1. Technical Field
The present disclosure relates to wireless communications, and, more particularly, to managing access to coverage areas in wireless communication systems.
2. Description of Related Art
Many people use mobile stations, such as cell phones and personal digital assistants, to communicate with cellular wireless networks, which typically provide communication services such as voice, text messaging, and packet-data communication to these mobile stations. The mobile stations and networks typically communicate with each other over a radio frequency (RF) air interface according to a wireless protocol such as 1×RTT CDMA, EV-DO, WiMax, etc.
Mobile stations typically conduct these wireless communications with one or more base transceiver stations (BTSs), each of which send communications to and receive communications from mobile stations over the air interface. Each BTS is in turn communicatively connected with an entity known as a base station controller (BSC) (or radio network controller (RNC)), which controls one or more BTSs, and which acts as a conduit between the BTS(s) and one or more switches or gateways, such as a mobile switching center (MSC) and/or a packet data serving node (PDSN), which may interface with one or more signaling and/or transport networks.
As such, mobile stations can typically communicate with one or more endpoints over the one or more signaling and/or transport networks from anywhere inside the coverage area of one or more BTSs, via the BTS(s), a BSC, and an MSC and/or a PDSN. In typical arrangements, MSCs interface with the public switched telephone network (PSTN), while PDSNs interface with one or more core packet-data networks and/or the Internet.
When a mobile station engages in packet-data communication over one or more packet-data networks via one or more BTSs, one or more BSCs, and one or more PDSNs, that packet-data communication may be with one or more different types of endpoints. Some examples of endpoints include other mobile stations, landline phones, conference servers, gateways, etc. In the case of landline phones, a media gateway may reside between a packet-data network and a telephone network such as the PSTN. For simplicity of explanation, examples involving mobile stations communicating with one respective endpoint over a packet-data network via one BTS, one BSC, and one PDSN may be described herein; however, the present disclosure could just as well be applied to more complex examples, perhaps involving communication sessions between mobile stations and multiple endpoints, such as may be the case in a conference call.
Furthermore, a given instance of packet-data communication engaged in by a mobile station may be of any type. One popular type is Voice over IP (VoIP), which may have a user experience that is similar to voice calls conducted over the PSTN via a BTS, a BSC, and an MSC. VoIP calls (i.e. sessions) may also or instead take the form of push-to-talk (PTT) sessions, known to those in the art. In general, as used herein, “VoIP” encompasses any type of voice-over-packet communication that may be engaged in by mobile stations. More generally, the methods and systems described herein may be applied to any type of data communication, though doing so with respect to latency-sensitive types such as VoIP, videoconferencing, streaming media, etc. may yield the greatest dividends with respect to user satisfaction.
In connection with latency-sensitive types of packet-data communication, it is generally considered important that packets carrying bearer (e.g. voice) data traverse from source to destination quickly, consistently, and reliably, among other desirable descriptors. Stated in terms typically used in the art, it is important and desirable that bearer packets traverse between one endpoint of the communication (e.g. a mobile station) and the other (e.g. a media gateway residing between a packet-data network, such as the Internet, and the PSTN) with relatively little delay, jitter, or packet loss. These terms are referred to herein as packet-transport metrics; in the context of VoIP, they may be referred to as VoIP-quality metrics. Using VoIP as an example, if a VoIP call has relatively poor values of delay, jitter, and/or packet loss, then the voice quality (experienced by one, both, or all participants) will be degraded, which is undesirable.
Note that these packet-transport metrics could be measured between a mobile station and the other endpoint of the communication session, between a network element (e.g. BTS or BSC) and the other endpoint, or on some other subpart of a communication path of a communication session. In general, the metrics will be described herein as being measured between a network element (e.g. an access node) and the other endpoint in the communication session (i.e. on the backhaul), though this is for illustration and not limitation. This choice may, however, avoid mobile stations having to report these metrics to an access node, which will likely be the entity that is carrying out exemplary embodiments, making it an efficient choice for being one endpoint of the path along which these metrics are measured and evaluated.
With respect to the first of the packet-transport metrics referenced above, delay is generally defined as the time taken for packets to get from one point to another in a network. Note that delay can be measured one-way, round-trip, or both. Typically, measuring round-trip delay is easier and requires less-expensive equipment. Note that, to obtain rough estimate of one-way delay, round-trip delay can be measured and then divided in half. A typical tolerance level for one-way delay in a VoIP context may be approximately 150-250 milliseconds (ms), before the quality of call degrades to a point that is generally considered unacceptable.
