1. Field
The following description relates generally to wireless communications, and more particularly to methods and apparatus for session handoff procedures in heterogeneous networks.
2. Background
Wireless networking systems have become a prevalent means to communicate with others worldwide. Wireless communication devices, such as cellular telephones, personal digital assistants, and the like have become smaller and more powerful in order to meet consumer needs and to improve portability and convenience. Consumers have become dependent upon these devices, demanding reliable service, expanded areas of coverage, additional services (e.g., web browsing capabilities), and continued reduction in size and cost of such devices.
In particular, as the evolution of wireless technologies continues to advance, the progression of mobile services will continue to evolve into ever-richer, more compelling mobile and converged services. With end users demanding more and higher-quality multimedia content in all environments, the evolution of device technologies will continue to enhance the increasing consumption of data usage. For example, over the last several years, wireless communications technologies have evolved from analog-driven systems to digital systems. Typically in conventional analog systems, the analog signals are relayed on a forward link and a reverse link and require a significant amount of bandwidth to enable signals to be transmitted and received while being associated with suitable quality. As the analog signals are continuous in time and space, no status messages (e.g., messages indicating receipt or non-receipt of data) are generated. In contrast, packet-switched systems allow analog signals to be converted to data packets and transmitted by way of a physical channel between an access terminal and a base station, router, and the like. In addition, digital data can be relayed in its natural form (e.g., text, Internet data, and the like) via employing a packet switched network.
As such, digital wireless communication systems are widely deployed to provide various communication services such as telephony, video, data, messaging, broadcasts, and the like. Such systems commonly employ an access network that connects multiple access terminals to a wide area network (WAN) by sharing the available network resources. The access network is typically implemented with multiple access points dispersed throughout a geographic coverage region. Moreover, the geographic coverage region can be divided into cells with an access point in each cell. Likewise, the cell can be further divided into sectors. However, in such system architecture, supplying an efficient handoff between access systems that do not share the same communication procedures and policies becomes a challenging task.
The following presents a simplified summary in order to provide a basic understanding of the described aspects. This summary is not an extensive overview and is intended to neither identify key or critical elements nor delineate the scope of such aspects. Its purpose is to present some concepts of the described aspects in a simplified form as a prelude to the more detailed description that is presented later.
The described aspects enable handoff of mobile units among heterogeneous networks, and further supply an inter-working between a source access system and a target access system in conjunction with a session handoff therebetween—via employing an inter-system handoff control component. As such, the inter-system handoff control component can supply tunneling in advance, as part of session negotiation between the AT and the target access system—wherein packets are transported via the source access system (e.g., to reduce interruption during handoff and mitigate a requirement to perform session setup during handoff.) Tunnel(s) can be established from the AT to the target access system, wherein from the AT's point of view the signaling of the “mobile-target access system” proceeds over such tunnel. Such tunneling can further be accompanied by establishing other tunnels to the target access system depending on type of tunneling involved (e.g., whether tunneling occurs at data link layer). The source access system can further designate the target access system based on pilot report, wherein the AT can then communicate with the target access system and establish a process for negotiation.
In a related aspect, existing mobility models can be leveraged in conjunction with IP tunneling between the mobile unit and the target access system, to ensure trust and privacy—thereby enabling secure seamless handoff among heterogeneous networks (e.g., devices move across networks and administrative domains.) Exemplary hand off between such heterogeneous access systems can include a handoff between: Ultra Mobile Broadband (UMB) and High Rate Packet Data (HRPD); WiMax/HRPD; Long Term Evolution (LTE)/HRPD, wherein system architectures can implement Internet Protocol (IP) mobility using client mobile IP to actively involve the mobile for handoff preparation. Alternatively, the system can employ systems that are more network controlled than the mobile unit itself. Such inter-working enables handoff for a mobile unit between different access systems, wherein a call can continue without being dropped.
