the channel between the source source and the target access system. The second description of the related purpose' is described in the following description and accompanying

/描述某些說明性態樣。然而,該等態樣僅指示其中可 ^ 晏丁之私的物之原理之各種方式中之幾種方式且該 所主張之標的物意欲包含所有此等態樣及其等效態樣。在 結合該等圖式考量時,可自以下詳細描述顯而易見其它優 點及新穎特徵。 【實施方式】 現將參照該等圖式描述各種態樣。在以下描述中出於 解釋目的’ W明許多具體細節讀達成對—個或多個態樣 之透徹理解。然而’顯而易I,可在沒有該等具體細節之 情況下實施此等態樣。 如在此申請案中所使用’術語”組件”、,,模組&quot;、&quot;系統,, 及類似術語皆意欲包含一電腦相關實體,例如(但不限 於):硬體、韌體、硬體與軟體之一組合、軟體、執行中 之軟體。例如而言,一組件可係(但不限於):一於一處理 器上運行之處理程式、—處理器、一物件、一可執行檔、 一執行線程、一程式、及/或一電腦。以圖解說明方式, 一於一計算器件上運行之應用程式及該器件二者皆可係一 133629.doc -11 · 200939809 組件。一個或多個組件可駐存於一處理程式及/或執行線 程内,且一組件可局域化於一個電腦上及/或分佈於兩個 或更多個電腦之間。另外,該等組件可自各種其上儲存有 各種資料結構之電腦可讀媒體執行。該等組件可藉由本端 及/或遠端過程例如根據一具有一個或多個資料封包之信 號來進行通信,例如,來自一個與一本端系統、分佈式系 統中之另一組件互動、及/或藉由該信號跨越一網路(例如 網際網路)與其它系統互動之組件之資料。 此外,本文中結合一終端機描述各種態樣,該終端機可 係-有線終端機或一無線終端冑。一終端機亦可稱為一系 統、器件、訂戶單元、訂戶台、行動台、行動、行動器 件、遠端台、遠端終端機、存取終端機、使用者終端機、 終端機、通信器件、使用者代理、使用者器件或使用者設 備(UE)。一無線終端機可係一蜂巢式電話、一衛星電話、 一無絕(C〇rdleSS)電話、一對話起始協定電話、一無 線局部迴路(WLL)台、—個人數位助理(pDA)、—具有無 線連接能力之手持式器件、一計算器件、或其它連接至— 無線數據機之處理器件。此外,本文中結合一基地台描述 各種態樣。-基地台可用於與無線終端機進行通信且亦可 稱為-存取點、一節點B、或某種其它術語。 此外,術语”或&quot;意欲意指一包含性&quot;或&quot;而非一排它性”或&quot;。 亦即’除非另外說明或自上下文中顯而易見,短語,,χ採用 Α或Β,’意欲意指該等自然包含性排列中之任—者。亦即, 以下情形中之卜者収短語&quot;X採用^Β&quot;: χ採用八;χ 133629.doc •12- 200939809 採用B;或X採用A及B兩者。另外,如在此申請案及隨附 申請專利範圍中所使用之冠詞&quot;一(a)&quot;及&quot;一(an)&quot;應一般解 釋為意指&quot;一個或多個&quot;,除非另外說明或貫注於一單數形 式之上下文顯而易見。 本文中所描述之技術可用於各種無線通信系統,例如 CDMA、TDMA、FDMA、OFDMA 及 SC-FDMA 及其它系 統。術語&quot;系統&quot;及&quot;網路&quot;常常可交替使用。一 CDMA系統 可實施一無線電技術,例如通用地面無線電存取(UTRA)、 cdma2000等等。UTRA包含寬頻-CDMA(W-CDMA)及 CDMA 之其它變型。此外,cdma2000涵蓋IS-2000、IS-95及IS-856標準。一 TDMA系統可實施一無線電技術,例如全球 行動通信系統(GSM)。一 OFDMA系統可實施一無線電技 術,例如演化UTRA(E-UTRA)、超級行動寬頻(UMB)、 IEEE 802.11 (Wi-Fi)、EEE 802.16 (WiMAX)、IEEE 802.20、 Flash-OFDM等等。UTRA及E-UTRA係通用行動電信系統 (UMTS)之一部分。3GPP長期演化(LTE)係一使用E-UTRA 之UMTS版本,其在下行鏈路上採用OFDMA且在上行鏈路 上採用SC-FDMA。在來自一名為&quot;第三代夥伴計劃&quot;(3GPP) 之組織之文件中對UTRA、E-UTRA、UMTS、LTE及GSM 進行描述。另外,在來自一名為&quot;第三代夥伴計劃 2(3GPP2)&quot;之組織之文件中對Cdma2000及UMB進行描述》 將依據可包含許多器件、組件、模組及類似物之系統來 呈現各種態樣或特徵。應理解及瞭解,各種系統可包含額 外器件、組件、模組等等,及/或可不包含結合附圖所討 133629.doc 13 200939809 論之所有器件、組件、模組等等。亦可使用該等方法之一 組合。 圖1圖解說明一網路系統100,其在異質網路之間供應交 遞,且在一來源存取系統110與一目標存取系統ιΐ2之間交 互工作。應瞭解,此圖實際上為例示性且該系統間交遞控 制組件可係一存取終端機(AT)之一部分。可(例如)經由一 • L3隧穿預先建立AT與目標系統之間之對話(對來源系統透 ❹ 明)。此系統間交遞控制組件11 5促進藉助以雙重模式運作 (在來源存取系統11〇及目標存取系統112兩者中)之行動單 元104設定一 L3隧穿》系統間交遞控制組件115最初使得行 動單元104能夠得到與來源及/或目標存取系統11〇、ιΐ2相 關聯之本端域名。此後,該系統間交遞控制組件促進發現 目標存取系統112之一安全閘道器及無線電存取網路(Ran) 之一 ip位址。此閘道器充當一用於到達目標存取系統i 12 之一入口之網路點。因此,系統間交遞控制組件115使得 ❹ 行動單元能夠建立L3隧穿,其中可接著經由該來源存 取系統通過無縫運作傳送與目標存取系統112相關聯之訊 號及封包。 照此’系統間交遞控制組件11 5可在一交遞之前,利用 • 隧穿以交換移交設定及執行封包作為AT 104與目標存取系 統112之間之對話協商之一部分,以減少交遞期間之中斷 並減輕一在交遞期間實施對話設定之需要。系統間交遞控 制組件11 5進一步使得能夠經由來源存取系統11 〇輸送通信 資料封包,其中此來源存取系統11 〇在AT 104與目標存取 133629.doc • 14· 200939809 系統112之間之協商期間通常不參與。 圖2及圖3圖解說明經由自一 umb系統210至一HRPD系統 215且反之亦然之L3隧穿交遞之特定態樣。在圖2中,該來 源存取系統由UMB系統210表示,其令存取終端機或行動 單元211與演化基地台(eBs)222進行通信,其中自該eBS至 該閘道器及本地代理至網際網路傳送IP封包。在自UMb 21〇(其代表來源存取系統)至HRPD存取系統215(其代表目 標存取系統)請求一交遞時,起始設定HRPD,在此期間行 動單元2 11仍保持在UMB系統21 0中。該系統間交遞控制組 件可接著在UMB 210與HRPD 215之間實施隧穿,其中可 經由L3隧穿透明地傳送HRPD訊號及相關聯之封包,其可 經由UMB系統210經由IP輸送。 因此,路徑線路250指示訊務線路,其中UMB 210中之 行動單元211需要發現HRPD 215之無線電存取網路 11入1^/11八]^1“€212及相關聯之1卩位址,以準備並設定通信 (例如,用於封包傳送)。在發現IP位址時,可接著經由此 RAN lite IP位址/封包傳輸HRPD 215之訊號,其中該等封 包可通過該UMB系統中之存取閘道器(AGw)2 1 7且可接著 傳輸至RAN lite 2 12。封包資料服務節點(pDSN)219充當 HRPD RAN 212與IP網路之間之連接點,其中交互工作安 全閘道(IWSG)214可經由IPsec隧道260供應安全(例如,對 於IP),以保護AT 211與RAN/RAN lite 212之間之封包傳 輸。此閘道器214充當一用於進入HRPD目標存取系統215 之一入口之網路點。另外,對話參考網路控制器 133629.doc -15- 200939809 (SRNC)21 8通常包含鑑別功能及相關聯之組態’其在基地 台222與存取終端機211之間協商’並充當基地台222擷取 資訊(例如,獲得對話資訊以避免對話改變期間之衝突)之 一參考。/ Describe some illustrative aspects. However, the scope of the invention is intended to be illustrative of the various embodiments of the invention. Other advantages and novel features will become apparent from the following detailed description in conjunction with the drawings. [Embodiment] Various aspects will now be described with reference to the drawings. In the following description, for the purposes of explanation, many specific details are read to achieve a thorough understanding of one or more aspects. However, it is obvious that I can implement such aspects without such specific details. As used in this application, the 'terms' component, ", module", "system", and similar terms are intended to include a computer-related entity such as, but not limited to, hardware, firmware, Combination of hardware and software, software, and software in execution. For example, a component can be, but is not limited to, a processing program running on a processor, a processor, an object, an executable file, an execution thread, a program, and/or a computer. By way of illustration, both an application running on a computing device and the device can be a component of 133629.doc -11 · 200939809. One or more components can reside within a process and/or execution thread, and a component can be localized on a computer and/or distributed between two or more computers. In addition, the components can be executed from a variety of computer readable media having various data structures stored thereon. The components can be communicated by the local and/or remote process, for example, based on a signal having one or more data packets, for example, from one interacting with a local system, another component of the distributed system, and / or data of components that interact with other systems over the network (eg, the Internet). In addition, various aspects are described herein in connection with a terminal, which can be a wired terminal or a wireless terminal. A terminal can also be called a system, device, subscriber unit, subscriber station, mobile station, mobile, mobile device, remote station, remote terminal, access terminal, user terminal, terminal, communication device , user agent, user device or user equipment (UE). A wireless terminal can be a cellular phone, a satellite phone, a C〇rdleSS phone, a conversation initiation protocol phone, a wireless local loop (WLL) station, a personal digital assistant (pDA), Handheld device with wireless connectivity, a computing device, or other processing device connected to a wireless data modem. In addition, this article combines a base station to describe various aspects. - The base station can be used to communicate with a wireless terminal and can also be referred to as an access point, a Node B, or some other terminology. In addition, the term "or" is intended to mean an inclusive "or &quot; rather than an exclusive" or ". That is, unless otherwise stated or apparent from the context, the phrase "," or "an", is intended to mean any of these natural inclusive arrangements. That is, in the following cases, the phrase "quote" is used by &quot;X&quot;: χ8; χ 133629.doc •12- 200939809 adopts B; or X employs both A and B. In addition, the articles &quot;a(a)&quot; and &quot;an&quot; as used in this application and the scope of the accompanying claims are generally to be construed as meaning &quot;one or more&quot; The context of a singular form is obvious unless otherwise stated. The techniques described herein can be used in a variety of wireless communication systems, such as CDMA, TDMA, FDMA, OFDMA, and SC-FDMA, among others. The terms &quot;system&quot; and &quot;network&quot; are often used interchangeably. A CDMA system can implement a radio technology such as Universal Terrestrial Radio Access (UTRA), cdma2000, and the like. UTRA includes Broadband-CDMA (W-CDMA) and other variants of CDMA. In addition, cdma2000 covers the IS-2000, IS-95, and IS-856 standards. A TDMA system can implement a radio technology such as the Global System for Mobile Communications (GSM). An OFDMA system can implement a radio technology such as Evolution UTRA (E-UTRA), Super Mobile Broadband (UMB), IEEE 802.11 (Wi-Fi), EEE 802.16 (WiMAX), IEEE 802.20, Flash-OFDM, and the like. UTRA and E-UTRA are part of the Universal Mobile Telecommunications System (UMTS). 3GPP Long Term Evolution (LTE) is a version of UMTS that uses E-UTRA, which employs OFDMA on the downlink and SC-FDMA on the uplink. UTRA, E-UTRA, UMTS, LTE, and GSM are described in documents from an organization that is a &quot;3rd Generation Partnership Project&quot; (3GPP). In addition, the description of Cdma2000 and UMB in a document from the organization of the &quot;3GPP2&quot; organization will be presented in terms of a system that can contain many devices, components, modules, and the like. Various aspects or features. It is to be understood and appreciated that the various systems may include additional components, components, modules, and the like, and/or may not include all of the devices, components, modules, etc. discussed in conjunction with the drawings. You can also use one of these methods to combine. 1 illustrates a network system 100 that provides for delivery between heterogeneous networks and that interacts between a source access system 110 and a target access system ι2. It should be understood that this figure is illustrative in nature and that the inter-system handover control component can be part of an access terminal (AT). The dialogue between the AT and the target system can be pre-established, for example, via a • L3 tunneling (through source system). The inter-system handover control component 115 facilitates setting an L3 tunneling inter-system handover control component 115 by means of the mobile unit 104 operating in dual mode (both in the source access system 11 and the target access system 112). The mobile unit 104 is initially enabled to obtain the local domain name associated with the source and/or target access systems 11〇, ιΐ2. Thereafter, the intersystem handover control component facilitates discovery of one of the security gateways of the target access system 112 and one of the radio access network (Ran) ip addresses. This gateway acts as a network point for reaching an entrance to one of the target access systems i12. Thus, the inter-system handover control component 115 enables the 行动 mobile unit to establish L3 tunneling, wherein the signals and packets associated with the target access system 112 can then be transmitted seamlessly via the source access system. As such, the intersystem handover control component 115 can utilize tunneling to exchange handover settings and execute packets as part of the dialog negotiation between the AT 104 and the target access system 112 prior to handover to reduce handover. The interruption of the period and the need to implement a dialogue setting during the handover. The inter-system handover control component 115 further enables the delivery of the communication data packet via the source access system 11 , wherein the source access system 11 is between the AT 104 and the target access 133629.doc • 14· 200939809 system 112 Usually do not participate during the consultation period. 2 and 3 illustrate a particular aspect of L3 tunneling via via an umb system 210 to an HRPD system 215 and vice versa. In FIG. 2, the source access system is represented by UMB system 210, which causes an access terminal or mobile unit 211 to communicate with evolved base stations (eBs) 222, from the eBS to the gateway and local agent to The Internet transmits IP packets. When a handover is requested from UMb 21 (which represents the source access system) to the HRPD access system 215 (which represents the target access system), the HRPD is initially set, during which the mobile unit 2 11 remains in the UMB system. 21 0. The intersystem handover control component can then perform tunneling between the UMB 210 and the HRPD 215, wherein the HRPD signals and associated packets can be transparently transmitted via L3 tunneling, which can be transported via the UMB system 210 via IP. Therefore, the path line 250 indicates the traffic line, wherein the mobile unit 211 in the UMB 210 needs to discover the radio access network 11 of the HRPD 215 into 1^/11 八]^1"€212 and the associated address. To prepare and set up communications (eg, for packet transmission). Upon discovery of the IP address, the HRPD 215 signal can then be transmitted via the RAN lite IP address/packet, where the packets can be stored in the UMB system The gateway (AGw) 2 1 7 is taken and can then be transmitted to the RAN lite 2 12. The packet data service node (pDSN) 219 acts as a connection point between the HRPD RAN 212 and the IP network, where the interworking security gateway (IWSG) 214 may be secured (eg, for IP) via IPsec tunnel 260 to protect packet transmissions between AT 211 and RAN/RAN lite 212. This gateway 214 acts as one of the HRPD target access systems 215 The network point of the portal. In addition, the dialog reference network controller 133629.doc -15-200939809 (SRNC) 21 8 typically includes an authentication function and associated configuration 'between base station 222 and access terminal 211 Negotiate 'and act as base station 222 to capture information (for example, He was a dialogue in order to avoid collisions during the change of dialogue) of a reference.

