US20130128739A1 - Method and Device to Control Communication with Multiple Networks Based on Respective Quality of Service Requirements - Google Patents
Method and Device to Control Communication with Multiple Networks Based on Respective Quality of Service Requirements Download PDFInfo
- Publication number
- US20130128739A1 US20130128739A1 US13/435,542 US201213435542A US2013128739A1 US 20130128739 A1 US20130128739 A1 US 20130128739A1 US 201213435542 A US201213435542 A US 201213435542A US 2013128739 A1 US2013128739 A1 US 2013128739A1
- Authority
- US
- United States
- Prior art keywords
- interface
- external network
- network
- pdn
- host device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0212—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is leader and terminal is follower
- H04W52/0216—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is leader and terminal is follower using a pre-established activity schedule, e.g. traffic indication frame
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03D—DEMODULATION OR TRANSFERENCE OF MODULATION FROM ONE CARRIER TO ANOTHER
- H03D7/00—Transference of modulation from one carrier to another, e.g. frequency-changing
- H03D7/16—Multiple-frequency-changing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0252—Traffic management, e.g. flow control or congestion control per individual bearer or channel
- H04W28/0263—Traffic management, e.g. flow control or congestion control per individual bearer or channel involving mapping traffic to individual bearers or channels, e.g. traffic flow template [TFT]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- the present application is directed to packet data networks (PDNs), and more specifically to a system and a method that enables a host device to support multiple packet data networks (PDNs).
- PDNs packet data networks
- IPCP Internet protocol configuration protocol
- FIG. 1 illustrates an exemplary system including a host device capable of supporting multiple PDNs according to an embodiment of the present disclosure.
- FIG. 2 illustrates another exemplary system including a host device capable of supporting multiple PDNs according to an embodiment of the present disclosure.
- FIG. 3 illustrates another exemplary system including a host device capable of supporting multiple PDNs according to an embodiment of the present disclosure.
- FIG. 4 illustrates an exemplary algorithm performed in a network device according to an embodiment of the present disclosure.
- FIG. 5 illustrates another exemplary algorithm performed in a network device according to an embodiment of the present disclosure.
- FIG. 6 illustrates another exemplary algorithm performed in a network device according to an embodiment of the present disclosure.
- FIG. 7 illustrates an example computer system that can be used to implement aspects of the present disclosure.
- references in the specification to “one embodiment,” “an embodiment,” “an example embodiment,” etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to effect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
- a conventional network host device is able to support only one PDN at a time, and involves the undesirable distribution of the functionality to configure the interface across several modules of the network host device to run and support IPCP. Therefore, the following system enables a network host device to support multiple PDNs at a time and enables the configuration of interfaces associated with the multiple PDNs without having to run and support IPCP, as discussed below.
- FIG. 1 illustrates a system 150 including a host device 100 connected to multiple PDNs 101 , 102 , 103 according to an embodiment of the present disclosure.
- Each PDN is connected to the host device 100 via respective bearers 111 , 112 , 113 which are used for bidirectional communication of data between the PDNs 101 , 102 , 103 and the host device 100 .
- PDN 1 101 is connected to the host device 100 via bearers 111
- PDN 2 102 is connected to the host device 100 via bearers 112
- PDN 3 103 is connected to the host device 100 via bearers 113 .
- the host device 100 includes a connection manager 104 and an integrated circuit 110 .
- the connection manager is connected to an applications unit 107 which stores the applications to be run by the host device 100 .
- the integrated circuit 110 further includes a memory 108 , and a CPU 1 120 including a PDN classification unit 106 and an interface driver 105 .
- the interface driver 105 is connected to the connection manager 104 via interfaces 121 , 122 , 123 .
- the integrated circuit 110 also includes a CPU 2 140 which includes a traffic control unit 160 .
- the traffic control unit 160 includes a PDN bearer mapping unit 161 , a quality of service (QOS) enforcement unit 162 , an intra-PDN classification unit 163 , and a timer 164 .
- the interface driver 105 is connected to the intra-PDN classification unit 163 via a queuing unit 130 .
- a PDN is an IP domain that the host device 100 is capable of communicating with.
- a PDN can be the Internet, a corporate network, or a private network associated with the host device 100 .
- a PDN can be identified by an Access Point Name (APN).
- the host device 100 connects to a PDN when the connection manager 104 detects a need for establishing a connection with a PDN and/or when an application stored in the applications unit 107 is initiated and requests the connection manager 104 to establish a connection with a PDN.
- the connection manager 104 Upon detecting a need or upon receiving a request to connect with a PDN, the connection manager 104 coordinates the necessary protocol-level handshake with the PDN and negotiates a quality of service (QOS) with respect to communication between the host device 100 and the PDN.
- QOS quality of service
- the QOS enforcement unit 162 stores these QOS requirements negotiated with the PDN.
- the QOS enforcement unit 162 also stores any updates or changes to the QOS requirements.
- the connection manager 104 informs the intra-PDN classification unit 163 of the identity of the PDN and of a default bearer that is to be used to communicate with the PDN.
- the connection manager 104 also manages the association of an initiated application with a PDN and the communication between the initiated application and the PDN. In one embodiment, once the manger associates the initiated application with PDN, the initiated application is configured to be able to communicate with the PDN by routing data back and forth without the involvement of the connection manager 104 .
- the connection manager 104 requests the interface driver 105 to expose an interface dedicated to the connected PDN.
- all processing of data associated with the connected PDN by the integrated circuit 110 is conducted through the interface dedicated to the connected PDN.
- all processing of data associated with PDN 1 101 by the integrated circuit 110 is conducted through the dedicated interface 121
- all processing of data associated with PDN 2 102 by the integrated circuit 110 is conducted through the dedicated interface 122
- all processing of data associated with PDN 3 103 by the integrated circuit 110 is conducted through the dedicated interface 123 .
- the PDN classification unit 106 monitors the communication between the connection manager 104 and the interface driver 105 , and classifies or associates the exposed dedicated interfaces with their respective PDNs.
- the PDN classification unit 106 associates the dedicated interface 121 with PDN 1 101 , associates the dedicated interface 122 with PDN 2 102 , and associates the dedicated interface 123 with PDN 3 103 .
- the interface driver 105 exposes interfaces that are Internet protocol (IP) interfaces.
- IP Internet protocol
- the IP interfaces can be implemented using an Ethernet connection between the connection manger 104 and the interface driver 105 .
- the characteristics and properties of an exposed interface are based on parameters of the PDN to which the exposed interface is dedicated. Further, the characteristics and the properties of the exposed interfaces are controllable to be dynamically changed to adapt to any changes to the parameters of the PDN.
- the parameters of the PDN and any changes thereto can be provided by the connection manager 104 to the interface driver 105 .
- the interface driver 105 receives the PDN parameters and any changes thereto, and exposes a new interface having custom characteristics and properties or adapts the characteristics and properties of an existing interface based on the received PDN parameters.
- the interface driver 105 When the host device 100 is connected to a plurality of PDNs, the interface driver 105 is requested to expose a plurality of dedicated interfaces.
- the plurality of exposed interfaces are collectively known as the stack of exposed interfaces.
- the host device 100 configures the stack of exposed interfaces 121 , 122 , 123 without the use of the network (for example, by running IPCP), as is done by conventional host devices.
- the traffic control unit 160 is used to configure the stack of exposed interfaces 121 , 122 , 123 .
- the traffic control unit 160 configures the stack of exposed interfaces by managing the exposing of a new interface (through the interface driver 105 ) in the presence of existing exposed interfaces and the functioning of all the exposed interfaces with respect to each other.
- the traffic control unit 170 performs a discovery process every time a new interface is exposed without using the network.
- the neighbor discovery process may include, for example, duplicate address detection to ensure that a tentative address selected for a PDN is unique with respect to an address selected for another PDN.
- the neighbor discovery process may also include running of an address resolution protocol.
- the neighbor discovery process may include a connectivity detection to check the status of a connection to a PDN. The neighbor discovery process is discussed in detail later on.
- An application of the host device 100 connected to a PDN is ready to communicate data with the PDN once the traffic control unit 160 has configured the stack of exposed interfaces.
- the connection manager 104 connects and associates each exposed interface to a respective PDN, and this knowledge is made available to the PDN classification unit 106 .
- multiple PDNs 101 , 102 , 103 can simultaneously be connected to and communicated with via the host device 100 . That is, the host device 100 is capable of supporting multiple PDNs at a given time.
- each PDN 101 , 102 , 103 has multiple respective bearers 111 , 112 , 113 which are used for bidirectional communication of data between each PDN 101 , 102 , 103 and the host device 100 .
- connection manager 104 assigns one of the interfaces exposed by the interface driver 105 as a default interface.
- the default interface is used for communication of processing data associated with default packet data that is to be transmitted to a PDN, the default packet data being generated by an application which is unknown to the PDN.
- the connection manager 104 is required to determine a destination PDN to which a piece of data (e.g., generated by an application of the host device) is to be routed. This process to determine the destination PDN is called inter-PDN classification. Further, once the destination PDN has been determined, the connection manager 104 is required to determine which one of the multiple bearers of the destination PDN is to be used to communicate the data based on the negotiated quality of service with the destination PDN. This process to determine the bearer for communication is called intra-PDN classification. To satisfy the QOS requirements negotiated with the PDNs, both the inter-PDN classification process and the intra-PDN classification process should be completed, as discussed below.
