Providing multiple service levels for wireless communication

FIELD: information technology.

SUBSTANCE: local access is granted through one or more nodes (for example, a local access point and/or a local gateway) in a wireless network in order to simplify access to one or more local services. In connection with local access, multiple IP points of presence, associated with different service levels, may be provided for the access point. For example, one point of presence can relate to a local service and the other point of presence can relate to a service in a backbone network. The IP point of presence can be identified for a radio interface packet in order to indicate the end point for the packet.

EFFECT: high efficiency.

29 cl, 27 dwg

 

This application claims the benefit and priority under common property of the provisional application for U.S. patent No. 61/036037 filed March 12, 2008 case number attorney in the United States 081105P1; provisional application for U.S. patent No. 61/091675, filed August 25, 2008 case number attorney in the United States 082459P1; and provisional application for U.S. patent No. 61/115430, filed November 17, 2008 case number attorney in the United States 090515P1, the disclosure of each of which is contained by reference in this document.

The LEVEL of TECHNOLOGY

The technical field to which the invention relates.

This application in General relates to wireless communications, and more particularly, but not exclusively, to improving performance connection.

Introduction

Wireless communication systems are widely deployed to provide various types of communication (e.g. speech, data, multimedia services etc) to multiple users. As the demand for high speed services and transmission of multimedia data is rapidly growing, there is a tough task to implement an efficient and fault-tolerant communication systems with increased performance.

To complement the access point traditional mobile telephone network, the access point with a small coating can be deployed (for example, to set the user who's home) to provide a more fault-tolerant internal coating for wireless communication of the mobile modules. Such access points with a small coating commonly known as a base station, access point, owned by the node B or femtocells. Typically, these access points with a small floor connect to the Internet and mobile network operator via a DSL router or cable modem.

In some wireless architectures, the access point is a device level 2, which does not process the packets of the Internet Protocol (IP)routed to or from the access terminal. For example, in the return line connection, the access point can receive packets from the access terminal and to forward the packets to the network via a Protocol tunnel. On the contrary, in a direct line connection, the access point can receive packets from the network via a Protocol tunnel to forward packets to the access terminal associated with this Protocol tunnel. Therefore, the endpoint for the Protocol of the tunnel may be a router of the first jump (or host behind the router first jump). Essentially any packet from the access terminal must pass through this route before it is forwarded to the destination. Similarly, any packet destined for the access terminal should be routed through the device konecne the th point of the tunnel. When the router first jump is relatively far from the access terminal, however, suboptimal routing can occur. In addition, the access terminal may not be able to access local services, because services can be invisible to the router first jump (for example, due to the firewall in the router associated with local services. Thus, there is a need to improve resource management for wireless networks.

The INVENTION

The essence of the exemplary aspects of the disclosure are described below. It should be understood that references to the term "aspects" in this document may refer to one or more aspects of the disclosure entity.

This disclosure entity relates in some aspect to providing local access to facilitate access to one or more local services. For example, local access can be provided through a local access point and/or the local gateway, in order to allow the access terminal to access one or more services that you can access through a local access point and/or a local gateway.

This disclosure entity relates in some aspect to providing more IP points presets the via (for example, connection points) for the access terminal. Here each point of presence may correspond to a different service (for example, different service levels). For example, one point of presence may relate to local service, the other point of presence may relate to the service in the core network. Thus, in some aspects, the level of service may relate to a target node of the packet network. In some aspects, the access terminal uses multiple IP points of presence to access services through the associated access point, the access terminal and the access point to communicate over a single radio interface.

This disclosure entity relates in some aspect to upload the package in a way that indicates the level of service associated with the service. Thus, the node that sends the packet over the air interface, you may specify the endpoint for the service. In some aspects, the service level may indicate that, whether or not the package is sent via a Protocol tunnel, and/or to indicate the endpoint Protocol tunnel, which is used to route the packet. As an example, the access terminal may identify the service level package by specifying a specific thread on which the package should the n go, or by sending a corresponding identifier with the package (for example, in the header). The access point that receives the package interface of the access terminal can then determine how to send the package (for example, to define, or not to send the packet through the tunnel, and/or to determine the end point), based on the identified level of service.

This disclosure entity relates in some aspect to providing different functionality, mobility management and/or functionality of session management in different nodes in the system, whereby the management of mobility and/or sessions for this host can be provided through different sites for different traffic. For example, a network node can provide a mobility management and/or sessions associated with traffic in the core network, the local node can provide a mobility management and/or sessions associated with local traffic on the local node.

This disclosure entity relates in some aspect to the access terminal that supports multiple instances not associated with granting access level (NAS) for setting access to different services (for example, local IP access in relation to IP network access). For example, one or b is more NAS instances can be configured to communicate with the Manager of the local mobility (for example, which handles local mobility management and session)to facilitate access to local services, with one or more other NAS instances can be configured to communicate with a mobility Manager in the network (for example, which handles the mobility management and session in the core network)to facilitate access to services in the backbone network.

This disclosure entity relates in some aspect to providing various types of search calls for different types of traffic. For example, the search calls for local traffic can be controlled by a Manager of a local mobility, while search calls for network traffic can be controlled by the mobility Manager in the network.

This disclosure entity relates in some aspect to the transfer of messages, typically associated with one Protocol (for example, S11), another Protocol (for example, S1). For example, messages S11-Protocol relating to the establishment of unidirectional channels that are sent between the serving gateway and the mobility Manager may be transferred between the mobility Manager and the access point, which is jointly hosted with the service gateway.

BRIEF DESCRIPTION of DRAWINGS

These and other exemplary aspects of the disclosure are described in the detailed description and religeos claims, below and on the attached drawings, on which:

Figure 1 is a simplified block diagram of several sample aspects of a wireless communication system which has a capability to provide local access;

Figure 2 is a flowchart of the sequence of operations of way of several exemplary aspects of operations that may be performed in connection with the provision of multiple points of presence;

3 is a flowchart of the sequence of operations of way of several exemplary aspects of operations that may be performed in connection with the identification of points of presence for radiointerface package.

4 is a flowchart of the sequence of operations of way of several exemplary aspects of operations that may be performed in connection with determining the service level for radiointerface package.

5 is a flowchart of the sequence of operations of way of several exemplary aspects of operations that may be performed in connection with providing the functionality of a distributed regulatory control;

6 is a simplified block diagram of several sample aspects of components of wireless nodes that can be used in connection with the provision of local access;

7 is a simplified block diagram of several sample is of specto wireless communication systems, made with the ability to provide local access;

Fig is a simplified diagram of an exemplary Protocol stack for the control plane;

Figure 9 is a simplified diagram of an exemplary Protocol stack plane data;

Figure 10 is a simplified diagram illustrating an exemplary sequence of processing operations of the merger;

11 is a simplified diagram illustrating an exemplary sequence of processing operations initiated requests for services;

Fig is a simplified diagram illustrating an exemplary sequence of processing operations initiated requests for services;

Fig is a simplified block diagram of several sample aspects of a wireless communication system which has a capability to provide local access;

Fig is a simplified diagram illustrating an exemplary sequence of processing operations of the merger;

Fig is a simplified diagram illustrating an exemplary sequence of processing operations of accession, in which messages that are associated with one Protocol, transferred to another Protocol;

Fig is a simplified block diagram of several sample aspects of a wireless communication system which has a capability to provide local is access;

Figa and 17B are simplified block diagrams of several sample aspects of a wireless communication system using multiple keys in order to support multiple communication lines for local access;

Figa and 18B are simplified block diagrams of several sample aspects of a wireless communication system that uses one key to support multiple communication lines for local access;

Fig is a simplified diagram illustrating the coverage area for wireless communication;

Fig is a simplified diagram of a wireless communication system;

Fig is a simplified diagram of a wireless communication system, comprising famously;

Fig is a simplified block diagram of several sample aspects of components of communication; and

Fig-25 are simplified block diagrams of several sample aspects of the devices, with the ability to facilitate local access, covered in this document.

In accordance with established practice, the various signs, illustrated in the drawings may not be drawn to scale. Accordingly, the dimensions of the various features may be arbitrarily increased or reduced for clarity. In addition, some of the drawings may be simplified for clarity. Thus, the drawings may not illustratative components of this device (for example, device or method. Finally, similar reference numbers may be used to designate similar signs throughout the detailed description and drawings.

DETAILED description of the INVENTION

Various aspects of the disclosure are described below. It should be obvious that the ideas in this document can be implemented in many forms and that any specific structure, function, or both, disclosed herein are merely typical. Based on the ideas in this document are specialists in this field of technology should take into account that aspect, disclosed herein, can be implemented independently of any other aspects, and that two or more of these aspects can be combined in various ways. For example, the device may be implemented or a method can be used in practice by using any number of the aspects outlined in this document. In addition, such a device may be implemented or a method can be used in practice by using other structure, functionality, or structure and functionality in addition to or other than one or more aspects set forth herein. In addition, aspect can contain at least one element of the claims.

Figure 1 illustrates several nodes of the exemplary communication system 100 (for example, part of the network). To illustrate various aspects of the disclosure are described in the context of one or more access terminals, access points, gateways and network nodes that communicate with each other. You should note however that the ideas in this document may be applicable to other types of devices or other similar devices, which are referred to using other terms. For example, in various implementations access points may be referred to or implemented as base stations, access terminals may be referred to or implemented as a subscriber unit, etc.

The system 100 includes access points that provide one or more services (e.g., network connectivity) for one or more access terminals that can be accommodated within, or which can move across the associated geographic area. To reduce the complexity of Figure 1 shows only a single point 102 access and a separate terminal 104 access. Each of the access points in the system 100 may communicate with one or more network nodes (for example, router 106 of the first jump and other network nodes 108)to facilitate connectivity to the WAN. These network nodes can is to take a variety of forms, such as, for example, one or more radio and/or objects of the underlying network (for example, mobility management, session reference network controllers, gateways, routers, or some other suitable network object or objects), one or more nodes corresponding etc.

The system 100 includes various components that provide access to various services (for example, different levels of service). In particular, system 100 includes one or more nodes (for example, the local router 110 and the gateway 112), which provide local access to one or more local services (for example, the guest network). For example, the local router 110 may provide an opportunity to the terminal 104 access to access one or more local services 114. Similarly, the gateway 112 (for example, the boundary gateway) may provide an opportunity to the terminal 104 access to access one or more local services 116.

These local services can take different forms. For example, in some implementations, the local service 114 can refer to the services provided through local network (for example, through various objects in the same IP subnet managed by the local router 110). Such local network services may contain, e.g. the, access to the local printer, local server, or some other object. In some implementations, the local service 114 may include an Internet connection. For example, the local router 110 may provide an opportunity to the terminal 104 access to access the Internet connection provided by a commercial Internet service providers (ISP) in a specific location (for example, the home user, access point Internet, etc). In some implementations, the local service 116 may relate to network-related services that are local in nature. For example, local service 116 may refer to information location (for example, position), which terminal 104 access can be used to obtain other services.

To facilitate local access, multiple IP points of presence (POPs) are provided for the terminal 104 access. In connection with each point of presence terminal 104 provides access to the appropriate IP interface associated with the IP address)associated with the corresponding service level. Thus, the terminal 104 may use the first IP address to access the first level of service (for example, network service), and to use the second IP address to access the second level of the services (for example, local service). For example, one or more network points of presence 118 can be configured to allow the terminal 104 access to communicate with the router 106 of the first jump (for example, gateway core network)to get the service through the underlying network (for example, from their own network). In addition, one or more network 120 points of presence can be set to allow the terminal 104 access to communicate with the local object, to access local services. For example, the terminal 104 may use the point 120A presence, to access a local service 114, and the terminal 104 may use the point 120B presence, to access a local service 116.

Approximate associated with a local access operation is next explained in detail in connection with the flowchart of the operational sequence of the method Figure 2-5. For convenience of operation Figure 2-5 (or any other operations illustrated or described in this document) can be described as performed by specific components (for example, components of the system 100 and/or system 600, as illustrated in Fig.6). You should note however, that these operations can be performed by other types of components and may be ispolneny using a different number of components. You should also take into account that one or more of the operations described in this document may not be used in this implementation.