類似地,圖3圖解說明一經由自一HRPD 310至一111^^系 統315之L3隧穿交遞之一進一步態樣。在自來源系統HRPD 310至目標系統UMB 315進行一交遞請求時,可發現UMB 11八&gt;1/出6-688 312並識別相關聯之1;]^丑閘道器316、325。 舉例而言’最初,可發現一111^18 11八]^-出6 312與交互工作 安全閘道器(IWSG)325相關聯。隨後,在發現此ip位址 時,可接著基於通信協定之層3處之隧穿將封包發送至目 的地ip位址《此預先建立可接著促進隨後封包流動至UMB 目標系統3 1 5。 圖4根據一態樣圖解說明一用於異質系統之間之 之例示性方法。雖然本文中將該例示性方式圖解說明且描 述為-系列表示各種事件及/或動作之塊,然而本態樣並 不文此等塊之所圖解說明述之次序限制。舉例而言,根據 所描述之態樣,除本文中所圖解說明之次序之外,某些動 作或事件可按不同次序及/或與其它動作或事件同時發 生。另外,實施根據本態樣之方法可能並不需要所有 塊、事件或動作。此外,應瞭解,根據所描述之 ㈣=讀方法及其它方法可與本文中所圖解說明及描 述之方法關聯實施,亦與未圖解㈣或描述 裝置關聯。最初且在41。處,可摘測無線電條件改= 133629.doc •16- 200939809 可觸發一自AT至一目標存取系統之交遞準備請求。另一 選擇為,觸發交遞準備可由將目標存取系統廣告為來源存 取系統之鄰近技術引起。隨後且在為交遞對話做準備之過 程中,在412處,可在AT與目標存取系統之間建立一建 立。此建立可包含在41 6處發現確保所傳輸之封包之安全 之交互工作安全閘道器之一 IP位址。該建立可進一步包含 在418處發現目標存取系統之尺八1^/11入]^-1丨16之1?位址。該 系統間交遞控制組件可接著在420處在AT與目標存取系統 之間實施隧穿,其中可經由來源系統傳送與該目標系統相 關聯之發訊/封包。此外,在422處,AT與目標存取系統協 商一空中介面對話及一 IP對話。照此,在424處,接收一 來自目標系統之無線電資源請求,後跟在426處將來自該 目標系統之無線電資源指派給AT。因此,在430處可將IP 訊務重新定向至AT(或亦可在動作434之後定位),後跟在 432處完成移交&quot;隨後,在434處,AT經由空中傳輸獲取 目標系統。 下文係其中任一 IP主機(例如,AT)可與DNS伺服器一起 實施之DNS查找之完整域名之一特定實例》對目摞系統之 安全閘道器及RAN/RAN-lite發現之例示性呼叫可包含: 自UMB至HRPD有效交遞 〈HRPD-子網路 &gt;.HRPD.IWSG.〈本端-網-名〉 &lt;HRPD-子網路&gt;.HRPD.RAN.〈本端-網-名&gt; 自HRPD至UMB有效交遞 &lt;UMB-ANID&gt;.UMB.IWSG.〈本端-網-名 &gt; 133629.doc •17· 200939809 &lt;UMB-ANID&gt;.UMB.RAN.〈本端-網-名〉 自WiMAX至HRPD有效交遞 &lt;HRPD-子網路 &gt;.HRPD.IWSG.&lt;本端-網-名 &gt; &lt;HRPD-子網路&gt;.HRPD.RAN.&lt;本端-網-名&gt; 自HRPD至WiMAX有效交遞 &lt;WiMAX-APID&gt;. WiMAX.IWSG.〈本端·網-名〉 &lt;\^1^入又-八卩10&gt;_\\^]^八又.11人]^.&lt;本端-網-名&gt; 自LTE至HRPD有效交遞 〈HRPD-子網路 &gt;.只1^0.1\\^0.&lt;本端-網-名〉 &lt;HRPD-子網路&gt;.HRPD.RAN.&lt;本端-網-名&gt; 自HRPD至LTE有效交遞 &lt;LTE-eNBID&gt;. LTE.IWSG.〈本端-網-名 &gt; &lt;LTE_eNBID&gt;. LTE.RAN.〈本端-網-名 &gt; 可藉助目標存取系統經由空中傳輸直接獲得HRPD子網 路、UMB ANID、WiMax APID及 LTE-eNBID 或透過由來 源存取系統廣告之鄰近技術記錄獲得。 圖5圖解說明使用者設備或存取終端機5 1 0、來源存取系 統540及目標存取系統560中之一互動之一例示性方塊圖。 UE 5 1 0包含目標系統協定5 11及來源系統協定5 1 2兩者以使 得能夠與兩個系統雙重模式運作。此一配置使得能夠發現 IWSG之IP位址並建立IPsec隧道。此外,可發現一目標 RAN之IP位址以使得能夠預先建立目標RAN對話。配置 500藉由構建IPsec隧道在移交之前利用移交準備及移交執 行來促進自來源存取系統540至目標存取系統560之對話交 133629.doc -18- 200939809 遞。 圖6根據一進一步態樣圖解說明一用於建立_ Ip安全隨 道之例示性呼叫流程600。AT 602最初與來源存取系統6〇4 相關聯’並經由一呼叫610獲得目標存取系統之域名。因 此,AT 602可發出一域名系統(DNS)606詢問以獲得交互工 ' 作安全閘道器(IWSG)608之一 IP位址以存取目標存取系 - 統。此外,此DNS詢問可進一步包含發現目標存取系統之 RAN/RAN-lite之IP位址。AT 602可接著起始到達目標存取 ❹ 系統之隧穿,其中可經由來源系統604傳送與該目標系統 相關聯之發訊/封包。如較早所解釋,此等異質存取系統 之間之例示性交遞可包含UMB/HRPD、WiMax/HRPD、 LTE/HRPD之間之交遞,其中系統架構可使用用戶端行動 IP實施IP行動性以使該行動或存取終端機6〇2主動地參與 到交遞準備中;或另一選擇為採用較該行動單元自身更受 網路控制之系統。此交互工作可使得一行動單元能夠在不 〇 同存取系統之間進行對話交遞,其中一呼叫可繼續而不半 途停止。 圖7圖解說明可向一無線終端機726供應服務之例示性異 質無線通信系統711、721。系統711、721分別表示一目標 存取系統及一來源存取系統,其包含複數個扇區7〇2、 704、708及706、710、712。目標存取系統711及來源存取 系、統721可在此等扇區内採用不同的無線服務。雖然顯示 此等扇區實際上為六邊形並具有大致類似大小,然而應理 解,該等扇區之大小及形狀可端視地理區域、實體障礙物 133629.doc -19- 200939809 (例如建築物)之數量、大小及形狀及數個其它因素而變 化。存取點(基地台、存取路由器等等)714、716、720與扇 區702、704、708相關聯,其中採用技術,,A&quot;作為其一部 分。類似地,存取點718、722、724與扇區706、712、710 相關聯,其中採用技術&quot;B&quot;作為其一部分,其中技術”B&quot;不 . 同於技術&quot;A。’· ’ 在無線終端機726在地理上接入埠時,其可自目標存取 ❹ 系統711接收比自來源存取系統721接收之信號具有更大強 度之信號。應瞭解,無線終端機726可與來源存取系統721 及目標存取系統711兩者一起以雙重模式運作_其中系統間 交遞控制組件719可在交遞之前供應隧穿作為AT 726與目 標存取系統71 1之間之對話協商之一部分。因此,可經由 來源存取系統721(透明或不透明地))輸送資料封包,苟辟 AT正準備交遞至該目標系統,且接著—旦完成該交遞即 可將該等可資料封包重新定向至該目標系統。 〇 圖8圖解說明一特定系統800,其在在經由一由行動單元 建立之L3隨穿請求一交遞時促進在異質存取系統之間傳輸 資料。系統800可與一存取點相關聯並包含一組件群組 • 謝,該等組件可在異質存取系統之間之-交遞期間結合 向一存取終端機傳輸資料而彼此進行通信。群組8〇2包含 組件804,其用於確定一存取終端機已自一第一存取系統 至一第二存取系統請求一交遞.舉例而言,此確定可藉由 藉助該存取終端機分析-目標存取系統之_身份而發生。 此身份可包含用於識別一個或多個其他存取系統模組中目 133629.doc -20- 200939809 標系統模組之IP位址之任一適宜之標記。應瞭解,所描述 之態樣可預期指示目標存取之一身份之各種過程且由此意 欲涵蓋該等過程。 群組802亦包含一組件806,其用於自第一存取接收資料 且接收將接著將什麽資料自此第一存取系統傳輸 至該存取 終端機之一指示。舉例而言,一RLp封包標頭中之一時間 戳或其他序號可指示將接著將什麼資料傳輸至該存取終端 ❹ Ο 機。群組802額外包含一組件808,其用於自一網路模組接 收&gt; 料其中該資料被期望地傳輸至該存取終端機。此 外,自該網路模組接收之資料可係一與一序號或戳相關聯 之ip囊封之資料封包’從而使得第二收發機能夠用於確定 接著將什麼資料傳輸至該存取終端機。群組8〇2可進一步 包含-組件81〇,其用於以—適當的順序向該存取終端機 傳輸資料,其中該資料係自該第-存取系統及該網路模組 接收。舉例^言H存取线可接㈣傳輸至該存取 終端機之資料’纟中該資料不重複且將以—特定順序傳 輸。系統800亦可包含一記憶體812’其可保留與執行組件 隊81〇有關之指令。系統綱使得新的或目標存取系統能 夠開始接收資料以為交遞做準備’即使來源尚未放棄控制 且資料正在該目標存取系統處排隊β A目標存取系統^有 恢復網路層協定及所傳輸之資料之資訊所需之資吞 藉由不中斷-當前資料傳送,該交遞可以顯著高:度= 滞後時間發生。)可將系統800併入為一分佑 加# 刀怖式及/或集中式 133629.doc •21 · 200939809 圖9圖解說明一系統900 ’其可結合在。層中之一交遞之 前及之後向一存取終端機傳輸資料採用。系統9〇〇包括一 接收器902,該接收器自(例如)一個或多個 信號,並對所接收之信號實施典型動作(例如,Z收放 大下I頻)’且數位化經調節之信號以獲得樣本。&lt; ' 一解調變器9〇4可解調變所接收之導頻符號並將其提供至 一處理器906用於通道估計。 纟理器906可係-專用於分析由接收器組件902所接收之 資訊及/或產生由傳輸器914傳輸之資訊之處理器。處理器 906可係一控制系統90〇之一個或多個部分之處理器,及/ 或一分析由接收器902所接收之資訊、產生由傳輸器914傳 輸之資訊並控制系統900之一個或多個部分之處理器。系 統900可包含一最佳化組件9〇8,其可在交遞之前期間及/ 或之後最佳化使用者設備之效能。可將最佳化組件9〇8併 入處理器906中。應瞭解,最佳化組件9〇8可包含結合是否 φ 自一來源存取系統至一目標存取系統交遞之確定實施基於 效用之分析之最佳化碼。該最佳化碼可結合實施推論及/ 或概率確疋及/或結合實施交遞之基於統計之確定利用基 ' 於人工智慧之方法。 • 系統(使用者設備)9〇〇可額外包括記憶體910,其以可運 作方式耦合至處理器906並儲存資訊(例如,關於一基地台 之信號強度資訊、排程資訊及類似資訊),其中可結合確 定是否及何時請求一交遞採用此資訊。記憶體910可額外 儲存與產生查找表等等相關聯之協定,以便系統9〇〇可採 133629.doc -22- 200939809 用所儲存之協定及/或演算法來增加系統容量。應瞭解, 本文十所描述之資料儲存(例如,記憶體)組件可係揮發性 或非揮發性記憶體,或可包含揮發性及非揮發性記憶體兩 者。以圖解說明而非限定方式,非揮發性記憶體可包含唯 讀記憶體(ROM)、可程式化ROM(PROM)、電可程式化 ROM(EPROM)、電可擦除ROM(EEPROM)、或快閃記憶 體。揮發性記憶體可包含充當外部快取記憶體之隨機存取 記憶體(RAM)。以圖解說明而非限定方式,RAM可具備許 多種形式,例如,同步RAM(SRAM)、動態RAM(DRAM)、 同步 DRAM(SDRAM)、雙倍資料速率 SDRAM(DDR SDRAM)、 增強之SDRAM(ESDRAM)、同步鏈路(Synchlink)DRAM(SLDRAM)、 及直接Rambus RAM (DRRAM)。記憶體910意欲包括(而不 限於)該等及其他適宜類型之記憶體。處理器906連接至一 符號調變器91 2及傳輸經調變之信號之傳輸器914。 圖10圖解說明一可結合接收一交遞指示及/或相應地向 一存取終端機傳輸資料所採用之系統。系統1000包括一具 有一接收器1010之基地台1002,該接收器經由一個或多個 接收天線1006自一個或多個使用者器件1004接收信號,並 透過複數個傳輸天線1008向一個或多個使用者器件1004傳 輸。在一個實例中,可使用一單組天線來構建接收天線 1006及傳輸天線1008。接收器1010可自接收天線1006接收 資訊並以可運作方式與一解調變所接收之資訊之解調變器 1012相關聯。如熟習此項技術者應瞭解,接收器1010可係 (例如)一耙式(Rake)接收器(例如,一使用複數個基頻相關 133629.doc -23- 200939809 器單獨處理多路徑信號組分之技術,)、一基KMMSEi 接收器、或某一其它用於將指派至其之使用者器件分離出 來之適宜之接收器。例如而言,可採用多個接收器(例 如,每一接收天線一個),且此等接收器可彼此進行通信 以k供使用者資料之改良之估計。該等經解調變之符號係 由一處理器10U進行分析,該處理器類似於上文參照圖9 ' 所描述之處理器,並耦合至一儲存關於使用者器件指派之 φ 資訊、關於該資訊之查找表及類似物之記憶體1016。可由 接收器1010及/或處理器1014共同處理每一天線之接收器 輸出。一調變器1018可多工該信號以由一傳輸器1〇2〇透過 傳輸天線1008傳輸給使用者器件1004。 如本文中所使用者,術語”組件&quot;、,,系統&quot;及類似術語意 欲指代一電腦有關實體,其可係硬體、硬體與軟體之一組 合、軟體或執行中之軟體及/或機電單元。例如而言,一 組件可係(但不限於广一於一處理器上運行之處理程式、 〇 一處理器、一物件、一執行個體、一可執行檔、一執行線 程、一程式及/或一電腦。以圖解說明方式,一於一電腦 上運行之應用程式及該電腦兩者皆可係一組件。一個或多 個組件可駐存於一處理程式及/或執行線程内,且一組件 可局域化於個電腦上及/或分佈於兩個或更多個電腦之 間。 在本文中,詞語&quot;例示性&quot;用於意指用作一實例、示例或 圖解說明。本文中描述為&quot;例示性&quot;之任—態樣或設計皆未 必應視為較其它態樣或設計為佳或有利。類似地,本文中 133629.doc -24- 200939809 僅出於清楚及理解目的提供實例,且並不意欲以任一方式 限制所描述之態樣或其部分。應暸解,可呈現衆多額外或 替代實例,但出於簡短目的而將其省略。 此外’可使用標準程式化及/或工程技術將所描述之態 樣之全部或部分構建為一方法、裝置、或製品,以製成軟 體、韌體、硬體'或其任一組合來控制一電腦實施所揭示 之態樣。例如而言,電腦可讀媒體可包含(但不限於):磁Similarly, Figure 3 illustrates a further aspect of L3 tunneling via a HRPD 310 to a 111^^ system 315. Upon a handover request from the source system HRPD 310 to the target system UMB 315, UMB 11 VIII &gt; 1 out 6-688 312 can be found and the associated 1; ^ 闸 闸 316 316, 325. For example, 'initially, a 111^18 11 eight]^-out 6 312 can be found associated with the Interworking Security Gateway (IWSG) 325. Subsequently, upon discovery of the ip address, the packet can then be sent to the destination IP address based on tunneling at layer 3 of the communication protocol. "This pre-establishment can then facilitate subsequent packet flow to the UMB target system 315. Figure 4 illustrates an exemplary method for use between heterogeneous systems in accordance with an aspect. While the exemplary mode is illustrated and described herein as a series of various events and/or acts, the present invention is not limited by the order of the illustrated. For example, some acts or events may occur in different orders and/or concurrently with other acts or events, in addition to the order illustrated herein. In addition, it may not be necessary to implement all of the blocks, events or actions in accordance with the methods of the present invention. In addition, it should be understood that the method of describing (4) = reading and other methods can be implemented in association with the methods illustrated and described herein, as well as in the non-illustrated (d) or described devices. Initially at 41. At the same time, the radio condition can be selected to change = 133629.doc •16- 200939809 can trigger a handover preparation request from AT to a target access system. Alternatively, triggering the delivery preparation may be caused by the proximity technology that advertises the target access system as a source access system. Then, and in preparation for the handover session, at 412, a setup can be established between the AT and the target access system. This establishment may include an IP address of one of the interworking security gateways found to ensure the security of the transmitted packet at 41 6 . The establishing may further include discovering at 1 418 the address of the target access system of the size 8^/11 into]^-1丨16. The inter-system handover control component can then perform tunneling between the AT and the target access system at 420, wherein the messaging/packet associated with the target system can be transmitted via the source system. In addition, at 422, the AT negotiates with the target access system an empty mediation session and an IP session. As such, at 424, a radio resource request from the target system is received, followed by assigning radio resources from the target system to the AT at 426. Thus, the IP traffic can be redirected to the AT at 430 (or can also be located after action 434), followed by the handover at 432. Subsequently, at 434, the AT acquires the target system via over-the-air transmission. The following is a specific example of a complete domain name for a DNS lookup that any IP host (eg, an AT) can implement with a DNS server. An exemplary call to the security gateway of the witness system and RAN/RAN-lite discovery. Can include: From UMB to HRPD effective delivery <HRPD-Subnet>.HRPD.IWSG.<Local-Net-Name> &lt;HRPD-Subnet&gt;.HRPD.RAN.<本端-网-Name &gt; Effective delivery from HRPD to UMB&lt;UMB-ANID&gt;.UMB.IWSG.<本端-网-名&gt; 133629.doc •17· 200939809 &lt;UMB-ANID&gt;.UMB.RAN. Local-net-name> Effective handover from WiMAX to HRPD&lt;HRPD-Subnet&gt;.HRPD.IWSG.&lt;Local-Net-Name&gt;&lt;HRPD-Subnet&gt;.HRPD.RAN.&lt;Local-Net-Name&gt; Effective handover from HRPD to WiMAX&lt;WiMAX-APID&gt;. WiMAX.IWSG.<本端·网-名〉 &lt;\^1^入进-八卩10&gt ;_\\^]^八又.11人]^.&lt;Local-Net-Name&gt; Effective handover from LTE to HRPD <HRPD-Subnet>. Only 1^0.1\\^0. &lt;Local-Net-Name&gt;&lt;HRPD-Subnet&gt;.HRPD.RAN.&lt;Local-Net-Name&gt; Effective handover from HRPD to LTE&lt;LTE-eNBID&gt;. LTE.IWSG .<本端-网-名&g t; &lt;LTE_eNBID&gt;. LTE.RAN. <Local-Net-Name> can directly obtain HRPD subnet, UMB ANID, WiMax APID and LTE-eNBID via over-the-air transmission by means of the target access system or by source Get the proximity technology record for the system ad. FIG. 5 illustrates an exemplary block diagram of one of user device or access terminal 50, source access system 540, and target access system 560. The UE 5 10 includes both the target system protocol 5 11 and the source system protocol 5 1 2 to enable operation in a dual mode with both systems. This configuration enables the discovery of the IP address of the IWSG and the establishment of an IPsec tunnel. In addition, the IP address of a target RAN can be found to enable the target RAN session to be established in advance. Configuration 500 facilitates conversations from source access system 540 to target access system 560 by using handover preparation and handover execution prior to handover by constructing an IPsec tunnel. 