- the connection manager 104 transfers the received data to the respective interface associated or connected to the one of the multiple PDNs. Further, the interface driver 105 identifies the PDN that provided the received data based on the interface through which it receives the received data and based on the information available from the PDN classification unit 106 . Now, when an application of the host device 100 generates data to be communicated to a particular PDN, the communication manager transfers the generated data to the interface driver 105 through the interface dedicated to the particular PDN.
- the interface driver 105 then identifies the particular PDN, to which the generated data is to be communicated, based on the interface to which it receives the generated data and based on the information available from the PDN classification unit 106 . Once the interface driver 105 has identified the destination PDN, this identification of the destination PDN is provided to the intra-PDN classification unit 163 . This enables the intra-PDN classification unit to carry out the intra-PDN classification process to determine which one of the multiple bearers of the destination PDN is to be used to communicate the data to the destination PDN.
- the interface driver 105 uses the queuing unit 130 to provide the identification of the destination PDN to the intra-PDN classification unit 163 .
- the interface driver 105 tags each packet of the received data or the generated data with identification information of the destination PDN, and transfers the tagged packets to the intra-PDN classification unit 163 via the queuing unit 130 .
- the queuing unit 130 includes modules that allow and/or guarantee preservation of the identification information tagged on to each packet of the received data or the generated data that is being transferred from the interface driver 105 to the intra-PDN classification unit 163 .
- the use of modules that allow and/or guarantee preservation of the identification information is important because otherwise the identification information may be lost during the transfer of the tagged packet data.
- the queuing unit 130 may use mutually incompatible modules to transfer the tagged packet data, and therefore, preservation of the identification information is not guaranteed. In such situations, the identification information can be lost during the transfer of the tagged packet data. As such, it is desirable that the queuing unit 130 ensure that only those modules which allow and/or guarantee the preservation of the identification information are used in the transfer of the tagged packet data.
- the connection manager 104 transfers packet data received from one of the multiple PDNs (destination PDN) or the generated packet data received from an initiated application to the interface driver 105 over a respective interface associated with the destination PDN.
- the interface driver 105 identifies the destination PDN based on the respective interface over which the packet data is received from the connection manager 104 .
- the interface driver 105 tags each packet of the packet data with identification information of the destination PDN. For example, each packet of the packet data includes a header, and the interface driver 105 includes the identification information of the destination PDN in the header of each packet.
- the interface driver 105 then transfers each tagged packet of the packet data to the intra-PDN classification unit 163 via the queuing unit 130 .
- the interface driver 105 generates a respective descriptor associated with each packet of the received packet data or the generated packet data.
- the interface driver 105 then stores the packets of the received/generated packet data in the memory 108 , and tags each of the descriptors with the identification information of the destination PDN before transferring each of the tagged descriptors to the intra-PDN classification unit 163 via the queuing unit 130 .
- the interface driver modifies a text-entry portion of the descriptor to include the identification information of the destination PDN. Further, the interface driver 105 may generate the descriptor including a pointer that indicates a location of the corresponding packet of received/generated packet data stored in the memory 108 .
- the interface driver 105 may store the identification information of the destination PDN in the memory 108 .
- the pointer included in the descriptor may indicate the identity of the destination PDN by pointing to the location in the memory 108 where the identification information of the destination PDN is stored.
- each descriptor is capable of storing specific information about the corresponding packet of data such as length of the packet, type of the packet data (voice, text, etc.), and the like. This specific information is used by the intra-PDN classification unit 163 to carry out the above-described intra-PDN classification process.
- the queuing unit 130 can be implemented as multiple queuing units 131 , 132 , 133 , each queuing unit being dedicated to each interface exposed by the interface driver 105 . Further, each queuing unit 131 , 132 , 133 is configured to run its own scheme of ordering the packet data (or descriptors). Now, since each exposed interface is dedicated to a particular PDN, each queuing unit from among the multiple queuing units 131 , 132 , 133 is also dedicated to a particular PDN.
- a given queuing unit from among the multiple queuing units 131 , 132 , 133 always transfers data (or descriptors) associated with a given PDN from among the multiple PDNs. In this way, data (or descriptors) associated with a plurality of PDNs can be simultaneously transferred to the intra-PDN classification unit 163 , thereby increasing overall efficiency.
- the intra-PDN classification unit 163 can be configured to identify the destination PDN based on the queuing unit through with the received/generated packet data (or descriptors) is received. In this case, the tagging of each data packet (or descriptor) could be avoided.
- the interface driver 105 tags each packet (or descriptor) of the received/generated packet data with identification information of the destination PDN, and transfers the tagged packets (or descriptors) to the intra-PDN classification unit 163 via the queuing unit 130 .
- the intra-PDN classification unit is configured to select a data packet (or descriptor) from among a plurality of packets (or descriptors) in a queue of the queuing unit 130 based on QOS requirements of a PDN associated with the packet (or descriptor) or based on characteristics of packet data such as, for example, the specific information included in the descriptors, n the embodiment including the multiple queuing units 131 , 132 , 133 , the intra-PDN classification unit can be configured to select a data packet (or descriptor) from among a plurality of packets (or descriptors) based on an ordering scheme of the respective queuing unit from among the multiple queuing units 131 , 132 , 133 .
- the intra-PDN classification unit 163 stores a traffic flow template (TFT) associated with each PDN.
- TFT traffic flow template
- a traffic flow template enables the intra-PDN classification unit 163 to determine which bearer from among the multiple bearers of a given PDN is to be used for communication with the given PDN, in addition, the intra-PDN classification unit 163 determines the bearer for communication based on the QOS requirements negotiated with the given PDN and stored in the QOS enforcement unit 162 . Additionally or optionally, the intra-PDN classification unit 163 may determine the bearer for communication used on information (e.g., specific information) included in the tagged packet data or tagged descriptors.
- information e.g., specific information
- the QOS requirements stored in the QOS enforcement unit 162 are, for example, associated with an amount of traffic of data on each bearer from among the multiple bearers associated with each PDN.
- the intra-PDN classification unit 163 satisfies the QOS requirements negotiated with a given PDN by balancing parameters associated with the communication of data between the host device 100 and given PDN. For example, the intra-PDN classification unit 163 balances the data rate through a given bearer with an allowable jitter requirement, thereby increasing overall efficiency. Further, the intra-PDN classification unit 163 balances a check level discard timer 164 associated with a given bearer to satisfy the QOS requirements and also to arrive at the allowable jitter requirement.
- the check level discard timer 164 starts running once the packet data or a descriptor of the packet data arrives at the intra-PDN classification unit 163 , and runs for a predetermined duration of time within which the intra-PDN classification process should be completed.
- the intra-PDN classification unit 163 may use a token bucket algorithm to check whether the data communication through the bearers conforms to the QOS requirements stored in the QOS enforcement unit 162 .
- FIG. 3 illustrates a system 350 including the host device 100 connected to multiple the PDNs 101 , 102 , 103 via respective PDN gateways 301 , 302 , 303 .
- the remaining features of the system 350 are analogous to the features of the system 150 , and therefore, a detailed discussion of these features is being omitted.
- the host device 100 is connected to PDNs 101 , 102 , 103 via respective PDN gateways 301 , 302 , 303 .
- connection manager 104 of the host device 100 is connected to PDN 1 via PDN 1 gateway 301 , to PDN 2 via PDN 2 gateway 302 , and to PDN 3 via PDN 3 gateway 303 .
- the host device 100 may simultaneously communicate with the PDNs 101 , 102 , 103 via respective PDN gateways 301 , 302 , 303 . Further, the host device 100 may communicate with another host device connected to one of the PDNs 101 , 102 , 103 .
- a conventional host device is required to perform a cumbersome process of neighbor solicitation when the conventional host device is connected to a given PDN, and is communicating with another conventional host device connected to the given PDN.
- the conventional host device is required to choose a network address to identify itself to the given PDN, and further to advertise the chosen network address over the given PDN to ensure that no other host device connected to the given PDN is using the same chosen network address. That is, the conventional host device is required to conduct the cumbersome process of neighbor solicitation to ensure uniqueness of its chosen network address.
- the conventional host device is required to conduct additional processing to identify an intermediate node (e.g., a base station using a radio link) to which a piece of data will be initially transmitted to when the conventional host device wishes to transmit the piece of data to the another conventional host device.
- the conducting of these processes adversely affects the efficiency of the conventional host device.
- the advertising of the chosen network address over the given PDN unnecessarily burdens traffic of data over the given PDN.
- the present disclosure obviates the need for the host device 100 to conduct the above cumbersome processes and also reduces the traffic over a PDN by connecting the host device 100 to the PDNs via respective PDN gateways.
- the interface driver 105 when the interface driver 105 provides an interface (e.g., IP interface 121 ) to be dedicated to a PDN (e.g., PDN 1 ), the interface driver 105 is configured to assign a network address to the provided interface, and to inform the assigned network address to the connection manager 104 . The connection manager 104 then provides the assigned network address to the PDN 1 gateway 301 over a network link.
- the PDN 1 gateway 301 recognizes the host device 100 as being a unique device based on this network link because the host device 100 is the only host device connected to the PDN 1 gateway 301 over this network link.
- the PDN 1 gateway 301 assigns a global network address to the host device 100 based on this network link.
- the global network address may include the network address assigned by the interface driver 105 or a modified version of the same. In this way, the host device 100 is provided with a unique global network address with respect to PDN 1 101 . Now, the host device 100 only needs to provide destination information of the another host to which data is to be transmitted without having to conduct any neighbor solicitation.