Jitter is typically defined as the variation in delay over some period of time between the network points for which the delay is measured. In general, if the delay of VoIP-packet transmissions varies too widely during a particular VoIP call, in other words if the jitter is too high, then the call quality typically would be significantly degraded.
Finally, some VoIP packets transmitted from the source never make it to the destination; i.e. they are lost. Packet loss, then, is typically defined as the ratio of (i) the number of packets that never make it to their destination to (ii) the total number of packets that were transmitted (including those that made it to their destination and those that did not) over some time period. The higher this ratio is, the more the VoIP call quality will be degraded, since certain portions of the audio will not be available for playout, and retransmission is generally not thought to be a practical solution to packet loss in real-time applications such as VoIP.
When a given base station—and a given wireless network in general—provides packet-data service (e.g. VoIP service) to a given mobile station, the base station is providing at least two services to that mobile station. The first is wireless service over the air interface, and the other is transport service (i.e. connectivity) over one or more packet-data networks, such as direct transport service over the service provider's privately-operated core packet-data network, as well as indirect transport service over a public packet-data network such as or including the Internet. In general, the packet-transport metrics referred to herein pertain to the transport service, and reflect the quality of network (or “transport”) conditions over the packet-data network(s) that the packets—sent to and from a given mobile station—traverse.
Note that, in contexts where wireless service is provided according to a protocol known as EV-DO (perhaps according to IS-856, Revision 0 and/or IS-856, Revision A, both of which are hereby incorporated herein by reference in their entirety), mobile stations are often referred to as access terminals, and BSCs are often referred to as RNCs (radio network controllers). Furthermore, a combination of an RNC and one or more BTSs is often referred to as an access node. This terminology will be adopted for the balance of this written description, though again for illustration and not to limit the described embodiments to any particular protocol.
As known to those of skill in the art, in EV-DO networks, access terminals use a reverse-link channel known as the DRC channel to request forward-link service from a particular network sector. Typically, an access terminal will specify the sector (or coverage area, more generally) from which the access terminal is requesting forward-link service by transmitting a particular value known as a DRC cover in the reverse-link DRC channel, where the DRC cover sent by the access terminal indicates a particular sector. Incidentally, the access terminal also includes data in the reverse-link DRC channel that indicates a particular data rate or particular packet-transmission format, depending on the implemented version of IS-856.
In any event, upon receiving a request for forward-link service (i.e. a DRC request) from an access terminal via the reverse-link DRC channel, a given EV-DO network sector may grant the request and provide forward-link service, in which case the access terminal receives forward-link service from that sector until the access terminal selects another sector, powers down, ceases communication, and/or some other event occurs. If, however, the sector (or more generally perhaps, the access node) determines that the requested sector is not able or willing to provide forward-link service to the access terminal, the sector typically transmits a value to the access terminal known as a DRCLock. In current implementations, the DRCLock is sent when a potential serving sector determines that it is not properly receiving (e.g. cannot properly decode) the reverse-link DRC channel from the access terminal, and thus concludes that it is not a good candidate to provide forward-link service to the access terminal.
Essentially, then, the DRCLock is a message from a sector to an access terminal, informing the access terminal that, at least for the time being, the sector is not an option for providing forward-link service to the access terminal. The DRCLock typically takes the form of a bit, where one of the two possible values (referred to herein as the DRCLock being “set”) indicates that the sector is not an option for the access terminal, and where the other of the two possible values (referred to herein as the DRCLock being “clear” or “cleared”) indicates that the sector is an option for the access terminal. In response to detecting that a sector has set the DRCLock for an access terminal, the access terminal typically programmatically points its DRC channel at another sector (i.e. transmits a DRC cover corresponding to another sector). The access terminal may then periodically check whether the first sector has cleared its DRCLock and, if so, point its DRC cover back at that first sector.
As described, in current implementations, sectors (and access nodes, more generally), determine whether to set a DRCLock on an access-terminal-by-access-terminal basis, depending on the air-interface conditions between the sector and the particular access terminal. Thus, it may well occur that there may be times where (i) an access node (i.e. one or more sectors thereof) is able to properly receive DRC requests from multiple (and perhaps numerous) access terminals, and thus becomes the forward-link serving sector for those access terminals and (ii) the transport conditions are unfavorable, perhaps due to poor values of at least one of delay, jitter, and packet loss on the transport/backhaul side. At these times, the access terminals for which the access node has agreed to be the serving sector may very well experience poor communication quality, such as choppy and/or intermittent VoIP audio, as one example.