133629.doc -18- 200939809. Figure 6 illustrates an exemplary call flow 600 for establishing an _Ip secure channel in accordance with a further aspect. The AT 602 is initially associated with the source access system 〇4&apos; and obtains the domain name of the target access system via a call 610. Thus, the AT 602 can issue a Domain Name System (DNS) 606 query to obtain an IP address of one of the Security Gateways (IWSG) 608 to access the target access system. In addition, the DNS query can further include discovering the IP address of the RAN/RAN-lite of the target access system. The AT 602 can then initiate tunneling to the target access system where the messaging/packet associated with the target system can be transmitted via the source system 604. As explained earlier, an exemplary handover between such heterogeneous access systems may include handover between UMB/HRPD, WiMax/HRPD, LTE/HRPD, where the system architecture may implement IP mobility using client-side mobile IP. In order for the action or access terminal 6〇2 to actively participate in the handover preparation; or alternatively, to adopt a system that is more network controlled than the mobile unit itself. This interaction allows a mobile unit to communicate without having to communicate with the access system, where a call can continue without stopping halfway. FIG. 7 illustrates an exemplary heterogeneous wireless communication system 711, 721 that can service a wireless terminal 726. Systems 711, 721 represent a target access system and a source access system, respectively, comprising a plurality of sectors 7, 2, 704, 708 and 706, 710, 712. The target access system 711 and the source access system 721 can employ different wireless services within such sectors. Although it is shown that the sectors are actually hexagonal and have substantially similar sizes, it should be understood that the size and shape of the sectors may be viewed from a geographic area, physical obstacles 133629.doc -19- 200939809 (eg, buildings) ) varies in number, size and shape, and several other factors. Access points (base stations, access routers, etc.) 714, 716, 720 are associated with sectors 702, 704, 708, with the technique employed, A&quot; as part of it. Similarly, access points 718, 722, 724 are associated with sectors 706, 712, 710, where the technology &quot;B&quot; is employed as part of the technology "B&quot; not the same as technology&quot;A.'. When the wireless terminal 726 is geographically enabled, it can receive a greater strength signal from the target access system 711 than the signal received from the source access system 721. It should be appreciated that the wireless terminal 726 can be associated with the source. Both the access system 721 and the target access system 711 operate in a dual mode - wherein the inter-system handover control component 719 can provide tunneling prior to handover as a dialog negotiation between the AT 726 and the target access system 71 1 Part of the data packet can therefore be transported via source access system 721 (transparent or opaque), the AT is preparing to hand over to the target system, and then the data can be packetized once the handover is completed. Redirecting to the target system. Figure 8 illustrates a particular system 800 that facilitates the transfer of data between heterogeneous access systems upon a L3 pass-through request established by a mobile unit. Associated with an access point and including a component group, these components can communicate with each other in conjunction with transferring data to an access terminal during the handover between heterogeneous access systems. 2 includes a component 804 for determining that an access terminal has requested a handover from a first access system to a second access system. For example, the determination can be analyzed by means of the access terminal - the identity of the target access system occurs. This identity may include any suitable one for identifying the IP address of one or more other access system modules in the target system module 133629.doc -20- 200939809 It should be appreciated that the described aspects can be expected to indicate various processes for the target to access one of the identities and are thus intended to cover such processes. Group 802 also includes a component 806 for receiving data from the first access. And receiving an indication of what data will be transmitted from the first access system to the access terminal. For example, a timestamp or other sequence number in an RLp packet header may indicate what data will be transmitted next. To the access terminal ❹ Ο The group 802 additionally includes a component 808 for receiving from a network module, wherein the data is desirably transmitted to the access terminal. Further, the data received from the network module can be An ip-encapsulated data packet associated with a serial number or stamp' such that the second transceiver can be used to determine what data to subsequently transmit to the access terminal. Group 8.2 can further include - component 81 That is, it is used to transmit data to the access terminal in an appropriate sequence, wherein the data is received from the first access system and the network module. For example, the H access line can be connected (4) to The material of the access terminal 'this material is not repeated and will be transmitted in a specific order. System 800 can also include a memory 812' that retains instructions associated with executing component fleet 81. The system framework enables new or target access systems to begin receiving data in preparation for delivery 'even if the source has not given up control and the data is being queued at the target access system. β A target access system ^ has recovered network layer agreement and The information required for the information transmitted is not interrupted - the current data transfer, the handover can be significantly higher: degree = lag time occurs. The system 800 can be incorporated as a one-of-a-kind and/or centralized 133629.doc • 21 · 200939809 Figure 9 illustrates a system 900' that can be incorporated. Data is transmitted to an access terminal before and after one of the layers is handed over. System 9A includes a receiver 902 that performs, for example, one or more signals and performs a typical action on the received signal (eg, Z-amplified I-frequency) and digitizes the conditioned signal Get samples. &lt; 'A demodulation transformer 9〇4 can demodulate the received pilot symbols and provide them to a processor 906 for channel estimation. Processor 906 can be a processor dedicated to analyzing information received by receiver component 902 and/or generating information transmitted by transmitter 914. The processor 906 can be a processor that controls one or more portions of the system 90 and/or analyzes information received by the receiver 902, generates information transmitted by the transmitter 914, and controls one or more of the system 900. Part of the processor. System 900 can include an optimization component 9-8 that optimizes the performance of the user device during and/or after delivery. The optimization component 9〇8 can be incorporated into the processor 906. It will be appreciated that the optimization component 〇8 may include an optimization code that implements a utility-based analysis in conjunction with determining whether φ is from a source access system to a target access system handover. The optimization code can be combined with the implementation of inference and/or probability confirmation and/or statistically determined determination of the implementation of the basis for artificial intelligence. • The system (user device) 9 can additionally include a memory 910 operatively coupled to the processor 906 and storing information (eg, signal strength information, scheduling information, and the like for a base station), It can be combined with determining whether and when to request a delivery to use this information. The memory 910 can additionally store protocols associated with generating lookup tables and the like so that the system can increase the system capacity using stored protocols and/or algorithms. It should be understood that the data storage (e.g., memory) components described herein may be volatile or non-volatile memory, or may include both volatile and non-volatile memory. By way of illustration and not limitation, non-volatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or Flash memory. Volatile memory can include random access memory (RAM) that acts as external cache memory. By way of illustration and not limitation, RAM can be in many forms, such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM). ), Synchronized Link (Synchlink) DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). Memory 910 is intended to include, without being limited to, such and other suitable types of memory. Processor 906 is coupled to a symbol modulator 91 2 and a transmitter 914 that transmits the modulated signal. Figure 10 illustrates a system that can be employed in conjunction with receiving a handover indication and/or correspondingly transmitting data to an access terminal. System 1000 includes a base station 1002 having a receiver 1010 that receives signals from one or more user devices 1004 via one or more receive antennas 1006 and uses one or more through a plurality of transmit antennas 1008 The device 1004 transmits. In one example, a single set of antennas can be used to construct receive antenna 1006 and transmit antenna 1008. Receiver 1010 can receive information from receive antenna 1006 and can be associated in a operative manner with a demodulation transformer 1012 that receives information received by a demodulation. As will be appreciated by those skilled in the art, receiver 1010 can be, for example, a Rake receiver (e.g., using a plurality of fundamental frequency correlations 133629.doc -23-200939809 to separately process multipath signal components). The technology, a base KMMSEi receiver, or some other suitable receiver for separating the user equipment assigned thereto. For example, multiple receivers (e.g., one for each receive antenna) can be employed, and such receivers can communicate with each other to provide an improved estimate of the user's data. The demodulated symbols are analyzed by a processor 10U similar to the processor described above with reference to Figure 9' and coupled to a φ information stored with respect to the user device assignment, The memory 1016 of the lookup table and the like of the information. The receiver output of each antenna can be handled jointly by receiver 1010 and/or processor 1014. A modulator 1018 can multiplex the signal for transmission by a transmitter 1 〇 2 〇 through the transmit antenna 1008 to the user device 1004. As used herein, the terms "component", ", system" and the like are intended to mean a computer-related entity that can be a combination of hardware, hardware, and software, software, or software in execution. Or an electromechanical unit. For example, a component can be (but is not limited to, a processing program running on a processor, a processor, an object, an execution entity, an executable file, an execution thread, A program and/or a computer. By way of illustration, an application running on a computer and the computer can be a component. One or more components can reside in a processing program and/or execution thread. And a component can be localized on a computer and/or distributed between two or more computers. In this context, the word &quot;exemplary&quot; is used to mean serving as an example, example or Graphical description. The descriptions in this article for "exclusive" are not necessarily considered to be better or advantageous than other aspects or designs. Similarly, 133629.doc -24- 200939809 is only For clarity and understanding The examples are not intended to limit the described aspects or portions thereof in any way. It will be appreciated that numerous additional or alternative examples may be presented, but are omitted for the sake of brevity. Also, 'standard stylization and/ can be used. Or engineering techniques construct all or part of the described aspects as a method, apparatus, or article to make a soft body, a firmware, a hardware, or any combination thereof, to control the aspects disclosed by a computer implementation. For example, a computer readable medium can include, but is not limited to: magnetic