According to a related methodology, a setup can be established between the source access system and the target access system, in preparation for the handoff session. Such set up can include discovery of an IP address for the Inter-Working Security Gateway (IWSG) that ensures security of transmitted packets. The setup can further include discovery of IP address for Radio Access Network (RAN) or RAN-lite of the target access system. Typically, the RAN-lite is a RAN that only contains protocol stacks and not radio transceiver functions. It also supports existing RAN interfaces to core network elements and real RAN. After session has been pre-established with RAN-lite, it can be transferred to the real RAN through existing RAN interface (which is used to support intra-technology inter-RAN handoff). Such enables inter-technology handoff to the target system to be done without requiring upgrades to existing real RANs (to support L3 tunnel from AT), for example.
According to a further aspect, the RAN-lite is associated with a protocol (e.g., contained within the mobile and/or IWSG), which enables the mobile to discover an IP address and establish a tunnel to pre-setup the session for the target radio system. Upon requirement for handoff over the air, then the session that is negotiated in the RAN-lite can be transferred over a well known existing interface. Accordingly, from a perspective of a radio access network, access after handoff can be from the same radio technology, and hence the target radio access system need not be modified to support heterogeneous system radio technology handoff. The RAN-lite can logically function as any other real RAN (e.g., a base station controller)—without actual control of any physical base station. Whenever a mobile establishes tunnel with the RAN-lite, such mobile can negotiate a session with the RAN-lite—so that the mobile can obtain session of the target radio technology, and the RAN-lite can store a copy of the session for the target radio technology, wherein the mobile can still operate on the source radio technology.
As such, upon a handoff from the mobile to the target radio technology over-the-air, the mobile can then access the real RAN of the target access system—e.g., the mobile access, and the target access system ask the mobile whether a session exists for technology to be negotiated. The mobile unit can further supply a Unicast Access Terminal Identifier (UATI) or an equivalent identifier that can be employed to locate the session, wherein the UATI from the mobile can point to the RAN-lite, wherein the real RAN can be used to retrieve the session from the RAN lite to the real RAN. Upon fetching a session, the mobile can then communicate with the real RAN in the target radio system. It is to be appreciated that the real RAN can represent the base station controller that includes real connection to the base station.
The inter-system handoff control component can then implement tunneling between the AT and the target system, wherein signaling/packeting associated with the target system can be transferred over the source system. According to a further aspect, the L3 tunneling provides the functional and procedural processes of transferring variable length data sequences between heterogeneous systems, while maintaining the quality of service, and error control functions. Such tunneling can further be transparent to the underlying access system (e.g., no change to the source for the IP packets) regardless of direction (e.g., from LTE to HRPD or from HRPD to LTE).
In a related aspect, a computer readable medium is supplied, which has codes or computer-executable instructions for; discovering IP addresses of security gateways for the target access system and the source access system; establishing secure tunnels to security gateways and/or any of the heterogeneous access systems.
According to a further aspect a processor is provided that executes instructions and/or includes modules related to discovering addresses for security gateways; establishing tunnels between an AT and source or target access systems.
To the accomplishment of the foregoing and related ends, certain illustrative aspects are described herein in connection with the following description and the annexed drawings. These aspects are indicative, however, of but a few of the various ways in which the principles of the disclosed subject matter may be employed and the claimed matter is intended to include all such aspects and their equivalents. Other advantages and novel features may become apparent from the following detailed description when considered in conjunction with the drawings.
Various aspects are now described with reference to the drawings. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of one or more aspects. It may be evident, however, that such aspect(s) may be practiced without these specific details.
As used in this application, the terms “component,” “module,” “system” and the like are intended to include a computer-related entity, such as but not limited to hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets, such as data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems by way of the signal.
Furthermore, various aspects are described herein in connection with a terminal, which can be a wired terminal or a wireless terminal. A terminal can also be called a system, device, subscriber unit, subscriber station, mobile station, mobile, mobile device, remote station, remote terminal, access terminal, user terminal, terminal, communication device, user agent, user device, or user equipment (UE). A wireless terminal may be a cellular telephone, a satellite phone, a cordless telephone, a Session Initiation Protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a handheld device having wireless connection capability, a computing device, or other processing devices connected to a wireless modem. Moreover, various aspects are described herein in connection with a base station. A base station may be utilized for communicating with wireless terminal(s) and may also be referred to as an access point, a Node B, or some other terminology.