- the PDN 1 gateway 301 then resolves the path through which the transmitted data is to be routed so that the transmitted data reaches the another host.
- the PDN 1 gateway 301 includes the global network address of the host device 100 in the information sent along with the transmitted data. In this way, the host device 100 is not required to conduct the cumbersome process of neighbor solicitation or of identifying the above-mentioned intermediate node.
- the host device 100 may communicate with all other host devices connected to PDN 1 101 only via the PDN 1 gateway 301 . In the above embodiment, it is not necessary that the another host device be connected to PDN 1 101 . Rather, the another host device can be connected to any PDN, the path to which is resolved by the PDN 1 gateway 301 .
- PDN gateways 302 and 303 function in a similar way to the above exemplary functioning of PDN gateway 301 .
- the connection manager 104 when the host device 100 is required to receive a response ensuring the uniqueness of the network address before communicating through a given PDN, the connection manager 104 is configured to generate a fake response indicating the uniqueness of the network address assigned by the interface driver 105 , and to communicate the fake response to the interface driver 105 . This allows the host device 100 to communicate through the given PDN without advertising the chosen network address over the given PDN to ensure uniqueness of the same.
- the network address of the interface 121 could be an IPv6 address.
- the network link could be a wireless network link.
- the host device 100 For the host device 100 to be able to communicate with a destination host (beyond PDN-Gateway), the host device 100 needs to know the next-hop neighbor's link-layer address to which the data may be routed. For example, when the host device 100 uses an Ethernet device/interface, the host device 100 needs to know a Ethernet MAC address (e.g. 48 bit address) of the destination host device that the host device 100 should address its Ethernet packets to. Alternatively, when the host device 100 uses an LTE interface, the host device 100 can remove the Ethernet header before sending any uplink packet, and therefore the exact value of the advertised link-layer address for the destination host device IP address is not required.
- Ethernet MAC address e.g. 48 bit address
- the host device 100 simply routes any uplink packet to the PDN gateway associated with the destination host, and the PDN gateway resolves the path to the destination host.
- the traffic control module may respond with a neighbor advertisement message including an arbitrary Ethernet address.
- the connectivity detection procedure included in the neighbor discovery process will now be explained when the host device 100 operates using, for example, the IPv6 protocol.
- the host device 100 would have to perform the IPv6 un-reachability detection to check the availability of another IPv6 device connected on the same link to a PDN as the host device 100 , so as to ensure uniqueness and security of communication.
- the host device 100 is connected to a PDN via a PDN gateway, and the host device 100 is the only device connected to the PDN gateway on a given link.
- a link between the host device and a PDN gateway has no other host devices connected to the link. Therefore, it is not necessary for the host device 100 to perform the un-reachability detection described above.
- the connection manager 104 and/or the interface driver 105 can generate un-reachability detection messages and transmit the same to the traffic control module.
- the traffic control module responds to the un-reachability detection messages within the host device 100 without sending the messages to the PDN gateway.
- the integrated circuit 110 can be external to the host device 100 and can be communicatively connected to the host device 100 , for example, via an IP interface.
- the integrated circuit 110 can be communicatively connected to the host device 100 via a USB connection or via an SDIO connection.
- the host device 100 could be a handheld device such as a cellular phone, PDA, or the like. Further, the host device 100 could be compatible with many networks including LTE, 2G, 3G, or the like.
- FIG. 4 illustrates an exemplary algorithm performed in a network device for communicating data with an external network over a plurality of bearers associated with the external network according to an embodiment of the present disclosure.
- the network device connects to an external network.
- the network device negotiates a quality of service (QOS) requirement related to communication with the external network.
- QOS quality of service
- the network device stores an application that is capable of communicating with the external network.
- the network device provides an interface dedicated to the external network.
- processing data associated with communication over the interface is received
- the network device tags a packet of the processing data with identification information of the external network.
- the network device identifies or generates the identification information of the external network based on the interface over which the processing data associated with the external network is received.
- the network device selects a bearer from among the plurality of bearers based on the identification information tagged on the packet and/or based on the negotiated QOS requirement, to communicate with the external network.
- FIG. 5 illustrates another exemplary algorithm performed in a network device for communicating data with an external network over a plurality of bearers associated with the external network according to an embodiment of the present disclosure.
- the network device connects to an external network.
- the network device negotiates a quality of service (QOS) requirement related to communication with the external network.
- the network device stores an application that is capable of communicating with the external network.
- the network device provides an interface dedicated to the external network.
- processing data associated with communication over the interface is received.
- QOS quality of service
- the network device In step 506 , the network device generates a descriptor associated with a packet of the processing data. In step 507 , the network device tags the generated descriptor with identification information of the external network. In one embodiment, the network device identifies and/or generates the identification information of the external network based on the interface over which the processing data associated with the external network is received. In step 508 , the network device selects a bearer from among the plurality of bearers based on the identification information tagged on the descriptor and/or based on the negotiated QOS requirement, to communicate with the external network.
- FIG. 6 illustrates an exemplary algorithm performed by the network device while providing an interface dedicated to the external network.
- the network device provides the interface dedicated to the external network without running the Internet protocol configuration protocol (IPCP).
- IPCP Internet protocol configuration protocol
- step 601 the network device provides the interface with a characteristic based on a parameter associated with the external network
- step 602 the network device dynamically adjusts the characteristic of the interface with a change in the parameter associated with the external network.
- IPCP Internet protocol configuration protocol
- the exemplary algorithms discussed in the present disclosure can be performed by the hardware components of the devices (e.g., host device 100 ) discussed in the present disclosure.
- Embodiments of the present disclosure can be implemented in hardware, or as a combination of software and hardware. Consequently, embodiments of the disclosure may be implemented in the environment of a computer system or other processing system.
- An example of such a computer system 700 is shown in FIG. 7 .
- One or more of the features depicted in FIGS. 1-6 e.g., communication manager 104 , interface driver 105 , traffic control module 160 , PDN gateway 301 , etc.
- any functions performed by any of the above features can be implemented on one or more distinct computer systems 700 .
- a computer system 700 includes one or more processors, such as processor 704 .
- Processor 704 can be a special purpose or a general purpose digital signal processor.
- Processor 704 is connected to a communication infrastructure 702 (for example, a bus or network).
- a communication infrastructure 702 for example, a bus or network.
- Computer system 700 also includes a main memory 706 , preferably random access memory (RAM), and may also include a secondary memory 708 .
- Secondary memory 708 may include, for example, a hard disk drive 710 and/or a removable storage drive 712 , representing a floppy disk drive, a magnetic tape drive, an optical disk drive, or the like.
- Removable storage drive 712 reads from and/or writes to a removable storage unit 716 in a well-known manner
- Removable storage unit 716 represents a floppy disk, magnetic tape, optical disk, or the like, which is read by and written to by removable storage drive 712 .
- removable storage unit 716 includes a computer usable storage medium having stored therein computer software and/or data.
- secondary memory 708 may include other similar means for allowing computer programs or other instructions to be loaded into computer system 700 .
- Such means may include, for example, a removable storage unit 718 and an interface 714 .
- Examples of such means may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, a thumb drive and USB port, and other removable storage units 718 and interfaces 714 which allow software and data to be transferred from removable storage unit 718 to computer system 700 .
- Computer system 700 may also include a communications interface 720 .
- Communications interface 720 allows software and data to be transferred between computer system 700 and external devices. Examples of communications interface 720 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc.
- Software and data transferred via communications interface 720 are in the form of signals which may be electronic, electromagnetic, optical, or other signals capable of being received by the host device 100 . These signals are provided to communications interface 720 via a communications path 722 .
- Communications path 722 carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link and other communications channels.
- computer program medium and “computer readable medium” are used to generally refer to tangible storage media such as removable storage units 716 and 718 or a hard disk installed in hard disk drive 710 . These computer program products are means for providing software to computer system 700 .
- Computer programs are stored in main memory 706 and/or secondary memory 708 . Computer programs may also be received via communications interface 720 . Such computer programs, when executed, enable the computer system 700 to implement the present disclosure as discussed herein. In particular, the computer programs, when executed, enable processor 704 to implement the processes of the present disclosure, such as any of the methods described herein. Accordingly, such computer programs represent controllers of the computer system 700 . Where the disclosure is implemented using software, the software may be stored in a computer program product and loaded into computer system 700 using a removable storage drive 712 , interface 714 , or communications interface 720 .
- features of the disclosure are implemented primarily in hardware using, for example, hardware components such as application-specific integrated circuits (ASICs) and gate arrays.
- ASICs application-specific integrated circuits
- gate arrays gate arrays
- any exemplary processes described herein can be implemented in hardware, software, or any combination thereof.
- the exemplary process can be implemented using computer processors, computer logic, application specific circuits (ASICs), digital signal processors (DSP), etc., as will be understood by one of ordinary skill in the arts based on the discussion herein.
- ASICs application specific circuits
- DSP digital signal processors
- any exemplary processes discussed herein can be embodied by a computer processor or any one of the hardware devices listed above.
- the computer program instructions cause the processor to perform the processing functions described herein.
- the computer program instructions e.g., software
- Such media include a memory device such as a computer disk or CD ROM, or the equivalent.
- any computer storage medium having computer program code that causes a processor to perform the processing functions described herein are with the scope and spirit of the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- This non-provisional application claims the benefit of U.S. Provisional Application No. 61/562,196, filed Nov. 21, 2011, the contents of which are herein incorporated by reference in their entirety.