性儲存器件(例如,硬碟、軟碟、磁條)、光碟(例如,光 碟(CD)、數位多功能光碟(DVD) )、智慧卡、及快閃記憶 體器件(例如,卡、棒、鍵驅動器…)。另外,應瞭解,可 採用一載波來載送電腦可讀電子資料,例如彼等用於傳輸 及接收電子郵件之資料或用於存取一諸如網際網路或區域 網路(LAN)等網路之資料。當然,熟習此項技術者將認識 到’可對此組態做出許多修改,此並不背離所主張之標的 物之範疇或精神。 系統及/或方法係構建於軟體、 式碼或碼段中時,其可儲存於一 在本文中所描述之該等 韌體、中間體或微碼、程 諸如-儲存組件等機器可讀媒體H段可表示一程 序、-功能、-次程式、_程式、一常式、一次常式、一 模塊…㈣m或指令、資料結構或程式語句 之任-組合。-碼段可藉由傳遞及/或接收資訊、資料、 引數、參數或記憶體内容而麵合至另一碼段或一硬件電 :。資訊、引數、參數、資料等等可使用包含記憶體共 享、訊息傳遞、記號傳遞、網路傳輸等等在内之任一適宜 133629.doc •25· 200939809 之方法來傳遞、轉接或傳輪。 :於一軟體實施方案而言,可藉助實施本文中所描述之 ::之模組(例如,程序、功能等等)來構建本文中所描述 之技術。軟體碼可储存於記憶體單元中並由處理器執行。 -記憶體單元可構建於處理器内部或外部,在此情況下, 其可透過各種方法以通信方式耦合至該處理器。 ❹Storage devices (eg, hard drives, floppy disks, magnetic strips), optical discs (eg, compact discs (CDs), digital versatile discs (DVD)), smart cards, and flash memory devices (eg, cards, sticks, Key driver...). In addition, it should be understood that a carrier can be used to carry computer readable electronic data, such as data for transmitting and receiving electronic mail or for accessing a network such as the Internet or a local area network (LAN). Information. Of course, those skilled in the art will recognize that many modifications can be made to this configuration without departing from the scope or spirit of the claimed subject matter. When the system and/or method is constructed in a software, code or code segment, it can be stored in a machine readable medium such as the firmware, intermediate or microcode, such as a storage component described herein. The H segment can represent a program, a function, a subroutine, a _ program, a routine, a routine, a module, (4) m, or any combination of instructions, data structures, or program statements. The code segment can be combined to another code segment or a hardware device by transmitting and/or receiving information, data, arguments, parameters or memory contents: Information, arguments, parameters, data, etc. can be passed, transferred or transmitted using any suitable method including memory sharing, messaging, token passing, network transmission, etc., 133629.doc •25· 200939809 wheel. In the case of a software implementation, the techniques described herein can be constructed by implementing the modules (e.g., programs, functions, etc.) described herein. The software code can be stored in the memory unit and executed by the processor. The memory unit can be built inside or outside the processor, in which case it can be communicatively coupled to the processor by various methods. ❹