Moreover, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or.” That is, unless specified otherwise, or clear from the context, the phrase “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, the phrase “X employs A or B” is satisfied by any of the following instances: X employs A; X employs B; or X employs both A and B. In addition, the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more” unless specified otherwise or clear from the context to be directed to a singular form.
The techniques described herein may be used for various wireless communication systems such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA and other systems. The terms “system” and “network” are often used interchangeably. A CDMA system may implement a radio technology such as Universal Terrestrial Radio Access (UTRA), cdma2000, etc. UTRA includes Wideband-CDMA (W-CDMA) and other variants of CDMA. Further, cdma2000 covers IS-2000, IS-95 and IS-856 standards. A TDMA system may implement a radio technology such as Global System for Mobile Communications (GSM). An OFDMA system may implement a radio technology such as Evolved UTRA (E-UTRA), Ultra Mobile Broadband (UMB), IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, Flash-OFDM, etc. UTRA and E-UTRA are part of Universal Mobile Telecommunication System (UMTS). 3GPP Long Term Evolution (LTE) is a release of UMTS that uses E-UTRA, which employs OFDMA on the downlink and SC-FDMA on the uplink. UTRA, E-UTRA, UMTS, LTE and GSM are described in documents from an organization named “3rd Generation Partnership Project” (3GPP). Additionally, cdma2000 and UMB are described in documents from an organization named “3rd Generation Partnership Project 2” (3 GPP2).
Various aspects or features will be presented in terms of systems that may include a number of devices, components, modules, and the like. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules etc. discussed in connection with the figures. A combination of these approaches may also be used.
As such, the inter-system handoff control component 115 can utilize tunneling in advance of a handoff to exchange handover set-up and execution packets as part of session negotiation between the AT 104 and the target access system 112, to reduce interruption during handoff and mitigate a requirement to perform session setup during handoff. The inter-system handoff control component 115 further enables communication data packets to be transported via the source access system 110, wherein such source access system 110 is typically not engaged during negotiations between the AT 104 and the target access system 112.
Accordingly, the path line 250 indicates the traffic line, wherein the mobile unit 211 in the UMB 210 requires discovery of the Radio Access Network RAN/RAN lite 212 and associated IP address of the HRPD 215, to prepare and setup communication (e.g., for packet transfer.) Upon discovery of the IP address, signaling for the HRPD 215 can then be transmitted over such RAN lite IP address/packeting, wherein the packets can pass through the Access Gateway (AGW) 217 in the UMB system and can then be transmitted to the RAN lite 212. The Packet Data Serving Node (PDSN) 219 acts as the connection point between the HRPD RAN 212 and IP networks—wherein the Inter-Working Security Gate (IWSG) 214 can supply security (e.g., for IP) over the IPsec tunnel 260, to secure the packet transmission between the AT 211 and the RAN/RAN lite 212. Such gateway 214 acts as a network point for an entrance to the HRPD target access system 215. In addition, the Session Reference Network Controller (SRNC) 218 typically includes authentication functions and associated configurations, which are negotiated between base station 222 and access terminal 211, and functions as a reference for the base station 222 to retrieve information (e.g., obtain session information to avoid conflicts during session change.)
Similarly,
The followings is a particular example of Fully Qualified Domain Names for DNS lookup in which any IP host (such as the AT) can perform with DNS server. Exemplary calls for security gateway and RAN/RAN-lite discovery of the target system can include:
HRPD subnet, UMB ANID, WiMax APID, and LTE-eNBID can be obtained either directly over-the-air by the target access system or through neighbor technology record advertised by the source access system.