- The present application is directed to packet data networks (PDNs), and more specifically to a system and a method that enables a host device to support multiple packet data networks (PDNs).
- Conventional network host devices operating in a network environment are able to support only one PDN at a given time. Further, these conventional network host devices require the use of several dedicated modules that run and support the Internet protocol configuration protocol (IPCP) over the network to configure an interface that is required to support the PDN. As such, the functionality to configure the interface is distributed over several modules within the host device. However, the requirement to utilize several modules of the host device is undesirable because it greatly reduces the efficiency of the host device. Further, the several modules have different characteristics which are incompatible with each other with respect to the configuration of the interface.
- Therefore, there is a need for a system and a method that enables a host device to support multiple PDNs at a given time based on respective quality of service requirements, and to avoid the distribution of the functionality to configure the interfaces required to support the multiple PDNs over several modules within the host device.
-
FIG. 1 illustrates an exemplary system including a host device capable of supporting multiple PDNs according to an embodiment of the present disclosure. -
FIG. 2 illustrates another exemplary system including a host device capable of supporting multiple PDNs according to an embodiment of the present disclosure. -
FIG. 3 illustrates another exemplary system including a host device capable of supporting multiple PDNs according to an embodiment of the present disclosure. -
FIG. 4 illustrates an exemplary algorithm performed in a network device according to an embodiment of the present disclosure. -
FIG. 5 illustrates another exemplary algorithm performed in a network device according to an embodiment of the present disclosure. -
FIG. 6 illustrates another exemplary algorithm performed in a network device according to an embodiment of the present disclosure. -
FIG. 7 illustrates an example computer system that can be used to implement aspects of the present disclosure. - In the following description, numerous specific details are set forth in order to provide a thorough understanding of the disclosure. However, it will be apparent to those skilled in the art that the disclosure including structures, systems, and methods, may be practiced without these specific details. The description and representation herein are the common means used by those experienced or skilled in the art to most effectively convey the substance of their work to others skilled in the art. In other instances, well-known methods, procedures, components, and circuitry have not been described in detail to avoid unnecessarily obscuring aspects of the disclosure.
- References in the specification to “one embodiment,” “an embodiment,” “an example embodiment,” etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to effect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
- As described above, a conventional network host device is able to support only one PDN at a time, and involves the undesirable distribution of the functionality to configure the interface across several modules of the network host device to run and support IPCP. Therefore, the following system enables a network host device to support multiple PDNs at a time and enables the configuration of interfaces associated with the multiple PDNs without having to run and support IPCP, as discussed below.
-
FIG. 1 illustrates asystem 150 including ahost device 100 connected to 101, 102, 103 according to an embodiment of the present disclosure. Each PDN is connected to themultiple PDNs host device 100 via 111, 112, 113 which are used for bidirectional communication of data between therespective bearers 101, 102, 103 and thePDNs host device 100. In particular, PDN1 101 is connected to thehost device 100 viabearers 111, PDN2 102 is connected to thehost device 100 viabearers 112, and PDN3 103 is connected to thehost device 100 viabearers 113. - The
host device 100 includes aconnection manager 104 and anintegrated circuit 110. The connection manager is connected to anapplications unit 107 which stores the applications to be run by thehost device 100. The integratedcircuit 110 further includes amemory 108, and aCPU1 120 including aPDN classification unit 106 and aninterface driver 105. Theinterface driver 105 is connected to theconnection manager 104 via 121, 122, 123. The integratedinterfaces circuit 110 also includes aCPU2 140 which includes atraffic control unit 160. Thetraffic control unit 160 includes a PDNbearer mapping unit 161, a quality of service (QOS)enforcement unit 162, anintra-PDN classification unit 163, and atimer 164. Theinterface driver 105 is connected to theintra-PDN classification unit 163 via aqueuing unit 130. - A PDN is an IP domain that the
host device 100 is capable of communicating with. A PDN can be the Internet, a corporate network, or a private network associated with thehost device 100. A PDN can be identified by an Access Point Name (APN). Thehost device 100 connects to a PDN when theconnection manager 104 detects a need for establishing a connection with a PDN and/or when an application stored in theapplications unit 107 is initiated and requests theconnection manager 104 to establish a connection with a PDN. Upon detecting a need or upon receiving a request to connect with a PDN, theconnection manager 104 coordinates the necessary protocol-level handshake with the PDN and negotiates a quality of service (QOS) with respect to communication between thehost device 100 and the PDN. TheQOS enforcement unit 162 stores these QOS requirements negotiated with the PDN. TheQOS enforcement unit 162 also stores any updates or changes to the QOS requirements. In addition, theconnection manager 104 informs theintra-PDN classification unit 163 of the identity of the PDN and of a default bearer that is to be used to communicate with the PDN. Theconnection manager 104 also manages the association of an initiated application with a PDN and the communication between the initiated application and the PDN. In one embodiment, once the manger associates the initiated application with PDN, the initiated application is configured to be able to communicate with the PDN by routing data back and forth without the involvement of theconnection manager 104. - Now, upon connection with a PDN, the
connection manager 104 requests theinterface driver 105 to expose an interface dedicated to the connected PDN. In one embodiment, all processing of data associated with the connected PDN by the integratedcircuit 110 is conducted through the interface dedicated to the connected PDN. For example, all processing of data associated withPDN1 101 by the integratedcircuit 110 is conducted through thededicated interface 121, all processing of data associated withPDN2 102 by the integratedcircuit 110 is conducted through thededicated interface 122, and all processing of data associated withPDN3 103 by theintegrated circuit 110 is conducted through thededicated interface 123. ThePDN classification unit 106 monitors the communication between theconnection manager 104 and theinterface driver 105, and classifies or associates the exposed dedicated interfaces with their respective PDNs. In particular, based on the communication between theconnection manager 104 and theinterface driver 105, thePDN classification unit 106 associates thededicated interface 121 with PDN1 101, associates thededicated interface 122 withPDN2 102, and associates thededicated interface 123 withPDN3 103. - In one embodiment, the
interface driver 105 exposes interfaces that are Internet protocol (IP) interfaces. For example, the IP interfaces can be implemented using an Ethernet connection between theconnection manger 104 and theinterface driver 105. The characteristics and properties of an exposed interface are based on parameters of the PDN to which the exposed interface is dedicated. Further, the characteristics and the properties of the exposed interfaces are controllable to be dynamically changed to adapt to any changes to the parameters of the PDN. The parameters of the PDN and any changes thereto can be provided by theconnection manager 104 to theinterface driver 105. Specifically, theinterface driver 105 receives the PDN parameters and any changes thereto, and exposes a new interface having custom characteristics and properties or adapts the characteristics and properties of an existing interface based on the received PDN parameters. - When the
host device 100 is connected to a plurality of PDNs, theinterface driver 105 is requested to expose a plurality of dedicated interfaces. The plurality of exposed interfaces are collectively known as the stack of exposed interfaces. Thehost device 100 configures the stack of exposed 121, 122, 123 without the use of the network (for example, by running IPCP), as is done by conventional host devices. In one embodiment, theinterfaces traffic control unit 160 is used to configure the stack of exposed 121, 122, 123. In particular, theinterfaces traffic control unit 160 configures the stack of exposed interfaces by managing the exposing of a new interface (through the interface driver 105) in the presence of existing exposed interfaces and the functioning of all the exposed interfaces with respect to each other. In one embodiment, the traffic control unit 170 performs a discovery process every time a new interface is exposed without using the network. The neighbor discovery process may include, for example, duplicate address detection to ensure that a tentative address selected for a PDN is unique with respect to an address selected for another PDN. The neighbor discovery process may also include running of an address resolution protocol. Further, the neighbor discovery process may include a connectivity detection to check the status of a connection to a PDN. The neighbor discovery process is discussed in detail later on. - An application of the
host device 100 connected to a PDN is ready to communicate data with the PDN once thetraffic control unit 160 has configured the stack of exposed interfaces. At this point, theconnection manager 104 connects and associates each exposed interface to a respective PDN, and this knowledge is made available to thePDN classification unit 106. As such, 101, 102, 103 can simultaneously be connected to and communicated with via themultiple PDNs host device 100. That is, thehost device 100 is capable of supporting multiple PDNs at a given time. Further, each 101, 102, 103 has multiplePDN 111, 112, 113 which are used for bidirectional communication of data between eachrespective bearers 101, 102, 103 and thePDN host device 100. In one embodiment, theconnection manager 104 assigns one of the interfaces exposed by theinterface driver 105 as a default interface. The default interface is used for communication of processing data associated with default packet data that is to be transmitted to a PDN, the default packet data being generated by an application which is unknown to the PDN. - Now, during simultaneous communication with multiple PDNs, the
connection manager 104 is required to determine a destination PDN to which a piece of data (e.g., generated by an application of the host device) is to be routed. This process to determine the destination PDN is called inter-PDN classification. Further, once the destination PDN has been determined, theconnection manager 104 is required to determine which one of the multiple bearers of the destination PDN is to be used to communicate the data based on the negotiated quality of service with the destination PDN. This process to determine the bearer for communication is called intra-PDN classification. To satisfy the QOS requirements negotiated with the PDNs, both the inter-PDN classification process and the intra-PDN classification process should be completed, as discussed below. - The inter-PDN classification process performed by the