Referring initially to Figure 2, we see that describes several operations relating to the provision of multiple points of presence in connection with local access. Steps 202 and 204 are providing points of presence for terminal 104 access. The point of presence may relate to various parameters in different implementations. For example, in some implementations (for example, the implementation based on LTE), each point of presence may relate to different time access point name (APN)associated with the service unidirectional channel. Thus, the first level of service (for example, local service) can be associated with one identifier APN, with a different level of service (for example, service in the core network) may be associated with another identifier APN. In some implementations (for example, implementation-based UMB), each point of presence may relate to various LinkID. Thus, the first level of service can be associated with one LinkID, with a different level of service can be associated with other LinkID.

As represented by step 202, the first point of presence is available for local and the Luga. Here the point 102 of the access (for example, in conjunction with the local router 110 may assign an IP address to the terminal 104 of access that should be used in connection with the routing of local traffic to/from the terminal 104 to access. For example, one IP address may be assigned to provide access to the local service 114 through the local router 110. Alternative or in addition, the IP address may be assigned to provide access to the local service 116 via the gateway 112. Point 102 can access thereby to use the local IP address to route packets between the terminal 104 and access the object that provides local service.

As represented by step 204, the second point of presence is available for network services. In this case, the network (for example, router 106 of the first jump), you can specify the IP address of the terminal 104 of access that should be used in connection with network traffic routing in/and/of the terminal 104 access. Point 102 access can thus use this IP address to route packets between the terminal 104 and access the object that provides the network service.

Steps 206-212 relate to operations that may be used in implementations in which the functionality of regulatory control is distributed. In particular, how young is it described in connection with Fig.7, in some implementations, the functionality of regulatory control for the access terminal may be provided through various objects. For example, the functionality of the mobility management regarding local services may be provided by the Manager of the local mobility (not shown in figure 1). On the contrary, the functionality of the mobility management related to network services can be provided through a network object mobility management (not shown in Fig.1).

As represented by step 206, Manager local management may establish one or more threads and to provide other functionality for session management for local traffic. For example, a local object mobility management (MME) may establish one or more unidirectional channels, in order to allow the terminal 104 access to communicate with the provider of local services. With this purpose, the local MME may control the establishment of a unidirectional channel, quality of service (QoS) and IP addresses for local services.

As represented by step 208, the control Manager network can also install one or more threads and to provide other functionality for session management for network traffic. For example, the network volume is t mobility management (MME) may establish one or more unidirectional channels, in order to allow the terminal 104 access to communicate with the network provider. To this end network MME may control the establishment of a unidirectional channel, quality of service (QoS) and IP addresses for services in the backbone network.

As represented by step 210, the Manager of the local control can also control the search calls and provide other functionality mobility management for local traffic. For example, when local traffic is accepted (for example, at point 102 access) from a provider of local services, local object mobility management (MME) may instruct the point 102 access to carry out search engine call terminal 104 of the access, if the terminal 104 access is currently in standby mode (for example, in the mode with the lowest power level). Here because the traffic is associated with a local service, local MME initiates a search calls only point 102 access (in contrast with all other neighboring access points).

As represented by step 212, the control Manager network can control the search calls and provide other functionality of the mobility management network traffic. For example, when network traffic is allowed (for example, router 106 of the first lane is Lope), network object mobility management (MME) may instruct the terminal 104 access be caused by prospecting calls, if the terminal 104 access is currently in standby mode. Here, since the received traffic may be normal network traffic, network MME initiates a search calls according to the standard net search calls. For example, the terminal 104 access may be called by the search calls by all access points associated with one or more zones of tracking one or more zones, etc, or terminal 104 access may be called by the search calls based on the rules of search calls based on distance or other types of rules of search calls.

Referring now to Figure 3 and 4, we see that describes several operations relating to the identification of points of presence in connection with local access. These operations can be used, for example, in order to effectively identify the endpoint package, which moves over the air interface between the access terminal and the access point. For example, it may be impractical or impossible for the access point that receives the tunneled packet from the access terminal, to determine the IP destination of the packet. Therefore, several technologies opisyvayut is for efficient routing of such a package.

Figure 3 describes these operations at a relatively high level. As represented via step 302 in Figure 3, initially, a node can identify the point of presence for radiointerface package to specify the target node of the hierarchical tunnel for the package. The node may then send a packet based on the identified point of presence (stage 304). As described in more detail in figure 4, these high-level operations can be performed in the access terminal and the access point. For example, the access terminal may determine a point of presence for a package to be sent, then send the packet over the radio interface on the basis of this definition. On the contrary, the access point may determine the point of presence for the packet received by the radio interface, then forward the packet based on the identified point of presence.

Referring now to Figure 4, we see that as represented by steps 402 and 404, different IP point of presence can be provided for the access terminal to enable the access terminal to access different levels of service. Each service level can identify different target node in the network for packets. In other words, the service level may indicate where the packet from the access terminal should remain in the network for Example, the service level can indicate whether or not the packets to be tunneled (for example, local service level may indicate that there is no tunnel, with the level of service of the underlying network may indicate that there is a tunnel). As another example, the service level may indicate that the packet should be sent through the tunnel that terminates on the guest network and/or in a Central routing system. As still another example, the service level may indicate that the packet should be sent through the tunnel, which terminates in a private network and/or gateway core network. You should take into account that the level of service can be specified in various ways (for example, by number, text, ASCII and so on).

As represented by step 406, when the access terminal needs to send a packet over the air interface to the access point, the access terminal may identify a point of presence for this traffic. As explained above, in some aspects, the point of presence may relate to different levels of service (for example, local traffic or network traffic). In some aspects, the point of presence is a sign of PSN-gateway endpoint of the tunnel. Thus, in some aspects, the point of presence may serve to tells the depth within the network this endpoint (for example, which can be in your own network or guest network).

In some implementations, different levels of service can be associated with different streams (for example, associated with different quality of service). For example, the first level of service can be associated with the first set of one or more threads, the second level of service can be associated with a second set of one or more threads. Thus, the operation of step 406 may contain the identification of the particular thread, which radiointerface package should be sent (for example, through the identification of flow from the corresponding set) for a given level of service. Such flows can take different forms in different implementations. For example, in implementations based on LTE different sets of threads can belong to different sets of unidirectional radio data (DRB).

In some implementations, different levels of service can be identified with a unique identifier that is associated with the service levels. For example, this identifier can be sent with the packet when it is transmitted on air. Accordingly, in this case, the operation of step 402 may comprise a definition of ID, ACC is chiromassage with the level of service for the package, which should be sent over the radio interface.

As shown by step 408, the access terminal then sends the traffic that indicates the level of service. As explained above, in some implementations it may contain the packet to the radio through the appropriate thread. On the contrary, in other implementations it may contain the sending of the corresponding identifier with the package. In some implementations, the identifier can be sent over the packet header. For example, a special packet header, which includes the identifier may be inserted between the IP packet header and the header radiointerface package (for example, RLP-header) for the package.

As represented by step 410, the access point must then make a package on air. As shown by step 412, the access point can then determine the level of service for the package. For example, the access point can identify the level of service by defining a flow in which the packet is sent, or by reading the identifier that is sent with the package.

As represented by step 414, the access point determines how to send a packet based on a defined level of service. On the basis of the level of service, access point the PA can determine the target node (for example, endpoint for the packet in the network. For example, as mentioned above, the service level may indicate, should or should not be tunneled packet. If the packet should be tunneled, the service level may indicate where the tunnel terminates (for example, a guest network, edge gateway, a private network, the gateway core network). In other words, in some aspects, the endpoint for the packet may correspond to a leaf node of the hierarchical tunnel through which the packet is sent from the access terminal to another node (for example, router 106 of the first jump or provider of local services Figure 1). Therefore, the packet may be routed to the designated end point (for example, associated with a network service or local service) is a relatively efficient way.

Referring now to Figure 5, we see that describes several operations related to the use of distributed MME. Steps 502 and 504 relate to operations that may be performed in implementations in which some functionality MME for terminal access is available in one site, while another MME functionality for terminal access is available in the other node.

As shown by step 502, the first MME may be provided in the first node (for example, the local node). For example, as more op the Sano in connection with Fig.7 below, the functionality of the local MME may be implemented in the access point. The local MME may provide, for example, management unidirectional channels and search calls and other mobility management and session for local access traffic that flows in/and/of the access terminal.

As shown by step 504, the second MME may be provided in the other node in the system. For example, the functionality MME core network can be implemented in the node in the underlying network. This network MME may provide, for example, management unidirectional channels and search calls and other mobility management and session traffic in the core network, which runs in/and/of the access terminal.

Steps 506 and 508 are operations that can be performed in connection with the support for multiple instances of transfer of control of the service signals, to simplify access to various services. For example, the access terminal may support multiple NAS instances to communicate with different MME in different nodes.

As represented by step 506, the access terminal communicates with the first MME through the first transmitting control service signals (for example, traffic to the control plane, which terminated in MME). For example, the access terminal may maintain the first NAS eczema is FLNR to communicate with the local MME, to facilitate access to one or more local services.

As represented by step 508, the access terminal communicates with the second MME through the second transmitting control service signals. For example, the access terminal may maintain the second NAS instance to communicate with the network MME, to facilitate access to one or more network services.

In some aspects, the transmission NAS signals is used for mobility management and session management. For example, the mobility management may include management of mobility and management of search calls for terminal access. In addition, the session management may include management establishing a unidirectional channel, QoS and different IP addresses for the access terminal. Here, the transmission NAS signals refers to the exchange of messages in the control plane between the access terminal and the control Manager (for example, MME) and differs from that associated with the provision of level access (AS) between the access terminal and the associated access point that controls a radio access (for example, sets the route for transmission service NAS-signals-way radio service). You should also take into account that the transfer service NAS signals for all NAS instances, it may be routed che is ez identical (i.e. total) air interface between the access terminal and the associated access point.

As represented by step 510, the access terminal may then access the first service and the second service through a common interface. Here the access to the first service provided by the first NAS instance, and access to the second service provided by the second NAS instance.

6 illustrates several components that may be used in the nodes, such as point 602 of the access terminal 604 of access to grant associated with local access functionality, as discussed in this document. You should take into account that the described components may also be incorporated into other nodes in the communication system. For example, other nodes in the system may include components similar to those described for point 602 and access terminal 604 of access to provide similar functionality. In addition, this site may contain one or more of the described components. For example, a node may contain multiple components of transponder devices, which allow the node to operate on multiple frequencies and/or communicate through other technology.

As shown in Fig.6, the point 602 of the access terminal 604 of access can include with the corresponding receiving-transmitting devices 606 and 608 to communicate with each other and with other nodes. Receiver-transmitter 606 includes a transmitting device 610 for sending signals (for example, messages, and packages) and the receiving device 612 for receiving signals. Similarly, the receiving-transmitting device 608 includes a transmitting device 614 for sending signals and receiving device 616 for receiving signals.

Point 602 of the access terminal 604 of access include other components that may be used in connection with the operations of local access, as discussed in this document. For example, point 602 of the access terminal 604 of access may include respective controllers 618 and 620 points of presence to provide (for example, job and/or maintain) multiple points of presence to provide access to various services (for example, local service and network service) and for providing other related functionality described in this document. Point 602 of the access terminal 604 of access may include respective controllers 622 and 624 to send and receive traffic (for example, traffic that indicates different levels of service, messages, and packages), to provide access to the services to determine how to send the package (for example, through a tunnel or no tunnel)and for providing other related functionality, RA is discussed in this document. Point 602 of the access terminal 604 may include appropriate processors 626 and 628 control signals to send and/or receive control service signals (for example, from/MME), to support (for example, use and/or tasks) multiple NAS instances and for providing other related functionality described in this document. Point 602 may include module 630 definition service level definition service level and for providing other related functionality described in this document.