As wireless terminal 726 is geographically ported, it may receive signals with greater strength from target access system 711 when compared to signals received from source access system 721. It is to be appreciated that the wireless terminal 726 can operate in dual mode with both the source access system 721 and the target access system 711—wherein the inter-system handoff control component 719 can supply tunneling in advance of the handoff as part of session negotiation between the AT 726 and the target access system 711. Accordingly, data packets can be transported (either transparently or non-transparently)) via the source access system 721 while the AT is preparing for handoff to the target system, and then the data packets can be redirected to the target system once the handoff is completed.
Grouping 802 also includes a component 806 for receiving data from the first access as well as receiving an indication of what data should next be transmitted to the access terminal from such first access system. For example, a timestamp or other sequence number in an RLP packet header can indicate what data should be next transmitted to the access terminal. Grouping 802 additionally includes a component 808 for receiving data from a network module, wherein the data is desirably transmitted to the access terminal. Moreover, the data received from the network module can be an IP-encapsulated data packet that is associated with a sequence number or stamp, thereby enabling the second transceiver function to determine what data to next transmit to the access terminal. Grouping 802 can further include a component 810 for transmitting data to the access terminal in an appropriate sequence, wherein the data is received from the first access system and the network module. For example, the second access system can receive data to be transmitted to the access terminal, wherein the data is not duplicative and is to be transmitted in a particular sequence. System 800 can also include a memory 812, which can retain instructions relating to executing components 804-810. The system 800 enables new or target access system to start receiving data in preparation of handoff even though the source has not relinquished control yet and data is lining up at the target access system. Such target access system has information required to re-instate information of the network layer protocol and transmitted data, wherein by not interrupting a current data transfer—the handoff can occur at substantially high speed and low dead time.) The system 800 can be incorporated as part of a distributed and/or centralized architecture.
Processor 906 can be a processor dedicated to analyzing information received by receiver component 902 and/or generating information for transmission by a transmitter 914. Processor 906 can be a processor that controls one or more portions of system 900, and/or a processor that analyzes information received by receiver 902, generates information for transmission by a transmitter 914, and controls one or more portions of system 900. System 900 can include an optimization component 908 that can optimize performance of user equipment before, during, and/or after handoff. Optimization component 908 may be incorporated into the processor 906. It is to be appreciated that optimization component 908 can include optimization code that performs utility based analysis in connection with determining whether to handoff from a source access system to a target access system. The optimization code can utilize artificial intelligence based methods in connection with performing inference and/or probabilistic determinations and/or statistical-based determination in connection with performing handoffs.
System (user equipment) 900 can additionally comprise memory 910 that is operatively coupled to processor 906 and that stores information such as signal strength information with respect to a base station, scheduling information, and the like, wherein such information can be employed in connection with determining whether and when to request a handoff. Memory 910 can additionally store protocols associated with generating lookup tables, etc., such that system 900 can employ stored protocols and/or algorithms to increase system capacity. It will be appreciated that the data store (e.g., memories) components described herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of illustration, and not limitation, nonvolatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory can include random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM). The memory 910 is intended to comprise, without being limited to, these and any other suitable types of memory. Processor 906 is connected to a symbol modulator 912 and transmitter 914 that transmits the modulated signal.
As used in herein, the terms “component,” “system” and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software or software in execution and/or electromechanical units. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an instance, an executable, a thread of execution, a program and/or a computer. By way of illustration, both an application running on a computer and the computer can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers.
The word “exemplary” is used herein to mean serving as an example, instance or illustration. Any aspect or design described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects or designs. Similarly, examples are provided herein solely for purposes of clarity and understanding and are not meant to limit the described aspects or portion thereof in any manner. It is to be appreciated that a myriad of additional or alternate examples could have been presented, but have been omitted for purposes of brevity.
Furthermore, all or portions of the described aspects may be implemented as a system, method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware or any combination thereof to control a computer to implement the disclosed aspects. For example, computer readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips . . . ), optical disks (e.g., compact disk (CD), digital versatile disk (DVD) . . . ), smart cards, and flash memory devices (e.g., card, stick, key drive . . . ). Additionally it should be appreciated that a carrier wave can be employed to carry computer-readable electronic data such as those used in transmitting and receiving electronic mail or in accessing a network such as the Internet or a local area network (LAN). Of course, those skilled in the art will recognize many modifications may be made to this configuration without departing from the scope or spirit of the claimed subject matter.
