Patent application number | Description | Published |
20090135795 | FEMTOCELL ARCHITECTURE IN SUPPORT OF VOICE AND DATA COMMUNICATIONS - Methods and systems for providing voice and date services in a femtocell wireless network. The proposed approach integrates IWLAN architecture into femtocell architecture by introducing a gateway to serve both IWLAN and femtocell users. The proposed approach handles the voice and data in a different way so that it enhances the data handling efficiency while re-using existing MSC investment. The proposed approach carries the data traffic from a femtocell base station to the gateway in native IP packet, instead of encapsulating them in 3G data, thus enhancing the efficiency and performance for the data traffic. The data traffic can then be sent to GGSN or directly to packet data network. The approach tunnels voice traffic to MSC through the gateway as in conventional Iu-CS approach. | 05-28-2009 |
20100027533 | METHOD AND SYSTEM FOR BYPASSING 3GPP PACKET SWITCHED CORE NETWORK WHEN ACCESSING INTERNET FROM 3GPP UES USING 3GPP RADIO ACCESS NETWORK - Techniques for bypassing a packet core network for Internet bound traffic from user equipment (UE) via a RAN are described herein. According to one embodiment, it is determined whether a packet of data is destined for the Internet, in response to receiving the packet from a radio network controller (RNC) of a radio access network (RAN). The packet is originated from user equipment (UE) over the RAN. The packet is routed directly to the Internet without sending the packet to an SGSN (serving GPRS support node) of a packet core network, if the packet is destined to the Internet. Other methods and apparatuses are also described. | 02-04-2010 |
20100077102 | METHOD AND SYSTEM FOR BYPASSING 3GPP PACKET SWITCHED CORE NETWORK WHEN ACCESSING INTERNET FROM 3GPP UES USING IP-BTS, FEMTO CELL, OR LTE ACCESS NETWORK - A type of network traffic associated with a packet received from a remote node of an access network is determined. A first interface logic routes the packet to a radio network controller (RNC) if the packet is received from an Internet protocol-basestation (IP-BTS) access network and destined to a packet core network. The RNC forwards the packet to a component of the packet core network. A second interface logic routes the packet to the component of the packet core network, including aggregating other packets of the same type received from other remote nodes, if the packet is received from a femto cell and destined to the packet core network. A breakout logic routes the packet to a destination of the Internet directly to enable the packet to reach the Internet without having to route the packet to the component of the packet core network, if the packet is destined to the Internet. | 03-25-2010 |
20100097981 | METHODS AND SYSTEMS FOR PROVIDING MULTIPLE MEDIA STREAMS IN A HYBRID WIRELESS NETWORK - A hybrid cellular and IWLAN network having an access gateway providing a user with simultaneous access to GGSN base packet data services and PDG based broadband multi-media services with one IP address. The system further comprises an authentication center retrieving the user's subscription profile information from an operator network to check the user's subscription to simultaneous GGSN and PDG services, wherein said access gateway multiplexes and de-multiplexes the service sessions without any change to said user. | 04-22-2010 |
20110075659 | METHOD AND SYSTEM FOR INSERTING A NEW NODE INTO A COMMUNICATIONS PATH BETWEEN TWO EXISTING NODES WITHOUT DISRUPTION - Techniques for inserting a new node into a communications path of existing nodes of a 3GPP network are described herein. According to one embodiment, state information is captured within a transport protocol layer of a first node. The state information pertains to an existing communications session between a second node and a third node, while the first node routing packets exchanged between the second and third nodes via the existing communications session. The transport protocol layer of the first node is then configured using the captured state information to enable the transport protocol layer of the first node to independently communicate with a transport protocol layer of the second node and the third node respectively without terminating the existing communications session. | 03-31-2011 |
20110116499 | METHOD AND SYSTEM FOR SELECTIVELY BYPASSING PACKET CORE NETWORK WITHIN A SESSION BASED ON TRAFFIC TYPE - According to one aspect of the invention, packets of a first type within a first data flow are routed to a destination through a packet core network. In response to a detection that packets of a second type are to be routed while routing the first data flow, a second data flow is created which is a sub-flow of the first data flow. Packets of the second type are routed via the second data flow to the destination without traversing the packet core network, while packets of the first type are routed via the first data flow traversing the packet core network. | 05-19-2011 |
20110208959 | METHOD AND SYSTEM FOR REDUCING PACKET OVERHEAD FOR AN LTE ARCHITECTURE WHILE SECURING TRAFFIC IN AN UNSECURED ENVIRONMENT - A first packet is received at a network element from an E-UTRAN Node B (eNB) of an E-UTRAN access network via a secured communications tunnel of a secured connection, where the first packet encapsulates a second packet therein. It is determined whether the network element serves both a security gateway functionality and a serving gateway functionality of a core packet network based on the first packet and the second packet. The network element negotiates with the eNB to switch further communications from a tunnel mode to a transport mode of the secured connection if it is determined that the network element serves both the security gateway functionality and the serving gateway functionality. Thereafter, the network element exchanges further packets with the eNB via the transport mode of the secured connection after the eNB switches from the tunnel mode to the transport mode. | 08-25-2011 |
20120008578 | METHOD AND SYSTEM FOR INTERWORKING A WLAN INTO A WWAN FOR SESSION AND MOBILITY MANAGEMENT - According to one aspect, a mobility gateway device (MGW) receives a request from a wireless local area network (WLAN) controller of a WLAN for accessing the Internet or a packet core network, where the request is originated from a user equipment communicatively coupled to the WLAN. In response to the request, the MGW is configured to determine whether there is an active session associated with the UE over a wireless wide area network (WWAN). If so, the MGW assigns an IP address to the UE that was assigned to the UE during the active session of the WWAN. The assigned IP address is used by the UE to access the Internet or the packet core network over the WLAN. | 01-12-2012 |