host device 100 will now be explained. When data is received from one of the 101, 102, 103 at themultiple PDNs host device 100, theconnection manager 104 transfers the received data to the respective interface associated or connected to the one of the multiple PDNs. Further, theinterface driver 105 identifies the PDN that provided the received data based on the interface through which it receives the received data and based on the information available from thePDN classification unit 106. Now, when an application of thehost device 100 generates data to be communicated to a particular PDN, the communication manager transfers the generated data to theinterface driver 105 through the interface dedicated to the particular PDN. Theinterface driver 105 then identifies the particular PDN, to which the generated data is to be communicated, based on the interface to which it receives the generated data and based on the information available from thePDN classification unit 106. Once theinterface driver 105 has identified the destination PDN, this identification of the destination PDN is provided to theintra-PDN classification unit 163. This enables the intra-PDN classification unit to carry out the intra-PDN classification process to determine which one of the multiple bearers of the destination PDN is to be used to communicate the data to the destination PDN. - The
interface driver 105 uses thequeuing unit 130 to provide the identification of the destination PDN to theintra-PDN classification unit 163. In particular, theinterface driver 105 tags each packet of the received data or the generated data with identification information of the destination PDN, and transfers the tagged packets to theintra-PDN classification unit 163 via thequeuing unit 130. The queuingunit 130 includes modules that allow and/or guarantee preservation of the identification information tagged on to each packet of the received data or the generated data that is being transferred from theinterface driver 105 to theintra-PDN classification unit 163. The use of modules that allow and/or guarantee preservation of the identification information is important because otherwise the identification information may be lost during the transfer of the tagged packet data. In particular, sometimes, when data is communicated between two separate processors (120 and 140) which use different modules, the queuingunit 130 may use mutually incompatible modules to transfer the tagged packet data, and therefore, preservation of the identification information is not guaranteed. In such situations, the identification information can be lost during the transfer of the tagged packet data. As such, it is desirable that thequeuing unit 130 ensure that only those modules which allow and/or guarantee the preservation of the identification information are used in the transfer of the tagged packet data. - The tagging of each packet of the data will now be explained. As described above, the
connection manager 104 transfers packet data received from one of the multiple PDNs (destination PDN) or the generated packet data received from an initiated application to theinterface driver 105 over a respective interface associated with the destination PDN. Theinterface driver 105 identifies the destination PDN based on the respective interface over which the packet data is received from theconnection manager 104. Once theinterface driver 105 has identified the destination PDN, theinterface driver 105 tags each packet of the packet data with identification information of the destination PDN. For example, each packet of the packet data includes a header, and theinterface driver 105 includes the identification information of the destination PDN in the header of each packet. Theinterface driver 105 then transfers each tagged packet of the packet data to theintra-PDN classification unit 163 via thequeuing unit 130. - In one embodiment, the
interface driver 105 generates a respective descriptor associated with each packet of the received packet data or the generated packet data. Theinterface driver 105 then stores the packets of the received/generated packet data in thememory 108, and tags each of the descriptors with the identification information of the destination PDN before transferring each of the tagged descriptors to theintra-PDN classification unit 163 via thequeuing unit 130. In one embodiment, the interface driver modifies a text-entry portion of the descriptor to include the identification information of the destination PDN. Further, theinterface driver 105 may generate the descriptor including a pointer that indicates a location of the corresponding packet of received/generated packet data stored in thememory 108. Additionally or optionally, theinterface driver 105 may store the identification information of the destination PDN in thememory 108. In this embodiment, the pointer included in the descriptor may indicate the identity of the destination PDN by pointing to the location in thememory 108 where the identification information of the destination PDN is stored. One will appreciate that transferring the descriptors obviates the need to tag and transfer each packet of the packet data, which could be a more memory intensive task. Further, each descriptor is capable of storing specific information about the corresponding packet of data such as length of the packet, type of the packet data (voice, text, etc.), and the like. This specific information is used by theintra-PDN classification unit 163 to carry out the above-described intra-PDN classification process. - In another exemplary embodiment, as shown in
FIG. 2 , the queuingunit 130 can be implemented as multiple queuing 131, 132, 133, each queuing unit being dedicated to each interface exposed by theunits interface driver 105. Further, each queuing 131, 132, 133 is configured to run its own scheme of ordering the packet data (or descriptors). Now, since each exposed interface is dedicated to a particular PDN, each queuing unit from among the multiple queuingunit 131, 132, 133 is also dedicated to a particular PDN. Therefore, a given queuing unit from among the multiple queuingunits 131, 132, 133 always transfers data (or descriptors) associated with a given PDN from among the multiple PDNs. In this way, data (or descriptors) associated with a plurality of PDNs can be simultaneously transferred to theunits intra-PDN classification unit 163, thereby increasing overall efficiency. Further, since each queuing unit from among the multiple queuing 131, 132, 133 always transfers the received/generated packet data (or descriptors) associated with a given PDN from among the multiple PDNs, theunits intra-PDN classification unit 163 can be configured to identify the destination PDN based on the queuing unit through with the received/generated packet data (or descriptors) is received. In this case, the tagging of each data packet (or descriptor) could be avoided. - The intra-PDN classification process performed by the
host device 100 will now be explained. As discussed above, theinterface driver 105 tags each packet (or descriptor) of the received/generated packet data with identification information of the destination PDN, and transfers the tagged packets (or descriptors) to theintra-PDN classification unit 163 via thequeuing unit 130. The intra-PDN classification unit is configured to select a data packet (or descriptor) from among a plurality of packets (or descriptors) in a queue of thequeuing unit 130 based on QOS requirements of a PDN associated with the packet (or descriptor) or based on characteristics of packet data such as, for example, the specific information included in the descriptors, n the embodiment including the multiple queuing 131, 132, 133, the intra-PDN classification unit can be configured to select a data packet (or descriptor) from among a plurality of packets (or descriptors) based on an ordering scheme of the respective queuing unit from among the multiple queuingunits 131, 132, 133.units - The
intra-PDN classification unit 163 stores a traffic flow template (TFT) associated with each PDN. A traffic flow template enables theintra-PDN classification unit 163 to determine which bearer from among the multiple bearers of a given PDN is to be used for communication with the given PDN, in addition, theintra-PDN classification unit 163 determines the bearer for communication based on the QOS requirements negotiated with the given PDN and stored in theQOS enforcement unit 162. Additionally or optionally, theintra-PDN classification unit 163 may determine the bearer for communication used on information (e.g., specific information) included in the tagged packet data or tagged descriptors. The QOS requirements stored in theQOS enforcement unit 162 are, for example, associated with an amount of traffic of data on each bearer from among the multiple bearers associated with each PDN. Once theintra-PDN classification unit 163 has determined the bearer for communication with the given PDN, theintra-PDN classification unit 163 references the bearer mapping information stored in the PDNbearer mapping unit 161 and informs theinterface driver 105 of the mapping information of the determined bearer. Theinterface driver 105 then coordinates with theconnection manager 104 to communicate data to the given PDN over the determined bearer. - In one embodiment, for enhanced efficiency, the
intra-PDN classification unit 163 satisfies the QOS requirements negotiated with a given PDN by balancing parameters associated with the communication of data between thehost device 100 and given PDN. For example, theintra-PDN classification unit 163 balances the data rate through a given bearer with an allowable jitter requirement, thereby increasing overall efficiency. Further, theintra-PDN classification unit 163 balances a check level discardtimer 164 associated with a given bearer to satisfy the QOS requirements and also to arrive at the allowable jitter requirement. In one embodiment, the check level discardtimer 164 starts running once the packet data or a descriptor of the packet data arrives at theintra-PDN classification unit 163, and runs for a predetermined duration of time within which the intra-PDN classification process should be completed. Finally, theintra-PDN classification unit 163 may use a token bucket algorithm to check whether the data communication through the bearers conforms to the QOS requirements stored in theQOS enforcement unit 162. - The neighbor discovery process will now be explained. First, the duplicate address detection procedure included in the neighbor discovery process will be described with reference to
FIG. 3 .FIG. 3 illustrates a system 350 including thehost device 100 connected to multiple the 101, 102, 103 viaPDNs 301, 302, 303. The remaining features of the system 350 are analogous to the features of therespective PDN gateways system 150, and therefore, a detailed discussion of these features is being omitted. In system 350, thehost device 100 is connected to 101, 102, 103 viaPDNs 301, 302, 303. For example, therespective PDN gateways connection manager 104 of thehost device 100 is connected to PDN1 viaPDN1 gateway 301, to PDN2 viaPDN2 gateway 302, and to PDN3 viaPDN3 gateway 303. As such, thehost device 100 may simultaneously communicate with the 101, 102, 103 viaPDNs 301, 302, 303. Further, therespective PDN gateways host device 100 may communicate with another host device connected to one of the 101, 102, 103.PDNs - Now, a conventional host device is required to perform a cumbersome process of neighbor solicitation when the conventional host device is connected to a given PDN, and is communicating with another conventional host device connected to the given PDN. In particular, the conventional host device is required to choose a network address to identify itself to the given PDN, and further to advertise the chosen network address over the given PDN to ensure that no other host device connected to the given PDN is using the same chosen network address. That is, the conventional host device is required to conduct the cumbersome process of neighbor solicitation to ensure uniqueness of its chosen network address. Further, the conventional host device is required to conduct additional processing to identify an intermediate node (e.g., a base station using a radio link) to which a piece of data will be initially transmitted to when the conventional host device wishes to transmit the piece of data to the another conventional host device. The conducting of these processes adversely affects the efficiency of the conventional host device. Further, the advertising of the chosen network address over the given PDN unnecessarily burdens traffic of data over the given PDN.