上述已描述的内容包含所主張之標的物之實例。當然, 不可能出於描述此標的物之目的而描述組件或方法之每一 種可構想之組合,但熟習此項技術者將認識到,許多進一 步組合及變換亦可行。因此。該標的物意欲囊括所有此等 屬於隨附申請專利範圍之精神及範缚内之變更、修改及變 化。此外,就術語&quot;包含(includes)&quot;用於本詳細描述或申請 專利範圍中而言,此術語之包含方式意欲與術語&quot;包括 (comprising)”在&quot;包括(comprising)&quot;在一請求項中用作一轉 折詞時所解釋之方式類似。 【圖式簡單說明】 圖1圖解說明一例示性系統間交遞控制組件,其經由一 來源存取系統藉助行動單元自該來源存取系統至—目柯存 取系統供應一通信層之隧穿。 圖2根據一進一步態樣圖解說明經由超級行動寬頻 (UMB)及高速率封包資料(HRPD)系統之L3隧穿之—特定交 遞。 圖3圖解說明經由HRPD-UMB系統之L3隧穿之_例示性 交遞。 133629.doc -26- 200939809 圖4根據一態樣圖解說明一自一來源存取系統至一目標 存取系統傳送一對話狀態之相關方法。 圖5根據—特定態樣圖解說明在使用者設備與來源/目標 存取系統之間供應一交遞之一分層配置。 圖6根據一例示性態樣圖解說明一呼叫流程。 圖7根據一態樣圖解說明一可在L3層中實施一交遞之系 統0What has been described above contains examples of claimed subject matter. Of course, it is not possible to describe every conceivable combination of components or methods for the purpose of describing the subject matter, but those skilled in the art will recognize that many further combinations and transformations are possible. therefore. It is intended that the subject matter of the subject matter of the invention is intended to cover all such modifications, modifications and changes In addition, the term &quot;includes&quot; is used in this detailed description or the scope of the patent application, and the term is included in the term &quot;comprising&quot; in &quot;comprising&quot; The manner in which a request item is used as a turning point is similar. [Schematic Description] FIG. 1 illustrates an exemplary intersystem handover control component that is stored from the source via a source access system via an action unit. The system-to-mesh access system supplies a communication layer tunneling. Figure 2 illustrates, according to a further aspect, L3 tunneling through a Super Mobile Broadband (UMB) and High Rate Packet Data (HRPD) system - specific intersection Figure 3 illustrates an exemplary handover of L3 tunneling via the HRPD-UMB system. 133629.doc -26- 200939809 Figure 4 illustrates a transmission from a source access system to a target access system according to an aspect. A method of relating to a conversation state. Figure 5 illustrates a hierarchical configuration of provisioning a handover between a user equipment and a source/target access system in accordance with a particular aspect. Illustrates a call flow of Figure 7 may be an embodiment of a post-based delivery system 0 in the L3 layer in accordance with an aspect of illustrating