The ideas in this paper can be applied to many communication systems. For example, the techniques described herein can be implemented in the system based on standard ultra-wideband communications for mobile devices (based UMB), the system based on the standard of long-term development (based on LTE) or some other type of communication system. For purposes of illustration several exemplary implementation details are described in the context of a communication system based on LTE in the following description in connection with Fig.7-15. In addition, several exemplary implementation details are described in the context of communication systems based on the UMB in the following description in connection with Fig-18B. You should take into account that some or all of the components which you and/or operations, as discussed below, can be included in other types of communication systems.

7 illustrates multiple nodes in the exemplary system 700 of communication, which contains, for example, part of a network based on LTE, which includes components of terrestrial radio access network UMTS (UTRAN), the components of the radio access network GSM/EDGE (GERAN) and the components on the basis of an improved core packet switching (EPC). In this example, subscriber unit (UE) 702 communicates by radio with a private e-node B (HENB) 704 (and potentially other elements of the UTRAN network, not shown).

To facilitate local access of the functionality traditionally implemented in the network, instead, is implemented in the HENB 704. In particular, with the HENB 704 are placed together own serving gateway (HSGW) 706, the gateway 708 own packet data network (HPGW) and MME (HMME) 710. For convenience, these co-located components may be referred to in this document as the local SGW, local PGW and the local MME respectively. In addition, the HENB 704 and co-located components may be referred to in this document as a conjunction containing femtocell.

The system 700 uses different protocols to facilitate communication between the illustrated functional units. For example, HENB 704 can communicate with MME 712 (for example, MME core network) via 1-Protocol, as indicated by line 713. HENB 704 can communicate with SGW 714 (for example, network SGW) through S1-Protocol, as indicated by line 716. MME 712 may communicate with the serving GPRS support node (SGSN) 718 through S3 Protocol, as indicated by line 720. MME 712 may also communicate with the server private subscribers (HSS) 722 via the S6a Protocol, as indicated by line 724. SGW 714 can communicate with other UTRAN components through S12 Protocol, as indicated by line 726, SGSN 718 through S4 Protocol, as indicated by line 728, MME 712 through S11 Protocol, as indicated by line 730, and with PSN gateway (for example, network PGW) 732 through S5 and S8 protocols, as indicated by line 734. PGW 732 may communicate with the objects of the packet data network such as the Internet and multimedia subsystem IP-based Protocol (IMS), through SGi protocols, as indicated by lines 736 and 738, respectively. In addition, rules and policies of pricing and payment (PCRF) 740 can communicate with PGW 732 via the Gx Protocol, as indicated by line 742, and IMS via the Rx Protocol, as indicated by line 744.

The system 700 provides improved performance local access through the use HSGW 706, HPGW 708 and HMME 710. As described below, this increased performance which may relate in some aspects to improved management of mobility, management unidirectional channels and management of search calls.

Fig.7 illustrates that the local traffic and the network traffic is routed through different SGW and PGW-objects. As represented by line 746, local traffic access for the UE 702 is routed through the HENB 704, HSGW 706 and HPGW 708, from/provider of local services (not shown in Fig.7). On the contrary, as represented by line 748, network traffic (for example, private routed traffic can be routed through the HENB 704, SGW 714 and PGW 732 to/from the packet data network.

To support local traffic and network traffic, the UE can run multiple (e.g. two) partial Protocol stacks, and the radio interface between the UE and associated HENB may be shared between the stacks. For example, Fig illustrates the stack 800 of the protocols of the control plane, which illustrates that the UE can support multiple NAS instances (802 NAS and NAS 804 in this example). In addition, Figure 9 illustrates the stack 900 protocols plane data, which illustrates that the UE can support multiple applications (APPL 902 and APPL 904), and each application is associated with a different IP interface (for example, according to the IP 906 and IP 908).

May provide various measures for the data plane in the UE to support a local who Rafiq and network (for example, private routed) traffic. As explained below, in some implementations, the UE may not be allowed to connect to the local access HENB, if UA is not allowed by the underlying network. Thus, the UE may not be able to use the services of local access, if the UE is not authenticated by the underlying network, transit or if the connection is not valid. A separate unidirectional channels default to the path of the local access network path. From the viewpoint of the UE, local traffic access may simply be similar to another PDN. UE has information on the various sets of unidirectional channels on the data plane. Different points of presence (for example, APN) distinguish PDN local access network (for example, macro-) PDN. UE thus must use the appropriate unidirectional channel for local traffic access in relation to network traffic. For example, the UE may send a separate DHCP requests for local traffic access in relation to network traffic.

Can also provide various measures for the control plane in the UE to support local traffic and network traffic. For example, the UE may use the appropriate code when communicating with the network (for example, macro-) MME. On the contrary, the UE may not use the cipher(or can use a null cipher) when communicating with HMME.

A new request for services may be encrypted between UE and MME. Here HENB may not be able to discern, is the request for HENB (for local access) or to the network. Accordingly, such circuits as described above in figure 3 and 4, may be used here.

In one implementation uses a single NAS SM level. Here, the UE may include a special bit in the header to indicate the intended message NAS for HMME or network MME. When the HENB receives this message, it routes the packet to the appropriate destination based on this bit. In this implementation, the UE may use different sequence numbers for messages associated with HMME and network MME.

In another implementation, separate unidirectional channels for transmission service NAS signals are provided to communicate with HMME and network MME. This implementation thus involves the separation of NAS SM level. Here, the UE must accommodate requests for local access and network requests in the corresponding unidirectional channel for transmission service NAS signals. When the HENB receives a message on this unidirectional channel for transmission service NAS-signal HENB routes the packet to the appropriate destination based on the unidirectional channel.

The system 700 may provide other functionality local access to area is similar to the functionality explained above in connection with Figures 1-6. For example, the HENB can assign an IP address for the UE for local access. In addition, the UE may be caused by prospecting calls for local traffic access. In addition, the HENB can support QoS for traffic local access. Each of these aspects of local access is illustrated in the queue.

This functionality, as the allocation of IP addresses UE, function DHCPv4 and DHCPv6 and discovery of neighboring nodes, as specified in RFC 4861, can be used to assign an IP address for the UE. To provide these functions, HPGW with reduced functionality may be provided in the HENB, as shown in Fig.7. Here HPGW may not support all the functions of a traditional PGW (for example, as deployed in the core network), but instead can support the above functions and any other functions that may be required.

Examples of functionality that can be used in connection with the provision of opportunities UE be called by means of search engine calls for local traffic access, are provided later. Here SGW can buffer packets (for example, to provide buffering of packet downlink in ECM-IDLE-mode). In addition, the SGW can support the activation procedure initiated by the network request for the provision of services. SGW may thereby warn Association is qualified MME about the presence of traffic.

In response to this warning MME can determine when and in what e-node B must be raised by means of search engine calls the UE. Thus, the MME can support the reach of the UE in ECM-IDLE state (for example, including the management and execution of retransmission search calls). Here search calls by MME does not require the transmission NAS signals. On the contrary, the MME can just tell it when to carry out search engine calling UE, in relevant e-node B or e-node B (for example, HENB). Search the call is then transmitted in the broadcast mode through each e-node B on the basis of the identifier (for example, GUTI, T-IMSI, IMSI etc) UE.

In some implementations, the mobility (for example, continuity of services) for local traffic access is not supported. In this case, the UE may be caused by prospecting calls for local traffic access only in the corresponding HENB, which provides local access. However, mobility may still be applied to fixed traffic (for example, enshrined in the VPLMN or HPLMN). This fixed the traffic may be associated, for example, with the base PGW or some other fixed PDN. Here the network MME may instruct the UE to be called by means of search engine calls for fixed traffic HENB and microsotf in the current zone list is Tserovani for the UE.

In order to provide the above functions SGW, HSGW with reduced functionality may be provided in the HENB, as shown in Fig.7. HSGW may not support all the functions of a traditional SGW (for example, as deployed in the core network), but instead can support the above functions (for example, to provide an interface with the MME to support search calls) and any other functions that may be required.

In some implementations of the above functions MME may be provided through the inclusion of HMME with reduced functionality in the HENB, as shown in Fig.7. Thus, the system can use the functionality of the distributed MME, whereby the functionality for different types of traffic is available in various objects in the system (for example, HMME manages prospecting calls and unidirectional channels for local service, and network MME manages prospecting calls and unidirectional channels for network services). HMME may not support all the functions of a traditional MME (for example, as deployed in the core network), but instead can support the above functions and any other functions that may be required.

In other implementations of the above functions MME instead may be provided using the S11 interface Protocol from the HSGW in the MME (not showing the n-7). Thus, instead of using HMME, as shown in Fig.7, the HSGW can communicate with MME core network, which provides all the functionality of the MME. In some aspects of this implementation may comprise a modification S11-Protocol, or may comprise a change MME to support multiple SGW to change the mode of search calls MME.

Some efficiency can be achieved through the functionality of the distributed MME (for example, between HMME and MME core network), because the messages relating to local traffic can be routed from the HENB to the local MME, and not in the MME core network. Thus, the resulting architecture may not allow the use of one or more interfaces between the primary MME and each HENB (for example, S11 interface between MME and HSGW). In addition, the reduction of traffic messaging and workload in the core network associated with the processing of these messages can be significant when there are a large number HENB in the system.

Some examples of functionality that can be used in connection with QoS support through HENB for local traffic access, are provided later. In some cases, the pattern of traffic flow upward communication/downlink (TFT) and an indicator of QoS class (QCI) are provided for each of AGNONA ablanovo channel local access to support QoS functionality.

Several procedures can be used to establish unidirectional EPS-channel HPGW. In one procedure unidirectional EPS-channel can be configured statically in HPGW (for example, for each HENB instead of for each UE). In another procedure, the STA interface can be specified in HMME from AAA (specific for access). This procedure may be the better option in implementations in which HMME also authenticates the UE. In one other procedure Gx interface is set for HPGW (dynamically).

Different types of functionality can be implemented in HPGW in connection with QoS support for local traffic access. For example, HPGW can support filtering packet for each user. HPGW can support the marking of the transport level packet in uplink communication. In addition, the shaping/policing of politics in tariffs in the ascending line (UL) and downlink (DL) and the control gate can be supported. In addition, the binding of unidirectional channels in UL and DL, as defined in TS 23.203, can be supported.

Different types of functionality MME may be provided in connection with QoS support for local traffic access. For example, the transfer functions of the service NAS-signals and control unidirectional and channels (for example, enable the establishment of a dedicated unidirectional channel) may be provided.

In implementations that use HMME (for example, as shown in Fig.7), HMME can be used to send a service NAS signals. This may imply that the UE should support multiple instances of transmission service MME NAS signals. One way may contain a second unidirectional channel for MME HENB. Then, on the basis of what PDN is used (for example, for local traffic or network traffic), the UE selects the corresponding unidirectional channel. The use of multiple unidirectional channels may comprise a separate NAS security for each pair or may be based on RRC security.

In implementations that do not use HMME, S11 interface with MME core network can be used to support QoS for traffic local access. This implementation may comprise a modification S11-Protocol, or may comprise a change MME to support multiple SGW to change how unidirectional channels are used by the MME.

In addition to the functionality described above, other functionality may be supported in connection with local access. For example, such functions PGW as lawful interception and accounting functions, could the t to be supported. Examples of accounting functions include billing and payment of services at the service level in UL and DL, and a control gate on the level of service in UL and DL, as defined in TS 23.203. In addition, such functions MME control lists areas of tracking, can be supported. Here the list of zones tracking for local access can mean only HENB, which provides local access.

Referring now to Figure 10-12, we will see that it describes a few examples of the sequence of processing operations that can be used in the system 700. In some implementations, the UE may send an indicator to the access point to inform the access point that UE accept local services.