20130017831 | FEMTOCELL Architecture In Support Of Voice And Data Communications - Methods and systems for providing voice and date services in a femtocell wireless network. The proposed approach integrates IWLAN architecture into femtocell architecture by introducing a gateway to serve both IWLAN and femtocell users. The proposed approach handles the voice and data in a different way so that it enhances the data handling efficiency while re-using existing MSC investment. The proposed approach carries the data traffic from a femtocell base station to the gateway in native IP packet, instead of encapsulating them in 3G data, thus enhancing the efficiency and performance for the data traffic. The data traffic can then be sent to GGSN or directly to packet data network. The approach tunnels voice traffic to MSC through the gateway as in conventional Iu-CS approach. | 01-17-2013 |
20130021972 | METHOD AND SYSTEM FOR OPTIMIZED HANDLING OF CONTEXT USING HIERARCHICAL GROUPING (FOR MACHINE TYPE COMMUNICATIONS) - A hierarchical data structure for signaling and data handling at a packet core network is defined. A hierarchical data structure is applied to both persistent and dynamic information to support a type of devices that share the same characteristics. Subscription database, context information, and policy rule information is comprised of group level information and device level information. Group level information contains the information the devices that belong to the group share. Device level information contains the device specific information that is different from group level information. When a device belonging to a group requests access to a packet network or performs a procedure that changes the mobility or session state of the device, context management unit works with authentication unit, subscription database unit, and policy decision unit to construct a right information for the device to handle the control and user data traffic. | 01-24-2013 |
20140029519 | Wireless Architecture in Support of Voice and Data Communications - A wireless access network including a wireless base station configured to, for Iu-CS voice traffic, act as a network controller, by, terminating Iu-b signals from user equipment, and relaying the voice traffic over Iu-CS via an IP sec tunnel. And for data traffic, wireless base station is configured to act as the network controller, by, terminating Iu-b signals from the user equipment, striping IP payload, and sending the data traffic inside IPsec. Further, the wireless access network includes a wireless gateway configured to act as a security gateway for Iu-CS voice traffic, by, establishing the IP sec tunnel with the femtocell base station without the support of a GPRS Tunneling Protocol (GTP) as defined over Iu-PS. Also receiving and forwarding the tunneled Iu-CS voice traffic to a mobile switching center, and for data traffic, encapsulate the IP payload and send it via Gn to GGSN. | 01-30-2014 |
20140056132 | METHOD AND SYSTEM FOR SIGNALING SAVING ON RADIO ACCESS NETWORKS USING EARLY THROTTLING MECHANISM FOR COMMUNICATION DEVICES - An intelligent system and a method in a packet network to utilize the radio network resource and the core network resource in an optimized way so that more high priority, critical devices are granted access to the network while throttling the low priority, non-critical devices with the same given resource. The system collects all the necessary information from the signaling exchange between the radio access network and the core network and takes the device subscription characteristics and statically or dynamically defined throttling behavior rules into consideration to choose the optimal behavior to handle the requests from devices at any given time including deciding to reject the requests for certain types of devices under certain network conditions while granting the requests for other types of devices. This early throttling mechanism effectively increases the network resources, especially radio access network resources for high priority devices so that the quality of service does not change for those high priority devices even under network congestion condition. | 02-27-2014 |
20140078988 | METHOD AND SYSTEM FOR ELASTIC AND RESILIENT 3G/4G MOBILE PACKET NETWORKING FOR SUBSCRIBER DATA FLOW USING VIRTUALIZED SWITCHING AND FORWARDING - A system and method in a packet network for optimally separating control and data in the context of mobile networking. The embodiments disclosed herein utilize virtualization and elastic computing in the context of a control plane while the user plane flexibility is realized by application programming interfaces (APIs) between a control and user plane. The control plane is configured to receive a notification that a mobile device is done sending or receiving a communication; store in a flow table flow information associated with the communication; receive a trigger for resumption of flow when the communication is to be resumed; and pass the flow information to a cache in a data plane. | 03-20-2014 |
20140349611 | Method and System for Selective and Secure interaction of BYOD (Bring Your Own Device) with Enterprise network through mobile wireless networks - A mechanism to allow provisioning and use of BYOD (Bring Your Own Device) for authorized access in the enterprise network through a 3G/4G/Wi-Fi access network is provided. A brokering entity in the mobile packet core is provisioned for each authorized employee with enterprise specific rules for security and steering of user traffic. An Enterprise Container is defined as entity on the User Equipment that is self-contained virtual machine with enterprise sanctioned applications. An intelligent mechanism for and steering of signaling and traffic from such BYOD devices to the brokering entity is defined. At any time by using the personal container or the default behavior of the user equipment the user can get mobile service as if the Enterprise Container did not exist. Further, when such employment relationship is terminated the user's BYOD needs to be restored to its pre-employment functionality. | 11-27-2014 |