Thus, in accordance with the present methods and systems, an EV-DO access node considers packet-transport metrics (such as packet loss, delay, and/or jitter) as at least part of the decision-making criteria when determining whether to set DRCLocks for one or more access terminals. In an embodiment, an access terminal (e.g. a sector) may maintain thresholds for one or more packet-transport metrics, such as a delay threshold, a jitter threshold, and/or a packet-loss threshold. The access node may periodically compare current values of one or more of those metrics against their respective thresholds and, if a certain number (e.g. one, two, or all) of the current values of the metrics exceed their respective threshold(s), the access node may responsively set the DRCLock for at least one access terminal. As far as selecting which access terminals for which to set DRCLock, an access node may make such a selection at random, according to tiered-service arrangements, according to the type of packet-data communication (e.g. best efforts, VoIP, etc.) in which an access terminal is engaging, and/or any other factor(s).
Note that an access node may consider the metrics in any order, and may consider only one or two of them. That is, the base station could consider (i) delay, (ii) jitter, (iii) delay and packet loss, etc. And it should be noted that evaluation of one or more packet-transport metrics need not be to the exclusion of considering other criteria for DRCLock decisions; some embodiments may well involve (i) not setting DRCLocks when no metrics exceed their thresholds and (ii) setting at least one DRCLock when at least one metric exceeds its threshold. However, other embodiments may involve setting at least one DRCLock when at least one metric exceeds its threshold, but may further condition setting at least one DRCLock on one or more other criteria. For one or more of the metrics, an access node could consider only a most-recently-measured value, an average over some previous time period, an average of a worst 10% (or some other percentage) of measurements over some previous time period, and/or any other relevant data set considered appropriate for a given implementation.
Furthermore, an access node, after determining to set (and then actually setting) one or more DRCLocks based on one or more packet-transport metrics exceeding one or more respective thresholds, may continue to periodically monitor the metrics and compare them to the respective one or more thresholds. In an embodiment, when an access node then concludes that, as an example, all of the packet-transport metrics have a value below their respective threshold, the access node may then clear one or more of the DRCLocks that it had previously set based at least in part on the one or more packet-transport metrics. In other embodiments, the access node may clear the DRCLocks in that situation on an access-terminal-by-access-terminal basis, depending for each access terminal on whether other criteria also indicate clearing the DRCLock.
Note that, in some embodiments, a dual-mode (e.g. EV-DO and 1×RTT CDMA (“1×”)) access terminal that is denied service from a first network (e.g. an EV-DO network) may, according to the herein-described methods and systems, attempt to acquire resources from a second network (e.g. a 1× network).
And it should be noted that the above overview is intended to be illustrative and not limiting. Additional and/or different features may be present in some embodiments. And any description of a mobile station, access terminal, or other network element operating according to any particular protocol is by way of example and not limitation; any suitable wireless protocol(s) may be used, such as but not limited to 1×RTT CDMA, EV-DO, TDMA, AMPS, GSM, GPRS, UMTS, EDGE, WiMax (e.g. IEEE 802.16), LTE, microwave, satellite, MMDS, Wi-Fi (e.g. IEEE 802.11), Bluetooth, infrared, and/or any other now known or later developed.
Various exemplary embodiments are described herein with reference to the following drawings, wherein like numerals denote like entities.
As shown in
Access terminal 102 may be any device arranged to carry out the access-terminal functions described herein, and may include a user interface, a wireless-communication interface, a processor, and data storage comprising instructions executable by the processor for carrying out those access-terminal functions. The user interface may include buttons, a touchscreen, a microphone, and/or any other elements for receiving inputs from users, as well as a speaker, one or more displays, and/or any other elements for communicating outputs to users.
The wireless-communication interface may comprise an antenna and a chipset for communicating with one or more base stations over an air interface. As an example, the chipset could be one suitable for engaging in EV-DO communications, including IS-856, Rel. 0 and/or IS-856, Rev. A communications. The chipset or wireless-communication interface in general may also be able to communicate with a 1×RTT CDMA network, a Wi-Fi (IEEE 802.11) network, and/or one or more additional types of wireless networks. The processor and data storage may be any suitable components known to those of skill in the art. As examples, access terminal 102 could be or include a cell phone, a PDA, a computer, a laptop computer, a hybrid IS-2000/IS-856 device, and/or a multi-mode Wi-Fi/cellular device.