- The present disclosure obviates the need for the
host device 100 to conduct the above cumbersome processes and also reduces the traffic over a PDN by connecting thehost device 100 to the PDNs via respective PDN gateways. In one embodiment, when theinterface driver 105 provides an interface (e.g., IP interface 121) to be dedicated to a PDN (e.g., PDN1), theinterface driver 105 is configured to assign a network address to the provided interface, and to inform the assigned network address to theconnection manager 104. Theconnection manager 104 then provides the assigned network address to thePDN1 gateway 301 over a network link. ThePDN1 gateway 301 recognizes thehost device 100 as being a unique device based on this network link because thehost device 100 is the only host device connected to thePDN1 gateway 301 over this network link. In one embodiment, thePDN1 gateway 301 assigns a global network address to thehost device 100 based on this network link. The global network address may include the network address assigned by theinterface driver 105 or a modified version of the same. In this way, thehost device 100 is provided with a unique global network address with respect toPDN1 101. Now, thehost device 100 only needs to provide destination information of the another host to which data is to be transmitted without having to conduct any neighbor solicitation. ThePDN1 gateway 301 then resolves the path through which the transmitted data is to be routed so that the transmitted data reaches the another host. In one embodiment, thePDN1 gateway 301 includes the global network address of thehost device 100 in the information sent along with the transmitted data. In this way, thehost device 100 is not required to conduct the cumbersome process of neighbor solicitation or of identifying the above-mentioned intermediate node. In one embodiment, thehost device 100 may communicate with all other host devices connected toPDN1 101 only via thePDN1 gateway 301. In the above embodiment, it is not necessary that the another host device be connected toPDN1 101. Rather, the another host device can be connected to any PDN, the path to which is resolved by thePDN1 gateway 301. 302 and 303 function in a similar way to the above exemplary functioning ofPDN gateways PDN gateway 301. - In another embodiment, when the
host device 100 is required to receive a response ensuring the uniqueness of the network address before communicating through a given PDN, theconnection manager 104 is configured to generate a fake response indicating the uniqueness of the network address assigned by theinterface driver 105, and to communicate the fake response to theinterface driver 105. This allows thehost device 100 to communicate through the given PDN without advertising the chosen network address over the given PDN to ensure uniqueness of the same. In one embodiment, the network address of theinterface 121 could be an IPv6 address. In one embodiment, the network link could be a wireless network link. - The running of an address resolution protocol included in the neighbor discovery process will now be explained. For the
host device 100 to be able to communicate with a destination host (beyond PDN-Gateway), thehost device 100 needs to know the next-hop neighbor's link-layer address to which the data may be routed. For example, when thehost device 100 uses an Ethernet device/interface, thehost device 100 needs to know a Ethernet MAC address (e.g. 48 bit address) of the destination host device that thehost device 100 should address its Ethernet packets to. Alternatively, when thehost device 100 uses an LTE interface, thehost device 100 can remove the Ethernet header before sending any uplink packet, and therefore the exact value of the advertised link-layer address for the destination host device IP address is not required. Rather, thehost device 100 simply routes any uplink packet to the PDN gateway associated with the destination host, and the PDN gateway resolves the path to the destination host. In one embodiment, for this reason, when the traffic control module receives the neighbor solicitation message requesting for a link-layer address of the destination host, the traffic control module may respond with a neighbor advertisement message including an arbitrary Ethernet address. - The connectivity detection procedure included in the neighbor discovery process will now be explained when the
host device 100 operates using, for example, the IPv6 protocol. Conventionally, thehost device 100 would have to perform the IPv6 un-reachability detection to check the availability of another IPv6 device connected on the same link to a PDN as thehost device 100, so as to ensure uniqueness and security of communication. However, in the present disclosure, thehost device 100 is connected to a PDN via a PDN gateway, and thehost device 100 is the only device connected to the PDN gateway on a given link. In particular, a link between the host device and a PDN gateway has no other host devices connected to the link. Therefore, it is not necessary for thehost device 100 to perform the un-reachability detection described above. As such, there is no need to forward the un-reachability detection messages to the PDN gateway. However, since the IPv6 protocol requires a received response at thehost device 100 to ensure uniqueness, theconnection manager 104 and/or theinterface driver 105 can generate un-reachability detection messages and transmit the same to the traffic control module. In response, the traffic control module responds to the un-reachability detection messages within thehost device 100 without sending the messages to the PDN gateway. - In one embodiment, the
integrated circuit 110 can be external to thehost device 100 and can be communicatively connected to thehost device 100, for example, via an IP interface. For example, theintegrated circuit 110 can be communicatively connected to thehost device 100 via a USB connection or via an SDIO connection. Thehost device 100 could be a handheld device such as a cellular phone, PDA, or the like. Further, thehost device 100 could be compatible with many networks including LTE, 2G, 3G, or the like. -
FIG. 4 illustrates an exemplary algorithm performed in a network device for communicating data with an external network over a plurality of bearers associated with the external network according to an embodiment of the present disclosure. One of ordinary skill in the art would appreciate that performing a subset of the disclosed steps is within the scope of the present disclosure. Instep 401, the network device connects to an external network. Instep 402, the network device negotiates a quality of service (QOS) requirement related to communication with the external network. Instep 403, the network device stores an application that is capable of communicating with the external network. Instep 404, the network device provides an interface dedicated to the external network. Instep 405, processing data associated with communication over the interface is received, instep 406, the network device tags a packet of the processing data with identification information of the external network. In one embodiment, the network device identifies or generates the identification information of the external network based on the interface over which the processing data associated with the external network is received. Instep 407, the network device selects a bearer from among the plurality of bearers based on the identification information tagged on the packet and/or based on the negotiated QOS requirement, to communicate with the external network. -
FIG. 5 illustrates another exemplary algorithm performed in a network device for communicating data with an external network over a plurality of bearers associated with the external network according to an embodiment of the present disclosure. One of ordinary skill in the art would appreciate that performing a subset of the disclosed steps is within the scope of the present disclosure. Instep 501, the network device connects to an external network. Instep 502, the network device negotiates a quality of service (QOS) requirement related to communication with the external network. Instep 503, the network device stores an application that is capable of communicating with the external network. Instep 504, the network device provides an interface dedicated to the external network. Instep 505, processing data associated with communication over the interface is received. Instep 506, the network device generates a descriptor associated with a packet of the processing data. Instep 507, the network device tags the generated descriptor with identification information of the external network. In one embodiment, the network device identifies and/or generates the identification information of the external network based on the interface over which the processing data associated with the external network is received. Instep 508, the network device selects a bearer from among the plurality of bearers based on the identification information tagged on the descriptor and/or based on the negotiated QOS requirement, to communicate with the external network. -
FIG. 6 illustrates an exemplary algorithm performed by the network device while providing an interface dedicated to the external network. In one embodiment, the network device provides the interface dedicated to the external network without running the Internet protocol configuration protocol (IPCP). Instep 601, the network device provides the interface with a characteristic based on a parameter associated with the external network, and instep 602, the network device dynamically adjusts the characteristic of the interface with a change in the parameter associated with the external network. It should be noted that the exemplary algorithms discussed in the present disclosure can be performed by the hardware components of the devices (e.g., host device 100) discussed in the present disclosure. - It will be apparent to persons skilled in the relevant art(s) that various elements, features, and functions (e.g., steps) of the present disclosure can be implemented in hardware using analog and/or digital circuits, in software, through the execution of instructions by one or more general purpose or special-purpose processors, or as a combination of hardware and software, via the general purpose computer. For example, various functions of at least the host device can be implemented by one or more general purpose or special-purpose processors, and/or as a combination of hardware and software, via the general purpose computer.
- The following description of a general purpose computer system is provided for the sake of completeness. Embodiments of the present disclosure can be implemented in hardware, or as a combination of software and hardware. Consequently, embodiments of the disclosure may be implemented in the environment of a computer system or other processing system. An example of such a
computer system 700 is shown inFIG. 7 . One or more of the features depicted inFIGS. 1-6 (e.g.,communication manager 104,interface driver 105,traffic control module 160,PDN gateway 301, etc.) and their corresponding algorithms can be executed on one or moredistinct computer systems 700, or a portion thereof. Furthermore, any functions performed by any of the above features can be implemented on one or moredistinct computer systems 700. - A
computer system 700 includes one or more processors, such asprocessor 704.Processor 704 can be a special purpose or a general purpose digital signal processor.Processor 704 is connected to a communication infrastructure 702 (for example, a bus or network). Various software implementations are described in terms of this exemplary computer system. After reading this description, it will become apparent to a person skilled in the relevant art(s) how to implement the disclosure using other computer systems and/or computer architectures. -
Computer system 700 also includes amain memory 706, preferably random access memory (RAM), and may also include asecondary memory 708.Secondary memory 708 may include, for example, ahard disk drive 710 and/or aremovable storage drive 712, representing a floppy disk drive, a magnetic tape drive, an optical disk drive, or the like.Removable storage drive 712 reads from and/or writes to aremovable storage unit 716 in a well-known mannerRemovable storage unit 716 represents a floppy disk, magnetic tape, optical disk, or the like, which is read by and written to byremovable storage drive 712. As will be appreciated by persons skilled in the relevant art(s),removable storage unit 716 includes a computer usable storage medium having stored therein computer software and/or data. - In alternative implementations,
secondary memory 708 may include other similar means for allowing computer programs or other instructions to be loaded intocomputer system 700. Such means may include, for example, aremovable storage unit 718 and aninterface 714. Examples of such means may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, a thumb drive and USB port, and otherremovable storage units 718 andinterfaces 714 which allow software and data to be transferred fromremovable storage unit 718 tocomputer system 700. -
Computer system 700 may also include acommunications interface 720. Communications interface 720 allows software and data to be transferred betweencomputer system 700 and external devices. Examples ofcommunications interface 720 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc. Software and data transferred viacommunications interface 720 are in the form of signals which may be electronic, electromagnetic, optical, or other signals capable of being received by thehost device 100. These signals are provided tocommunications interface 720 via acommunications path 722.Communications path 722 carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link and other communications channels. - As used herein, the terms “computer program medium” and “computer readable medium” are used to generally refer to tangible storage media such as
716 and 718 or a hard disk installed inremovable storage units hard disk drive 710. These computer program products are means for providing software tocomputer system 700. - Computer programs (also called computer control logic) are stored in
main memory 706 and/orsecondary memory 708. Computer programs may also be received viacommunications interface 720. Such computer programs, when executed, enable thecomputer system 700 to implement the present disclosure as discussed herein. In particular, the computer programs, when executed, enableprocessor 704 to implement the processes of the present disclosure, such as any of the methods described herein. Accordingly, such computer programs represent controllers of thecomputer system 700. Where the disclosure is implemented using software, the software may be stored in a computer program product and loaded intocomputer system 700 using aremovable storage drive 712,interface 714, orcommunications interface 720. - In another embodiment, features of the disclosure are implemented primarily in hardware using, for example, hardware components such as application-specific integrated circuits (ASICs) and gate arrays. Implementation of a hardware state machine so as to perform the functions described herein will also be apparent to persons skilled in the relevant art(s).