When the systems and/or methods described herein are implemented in software, firmware, middleware or microcode, program code or code segments, they may be stored in a machine-readable medium, such as a storage component. A code segment may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements. A code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted using any suitable means including memory sharing, message passing, token passing, network transmission, etc.
For a software implementation, the techniques described herein may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes may be stored in memory units and executed by processors. A memory unit may be implemented within the processor or external to the processor, in which case it can be communicatively coupled to the processor through various means.
What has been described above includes examples of the disclosed subject matter. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing such subject matter, but one of ordinary skill in the art may recognize that many further combinations and permutations are possible. Accordingly, the subject matter is intended to embrace all such alterations, modifications, and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the term “includes” is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.
This application is a Continuation of U.S. application Ser. No. 12/143,044 entitled “METHOD AND APPARATUS FOR HANDOFF BETWEEN SOURCE AND TARGET ACCESS SYSTEMS” filed on Jun. 20, 2008, which is a Continuation-in-Part of U.S. patent application Ser. No. 12/047,234 entitled “METHOD AND APPARATUS FOR HANDOFF BETWEEN ACCESS SYSTEMS” filed on Mar. 12, 2008, which claims the benefit of U.S. Provisional Patent Application Ser. No. 60/950,583 entitled “UMB TO DO HANDOFF” filed on Jul. 18, 2007, and U.S. Provisional Patent Application Ser. No. 60/895,365 entitled “INTERTECHNOLOGIES INTERWORKING” filed on Mar. 16, 2007, all of which are assigned to the assignee hereof, and hereby expressly incorporated by reference herein.
Number | Name | Date | Kind |
---|---|---|---|
6154652 | Park et al. | Nov 2000 | A |
6859654 | Reynolds et al. | Feb 2005 | B1 |
6909899 | Wang et al. | Jun 2005 | B2 |
7046647 | Oba et al. | May 2006 | B2 |
7079511 | Abrol et al. | Jul 2006 | B2 |
7206579 | Gwon et al. | Apr 2007 | B2 |
7697523 | Leung et al. | Apr 2010 | B2 |
7916715 | Rezaiifar et al. | Mar 2011 | B2 |
7933245 | Carlton | Apr 2011 | B2 |
7978683 | Balogh et al. | Jul 2011 | B2 |
8036176 | Oba et al. | Oct 2011 | B2 |
8072942 | Gaal et al. | Dec 2011 | B2 |
8145217 | Wang et al. | Mar 2012 | B2 |
8150397 | Khetawat et al. | Apr 2012 | B2 |
8243680 | Jung et al. | Aug 2012 | B2 |
8289920 | Wang et al. | Oct 2012 | B2 |
8359033 | Diachina et al. | Jan 2013 | B2 |
8457063 | Wu et al. | Jun 2013 | B2 |
8526952 | Shaheen | Sep 2013 | B2 |
8538430 | Filiatrault et al. | Sep 2013 | B1 |
8576795 | Ulupinar et al. | Nov 2013 | B2 |
8638749 | Cherian et al. | Jan 2014 | B2 |
20020136226 | Christoffel et al. | Sep 2002 | A1 |