圖8圖解說明一在在L3層中請求一交遞時促進向一存取 終端機傳輸資料之特定系統。 圖9圖解說明一可構建為在Μ層中之一交遞之前及之後 向一存取終端機傳輸資料之一部分之系統。 及/或相應地向 圖10圖解說明一可結合接收一交遞指示 一存取終端機傳輸資料採用之系統。 【主要元件符號說明】 100 網路系統 104 行動單元 110 來源存取系統 112 目標存取系統 115 系統間交遞控制組件 212 無線電存取網路RAN/RAN lite 214 交互工作安全門 215 HRPD目標存取系統 219 封包資料服務節點 211 存取終端機/行動單元 I33629.doc -27- 200939809 222 基地台 250 路徑線路 260 IPsec 隧道 210 UMB系統 217 存取閘道器 218 對話參考網路控制器Figure 8 illustrates a particular system that facilitates the transfer of data to an access terminal when a handover is requested in the L3 layer. Figure 9 illustrates a system that can be constructed to transmit a portion of data to an access terminal before and after one of the layers is handed over. And/or correspondingly illustrates to Fig. 10 a system that can be used in conjunction with receiving a handover indication to access data transmitted by the terminal. [Main component symbol description] 100 network system 104 mobile unit 110 source access system 112 target access system 115 inter-system handover control component 212 radio access network RAN/RAN lite 214 interworking security gate 215 HRPD target access system 219 Packet Data Service Node 211 Access Terminal/Action Unit I33629.doc -27- 200939809 222 Base Station 250 Path Line 260 IPsec Tunnel 210 UMB System 217 Access Gateway 218 Dialogue Reference Network Controller