Figure 10 describes an exemplary sequence of processing operations of accession. Initially, the UE communicates with one MME core network (for example, macro-MME) on the NAS. UE sends a join request to the HENB (for example, in femtocell), and the request is routed through the HENB network MME. The information provided in the request for connection from the UE, may include, for example, IMSI or GUTI, which can be used by HENB to find MME ID last visited zone tracking (if applicable), network characteristics UE, the PDN selection addresses (IP version when videla the ü address) configuration parameters of the Protocol, connection type, KSI, a sequence number, NAS and NAS-MAC. In some cases, some of this information may be encrypted. However, the UE may need to send some information in an open form, so that the HENB may determine, allow or not the UE accessing the services available locally.

Again referring to Figure 10, we see that UE communicates with the network MME to perform authentication and security. Here, the UE can authenticate with HSS (not shown in Figure 10).

In addition, unidirectional channels default to the network. Here the network MME sends a request to create a unidirectional channel by default. Network SGW interacts with network PGW to create a unidirectional channel, and responds with a message create a one-way channel by default.

Network MME then sends an accept message to join in the HENB. The information provided in the resolution on accession, may include, for example, APN, GUTI, information, PDN address, the TAI list, the identity of the unidirectional EPS-channel, IE the configuration session management (for example, which includes the UL TFT) or configuration parameters of the call, KSI, a sequence number, NAS, NAS-MAC, and the algorithm NAS security. On the other hand, h is the terrain of this information may be encrypted.

HENB then helps HMME in establishing unidirectional channels by default for local access. For example, the HENB may send a request to join in HMME, when the HENB receives permission to join a network of MME. Unidirectional channels by default for local access can then be generated by the interaction of HMME, HSGW and HPGW. Message reconfiguration RRC connection then you can go for local traffic access and network traffic, and the merger is completed. From the above it can be noted that the UE supports separate unidirectional EPS channels for traffic access and local network traffic.

Appropriate procedures may be used if a dedicated unidirectional local channels are needed later. For example, the UE may transmit service signals for local access using a special NAS-bit. This package can be routed in HMME. Local transmission of signals between HMME and HSGW sets a new unidirectional channel. HMME can communicate with the PCRF to identify the local access policies for the UE.

11 describes an exemplary sequence of operations initiated by the UE requests for services. Here HENB can set con the acts of the local access on the basis of information he receives and supports. For example, GUTI of the UE may be known in the HENB. Depending on the service type (for example, data in comparison with the service signals), the MME can activate unidirectional EPS channels or not. In some implementations, HMME can activate unidirectional EPS channels local access only if activated a network of unidirectional EPS channels.

UE sends a request message for providing NAS services, which includes, for example, GUTI, TMSI, the service type, and other information. HENB sends a request to the NAS in the network MME. After authentication, set the initial context. Unidirectional radio channels are established for the network and for local access. As soon as unidirectional channels are installed, the network data can be sent from the UE HENB in, then from the HENB network SGW, then in network PGW. Local access can be sent from the UE HENB in, then from the HENB in the HSGW and then HPGW.

Fig describes an exemplary sequence of operations initiated by the HENB (for example, Femto) requests for services. In implementations in which macrochelodina need for authentication, the request for the provision of services initiated by the HENB for local access, may establish unidirectional EPS channels to the network. However, this step can be eliminated, who do not eat less than if the request for services indicates that what it is intended only for local access. In this case, the network MME may not activate network unidirectional EPS channels.

When local data are provided in HPGW, data is forwarded to HSGW, and HSGW shall notify HMME that the local data has been accepted. This initiates a search call HMME, whereby HMME sends a message (for example, a request for the implementation of paging call) in HENB to instruct HENB to carry out search engine calling UE. The procedure initiated by the UE the request for services may then be performed, then the data can be sent from the HSGW to the UE via the HENB.

HENB may recognize the cycle information retrieval calls in advance. For example, DRX search calls for a UE may be included in the message retrieval call. In some implementations, DRX is included as an information element (IE) in the context of the UE. Here, when the UE context is selected by HENB, HENB relays DRX in HMME. In this implementation, the application's local access may not be allowed to forcibly activate tighter loops prospecting calls. In other implementations, other DRX (for example, integer multiples) can be used by HENB (for example, femtocell) and microsot. In this case, the UE is activated in the corresponding cycle depending on the cell in which the currently bestest the em UE. Here, the UE must recognize several controls MME. If the UE is activated in a slower cycle, the UE should receive the search call, when two cycles are the same.

Use the local access can have a relatively minimal impact on zone update tracking. For example, the HENB may report one area of the track. Thus, a separate area of the track may not be specified for local traffic access. The UE may update the zone tracking network MME. Here, the UE uses a network of unidirectional channel, and associated NAS message is sent directly to the network MME. HMME should not have information to update the zone tracking. On the contrary, HMME can only carry out search engine call for local traffic access and can only perform search call in the associated HENB.

Can be used various measures to handle connectivity for local access when the UE enters idle mode. In some implementations, the IP can be immediately disconnected. Thus, all unidirectional channels must be broken, and the connection is re-established when the UE appears again. In other implementations, the IP address can be maintained (for example, within a specified period of time). Here, the f UE appears again with the same GUTI (or S-TMSI), the UE shall be able to continue to use the existing unidirectional channels. In addition, the trigger can be used to qualify UE as released from the HENB. For example, a specified number of search missed calls can trigger the MME to the rupture of unidirectional channels.

As mentioned above, some implementations may choose not to use HMME. Several aspects of this system should be interpreted in relation to system 1300 Fig (for example, if the illustrated modules may have functionality similar to modules in Fig.7 with the appropriate names). In this case, the HSGW can communicate with MME core network through S11 Protocol, as represented by the dashed line 1302 on Fig. S11-messages that must be sent between the HSGW and the network MME may include, for example, the creation of a unidirectional channel (default or dedicated), remove the unidirectional channel, update unidirectional channel deactivation dedicated unidirectional channel, the resource allocation unidirectional channel, freeing resources unidirectional channel, create forwarding tunnel and other GTP-C messages (for example, echo). In this case initiated by the network requests for services should vary through setev the th MME as coming from the HSGW, and not from a network AGW. Initiated by the UE the request for local access must be transferred from UE HENB in, then MME in the network and, finally, in the HSGW. HSGW may request the implementation of paging call in a network MME (for example, indicator, to carry out search engine calls only HENB). Search the call must be transferred from HPGW in HSGW, then MME in the network and, finally, in the HENB.

In implementations that do not use HMME, two different reference points (S1 and S11) are supported through our own site. This leads to greater complexity in the HENB and the support, for example, GTP-C and eRANAP. To simplify the architecture, messages are traditionally associated with S11, instead, can be transferred through S1. In other words, some of the messages that are specified in S11, can be combined in the transmission S1-MME signals. For example, the message to create a unidirectional channels that may otherwise be conveyed through S11 between the network MME and HSGW, but instead may be transferred by S1 between the network MME and HENB. Thus, the S11 interface can be excluded in this case.

Fig and 15 compares the entry procedures for local access for two cases, when the S11 interface is used and not used, respectively.

On Fig UE sends a request for connection (for example, which includes the identifier APN) in eNB, and what the request is forwarded via the eNB to the MME. Unidirectional channels by default then set for the network. Here, the MME sends a request to create a unidirectional channel default in SGW, which forwards the request to PGW. PGW responds with a message create a unidirectional channel that redirects SGW MME. The MME then sends an accept message to join in eNB. Message reconfiguration RRC connection then you can go, and the merger is completed.

On the contrary, as represented by line 1502 on Fig, the MME sends a request message to establish the initial context and the request message to create a unidirectional channel default back to the HENB in response to the attach request (for example, which includes the value of the APN, which initiates a new connection). As represented by line 1504, HENB then sends a response message to establish the initial context and the response message for creating a unidirectional channel default back to the MME. A similar approach can be used to establish a subsequent dedicated unidirectional channels. Mainly, the message "S11", represented by lines 1502 and 1504, are carried through S1-connection (for example, through line 1304 between the HENB 1306 and MME 1308 on Fig).

Referring now to f is g-18B, see, that describes exemplary components and procedures that may be used in the communication system, such as a UMB network to provide local access. Local access allows the access terminal to access local services that are visible to one of the devices in the path from the terminal access to the router first jump. Two main forms of local access shows on Fig: local access in the access gateway and local access in famously. You should take into account that the local services provided through this site, can take various forms and may differ from specific services, illustrated in Fig and explained below.

The system 1600 for Fig, terminal 1602 access communicates with femtocell 1604 (for example, an advanced base station (eBS) on air. The system 1600 includes a router 1606 and gateway 1608 access, which provide local access to one or more local services.

Local access in ventouse may be provided after the terminal 1602 connects access to famously 1604. As shown by the dotted line 1610 router 1606 may provide an opportunity to the terminal 1602 access to access local services provided by the exploits of one or more nodes 1612 local network. For example, such a local service can provide access to devices (for example, printer) on your local network. As shown by the dotted line 1614, the router 1606 may also provide an opportunity to the terminal 1602 access to access the Internet 1616 (for example, to access one or more web servers 1618). Thus, the terminal 1602 access can access the Internet without passing through the core network operator.

As shown by the dotted line 1620, the gateway 1608 access may provide an opportunity to the terminal 1602 access to access one or more local services 1622. Local access in the access gateway may be applicable when the router first jump for terminal 1602 access an agent 1624 local mobility. Here, it may be desirable to provide a special local services (for example, location data) from the local gateway access, even when globally routable packets move through the agent 1624 local mobility.

As shown by the dotted line 1626, the traffic in the backbone network can be routed from terminal 1602 access agent 1624 local mobility (for example, the router first jump) via the Protocol tunnel. Hence, the traffic may marshrutiziruya through the underlying network in node-correspondent 1628. Complementary traffic flow should be provided in the downlink.

In order to maintain local access, several LinkID may be provided between the access terminal and eBS. Here each LinkID may belong to a level that corresponds to the object that manages the IP address on this level. For example, LinkID level 2 might correspond to the local agent mobility. LinkID level 1 may correspond to the access gateway. LinkID level 0 may correspond to a local router.

Description of application interface system (AIS) supports the location of several LinkID by eBS for the access terminal. Each LinkID corresponds to a different IP interface, and the access terminal is allocated a different IP address, managed by the object Manager interface.

Packets passing across the air interface between the access terminal and eBS are identified at the data link layer to which they belong. As explained above, two ways of achieving this may imply the identification of a flow for the packet or sending the identifier with the package.

In the first case, each packet belongs to the flow and can be transforming many-to-one relationship between flow and line of communication. Thus, the communication line can act as a host for multiple threads, but the sweat is it can only belong to a single channel level. Therefore, the link layer may be implicitly determined from the thread ID.

In the second case, the packets can carry a special header in one byte, is placed between the IP header and RLP-header. This title may include only the link layer.

Support to AIS for multiple communication lines, as described above, there are several variants of the architecture that can be used to provide local access. One version of the architecture encompasses the use of multiple GRE keys. Another option architecture encompasses the use of a single GRE tunnel and multiple addresses broadcast.

Figa and 17B illustrate an implementation that uses two GRE key. Here the gateway 1608 access (AGW) can provide GRE key (for example, GRE0) in eBS 1604 and binds it to any PMIP-tunnel agent 1624 local mobility (LMA). Key GRE0 may imply the following. If GRE0 is an even number, it is converted to the address level 1, and GRE0+1 is converted to the address level 2 this user; if GRE0 is an odd number, it is converted to the address level 2, and GRE0-1 is converted to the address of the level 1 user. EBS 1604 and gateway 1608 access is configured to allow packets based on any of these GRE keys. Can be provided according to CNAE measures to to provide two key eBS 1604. For example, both keys can be sent to eBS 1604, or one key can be generated based on another key, which is sent to eBS 1604.

Figa illustrates an exemplary traffic flow upward communication. Here, line 1702 represent the flow of traffic that is tunneled between eBS 1604 and gateway 1608 access with the use of first GRE key (GRE0). For example, the traffic flow may refer to packets layer 2 between the access terminal (AT) 1602 and agent 1624 local mobility. The packet uplink communication can thus be targeted to sites of correspondent in another place on the Internet. Line 1704 represents a stream of traffic that is tunneled between eBS 1604 and gateway 1608 access using the second GRE key (GRE1). The traffic flow may thus relate to the packages level 1 between the terminal 1602 access and gateway 1608 access (for example, carrying local traffic access, supported by the gateway 1608 access). Line 1706 represents a stream of traffic that is tunneled not. For example, the traffic flow may refer to packets local access between the terminal 1602 and access local devices in the subnet identical to the subnet eBS 1604. Figv illustrates complementary traffic flow for downlink.