20020194385 | Linder et al. | Dec 2002 | A1 |
20020196753 | Famolari | Dec 2002 | A1 |
20030104814 | Gwon et al. | Jun 2003 | A1 |
20030125027 | Gwon et al. | Jul 2003 | A1 |
20040008632 | Hsu et al. | Jan 2004 | A1 |
20040117508 | Shimizu | Jun 2004 | A1 |
20040125795 | Corson et al. | Jul 2004 | A1 |
20040156329 | Bck et al. | Aug 2004 | A1 |
20040203787 | Naghian | Oct 2004 | A1 |
20050143072 | Yoon et al. | Jun 2005 | A1 |
20050186948 | Gallagher et al. | Aug 2005 | A1 |
20050272432 | Ji et al. | Dec 2005 | A1 |
20060018280 | Kumar et al. | Jan 2006 | A1 |
20060023683 | Lee et al. | Feb 2006 | A1 |
20060045049 | Chung et al. | Mar 2006 | A1 |
20060046728 | Jung et al. | Mar 2006 | A1 |
20060050667 | Verma et al. | Mar 2006 | A1 |
20060072512 | Das et al. | Apr 2006 | A1 |
20060099949 | Jung et al. | May 2006 | A1 |
20060114871 | Buckley et al. | Jun 2006 | A1 |
20060126565 | Shaheen | Jun 2006 | A1 |
20060140150 | Olvera-Hernandez et al. | Jun 2006 | A1 |
20060148475 | Spear et al. | Jul 2006 | A1 |
20060203774 | Carrion-Rodrigo | Sep 2006 | A1 |
20070036109 | Kwak et al. | Feb 2007 | A1 |
20070160049 | Xie et al. | Jul 2007 | A1 |
20070165574 | Srey et al. | Jul 2007 | A1 |
20070177585 | El Mghazli et al. | Aug 2007 | A1 |
20070213060 | Shaheen | Sep 2007 | A1 |
20070249352 | Song et al. | Oct 2007 | A1 |
20070254625 | Edge | Nov 2007 | A1 |
20070258399 | Chen | Nov 2007 | A1 |
20080031159 | Jokinen | Feb 2008 | A1 |
20080076420 | Khetawat et al. | Mar 2008 | A1 |
20080089272 | Ahokangas | Apr 2008 | A1 |
20080089287 | Sagfors et al. | Apr 2008 | A1 |
20080092224 | Coulas et al. | Apr 2008 | A1 |
20080153495 | Ogami et al. | Jun 2008 | A1 |
20080165740 | Bachmann et al. | Jul 2008 | A1 |
20080242303 | Takahashi et al. | Oct 2008 | A1 |
20080281978 | Tang et al. | Nov 2008 | A1 |
20080305796 | Dolan | Dec 2008 | A1 |
20090016300 | Ahmavaara et al. | Jan 2009 | A1 |
20090040981 | Agashe et al. | Feb 2009 | A1 |
20090042576 | Mukherjee et al. | Feb 2009 | A1 |
20090111468 | Burgess et al. | Apr 2009 | A1 |
20090176489 | Ulupinar et al. | Jul 2009 | A1 |
20090186612 | Aghili | Jul 2009 | A1 |
20090201878 | Kotecha et al. | Aug 2009 | A1 |
20090202966 | Teicher et al. | Aug 2009 | A1 |
20090257402 | Zhu et al. | Oct 2009 | A1 |
20090258631 | Forsberg et al. | Oct 2009 | A1 |
20090271623 | Forsberg et al. | Oct 2009 | A1 |
20090286527 | Cheon et al. | Nov 2009 | A1 |
20100054207 | Gupta et al. | Mar 2010 | A1 |
20100061340 | Ramle et al. | Mar 2010 | A1 |
20100190500 | Choi et al. | Jul 2010 | A1 |
20110044198 | Persson et al. | Feb 2011 | A1 |
20110292914 | Sachs et al. | Dec 2011 | A1 |
20140295853 | Ulupinar et al. | Oct 2014 | A1 |
Number | Date | Country |
---|---|---|
2679270 | Sep 2008 | CA |
1505413 | Jun 2004 | CN |
1756237 | Apr 2006 | CN |
1441483 | Jul 2004 | EP |
1509052 | Feb 2005 | EP |
1746856 | Jan 2007 | EP |
2006518122 | Aug 2006 | JP |
2008503108 | Jan 2008 | JP |
2008507875 | Mar 2008 | JP |
2008519568 | Jun 2008 | JP |
2010534999 | Nov 2010 | JP |
20060124397 | Dec 2006 | KR |