310 HRPD 315 UMB系統310 HRPD 315 UMB System

316 UMB閘道器 312 UMB RAN-lite 325 UMB閘道器 510 使用者設備或存取終端機 511 目標系統協定 512 來源系統協定 540 來源存取系統 560 目標存取系統 602 存取終端機 604 來源存取系統 606 域名系統 608 交互工作安全閘道器 610 呼叫 702 扇區 714 存取點 704 扇區 133629.doc • 28- 200939809 716 存取點 708 扇區 720 存取點 711 目標存取系統 719 系統間交遞控制組件 721 來源存取系統 706 扇區 718 存取點 ❹ ❹ 712 扇區 724 存取點 710 扇區 722 存取點 726 無線終端機 800 特定系統 802 組件群組 804 用於自一個或多個存取系統接收資料之組件 806 用於接收一存取終端機正請求自一來源存取系 統至一目標存取系統之一交遞之一指示之組件 808 用於向目標存取終端機傳輸資料之組件 810 用於指示目標存取系統開始相對於自存取終 端機接收之資料形成接收器狀態訊息之組件 812 記憶體 9〇〇 系統 902 接收器 133629.doc -29- 200939809316 UMB Gateway 312 UMB RAN-lite 325 UMB Gateway 510 User Equipment or Access Terminal 511 Target System Protocol 512 Source System Protocol 540 Source Access System 560 Target Access System 602 Access Terminal 604 Source Storage Fetch system 606 Domain Name System 608 Interworking Security Gateway 610 Call 702 Sector 714 Access Point 704 Sector 133629.doc • 28- 200939809 716 Access Point 708 Sector 720 Access Point 711 Target Access System 719 Intersystem Handover Control Component 721 Source Access System 706 Sector 718 Access Point ❹ 712 Sector 724 Access Point 710 Sector 722 Access Point 726 Wireless Terminal 800 Specific System 802 Component Group 804 is used for one or more Component 806 for receiving data from the access system for receiving an access terminal requesting a component 808 from one source access system to one of the target access systems for transmission to the target access terminal The component 810 of the data is used to indicate that the target access system begins to form a receiver status message with respect to the data received by the self-access terminal. Component 812 Memory 9 System 902 Receiver 133629.doc -29- 200939809

904 906 908 910 912 914 1000 1002 1004 1006 1008 1010 1012 1014 1016 1018 1020 解調變器 處理器 最佳化組件 記憶體 符號調變器 傳輸器 系統 基地台 使用者器件 接收天線 傳輸天線 接收器 解調變器 處理器 記憶體 調變器 傳輸器 133629.doc -30-904 906 908 910 912 914 1000 1002 1004 1006 1008 1010 1012 1014 1016 1018 1020 Demodulation processor optimization component memory symbol modulator transmitter system base station user device receiving antenna transmission antenna receiver demodulation Processor memory modulator transmitter 133629.doc -30-

Claims (1)