EBS 1604 packages level 1 and the anti-shudder performance 2 can be identified through the channel, which they belong (in the return line) and the GRE key of the tunnel (in a straight line). Level packets 0 in a straight line are processed in a different way. For example, eBS 1604 can analyze the destination address to determine the access terminal for which it was designed package.

Figa and 18B illustrate an implementation that uses a single GRE key. According to this decision packages level 0 (line 1806) are processed as described above, however, there is a single GRE tunnel between 1808 gateway 1608 access and eBS 1604. In fact, in the reverse link, as shown Figa, packets originating within the GRE tunnel 1808A, demultiplexers in the gateway 1608 access. On the contrary, in a straight line, as shown Figv, packets originating within the GRE tunnel 1808B, demultiplexers eBS 1604.

In the back of the line gateway 1608 access may demultiplex the packets belonging to level 1 (line 1804) and level 2 (line 1802), by examining the source address of the packet and determine the channel based on the subnet. Similarly, in a straight line eBS 1604 can analyze the IP address of the destination of the packet, to determine the link layer to which the packet belongs, based on the subnet.

However, broadcast packets belonging to levels 1 and 2, can cause a problem because they go is on the same IP address. To allow this broadcast packets for protocols access level 1 (for example, RRP, RRQ, querying routers and alerts can be sent to various addresses. DHCP packets can be demultiplexers using client ID available in the Protocol. Alternatively, the broadcast packet can be demultiplexor through analysis package and use a specific Protocol information.

As mentioned above, the scheme local access, as discussed in this document can be used in a mixed deployment, which includes macrodactylia (for example, in a cellular network a large area, such as a 3G network, typically called macro-cellular network or wide area network (WAN) and the floor on a small scale (for example, network environment in an apartment or a house, typically called a local area network (LAN). Here, as an access terminal (AT) moves in the network, the access terminal may be served in certain locations by access points that provide macrodactylia, the access terminal may be served at other locations by access points that provide coverage on a small scale. In some aspects the nodes covering the sky is isogo scale can be used to provide incremental increases in capacity, coverage inside buildings and various facilities, all of which lead to reliable user experience.

A node that provides coverage for a relatively large area may be referred to as macrotel, while a node that provides coverage for a relatively small area (for example, flats), may be referred to as femtocell. You should take into account that the ideas in this paper can be applied to nodes associated with other types of coverage. For example, Ecotel can provide coverage for the zone which is less than macrozone and more femtozone (for example, a floor within an office building). In different embodiments use different terminology may be used to refer to macrotel, femtocell or other nodes of the type of access point. For example, macrotel may be configured or referred to as an access node, base station, access point, e-node B, microsata etc. in Addition, femtocell may be configured or referred to as the own node B, an e-node B, base station, access point, femtocell, etc. In some implementations a node may be associated (for example, split) with one or more hundred or sectors. The cell or sector associated with Makrolon, Femto the scrap or echoslam, may be referred to as macrosoma, femtocell or picosat respectively. A simplified example of how famously can be deployed in the network is available on Fig.

Fig illustrates an example of a map 1900 coating, in which several zones 1902 tracking (or routing zones, or zones) are defined, each of which includes multiple zones 1904 macropore. Here's coverage area, associated with zones 1902A, 1902B and 1902C tracking, described by wide lines and zones 1904 macropore are represented by hexagons. Zone 1902 tracking also include areas 1906 pantoporate. In this example, each of the zones 1906 pantoporate (for example, area 1906C pantoporate) is illustrated within the zone 1904 macrodactylia (for example, zone 1904B macropore). You should note however that the area 1906 pantoporate may lie partially within or outside the zone 1904 macropore. In addition, one or more zones ekoparty (not shown) can be specified within one or more zones 1902 tracking or zones 1904 macropore. You should take into account that there may be multiple zones pantoporate within the zone macrodactylia, either within or crossing the boundary with the adjacent macrostate.

Fig illustrates several aspects of the system 2000 wireless is vodnoy communication containing several hundred of 2002, such as, for example, macrosomy 2002A-2002G, and each cell is serviced by a corresponding access point 2004 (for example, points 2004A-2004G access). Thus, macrosomy 2002 may correspond to zones 1904 macroparasite on Fig. As shown in Fig, 2006 terminal access (for example, terminals 2006A-2006L access) can be dispersed in various locations throughout the system over time. Each terminal 2006 access can communicate with one or more points 2004 access in a straight line (FL) and/or the return line (RL) at a given moment, depending on, for example, whether or not the access terminal 2006 active, and it is found or not in the soft mode of transmission service. System 2000 wireless can provide services to a large geographic area. For example, macrosomy 2002A-2002G may cover a few blocks in the district or more miles in a rural environment.

Fig is an example of a system 2100, which illustrates how one or more femtocell can be deployed within a network environment (for example, system 2000). The system 2100 includes several femtocell 2110 (for example, famously 2110A and 2110B)installed in a network environment with a relatively small coverage area (for example, in one or more units 2130 user is El). Each femtocell 2110 may be associated with a global computer network 2140 (for example, the Internet) and basic network 2150 mobile operator via a DSL router, a cable modem, line, wireless or other means of connections (not shown).

The owner of famously 2110 can subscribe to mobile service, such as, for example, 3G mobile service, offered through the underlying network 2150 mobile operator. In addition, the terminal 2120 access may allow work in macrocrania and in network environments with a smaller coverage area (for example, housing). In other words, depending on the current location of the terminal 2120 access terminal 2120 access can be maintained through the point 2160 access macrosty associated with the underlying network 2150 mobile operator, or by any set femtocell 2110 (for example, femtocell 2110A and 2110B, which are always placed within the respective apartments 2130 user). For example, when the subscriber is away from home, it can be serviced with standard macropoint access (for example, point 2160 access), and when the subscriber is near the house or home, it can be serviced by ventouse (for example, node 2110A). Here femtocell 2110 may be backward compatible with existing terminals 2120 access.

Site for example, femtocell) may be limited in some aspects. For example, this femtocell can only provide certain services to certain access terminals. In deployments with so-called restricted (or closed) by the Association, the access terminal may be served only through a macro-cellular mobile communication network and a given set femtocell (for example, femtocell 2110, which are always placed in the appropriate apartment 2130 user). In some implementations, a node can be restricted to not provide, for at least one node, at least one of the following: the transmission of signals, data access, registration, search calls or service.

In some aspects, limited femtocell (which may also be referred to as its own node B closed user group) is femtocell, which provides services to a limited initialized to the set of access terminals. This set may temporarily or permanently be expanded as needed. In some aspects, a closed subscriber group (CSG) can be defined as a set of access points (for example, femtocell)that share a common access control list of access terminals. The channel, which employs all famously (or all limited famously) the area may be referred to as femtocell.

Different relationships can exist between data femtocell and data access terminal. For example, from the perspective of the access terminal, outdoor femtocell may be referred to as femtocell without Association limited (for example, femtocell provides access to all access terminals). Limited femtocell may be referred to as femtocell that is restricted in some way (for example, limited to the Association and/or registration). Own femtocell may be referred to as femtocell for which the access terminal is authorized to access and work (for example, permanent access is available for a given set of one or more access terminals). Invited femtocell may be referred to as femtocell for which the access terminal is temporarily authorized to access and work. Stranger femtocell may be referred to as femtocell for which the access terminal is not authorized to access and work, with the possible exception of emergency situations (for example, emergency calls).

From the point of view of a limited famously, private access terminal may be referred to as an access terminal that is authorized to access the limited famously (for example the, the access terminal has a constant access to famously). Invited the access terminal may be referred to as an access terminal with a temporary access to the limited famously (for example, limited on the basis of the delivery date, time of usage, bytes, meter connections, or some other criterion or criteria). Outside the access terminal may be referred to as an access terminal that does not have permission to access the limited famously, except for perhaps emergency situations, such as emergency calls (for example, the access terminal that does not have the credentials or permission to register in the limited famously).

For convenience of disclosure of this document describes the various functionality in the context of ventouse. You should note however that Ecotel can provide identical or similar functionality for greater coverage. For example, Ecotel may be limited, private Ecotel can be specified for a given access terminal, etc.

Wireless communication system with multiple access can simultaneously support communication for multiple wireless terminals access. Each terminal may communicate with one or more wireless access points via a transmission direct the ow and return line connection. Direct link (or downward communication refers to the communication line from the access points to the terminal, and the reverse link (or upward communication refers to the communication line from the terminals to the access points. This communication link may be established through a system with one input and one output, a system with many inputs and many outputs (MIMO) or some other type of system.

MIMO system uses multiple (NT) transmit antennas and multiple (NR) receiving antennas for data transmission. MIMO channel formed by NTtransmitting and NRreceiving antennas may be decomposed into NSindependent channels, which are also referred to as spatial channels, where NS≤min{NTNR}. Each of the NSindependent channels corresponds to a dimension. MIMO system can provide improved performance (for example, higher throughput and/or greater reliability)if there are more dimensions that are created by multiple transmitting and receiving antennas.

MIMO system can support systems with duplex time division channels (TDD) and duplex frequency division multiplexing (FDD). In the TDD system, the transmission forward and reverse lines of communication are in the same frequency region so that the principle is mainly the bridges provides channel estimation straight line from the channel of the reverse link. This allows the access point to extract profit from the beam forming transmission in a straight line, when multiple antennas are available at the access point.

The ideas in this document can be included in the node (for example, device)that uses various components to communicate at least one other node. Fig illustrates several sample components that may be used to simplify communication between nodes. In particular, Fig illustrates a wireless device 2210 (for example, the access point and the wireless device 2250 (for example, an access terminal) in a MIMO system 2200. In the device 2210 traffic data for a certain number of data streams is provided from a source 2212 data processor 2214 transmission (TX) data.

In some aspects, each data stream is transmitted through the corresponding transmit antenna. The processor 2214 TX-data formats, encodes, and punctuates traffic data for each data stream based on a particular coding scheme selected for that data stream to provide coded data.

The coded data for each data stream may be multiplexed with pilot data using OFDM technology. Pilot data are typically a known data pattern that is processed and the known method and can be used in the system of the receiving device, in order to estimate the channel response. The multiplexed pilot and coded data for each data stream is then modulated (i.e. the character is converted) based on a particular modulation scheme (for example, BPSK, QSPK, M-PSK or M-QAM)selected for that data stream to provide modulation symbols. The data rate, coding and modulation for each data stream may be determined by instructions performed by the processor 2230. Storage device 2232 may store program code, data and other information used by the processor 2230 or other components of the device 2210.

The modulation symbols for all data streams are then provided in the TX MIMO processor 2220, which may further process the modulation symbols (for example, for OFDM). TX MIMO processor 2220 then provides NTstreams of modulation symbols in NTreceiving-transmitting devices (XCVR) 2222A-2222T. In various embodiments, the implementation of the TX MIMO processor 2220 applies weighting factors of formation of the pattern to the symbols of the data streams and to the antenna from which the character is sent.

Each receiver-transmitter 2222 receives and processes the corresponding character stream to provide one or more analog signals, and additionally leads to rabbanim parameters (for example, amplifies, filters and converts with increasing frequency) analog signals to provide a modulated signal suitable for transmission over a MIMO channel. NTmodulated signals from transmitter-receiver pairs 2222A-2222T then transmitted from the NTantennas 2224A-2224T respectively.

In the device 2250 transmitted modulated signals are received by NRantennas 2252A-2252R, and the received signal from each antenna 2252 is available in the corresponding receiver-transmitter (XCVR) 2254A-2254R. Each receiver-transmitter 2254 results in the required parameters (for example, filters, amplifies and converts with decreasing frequency) corresponding to the received signal, digitizes, refer to the appropriate settings signal to provide samples, and additionally processes the samples to provide a corresponding "received" a stream of characters.