20070046012 | May 2007 | KR |
101042763 | Jun 2011 | KR |
2237381 | Sep 2004 | RU |
2004137498 | Jun 2005 | RU |
2260919 | Sep 2005 | RU |
2265282 | Nov 2005 | RU |
2006106706 | Sep 2006 | RU |
M294789 | Jul 2006 | TW |
WO-0031946 | Jun 2000 | WO |
WO-0247407 | Jun 2002 | WO |
WO-2004075576 | Sep 2004 | WO |
WO-2005036804 | Apr 2005 | WO |
WO-2005055481 | Jun 2005 | WO |
WO-2005125256 | Dec 2005 | WO |
WO-2006011053 | Feb 2006 | WO |
WO-2006049464 | May 2006 | WO |
WO-2006052563 | May 2006 | WO |
WO-2006083039 | Aug 2006 | WO |
WO-2006102650 | Sep 2006 | WO |
WO-2006118489 | Nov 2006 | WO |
WO-2007007990 | Jan 2007 | WO |
WO-2009002586 | Dec 2008 | WO |
WO-2009012191 | Jan 2009 | WO |
WO-2009037623 | Mar 2009 | WO |
WO-2009154640 | Dec 2009 | WO |
Entry |
---|
3GPP TS 23.401 v1.0.0 (May 2007), 3rd Generaiton Partnership Project; Technical Specification Group Services and System Aspects; GPRS enhancements for E-UTRAN access (Release 8). |
3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Architecture Enhancements for non-3GPP accesses(Release 8),3GPP TS 23.402 V1.0.0 (May 2007),3GPP,May 2007. |
Hyun-Ho Choi et al., “A seamless handoff scheme for UMTS-WLAN interworking,” Global Telecommunications Conference, 2004. Globecom '04. IEEE Dallas, TZ, Nov. 29-Dec. 3, 2004, vol. 3, Nov. 29, 2004, pp. 1559-1564. |
QUALCOMM Europe, “Information flows for handover between 3GPP and non-3GPP accesses,” 3GPP TSG SA WG2 Architecture—S2#56c Ad-hoc, S2-071148, Mar. 26-30, 2007, Warsaw, Poland, pp. 1-3. |
Technical Specification Group Services and System Aspects: “Architecture enhancements for non-3GPP accesses TS 23.402 V8.0.0 (Release 8)” 3GPP-Standards, 2500 Wilson Boulevard, Suite 300, Arlington, Virginia 22201 USA, Dec. 2007, XP002486002 Chapter 4.1.2; p. 12 Chapters 4.3.2-4.3.5.2; pp. 22-24 Chapters 6.2.1-6.3; pp. 54-62 Chapters 8-9.3.2; pp. 82-104 Annex C.5; pp. 124-125. |
3GPP: “Optimized Handover Procedures and Protocols between EUTRAN Access and cdma2000 HRPD Acess—Stage 3 (Release 8)” 3rd Generation Partnerschip Project;Technical Specification Group Core Network and Terminals; 3GPP Evolved Packet Systems, Jun. 6, 2008, pp. 1-21, XP002542969, Chapter 1; p. 7 Chapter 4; p. 8 Chapters 7.3-7.3.3; pp. 10-12 Chapter 7.5.6; p. 17. |
“3GPP TR 23.882 v1.8.0 3GPP System Architecture Evolution: Report on Technical Options and Conclusions (Release 7)”, Feb. 21, 2007, Retrieved from the Internet: http://www.3gpp.org/fpt/Specs/html-info/23882.htm,XP002488584. |
3GPP TS 23.402, “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Architecture enhancements for non-3GPP accesses (Release 8)”, V8.1.1, Mar. 2008, pp. 1-163. |
3GPP TS 36.300 V8.0.0 (Mar. 2007); Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN) (Mar. 31, 2007). |
3GPP TS36.300 v0.9.0 Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description; 3GPP Technical Specification Group Radio Access . Network, [Online] Mar. 4, 2007, p. 49. |
3GPP TSG-RAN WG2, “Generic approach for optimized non-3GPP handover”, S2-073606 (Aug. 31, 2007). |