200939809 十、申請專利範圍: 1. 一種在一來源存取系統與一目標存取系統之間對話交遞 之方法’其包括: 發現該目標存取系統之一位址用於自一與一來源存取 系統通信之存取終端機(AT)之隧穿; ' 隨穿一到達該目標存取系統之安全通道;及 自該來源存取系統經由該到達該目標存取系統之随穿 動作並透過該來源存取系統傳送使用者訊務。 © 2.如請求項1之方法,該隧穿動作進一步包括隧穿一到達 該目標存取系統之一安全閘道器之安全通道。 3. 如請求項1之方法,其進一步包括供應一單播存取終端 機識別符(UATI)以尋找一與該存取終端機相關聯之對 話。 4. 如請求項3之方法,其進一步包括經由該^八耵指向該目 心存取系統之一 RAN-lite,以促進建立一到達該目標存 ❹取系統之該RAN_iite之隧道。 5. 如請求項1之方法,其進一步包括當在來源無線電存取 系統中運作時監控該目標存取系統之一導頻。 • 6.如請求項1之方法,其進一步包括建立一自該ΛΤ至該來 源存取系統之隧道,其中該來源存取系統或該目標存取 系統可基於一 3GPP技術規範、一 3GPP2技術規範或一 IEEE技術規範中之至少一者運作。 7.如請求項丨之方法’其進一步包括在該AT與該目標存取 系統之間協商一對話以促進該AT之一通信對話自該來源 133629.doc 200939809 存取系統至該目標存取系統之交遞。 8. 9. 10. ❹ 11. 如請求項1之方法,其進一步包括自該目標存取系統接 收指示該AT正到達一涵蓋邊緣之廣告,並基於該接收動 作起始該隧穿。 如請求項2之方法,其進一步包括與一模組預先建立一 對話,該模組含有用於協商該目標存取系統之一對話之 協定0 如請求項1之方法,其進一步包括經由一内部技術交遞 介面向一真實RAN供應一交遞》 一種處理器,其中至少一該處理器經組態以供應對話交 遞’該至少一處理器包括: 一第一模組’其用於發現一目標存取系統之一位址用 於在一來源存取系統與一目標存取系統之間隧穿;及 一第二模組,其用於透過該來源存取系統自一Ατ至該 目標存取系統之一安全閘道器建立一安全隧道。 φ 12· 一種電腦程式產品,其包括: 一電腦可讀之下列碼,包括: 一第一組碼,其用於致使— 統之一安全閘道器之一位址以自 一第二組碼 電腦發現一目標存取系 —存取終端機隧穿;及 13. 女王閘道器之安全随道並將使 其上》 一種裝置,其包括: 其用於建立一到達該目標存取系統之 用者訊務重新定向至 目標存取系統相關聯之 發現構件’其用於發現與一 133629.doc 200939809 Nlite之一位址用於自一存取終端機隨穿; 傳輸構件,其用於在一異質來源存取系統與該目標存 取系統之間傳輸信號;及 用於透過該傳輸構件自-AT至該目標存取系統傳輸若 干封包之構件。 14· -種在—來源存取系統與—目標存取系統之間對話交遞 • 之方法,其包括: φ I現該目標存取系統之一位址用於自-存取終端機隨 穿; 隧穿—到達該目標存取系統之一安全閘道器之安全通 道;及 該目標存取系統經由該隧穿動作接收使用者訊務。 15.如請求項14之方法,其進一步包括藉由採用由該Ατ供應 之UATI透過該安全通道經由一„&gt;對話建立無線電存取對 話。 ❹ I6.如請求項14之方法,其進一步包括接收該目標存取系統 之一 RAN-lite之一指標並由此觸發一交遞。 17. 如請求項14之方法,其進一步包括當在來源無線電存取 系統中運作時監控目標存取系統之導頻。 18. 如請求項14之方法,其進一步包括自該Ατ至該目標存取 系統建立一隧道,其中該來源存取系統或該目標存取系 統可基於一 3GPP技術規範、一 3GPP2技術規範或一 IEEE 技術規範中之至少一者運作。 19. 如請求項14之方法’其進一步包括在該at與該目標存取 133629.doc 200939809 系統之間協商一對話以促進該AT之-通信對話自該來源 存取系統至該目標存取系統之交遞。 20. 如請求項14之方法,其進一#包括在觸發一預先確定之 事件時即►起始該目標存取系統之一交遞準備階段。 21. 如請求項14之方法,其進一步包括藉助該目標存取系統 ' 發送廣告。 22. 如吻求項14之方法,其進一步包括與該目標存取系統之 RAN_llte預先建立一對話以促進與該真實RAN之通 ^ 信。 23· —種處理器,其中至少一該處理器經組態以供應對話交 遞’該至少一處理器包括: 一第一模組,其用於發現一目標存取系統之一安全閘 道器之一位址;及 一第二模組,其用於經由一來源存取系統自一存取終 端機至該目標存取系統建立一隧道。 φ 24. —種電腦程式產品,其包括: 一電腦可讀之下列碼,包括: 一第一組碼’其用於致使一電腦發現一目標存取系 統之一安全閘道器之一位址;及 • 一第二組碼,其用於經由一來源存取系統自一存取 終端機至該目標存取系統之一 RAN_lite建立一隧道。 25. —種通信系統,其包括: 發現構件,其用於發現一目標存取系統之一位址用於 自一存取終端機随穿; 133629.doc 200939809 建立構件,其用於建立一透過一來源存取系統到達該 目標存取系統之一安全閘道器之安全通道;及 傳輸構件,其用於透過該安全通道傳輸信號。 26·如明求項25之通信系統,其進一步包括用於在一資料鏈 路層處隧穿至該存取終端機之構件。 27.如叫求項26之通尨系統’其進一步包括用於識別該目標 存取系統之一RAN-lite之構件。200939809 X. Patent application scope: 1. A method for dialogue delivery between a source access system and a target access system, which includes: discovering one address of the target access system for one source and one source Tunneling of an access terminal (AT) accessing system communication; 'a secure channel that arrives at the target access system as it passes through; and a follow-through action from the source access system to the target access system User services are transmitted through the source access system. © 2. The method of claim 1, the tunneling action further comprising tunneling a secure channel to a security gateway of the target access system. 3. The method of claim 1, further comprising supplying a unicast access terminal identifier (UATI) for a conversation associated with the access terminal. 4. The method of claim 3, further comprising directing to the RAN-lite of the one of the destination access systems via the octet to facilitate establishing a tunnel to the RAN_iite of the target storage system. 5. The method of claim 1, further comprising monitoring one of the pilots of the target access system when operating in the source radio access system. 6. The method of claim 1, further comprising establishing a tunnel from the source to the source access system, wherein the source access system or the target access system is based on a 3GPP technical specification, a 3GPP2 technical specification Or at least one of the IEEE specifications. 7. The method of claim </ RTI> further comprising: negotiating a dialog between the AT and the target access system to facilitate a communication session of the AT from the source 133629.doc 200939809 accessing the system to the target access system Handover. 8. The method of claim 1, further comprising receiving, from the target access system, an advertisement indicating that the AT is reaching a covered edge and initiating the tunneling based on the receiving action. The method of claim 2, further comprising pre-establishing a dialog with a module, the module including a method for negotiating a protocol 0 of the one of the target access systems, such as claim 1, further comprising an internal A technology delivery medium for a real RAN to provide a handover, wherein at least one of the processors is configured to supply a dialog handover. The at least one processor includes: a first module that is used to discover one One address of the target access system is used for tunneling between a source access system and a target access system; and a second module for accessing the target from the source to the target through the source access system Take a safety tunnel from one of the systems to establish a safe tunnel. Φ 12· A computer program product comprising: a computer readable code comprising: a first set of codes for causing one of the security gateways to address from a second set of codes The computer discovers a target access system - access terminal tunneling; and 13. the security of the queen gateway and will make it a device, comprising: it is used to establish a reach of the target access system The user traffic is redirected to the discovery component associated with the target access system 'it is used to discover one address with a 133629.doc 200939809 Nlite for use with an access terminal; the transmission component is used for A signal is transmitted between a heterogeneous source access system and the target access system; and means for transmitting a plurality of packets from the AT to the target access system through the transport component. 14. A method of interfacing between a source access system and a target access system, comprising: φ I presenting one of the target access systems for self-access terminal wear Tunneling - a secure channel to a security gateway of the target access system; and the target access system receives user traffic via the tunneling action. 15. The method of claim 14, further comprising establishing a radio access session via a secure channel via the secure channel by the UATI supplied by the Ατ. ❹ I6. The method of claim 14, further comprising Receiving one of the RAN-lite indicators of the target access system and thereby triggering a handover. 17. The method of claim 14, further comprising monitoring the target access system when operating in the source radio access system 18. The method of claim 14, further comprising establishing a tunnel from the Ατ to the target access system, wherein the source access system or the target access system is based on a 3GPP technical specification, a 3GPP2 technology A specification or at least one of the IEEE technical specifications operates. 19. The method of claim 14, which further comprises negotiating a dialogue between the at and the target access 133629.doc 200939809 system to facilitate the AT-communication Dialogue from the source access system to the target access system. 20. As in the method of claim 14, the further #includes when a predetermined event is triggered. 21. The handover preparation phase of one of the target access systems. 21. The method of claim 14, further comprising: transmitting an advertisement by means of the target access system. 22. a method of claim 14, further comprising the target The RAN_llte of the access system pre-establishes a dialog to facilitate communication with the real RAN. 23) A processor, wherein at least one of the processors is configured to provide a dialog handover. The at least one processor includes: a first module for discovering an address of one of the security gateways of a target access system; and a second module for accessing the terminal from an access terminal to the target via a source access system The access system establishes a tunnel. φ 24. A computer program product comprising: a computer readable code comprising: a first set of codes 'used to cause a computer to discover a secure one of the target access systems One address of the gateway; and a second set of codes for establishing a tunnel from an access terminal to one of the target access systems RAN_lite via a source access system. Package : a discovery component for discovering an address of a target access system for being accessed from an access terminal; 133629.doc 200939809 establishing a component for establishing a source access system to reach the target a secure channel for one of the security gateways of the system; and a transmission component for transmitting signals through the secure channel. 26. The communication system of claim 25, further comprising: for tunneling at a data link layer The component that is passed to the access terminal. 27. The overnight system of claim 26, which further includes means for identifying one of the target access systems, RAN-lite. 28_如請求項27之通信系統,其進—步 目標存取系統之對話交遞之構件。 包括用於準備一至該28_ The communication system of claim 27, which is a component of the conversational delivery of the target access system. Including for preparing one to the 133629.doc133629.doc
TW097133505A 2008-03-12 2008-09-01 Method and apparatus for handoff between source and target access systems TWI375477B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/047,234 US8289920B2 (en) 2007-03-16 2008-03-12 Method and apparatus for handoff between access systems
US12/143,044 US8576795B2 (en) 2007-03-16 2008-06-20 Method and apparatus for handoff between source and target access systems

Publications (2)

Publication Number Publication Date
TW200939809A true TW200939809A (en) 2009-09-16
TWI375477B TWI375477B (en) 2012-10-21

Family

ID=44867810

Family Applications (1)

Application Number Title Priority Date Filing Date
TW097133505A TWI375477B (en) 2008-03-12 2008-09-01 Method and apparatus for handoff between source and target access systems

Country Status (1)

Country Link
TW (1) TWI375477B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI458368B (en) * 2011-08-10 2014-10-21 Htc Corp Mobile communication devices and methods for handing over between multiple heterogeneous networks

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI458368B (en) * 2011-08-10 2014-10-21 Htc Corp Mobile communication devices and methods for handing over between multiple heterogeneous networks

Also Published As

Publication number Publication date
TWI375477B (en) 2012-10-21

Similar Documents

Publication Publication Date Title
KR101249377B1 (en) Methods, apparatuses and computer program products for inter-system handoff implementing tunneling between source and target access systems
KR101213545B1 (en) Method and apparatus for handoff between access systems
TWI730059B (en) Quality of service (qos) management in wireless networks
US8165088B2 (en) MIH protocol state machine
US20120230293A1 (en) Method of performing an inter-technology handoff in a loosely coupled architecture
KR20040075962A (en) Internet protocol based wireless communication arrangements
TW200901797A (en) Method and apparatus for transfer of session reference network controller
US7917142B2 (en) Comprehensive registration method for wireless communication system
TW200939809A (en) Method and apparatus for handoff between source and target access systems