The processor 2260 reception (RX) data and then receives and processes NRaccept streams of characters from the NRreceiving-transmitting devices 2254 on the basis of specific treatment technologies to the receiving device to provide NT"discovered" streams of characters. The processor 2260 RX-data then demodulates, back punctuates and decodes each stream is detected symbols to recover the data t is the Afik for data flow. Processing by processor 2260 RX-data complementary to the processing performed by TX MIMO processor 2220 and processor 2214 TX-data device 2210.

The processor 2270 periodically determines what kind of matrix pre-encoding to use (described below). The processor 2270 formulates a message back line containing part of the index matrix and part of the value of the rank. Storage device 2272 may store program code, data and other information used by processor 2270 or other components of the device 2250.

Message return line can contain various types of information related to the communication line and/or receive data stream. Message return line is then processed by processor 2238 TX-data, which also receives traffic data for a certain number of data streams from a source 2236 data is modulated by modulator 2280 is given to the appropriate settings via the receiving / transmitting devices 2254A-2254R and transmitted back to the device 2210.

In the device 2210 modulated signals from the device 2250 accepted by antennas 2224, are set to the appropriate settings via the transmitter-receiver pairs, 2222, demodulated through a demodulator (DEMOD) 2240 and handled through the m processor 2242 RX-data to retrieve the message back to the communication line to be passed through the device 2250. The processor 2230 then determines what kind of matrix pre-coding be used to determine the weights of the beam forming, and then processes the extracted message.

Fig also illustrates that the communication components may include one or more components that perform associated with local access operations, as discussed in this document. For example, a component 2290 access control can interact with the processor 2230 and/or other components of the device 2210 to send/receive signals to/from another device (for example, device 2250), as discussed in this document. Similarly, component 2292 access control can interact with the processor 2270 and/or other components of the device 2250 to send/receive signals to/from another device (for example, device 2210). You should take into account that for each device 2210 and 2250 functionality of two or more of the described components may be provided by a single component. For example, a single processing component may provide the functionality of the component 2290 access control and processor 2230, and a single processing component which may provide the functionality of the component 2292 access control and processor 2270.

The ideas in this document can be included in various types of communication systems and/or components of systems. In some aspects of the ideas in this document can be used in a multiple access system that can support communication with multiple users by sharing available system resources (for example, by specifying one or more of bandwidth, transmit power, encode, interleave, and so on). For example, the ideas in this paper can be applied to any or combinations of the following technologies: system multiple access code division multiple access (CDMA), CDMA system with multiple bearing (MCCDMA)systems, wideband CDMA (W-CDMA), high speed packet access (HSPA, HSPA+)systems, multiple access with time division multiplexing (TDMA)systems, multiple access frequency division multiple access (FDMA)FDMA system with single-carrier (SC-FDMA)systems, multiple access orthogonal frequency division multiplexing (OFDMA) or other multiple access technologies. Wireless communication system, using the ideas in this document, can be performed with the opportunity to implement one or more standards such as IS-95, cdma2000, IS-856, W-CDMA, TDSCDMA and other standards. A CDMA network may implement the wireless communication technology, as iversally terrestrial radio access (UTRA), cdma2000, or some other technology. UTRA includes W-CDMA and the standard low speed when transferring characters pseudonoise sequence (LCR). Additionally, technology cdma2000 covers standards IS-2000, IS-95 and is-856. TDMA network may implement such wireless communication technology such as global system for mobile communications (GSM). OFDMA network may implement the wireless communication technology, as the enhanced UTRA (E-UTRA), IEEE 802.11, IEEE 802.16, IEEE 802.20, Flash-OFDM®, etc. UTRA, E-UTRA and GSM are part of the universal mobile telecommunications system (UMTS). The ideas in this document may be implemented in the system according to the standard 3GPP long-term development (LTE)system according to the standard ultra-wideband transmission for mobile devices (UMB) and other types of systems. LTE is a version of UMTS, which uses EUTRA. Although certain aspects of the disclosure may be described using 3GPP terminology, it should be understood that the ideas in this paper can be applied to technology 3GPP (Re199, Re15, Re16, Re17), as well as to technology 3GPP2 (1xRTT, 1xEV-DO RelO, RevA, RevB) and other technologies.

The ideas in this document can be included (for example, implemented within or performed by) many devices (for example, nodes). In some aspects, the host (for example, wireless node, implemented in accordance with the ideas in this document is subject moderatedose access or the access terminal.

For example, the access terminal may contain, be implemented as, or known as subscriber unit, subscriber station, the subscriber module, mobile station, mobile device, mobile node, remote station, remote terminal, user terminal, user agent, user device, or some other term. In some implementations, the access terminal may include a cellular phone, a cordless phone, telephone Protocol session initiation (SIP), wireless local loop (WLL), personal digital appliance (PDA), a handheld device that supports wireless connections, or some other appropriate processing device connected to a wireless modem. Accordingly, one or more covered in this document aspects can be included in the phone (for example, cell phone or smart phone), a computer (for example, road computer), a portable communication device, a portable computing device (for example, personal digital device), home appliance (for example, music or video device, or a satellite radio), the device is a global positioning system or any other appropriate device that has a capability to communicate via a wireless network the second medium.

The access point can contain, be implemented as, or known as a nodeb, e-node B, radio network controller (RNC), base station (BS), eBS, a base station (RBS), a base station controller (BSC), base transceiver transmitting station (BTS), the function of transmitting and receiving devices (TF), Radiorama-transmitting device, radiomaster, a basic service set (BSS), extended service set (ESS) or some other similar term.

In some aspects, the host (for example, the access point may include an access node for communication systems. Such an access device may provide, for example, connectivity to a network (for example, a global computer network such as the Internet or a cellular network) via a wired line or wireless network. Accordingly, the access node may provide an opportunity to another node (for example, the access terminal to access the network, or some other functionality. In addition, you should take into account that one or both of the nodes can be portable or, in some cases, relatively reportative.

You should also take into account that the wireless node may allow for the transmission and/or reception of information besprovodnoy way (for example, through a wired connection). Thus, the receiving device and the transmitting device is ustwo, as explained herein, may include appropriate components of the communication interface (for example, components for the electrical or optical interface)to communicate through besprovodnoy medium.

The wireless node may communicate via one or more radio links, which are based on or otherwise support any suitable wireless technology. For example, in some aspects, the wireless node may be associated with the network. In some aspects, the network can include a local area network or a global computer network. A wireless device may support or otherwise use one or more of a variety of technologies, protocols, or wireless communication standards, for example, explained in this document (e.g., CDMA, TDMA, OFDM, OFDMA, WiMAX, Wi-Fi etc). Similarly, the wireless node may support or otherwise use one or more of a variety of appropriate modulation or multiplexing. Wireless node thus may include appropriate components (for example, a radio interface)to establish and communicate via one or more radio links using the above or other wireless technologies. For example, b is Spravochnoe node may contain a wireless transceiver transmitting device associated with the components of the transmitting device and receiving device which may include various components (for example, the shapers of signals and signal processors)that facilitate communication over a wireless transmission medium.

The functionality described in this document (for example, regarding one or more of the attached drawings), can fit in some aspects similar to the indicated functionality "means" in the attached claims. Turning to Fig-25, we will see that the device 2300, 2400 and 2500 are presented as a series of interrelated functional modules. Here the module 2302 provide points of presence may correspond at least in some aspects to, for example, the controller points of presence, as explained in this document. Module 2304 send traffic may correspond at least in some aspects to, for example, the communication controller, as explained in this document. Module 2306 send messages may correspond at least in some aspects to, for example, the communication controller, as explained in this document. Module 2402 receive packets may correspond at least in some aspects to, for example, the receiving device, as explained in this document. Module 2404 definition of service level may correspond at least in some aspects, for example the EP, the identity module service level, as explained in this document. Module 2406, packets may correspond at least in some aspects to, for example, the communication controller, as explained in this document. Module 2502 may correspond at least in some aspects to, for example, the processor control signals, as explained in this document. Module 2504 accessing services may correspond at least in some aspects to, for example, the communication controller, as explained in this document.

The functionality of modules Fig-25 can be implemented in a variety of ways, consistent with the ideas in this document. In some aspects, the functionality of these modules may be implemented as one or more electrical components. In some aspects, the functionality of these blocks may be implemented as a processing system that includes one or more components of the processor. In some aspects, the functionality of these modules may be implemented using, for example, at least part of one or more integrated circuits (for example, ASIC). As explained in this document, the integrated circuit may include a processor, software, other related components, or some combination of the above. Fun is inost these modules may also be implemented in some other way, as discussed in this document. In some aspects, one or more selected dashed blocks on Fig-25 are optional.

It should be understood that references to the element in this document with the use of such designations as "first", "second", etc. are, in General, does not limit the number or the order of these elements. Instead, the data symbols can be used herein as a convenient method of distinguishing between two or more elements or instances of the element. Thus, references to the first and second elements does not mean that only two elements can be used in this case or that the first item should precede the second element in some way. In addition, if not stated otherwise, the set of elements may contain one or more elements. In addition, the terminology of the form "at least one of the following: A, B or C"used in the description or the claims, means "A or B or C or any combination of these elements.

Experts in the art should understand that information and signals may be represented using any of a variety of different technologies. For example, data, instructions, commands, information, signals, bits, symbols, and characters psevdochumoy sequences that can be cited as examples the and throughout the description above, can be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination of the above.

Specialists in the art will additionally must take into account that any of the various illustrative logical blocks, modules, processors, means, circuits, and steps of the algorithm described in connection with the aspects disclosed herein may be implemented as electronic hardware (for example, a digital implementation, an analog implementation, or a combination thereof, which may be designed using source coding or some other technique), various forms of programme or project code containing instructions (which for convenience may be referred to herein as the "software" or "software module"), or a combination of the above. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps described above, in General, on the basis of functionality. Implemented this functionality as hardware or software depends upon the particular application and design constraints imposed on the system as a whole is m Specialists in the art can implement the described functionality in varying ways for each particular application, but such solutions should not be interpreted as deviating from the scope of the present disclosure.

The various illustrative logical blocks, modules, and circuits described in connection with the aspects disclosed herein may be implemented within or performed by an integrated circuit (IC), the access terminal or access point. IC may include a General purpose processor, a digital signal processor (DSP), a specialized integrated circuit (ASIC), programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, electrical components, optical components, mechanical components, or any combination of the above made with the possibility to carry out the functions described in this document, and may enforce codes or instructions that are permanently placed on the IC out IC or there. The General-purpose processor may be a microprocessor, but in an alternative embodiment, the processor may be any conventional processor, controller, microco is troller or a state machine. The processor may also be implemented as a combination of computing devices, for example, the combination of a DSP and a microprocessor, a variety of microprocessors, one or more microprocessors with a DSP core, or any other such configuration.

It should be understood that the specific order or hierarchy of steps in the disclosed processes is an example of a typical approach. On the basis of constructive preferences should be understood that the specific order or hierarchy of steps in the processes may be modified while remaining within the scope of the present disclosure. Points the way in the attached claims present elements of the various steps in a sample order, and have no intention to be limited presents specific order or hierarchy.

In one or more exemplary embodiments, the functions described may be implemented in hardware, software, firmware or any combination of the above. If implemented in software, the functions may be stored or transmitted as one or more instructions or code on a computer readable medium. Machine-readable media includes both computer storage media data, and the communication environment, including any medium that facilitates p is Emesene computer program from one place to another. The storage media can be any available media that can be accessed through a computer. As an example, but not limitation, these machine-readable media can include RAM, ROM, EEPROM, CD-ROM or other storage device for optical drives, storage on magnetic disks or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and which can be accessed through a computer. So any connection is properly termed a computer readable media. For example, if the software is transmitted from a web site, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave environment, coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, microwave, and environment, is included in the definition of the media. Disk (disk) and the disk (disc) when used in this document include compact disc (CD), laser disc, optical disc, digital versatile disk (DVD), floppy disk iDisk Blu-Ray, when the disk) usually reproduce data magnetically, while discs (disc) usually reproduce data optically with lasers. Combinations of the above should also include machine-readable media. Accordingly, it is necessary to take into account that the machine-readable medium may be implemented in any suitable computer software product.