3GPP2: “UMB and HRPD/Ix Interworking, X.S0054-610-0 Version 1.0” 3GPP2, [Online] Aug. 29, 2008, pp. 1-60, XP002529917 Retrieved from the Internet: www.3gpp2.org/Public—html/specs /X.S0054-610-0—vl.0—080909.pdf> paragraphs [003.]-[5.1.3.]. |
“3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals;3GPP System Architecture Evolution ; CT WG1 Aspects(Release 8)” 3GPP Draft; 24801-100, 3rd Generation Partnership Project (3GPP), Mobile Competence Centre ; 650, Route Des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, vol. CT WG1, no. Zagreb, Croatia; Jun. 23, 2008, May 21, 2008, XP050029410, Chapter 7.3.3.2.1; p. 56 Chapters 9.4.1-9.4.3; pp. 69-70 Chapter 10.4; p. 85 Chapters 10.14.1.1.2-10.14.1.1.3; p. 93. |
Dutta, A. et al.: Columbia Univ: “A Framework of Media-Independent Pre-Authentication (MPA); draft-ohba-mobopts-mpa-framework-OO.txt” IETF Standard-Working-Draft, Internet Engineering Task Force, IETF, CH, Feb. 13, 2005, pp. 1-39, XP015039521 ISSN: 0000-0004 paragraphs [4.1.]-[4.3.] paragraph [5.4.]. |
ERICSSON: “PDN GW identification” 3GPP Draft; S2-083275 23.402—CR0263—PDN—GW Identity PA2, 3rd Generation Partnership Project (3GPP), Mobile Competence Centre ; 650, Route Des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France,vol. SA WG2, no. Prague; May 12, 2008,Apr. 30, 2008, XP050265506 Chapters 8.3 and 9.5; pp. 24-29. |
International Search Report and The Written Opinion—PCT/US2008/070559 International Search Authority—European Patent Office—Jun. 15, 2009. |
Jun Wang, “Access Authentication and Authorization in UMB”, May 14, 2007, 3rd Generation Partnership Project 2 “3GPP2”, pp. 1-3. |
Stamoulis A et al.,“Space-Time Block-Coded OFDMA With Linear Precoding for Multirate Services” IEEE Transactions on Signal Processing, Jan. 1, 2002 IEEE Service Center, New York, NY, US, vol. 50,Nr:1,pp. 119-129, Jan. 2002, XP001200909. |
Taiwan Search Report—TW097133505—TIPO—Feb. 23, 2012. |
Technical Specification Group Services and System Aspects: “Architecture enhancements for non-3GPP accesses TS 23.402 V8.0.0 (Release 8)” 3GPP-Standards, 2500 Wilson Boulevard,Suite 300, Arlington, Virginia 22201 USA,Dec. 2007, XP040278698 Chapter 4.1.2; p. 12 Chapters 4.3.2-4.3.5.2; pp. 22-24 Chapters 6.2.1-6.3; pp. 54-62 Chapters 8-9.3.2; pp. 82-104 Annex C.5; pp. 124-125. |
“Universal Mobile Telecommunications System (UMTS); Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access (E-UTRAN); Overall description; Stage 2 (3GPP TS 36.300 version 8.1.0 Release 8); ETSI TS 136 300” ETSI Standards, LIS, Sophia Antip0lis Cedex, France, vol. 3-R2, No. V8.1.0, Jun. 1, 2007, pp. 1-107, XP014038500 ISSN: 0000-0001 paragraph [8.2.] paragraphs [010.]-[10.2.2.]. |
Number | Date | Country | |
---|---|---|---|
20140092870 A1 | Apr 2014 | US |
Number | Date | Country | |
---|---|---|---|
60895365 | Mar 2007 | US | |
60950583 | Jul 2007 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12143044 | Jun 2008 | US |
Child | 14061491 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12047234 | Mar 2008 | US |
Child | 12143044 | US |