- It is to be appreciated that the Detailed Description section, and not the Summary and Abstract sections, is intended to be used to interpret the claims. The Summary and Abstract sections may set forth one or more but not all exemplary embodiments of the present invention as contemplated by the inventor(s), and thus, are not intended to limit the present invention and the appended claims in any way.
- The present invention has been described above with the aid of functional building blocks illustrating the implementation of specified functions and relationships thereof. The boundaries of these functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternate boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed.
- The foregoing description of the specific embodiments will so fully reveal the general nature of the invention that others can, by applying knowledge within the skill of the art, readily modify and/or adapt for various applications such specific embodiments, without undue experimentation, without departing from the general concept of the present invention. Therefore, such adaptations and modifications are intended to be within the meaning and range of equivalents of the disclosed embodiments, based on the teaching and guidance presented herein. It is to be understood that the phraseology or terminology herein is for the purpose of description and not of limitation, such that the terminology or phraseology of the present specification is to be interpreted by the skilled artisan in light of the teachings and guidance.
- It should be noted that any exemplary processes described herein can be implemented in hardware, software, or any combination thereof. For instance, the exemplary process can be implemented using computer processors, computer logic, application specific circuits (ASICs), digital signal processors (DSP), etc., as will be understood by one of ordinary skill in the arts based on the discussion herein.
- Moreover, any exemplary processes discussed herein can be embodied by a computer processor or any one of the hardware devices listed above. The computer program instructions cause the processor to perform the processing functions described herein. The computer program instructions (e.g., software) can be stored in a computer useable medium, computer program medium, or any storage medium that can be accessed by a computer or processor. Such media include a memory device such as a computer disk or CD ROM, or the equivalent. Accordingly, any computer storage medium having computer program code that causes a processor to perform the processing functions described herein are with the scope and spirit of the present invention.
- The breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
Claims (20)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/435,542 US20130128739A1 (en) | 2011-11-21 | 2012-03-30 | Method and Device to Control Communication with Multiple Networks Based on Respective Quality of Service Requirements |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201161562196P | 2011-11-21 | 2011-11-21 | |
| US13/435,542 US20130128739A1 (en) | 2011-11-21 | 2012-03-30 | Method and Device to Control Communication with Multiple Networks Based on Respective Quality of Service Requirements |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20130128739A1 true US20130128739A1 (en) | 2013-05-23 |
Family
ID=48426847
Family Applications (4)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/309,290 Expired - Fee Related US9008734B2 (en) | 2011-11-21 | 2011-12-01 | Wireless communication device having reduced power consumption |
| US13/340,384 Active 2032-03-28 US8938239B2 (en) | 2011-11-21 | 2011-12-29 | Wireless communication device capable of efficient handoffs |
| US13/435,542 Abandoned US20130128739A1 (en) | 2011-11-21 | 2012-03-30 | Method and Device to Control Communication with Multiple Networks Based on Respective Quality of Service Requirements |
| US13/463,445 Abandoned US20130128937A1 (en) | 2011-11-21 | 2012-05-03 | Link adaptation for multimode mimo wireless system |
Family Applications Before (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/309,290 Expired - Fee Related US9008734B2 (en) | 2011-11-21 | 2011-12-01 | Wireless communication device having reduced power consumption |
| US13/340,384 Active 2032-03-28 US8938239B2 (en) | 2011-11-21 | 2011-12-29 | Wireless communication device capable of efficient handoffs |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/463,445 Abandoned US20130128937A1 (en) | 2011-11-21 | 2012-05-03 | Link adaptation for multimode mimo wireless system |
Country Status (1)
| Country | Link |
|---|---|
| US (4) | US9008734B2 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140105211A1 (en) * | 2012-10-16 | 2014-04-17 | Cisco Technology, Inc. | Eliminating ipv6 neighbor solicitations in constrained computer networks |
| CN109121143A (en) * | 2017-06-23 | 2019-01-01 | 联芯科技有限公司 | A kind of position mark method, terminal and computer readable storage medium |
Families Citing this family (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2480882B (en) * | 2010-06-04 | 2016-08-31 | Samsung Electronics Co Ltd | Method and apparatus for multiplexing different efficiency modes in digital radio systems |
| KR102092579B1 (en) | 2011-08-22 | 2020-03-24 | 삼성전자 주식회사 | Method and apparatus for support multiple frequency band in a mobile communication system |
| US8995560B2 (en) * | 2011-10-26 | 2015-03-31 | Google Technology Holdings LLC | Power detection of individual carriers of a multiple-carrier wideband signal |
| US20130343252A1 (en) * | 2012-06-25 | 2013-12-26 | Broadcom Corporation | Power Saving for Mobile Terminals |
| WO2014054998A1 (en) * | 2012-10-04 | 2014-04-10 | Telefonaktiebolaget L M Ericsson (Publ) | A node and method for uplink detection with an assigned uplink physical layer identity |
| US8948039B2 (en) * | 2012-12-11 | 2015-02-03 | Qualcomm Incorporated | Packet collisions and impulsive noise detection |
| US9380520B2 (en) | 2013-03-13 | 2016-06-28 | Qualcomm Incorporated | Using motion to improve local wireless network connectivity |
| US9161294B2 (en) * | 2013-03-13 | 2015-10-13 | Qualcomm Incorporated | Using motion to optimize place of relevance operations |
| US9380519B2 (en) | 2013-03-13 | 2016-06-28 | Qualcomm Incorporated | Using motion to improve local wireless network connectivity |
| US9042945B2 (en) * | 2013-06-20 | 2015-05-26 | Google Technology Holdings LLC | Parallelization of application launch and activation of mobile data connection for applications requiring remote data in a device |
| US20150016352A1 (en) * | 2013-07-10 | 2015-01-15 | Qualcomm Incorporated | Methods and apparatus for performing random access channel procedures |
| KR102007025B1 (en) * | 2014-01-07 | 2019-08-02 | 퀄컴 인코포레이티드 | Methods and apparatus for cooperating between wireless wide area network radios and wireless local area network radios |
| US9942847B2 (en) * | 2015-01-22 | 2018-04-10 | Apple Inc. | Apparatus, system, and method for adaptive sleep schedule for control signal decoding |
| US20160295380A1 (en) * | 2015-04-03 | 2016-10-06 | Qualcomm Incorporated | Multicast sub-grouping methods for wireless communications |
| US10079650B2 (en) | 2015-12-04 | 2018-09-18 | Infineon Technologies Ag | Robust high speed sensor interface for remote sensors |
| US10186910B2 (en) | 2016-07-15 | 2019-01-22 | The United States Of America, As Represented By The Secretary Of The Army | Signal comparison and direction |
| EP3497799A4 (en) * | 2016-08-12 | 2020-04-15 | Cohere Technologies, Inc. | MULTILEVEL ITERATIVE EQUALIZATION AND DECODING |
| US10387285B2 (en) | 2017-04-17 | 2019-08-20 | Microsoft Technology Licensing, Llc | Power evaluator for application developers |
| US10447353B2 (en) | 2017-10-03 | 2019-10-15 | Ceva D.S.P. Ltd. | System and method for selecting transmission parameters |
| US11109295B2 (en) * | 2018-05-21 | 2021-08-31 | Qualcomm Incorporated | Interaction of physical channel changes with physical channel based cell measurements |
| BR112020026961A2 (en) | 2018-11-09 | 2021-05-18 | Panasonic Intellectual Property Corporation Of America | communication device |
| US10805969B2 (en) * | 2018-11-29 | 2020-10-13 | Octasic Inc | Method for determining location of user equipment (UE) using portable pseudo base station in LTE |
| CN113498154B (en) * | 2020-04-06 | 2024-10-25 | 瑞昱半导体股份有限公司 | Method and related system for WiFi module |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6067300A (en) * | 1998-06-11 | 2000-05-23 | Cabletron Systems, Inc. | Method and apparatus for optimizing the transfer of data packets between local area networks |
| US20060050694A1 (en) * | 2004-09-03 | 2006-03-09 | James Bury | Processing replies to request packets in an advanced switching context |
| US20080117836A1 (en) * | 2006-11-20 | 2008-05-22 | Raghvendra Gurudath Savoor | Methods and apparatus to manage bandwidth in a wireless network |
| US20100058101A1 (en) * | 2008-08-29 | 2010-03-04 | Ahmed Shahid | System and method for reducing latency associated with timestamps in a multi-core, multi-threaded processor |