Given the above, in some aspects, the first communication method includes: providing a first point of presence of the Internet Protocol, to enable the access terminal to access local services; providing a second point of presence of the Internet Protocol, to enable the access terminal to access a network service; and sending traffic associated with the local service, and traffic associated with a network service, according to the General air. In addition, in some aspects, at least one of the following also may apply to the second method of communication: the first point of presence Internet Protocol associated with the name of the first access point or the first address of the Internet Protocol, and the second point of presence Internet Protocol associated with the second access point or the second address is an Internet Protocol; local service contains sm is si, provided via the access point that communicates with the access terminal on the shared radio interface and network service contains a service provided through the router first jump to the access terminal; the access point is associated with a subnet Internet Protocol, and local service contains a service provided by an object that is associated with a subnet Internet Protocol; local service contains a service provided through the gateway through which traffic from the access terminal proceeds to the router first jump to the access terminal and the network service comprises a service provided through the router first jump; local service includes Internet access, provided via the access point that communicates with the access terminal on the shared radio, and Internet access is not available through the router first jump to the access terminal; the method further comprises sending a message associated with the first Protocol via the second Protocol to control traffic associated with the local service; the first Protocol associated with the communication between the mobility Manager and the serving gateway, and a second Protocol associated with the communication between Manager mobile is t and the access point.

In some aspects, the second communication method includes: identifying points of presence of the Internet Protocol for radiointerface package to specify the target node of the tunnel packets for the packet; and the packet based on the identified point of presence Internet Protocol. In addition, in some aspects, at least one of the following also may apply to the second communication method: identification of the point of presence of the Internet Protocol includes determining, at the access point, an identifier that is transmitted with the packet, and send the package contains the redirection packet through the tunnel to the node that is identified based on the identifier; the identifier is transmitted through the header, which is permanently placed between the header of the Internet Protocol header according to the Protocol of the radio link packet; identifying point of presence Internet Protocol contains: set in the access terminal, the identifier of the point of presence The Internet Protocol and the transmission of the identifier with the package; the ID is passed through the header, which is permanently placed between the header of the Internet Protocol header according to the Protocol of the line radio package; identification of points of presence of the Internet Protocol provides authentication, the access point, the flow in to the m transmitted packet, and send the package contains the redirection packet through the tunnel to the node that is identified on the basis of the stream; the stream is associated with a one-way radio data designated for local traffic; identification of points of presence of the Internet Protocol includes: determining, at the access terminal, the stream associated with the point of presence of the Internet Protocol and the transmission of a packet through a particular flow; flow associated with a one-way radio data designated for local traffic; the identified point of presence Internet Protocol specifies associated radiointerface package with a local service or network service; identified a point of presence of the Internet Protocol specifies associated radiointerface package with its own network or guest network; the identified point of presence Internet Protocol represents the relative depth within the network node associated with the target node.

In some aspects, the third communication method includes: communicating with the first mobility Manager on the local node through the first transfer of control of the service signals; communication with the second mobility Manager in the other node through the second transmitting control service signals; and accessing the first service based on the communication with the first Manager of mobility and access to the second service based on the communication with the second mobility Manager. In addition, in some aspects, at least one of the following also may apply to the first communication method: first transfer of control of the service signals associated with the first instance is not associated with the access levels supported by the access terminal, and a second transfer control service signals associated with the second instance is not associated with the access levels supported by the access terminal; the first transmission control utility signals associated with the management of unidirectional channels for a first service and a second transfer control service signals associated with the management of unidirectional channels for the second service; the first transmission control utility signals associated with the management of search calls for a first service and a second transfer control service signals associated with the management of search calls for the second service; first and second transfer control service signals leads to various types of search calls for different types of traffic; the local node contains the access point that communicates over the radio interface with the access terminal, which provides access to the first service and the second service, the first service includes a local condition is uh-huh, provided via the access point and the second service comprises a network service provided through the router first jump to the access terminal; first service includes a local service provided via the gateway through which traffic from the access terminal proceeds to the router first jump to the access terminal, and the second service comprises a network service provided through the router first jump.

In some aspects, the functionality corresponding to one or more of the above aspects of the first, second and third means of communication may be implemented, for example, in the device using the structure, as discussed in this document. In addition, the computer software product may contain codes that are executed with the ability to instruct the computer to provide functionality corresponding to one or more of the above aspects of the first, second and third means of communication.

The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present disclosure entity. Various modifications to these aspects should be obvious to a person skilled in the art, as described in this Doc is the response of the General principles can be applied to other aspects without deviation from the scope of the disclosure. Thus, the present disclosure entity has no intention to be limited shown in this document aspects, and must satisfy the widest extent consistent with the principles and new features, disclosed in this document.

1. The communication method containing the steps are:
provide first point of presence Internet Protocol to allow the access terminal to access the first level of service that contains a local service, the first service level determines the first target node in the network packet, the first address of the Internet Protocol associated with the first service level;
use the first address is an Internet Protocol for routing packets between the access terminal and the first object that provides local service;
provide a second point of presence Internet Protocol to allow the access terminal to access the second level of service that contains a network service, the second service level determines the second target node in the network for packets, while the second address is an Internet Protocol associated with the second service level;
use the second address is an Internet Protocol for routing packets between the access terminal and the second object, which is in charge of the AET network service; and
sending, by the General radio traffic indicating the first level of service, and traffic indicating a second level of service.

2. The method according to claim 1, in which:
the first level of service indicates that the packet should not be tunneled; and
the second level of service specifies that packets must be tunneled.

3. The method according to claim 1, wherein the second service level indicates that the packet should be tunneled via the Protocol tunnel that terminates in at least one from the group consisting of the following: a guest network and edge gateway.

4. The method according to claim 1, wherein the second service level indicates that the packet should be tunneled via the Protocol tunnel that terminates in at least one from the group consisting of the following: a private network and a gateway core network.

5. The method according to claim 1, in which:
the first service level is also associated with the name of the first access point; and
the second level of service is also associated with the second access point.

6. The method according to claim 1, in which:
local service includes service provided through the service access point that communicates with the access terminal on the shared radio interface; and
network service contains a service provided through the first router is on the jump for the access terminal.

7. The method according to claim 6, in which:
the access point is associated with a subnet Internet Protocol; and local service contains a service provided by an object that is associated with a subnet Internet Protocol.

8. The method according to claim 1, in which:
sending traffic that indicates the first level of the service, contains the stage at which specify the first ID of the first service level and transmit the identifier to the first package;
sending traffic that indicates a second level of service, contains the stage at which specify a second identifier of the second service level and transmit the identifier to the second package.

9. The method according to claim 1, in which:
sending traffic that indicates the first level of the service, contains the phase in which define the first set of one or more threads associated with the first service level, and transmit the first packet stream in a first set of threads; and
sending traffic that indicates a second level of service, contains the phase in which determine a second set of one or more threads associated with the second service level, and transmit the second packet stream in a second set of threads.

10. The method according to claim 9, in which:
the first set of threads associated with the first set of unidirectional radio Yes the data; and
the second set of threads associated with the second set of unidirectional channels of data.

11. The method according to claim 1, additionally containing a stage on which to send messages that are associated with the first Protocol via the second Protocol to control the traffic is sent indicating the first level of service.

12. The method according to claim 11, in which:
the first Protocol associated with the communication between the mobility Manager and the serving gateway; and
the second Protocol associated with the communication between the mobility Manager and the access point that communicates with the access terminal on the shared radio interface.

13. Communication device, comprising:
the controller points of presence made with the possibility to provide the first point of presence Internet Protocol to allow the access terminal to access the first level of service that contains a local service, with the first address of the Internet Protocol associated with the first service level, and is additionally configured to provide a second point of presence Internet Protocol to allow the access terminal to access the second level of service that contains a network service, while the second address is an Internet Protocol associated with the second service level, PR is the first level of service determines the first target node in the network for packets and the second level of service is determined by the second terminal node in a network packet, the first address is an Internet Protocol used to route packets between the access terminal and the first object that provides local service, and the second address is an Internet Protocol used to route packets between the access terminal and the second object that provides the network service; and
communication controller, configured to send, according to the General radio traffic indicating the first level of service, and traffic indicating a second level of service.

14. The device according to item 13, in which:
the first level of service indicates that the packet should not be tunneled; and
the second level of service specifies that packets must be tunneled.

15. The device according to item 13, in which the second service level indicates that the packet should be tunneled via the Protocol tunnel that terminates in at least one from the group consisting of the following: a guest network and edge gateway.

16. The device according to item 13, in which the second service level indicates that the packet should be tunneled via the Protocol tunnel that terminates in at least one from the group consisting of the following: a private network and the gateway database is howling network.

17. The device according to item 13, in which:
the first service level is also associated with the name of the first access point; and
the second level of service is also associated with the second access point.

18. The device according to item 13, in which:
sending traffic that indicates the first level of the service, contains the job the first identifier of the first service level and the transmission of the identifier with the first service;
sending traffic that indicates a second level of service, contains the second identifier of the second service and the transmission of the identifier with the second package.

19. The device according to item 13, in which:
sending traffic that indicates the first level of the service, contains the definition of the first set of one or more threads associated with the first service level, and the transmission of the first packet flow in a first set of threads; and
sending traffic that indicates a second level of service, contains the definition of the second set of one or more threads associated with the second service level, and the transmission of the second packet stream in a second set of threads.

20. Communication device, comprising:
means for providing a first point of presence Internet Protocol to allow the access terminal to access p is pout level of service containing local service, with the first address of the Internet Protocol associated with the first service level, and for providing a second point of presence Internet Protocol to allow the access terminal to access the second level of service that contains a network service, while the second address is an Internet Protocol associated with the second service level, the first level of service determines the first target node in the network for packets, and the second level of service is determined by the second terminal node in a network packet, the first address is an Internet Protocol used to route packets between the access terminal and the first object, which provides local service, and the second address is an Internet Protocol used to route packets between the access terminal and the second object that provides the network service; and
means for sending, as a General radio traffic indicating the first level of service, and traffic indicating a second level of service.

21. The device according to claim 20, in which:
the first level of service indicates that the packet should not be tunneled; and
the second level of service specifies that packets must be tunneled.

22. The device according to claim 20, in which the second service the Oia indicates that what packets should be tunneled via the Protocol tunnel that terminates in at least one from the group consisting of the following: a guest network and edge gateway.

23. The device according to claim 20, in which the second service level indicates that the packet should be tunneled via the Protocol tunnel that terminates in at least one from the group consisting of the following: a private network and a gateway core network.

24. The device according to claim 20, in which:
the first service level is also associated with the name of the first access point; and
the second level of service is also associated with the second access point.

25. The device according to claim 20, in which:
sending traffic that indicates the first level of the service, contains the job the first identifier of the first service level and the transmission of the identifier with the first service;
sending traffic that indicates a second level of service, contains the second identifier of the second service and the transmission of the identifier with the second package.

26. The device according to claim 20, in which:
sending traffic that indicates the first level of the service, contains the definition of the first set of one or more threads associated with the first service level, and the transmission of the first packet flow in a first nab the re threads; and
sending traffic that indicates a second level of service, contains the definition of the second set of one or more threads associated with the second service level, and the transmission of the second packet stream in a second set of threads.

27. Machine-readable media containing code instructions of a computer:
to provide the first point of presence Internet Protocol to allow the access terminal to access the first level of service that contains a local service, the first service level determines the first target node in the network packet, the first address of the Internet Protocol associated with the first service level;
to use the first address in the Internet Protocol to route packets between the access terminal and the first object that provides local service;
to provide a second point of presence Internet Protocol,
to allow the access terminal to access the second level of service that contains a network service, the second service level determines the second target node in the network for packets, while the second address is an Internet Protocol associated with the second service level;
to use the second address is an Internet Protocol for routing packets between the terminal p is a and the second object, which provides a network service; and
send by General radio traffic indicating the first level of service, and traffic indicating a second level of service.

28. Machine-readable medium according to item 27, in which:
the first level of service indicates that the packet should not be tunneled; and
the second level of service specifies that packets must be tunneled.

29. Machine-readable medium according to item 27, in which:
the first service level is also associated with the name of the first access point; and
the second level of service is also associated with the second access point.



 

Same patents:

FIELD: radio engineering, communication.

SUBSTANCE: method includes performing of system call of data transfer, reading of flow multimedia data from disc space and their recording to user data buffer at server receiving flow multimedia data of data request from user equipment; packing of flow multimedia data saved in user data buffer into transferred packs of real time protocol using flow multimedia data packs, in which title and load are separated.

EFFECT: reduction of processor loading, arising from data copying and system calls.

6 cl, 2 dwg

FIELD: radio engineering, communication.

SUBSTANCE: conditional access system has a host configured to receive an input data stream and deliver the input data stream to a conditional access module, the conditional access module being configured to process the input data stream and provide a corresponding output stream to the host, the host and the conditional access module being configured to contact each other in an authentication protocol upon detection of a code embedded in the output stream.

EFFECT: preventing unauthorised access to information.

12 cl, 3 dwg

FIELD: radio engineering, communication.

SUBSTANCE: initialisation and control of access for communication units includes assignment of identifiers to sets of units, at the same time identifiers may be used to control access to limited units of access, which provide certain services only to determined specified sets of units. In certain aspects initialisation of the unit may contain provision of a unique identifier for sets from one or more units, such as limited points of access and terminals of access, which are authorised to receive a service from limited points of access. Access control may be provided by means of an operation of a limited point of access and/or a network unit. In certain aspects initialisation of a unit contains provision of a list of preferable roaming for a unit. In certain aspects the unit may be initialised with the help of a list of preferable roaming using a beacon radio signal of self-initialisation.

EFFECT: optimised process of access control.

36 cl, 28 dwg

FIELD: radio engineering, communication.

SUBSTANCE: system of avionics is connected with surface infrastructure with the help of at least one carrier of communication provision. The method includes at least one stage to receive service data stored in a memory of surface infrastructure related to faults of at least one functional unit, via the specified at least one carrier of communication provision, and a stage of repair of the specified at least one functional unit on the basis of received service data, at the same time the system of avionics established communication with surface infrastructure in a synchronous mode of communication.

EFFECT: reduction of costs for service and improvement of access to appropriate information for realisation of operations of aircraft servicing.

8 cl, 7 dwg

FIELD: radio engineering, communication.

SUBSTANCE: methods and devices are provided to format headings for data packages within a communication frame for use in a system of wireless communication. Formatting of headings includes determination of a size of a wireless communication frame and formatting of useful loads and related headings within a communication frame according to a certain size. Such formatting includes placement of headings in the beginning of the frame in front of data packages corresponding to these headings, in order to optimise processing of headings in a receiver. Formatting may also include formatting of headings according to the first format within the frame, when the determined size of the frame is less than the pre-determined size, in order to optimise the size of headings, and formatting according to the second format within the frame, when the size of the data package is equal or more than the predetermined size.

EFFECT: optimised processing for frames having large data packages.

52 cl, 10 dwg

FIELD: radio engineering, communication.

SUBSTANCE: server in a centre of data processing and storage may be arranged as capable of providing either a list of hashes or requested data on the basis of the fact, whether a system of cashes supported with a host node is permitted or not. The cash supported by the host node at the customer's side may provide data to the customer on the basis of hashes. Hashes may be generated to provide a reference sum of data, which may be used to efficiently index data.

EFFECT: provision of improvement in respect to delay time and reduction of total traffic of a global computing network.

20 cl, 10 dwg

FIELD: physics.

SUBSTANCE: interference detector of moving underwater object has a generator, a radiating antenna device, a signal processing unit which includes first and second receiving channels, having corresponding receiving antenna devices, a corresponding matching device and a filter unit, as well as a subtractor and an adaptive filter, an amplitude detector, a recording device, an information display unit, wherein the signal processing unit additionally includes a frequency tuning channel, which includes a third receiving antenna device, a third matching device, a third filter unit and a unit for calculating and comparing the coherence function.

EFFECT: detecting a moving underwater object in shallow water based on the changing interference pattern in the investigated region.

5 cl, 1 dwg

FIELD: information technology.

SUBSTANCE: functioning instructions are added to user group subscription stored in the IP multimedia subsystem, instructing nodes in the IP multimedia subsystem to adapt their standard functioning for this specific group of users. The instructions in a subscription of a specific user group, provide a node of the IP multimedia subsystem which no longer needs to be specific for certain types of users, but has a standard way of operation, which is modified by instructions for dedicated operation for only that specific user group.

EFFECT: easy access to services of an IP multimedia subsystem, by users group which require alternative handling in relation to the standard handling of IP multimedia subsystem users.

15 cl

FIELD: information technology.

SUBSTANCE: system has a receiving-control device having a subsystem for expanding wireless zones with a module for expanding wireless zones to provide two-way radio communication for constant control of the communication channel of wireless sensors and the receiving-control device on an internal communication bus; the sensors are configured form a data packet of control-diagnostic messages consisting of a pseudorandom encryption byte, a unique sensor number and packet index number, the message itself, the signal level of the previous received response from the corresponding module for expanding wireless zones and noise level in the sensor zone, and fitted with a transceiver for transmitting the data packet to the corresponding module for expanding wireless zones of the receiving-control device.

EFFECT: high reliability of the system and cryptographic protection of data transmission channels in order to reduce the probability of a security and fire alarm system being bypassed by intruders, interfacing a central monitoring system with digital communication channels.

19 cl, 1 dwg, 12 tbl

FIELD: information technology.

SUBSTANCE: method comprises steps of: organising the exchanged data into messages (M), having a single configuration; and the messages are described, as well as processing systems and applications with the same configuration in files stored in a storage unit (2) which is connected to the network and is accessible to data processing systems such that a data processing system which receives a message is capable, based on information delivered in the message, of finding the necessary data in the files of the storage unit.

EFFECT: improved adaptation properties of a data transmission system.

10 cl, 9 dwg

FIELD: mobile communications.

SUBSTANCE: base station determines speed of direct data transfer of data in accordance to control data about data transfer speed received from base station, reads temporary maximal total size encoder packers from buffer, determines, if it is possible to transfer these temporary packets at this speed of data transfer forms a combination of logic packets from these temporary packets, if it possible to transfer these packets at current data transfer speed, and total size of temporary packets is greater or equal to certain threshold value, and transmits logic packets with physical level packet.

EFFECT: higher data transfer speed.

3 cl, 9 dwg

FIELD: telecommunication systems and methods for global network access.

SUBSTANCE: proposed system has station that provides for meeting specified regulations concerning authentication of subscribers, authorization of access and services, accounting of network resources, and mobility. These specified regulations are determined by Internet service provider at decision station concerning specified regulations which is, essentially, server connected to Internet that communicates with mentioned providing station. Internet service provider may be made in the form of encryption key for given providing station and encryption key for particular subscriber.

EFFECT: enlarged functional capabilities.

33 cl, 4 dwg

FIELD: communications engineering.

SUBSTANCE: proposed device and method are used for voice frame/ data frame transmission in mobile communication system supporting ALL-IP network.Mobile phone sends heading information using synchronization frame and then separately transfers voice frame only; communication center B detects heading information in synchronization frame received, memorizes detected heading information, and upon receiving voice frame adds heading information to voice frame and transfers voice frame with added headings to base network.

EFFECT: provision for preventing addition of headings to traffics in mobile communication line.

39 cl, 7 dwg

FIELD: mobile communications.

SUBSTANCE: method and device for delivering a service are based on multiple speeds of data transfer, use scaling capability of multimedia codec in asynchronous communications network with multiple aces with code separation, delivering a service of multimedia broadcast and group transfer, area of whole cell is separated on first area and second area, first data are sent to first area, and second data are sent to second area, while first controller of electric power is in control of electric power of first data, and second controller of electric power controls electric power for second data, user device, positioned in second area, receives first data and second data, and user device in second area combines first data and second data, thus receiving one data element.

EFFECT: broader functional capabilities, lower costs.

5 cl, 13 dwg

FIELD: wireless communications.

SUBSTANCE: before starting data transfer between first object, for example, access terminal, and second object, for example, data transfer network, for synchronization a set of levels and/or protocols is selected, for each selected level and protocol, i.e. for each attribute, a list of selected attribute values is determined, viewed as acceptable for first object, selected attributes and attribute values connected thereto are sent from first object, and in response only a list of processed attributes is received and lists of values of processed attributes connected thereto, each list of values of processed attributes includes values of attributes, viewed as acceptable for first object, levels and protocols in first object are then configured in accordance to list of processed attributes and values of processed attributes connected thereto.

EFFECT: higher precision, broader functional capabilities, higher efficiency.

5 cl, 22 dwg, 1 tbl

FIELD: communication systems.

SUBSTANCE: system has commutated phone network and packet data transfer network Internet, control means, connected to Internet and made with possible determining of preferred route for phone calls through commutated phone network, and/or Internet, connection means, connected to commutated phone network, controlled by said control means, Internet-phone gateways, which are connected to commutated phone network and Internet network, and also authentication server, connected to Internet network.

EFFECT: higher efficiency, broader functional capabilities.

16 cl, 2 dwg

FIELD: establishing emergency communication session in information management system networks.

SUBSTANCE: proposed system has at least one piece of user's equipment and one or more network entities participating in establishment of emergency communication session when user's equipment initiates session establishment by sending message to network entity where identifier, such as call number or logic name of called entity, is indicated; one of network entities analyzes received identifier; if initiated session is found to be emergency communication session, information is returned to user's equipment to inform it about the fact that initiated session is just emergency communication session, whereupon user's equipment initiates emergency communication session execution; if user's equipment cannot find out that given session is emergency communication session, network will inform user's equipment about emergency communication session so as to provide for its adequate processing.

EFFECT: enhanced speed and reliability of emergency communication session identification.

38 cl, 4 dwg

FIELD: communication systems.

SUBSTANCE: system has receiver, transmitter, processing element, connected to receiver and transmitter and controlling receiver and transmitter, digital rights module, connected to processing elements and controlling operation of communication device in digital rights environment on domain basis, while digital rights module of communication device together with dispenser of domains of digital rights environment on domain basis is made with possible selective addition of communication device to domain, owning one or several communication devices, which together use a cryptographic key.

EFFECT: possible selective retrieval and decoding of digital content on basis of membership in a domain.

10 cl, 11 dwg

FIELD: telecommunications.

SUBSTANCE: method includes optimizing combination of event data, and excluding unnecessary transfer of detailed event records from one network object, responsible for data-gathering, to another.

EFFECT: detailed records of events, related to one session, but generated by several different network nodes, are sent in centralized manner in real time to data-gathering network node.

3 cl, 7 dwg

FIELD: mobile communication systems.

SUBSTANCE: proposed method used for Internet protocol (IP) mobile centers in heterogeneous networks with real-time applications includes following procedures: module 134 designed for managing interfaces of mobile center 10 checks mobile center for available network interfaces 14 - 17, generates recoding table with available and configurable interfaces 14 - 17, and communicates with applications 11 of interfaces 14 - 17. Applications 11 of IP mobile center 10 are given access to heterogeneous networks through virtual network IP interface 133 organized in mobile center 10; this IP interface 133 communicates with current network 21 - 24 through interface management module 134. Changing interface 14 - 17 of mobile center 10 updates communications of IP permanent virtual network interface with network 21 - 24 basing on recoding table by means of interface management module 134.

EFFECT: ability of change-over from one network connection to other in heterogeneous networks without interrupting internet protocol applications.

16 cl, 9 dwg

Up!