| US20100097956A1 (en) * | 2008-10-20 | 2010-04-22 | Toshiba America Research, Inc. | Multi-interface management configuration method and graphical user interface for connection manager |
| US7813274B1 (en) * | 2004-12-30 | 2010-10-12 | Symantec Corporation | Dynamic demultiplexing of network traffic |
| US20100302010A1 (en) * | 2008-03-12 | 2010-12-02 | Omron Corporation | Tag information processing apparatus, tag information processing system, tag information processing method, and program |
Family Cites Families (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6091717A (en) * | 1997-05-05 | 2000-07-18 | Nokia Mobile Phones Limited | Method for scheduling packet data transmission |
| US6173181B1 (en) * | 1997-11-07 | 2001-01-09 | Motorola, Inc. | Method and system for controlling neighbor scanning in a subscriber unit in a cellular communication system |
| US6505058B1 (en) * | 1998-12-04 | 2003-01-07 | Motorola, Inc. | Method for determining whether to wake up a mobile station |
| US7254118B1 (en) * | 2000-05-22 | 2007-08-07 | Qualcomm Incorporated | Method and apparatus in a CDMA communication system |
| EP1235366A1 (en) * | 2000-10-31 | 2002-08-28 | Matsushita Electric Industrial Co., Ltd. | Mobile station apparatus and handover method |
| US20030203722A1 (en) * | 2002-04-30 | 2003-10-30 | Karlquist Richard K. | Method of reducing power consumption in a radio receiver |
| US7013140B2 (en) * | 2002-09-19 | 2006-03-14 | Telefonaktiebolaget L.M. Ericsson | Mobile terminals and methods for performing fast initial frequency scans and cell searches |
| US7167707B1 (en) * | 2003-02-12 | 2007-01-23 | Cingular Wireless Ii, L.L.C. | Systems and methods for GSM selection |
| US7051220B2 (en) * | 2003-02-28 | 2006-05-23 | Microsoft Corporation | Mechanism for reducing power consumption of a transmitter/receiver circuit |
| GB2404539B (en) * | 2003-07-31 | 2006-06-14 | Fujitsu Ltd | Adaptive modulation and coding |
| KR100667178B1 (en) * | 2003-12-02 | 2007-01-12 | 한국전자통신연구원 | Resource Allocation and Access Method in Orthogonal Frequency Division Multiple Access System |
| US7590078B2 (en) * | 2004-10-05 | 2009-09-15 | Qualcomm Incorporated | Detecting legacy spoofing in reduced functionality user terminals |
| US20060183477A1 (en) * | 2005-02-15 | 2006-08-17 | Research In Motion Limited | Network selection user interface for wireless devices |
| US20080084829A1 (en) * | 2006-10-05 | 2008-04-10 | Nokia Corporation | Apparatus, method and computer program product providing link adaptation |
| US8462746B2 (en) * | 2006-12-27 | 2013-06-11 | Altair Semiconductor Ltd. | Wireless receiver with intermittent shut-off of RF circuits |
| US20090170424A1 (en) * | 2007-12-31 | 2009-07-02 | Agere Systems, Inc. | Low power mode for sdars receiver |
| US20090291686A1 (en) * | 2008-05-21 | 2009-11-26 | Comsys Communication & Signal Processing Ltd. | Autonomous connectivity between a mobile station and multiple network elements for minimizing service discontinuities during handovers in a wireless communication system |
| CN101635968A (en) * | 2008-07-22 | 2010-01-27 | 株式会社Ntt都科摩 | Switch processing method, base station and network communication system |
| US20100069070A1 (en) * | 2008-09-17 | 2010-03-18 | Qualcomm Incorporated | Location-assisted network entry, scan and handover |
| US8874065B2 (en) * | 2008-10-09 | 2014-10-28 | Qualcomm Incorporated | Method and apparatus for facilitating power conservation via time-gating in a wireless communication system |
| JP2012515377A (en) * | 2009-01-12 | 2012-07-05 | ラムバス・インコーポレーテッド | Clock transfer low power signaling system |
-
2011
- 2011-12-01 US US13/309,290 patent/US9008734B2/en not_active Expired - Fee Related
- 2011-12-29 US US13/340,384 patent/US8938239B2/en active Active
-
2012
- 2012-03-30 US US13/435,542 patent/US20130128739A1/en not_active Abandoned
- 2012-05-03 US US13/463,445 patent/US20130128937A1/en not_active Abandoned
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6067300A (en) * | 1998-06-11 | 2000-05-23 | Cabletron Systems, Inc. | Method and apparatus for optimizing the transfer of data packets between local area networks |
| US20060050694A1 (en) * | 2004-09-03 | 2006-03-09 | James Bury | Processing replies to request packets in an advanced switching context |
| US7813274B1 (en) * | 2004-12-30 | 2010-10-12 | Symantec Corporation | Dynamic demultiplexing of network traffic |
| US20080117836A1 (en) * | 2006-11-20 | 2008-05-22 | Raghvendra Gurudath Savoor | Methods and apparatus to manage bandwidth in a wireless network |
| US20100302010A1 (en) * | 2008-03-12 | 2010-12-02 | Omron Corporation | Tag information processing apparatus, tag information processing system, tag information processing method, and program |
| US20100058101A1 (en) * | 2008-08-29 | 2010-03-04 | Ahmed Shahid | System and method for reducing latency associated with timestamps in a multi-core, multi-threaded processor |
| US20100097956A1 (en) * | 2008-10-20 | 2010-04-22 | Toshiba America Research, Inc. | Multi-interface management configuration method and graphical user interface for connection manager |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140105211A1 (en) * | 2012-10-16 | 2014-04-17 | Cisco Technology, Inc. | Eliminating ipv6 neighbor solicitations in constrained computer networks |
| US9577914B2 (en) * | 2012-10-16 | 2017-02-21 | Cisco Technology, Inc. | Eliminating IPV6 neighbor solicitations in constrained computer networks |
| CN109121143A (en) * | 2017-06-23 | 2019-01-01 | 联芯科技有限公司 | A kind of position mark method, terminal and computer readable storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| US20130128937A1 (en) | 2013-05-23 |
| US20130130751A1 (en) | 2013-05-23 |
| US8938239B2 (en) | 2015-01-20 |
| US9008734B2 (en) | 2015-04-14 |
| US20130130694A1 (en) | 2013-05-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20130128739A1 (en) | Method and Device to Control Communication with Multiple Networks Based on Respective Quality of Service Requirements | |
| US11652911B2 (en) | Handling different protocol data unit types in a device to device communication system | |
| CN112055959B (en) | Method, apparatus and medium for communication | |
| CN110099370B (en) | Service Layer Southbound Interface and Quality of Service | |
| US9590916B2 (en) | Method and system for dynamically prioritizing user connections on network | |
| CN108632308B (en) | Control method, device, SMF, UPF, UE, PCF and AN | |
| EP3127286B1 (en) | Handling of traffic flows in a communications system | |
| CN109818917B (en) | Communication method and device thereof | |
| CN109041262A (en) | Data transmission method and relevant apparatus | |
| US9438557B2 (en) | Adaptive dynamic host configuration protocol assignment with virtual local area network pool | |
| CN106911778A (en) | A kind of flow bootstrap technique and system | |
| CN103430621A (en) | Method and system of providing internet protocol (IP) data communication in a NFC peer to peer communication environment | |
| CN110089146B (en) | Device shaping in a communication network | |
| EP3113539A1 (en) | Load balancing user plane traffic in a telecommunication network | |
| CN105591971A (en) | QoS implementation method and device | |
| US20150163331A1 (en) | Packet control method and apparatus | |
| CN107734546A (en) | Mapping method, the apparatus and system of user face data | |
| CN107645433B (en) | Message forwarding method and device | |
| CN104584598B (en) | Determine the service bearer of the data service between the content-data source of content-data network and terminal | |
| US9072078B2 (en) | Method and mobile communication system capable of establishing peer-to-peer transmission | |
| WO2017177753A1 (en) | Flow-based bearer management method, and data transmission method and device | |
| CN107949069A (en) | terminal wireless data transmission method, device, terminal and storage medium | |
| CN102946350B (en) | A kind of data transmission method based on priority and equipment | |
| CN103796191B (en) | Method, device and the terminal of data are sent to user terminal | |
| CN104683238A (en) | Method and device for transmitting data messages in LISP (List Processor) network |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: BROADCOM CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KHERANI, ARZAD;NUGGEHALLI, PAVAN;AIRY, MANISH;REEL/FRAME:027964/0119 Effective date: 20120320 |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
| AS | Assignment |
Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001 Effective date: 20160201 Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001 Effective date: 20160201 |
|
| AS | Assignment |
Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD., SINGAPORE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001 Effective date: 20170120 Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001 Effective date: 20170120 |
|
| AS | Assignment |
Owner name: BROADCOM CORPORATION, CALIFORNIA Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:041712/0001 Effective date: 20170119 |