BTS 103 may be any one or any combination of network elements arranged to carry out the BTS functions described herein, and may include a communication interface, a processor, and data storage comprising instructions executable by the processor to carry out those BTS functions. The communication interface may include one or more antennas and chipsets or other components for providing one or more coverage areas such as cells or sectors according to a protocol such as CDMA, EV-DO, WiMax, or any other suitable protocol. The communication interface may also include a wired or wireless packet-data interface (which may be characterized as a backhaul connection) such as an Ethernet interface for communicating with RNC 104.
RNC 104 may be any one or any combination of network elements arranged to carry out the RNC functions described herein. As such, RNC 104 may include a communication interface, a processor, and data storage comprising instructions executable by the processor to carry out those RNC functions. The communication interface may include a wired or wireless packet-data interface (which may be characterized as a backhaul connection) such as an Ethernet interface for communicating directly or over one or more networks with PDSN 106. In general, RNC 104 functions to control one or more BTSs, and to serve as a conduit between the one or more BTSs and PDSN 106, enabling access terminals to communicate over PDN 108 and perhaps beyond.
Note that access node 105 may comprise BTS 103 and RNC 104, and may comprise one or more additional BTSs as well. In general, access node 105 provides wireless service to access terminals over an air interface, and transport service over PDN 108 (or perhaps PDN 108 and PDN 112) to those access terminals using a backhaul connection. Access node 105 may further be able to (i.e. comprise hardware, firmware, and/or software programmed with the functionality to) measure, as is known in the art, one or more packet-transport metrics such as delay, jitter, and packet loss with respect to communications between access terminals such as access terminal 102 and endpoints such as endpoint 114.
Furthermore, access node 105 may store—or have access to—thresholds for a set of one or more packet-transport metrics.
Note as well that the thresholds 202-206 may take on any values suitable for a particular implementation. In some embodiments, delay threshold 202 may be approximately 150-250 ms. In some embodiments, jitter threshold 204 may be approximately 10-20 ms. In some embodiments, packet-loss threshold 206 may be approximately 1%, 2%, 5%, or thereabouts. And other values could certainly be used as well.
Returning to
Each of PDN 108 and PDN 112 may include one or more wide area networks, one or more local area networks, one or more public networks such as the Internet, one or more private networks, one or more wired networks, one or more wireless networks, and/or one or more networks of any other type. Devices in communication with PDN 108 and/or PDN 112 may exchange data using a packet-switched protocol such as IP, and may be identified by an address such as an IP address. In this example, PDN 108 is the service provider's privately-operated IP network (where the service provider may operate at least access node 105 and PDSN 106), while PDN 112 is the Internet. However, this is for illustration and not by way of limitation. In some embodiments, PDSN 106 may connect directly to the Internet, in which case PDN 108 and gateway 110 may not be necessary. And other configurations are possible as well.
Gateway 110 may be any networking server or other device arranged to carry out the gateway functions described herein. Thus, gateway 110 may include a communication interface, a processor, and data storage comprising instructions executable by the processor for carrying out those gateway functions. The communication interface may include a wired packet-data interface such as an Ethernet interface for communicating over PDN 108 and/or PDN 112. Note that gateway 110 may, instead or in addition, comprise a wireless-communication interface for communicating over PDN 108 and/or PDN 112. Gateway 110 may use the same interface or separate interfaces for communicating over PDN 108 and/or PDN 112. Gateway 110 may generally function to provide PDN 108 and PDN 112 with connectivity to each other.
Endpoint 114 may be any device arranged to carry out the endpoint functions described herein. As such, endpoint 114 may include a (wired and/or wireless) communication interface, a processor, and data storage comprising instructions executable by the processor for carrying out those endpoint functions. Endpoint 114 may be or include a media gateway (perhaps connected to the PSTN), a packet-based telephone, a personal computer, a PDA, a mobile station, an access terminal, a PTT server, a call server, and/or any other type of device capable of functioning as an endpoint of a VoIP—or other type of packet-data-communication—session in accordance with exemplary embodiments.
As shown in
At step 304, access node 105 measures, over at least the packet-data network, each packet-transport metric in a set of one or more packet-transport metrics, at least one of which may be a VoIP-quality metric. The set of one or more packet-transport metrics may include at least one of delay, jitter, and packet loss. Step 304 may involve measuring each packet-transport metric in the set of one or more packet-transport metrics between access terminals (that access node 105 is serving) and endpoints with which the access terminals are communicating. At least one of the endpoints could be a mobile station, an access terminal, a landline phone, a conference server, or a gateway.
In other embodiments, step 304 may involve measuring each packet-transport metric in the set of one or more packet-transport metrics between at least one network element and endpoints with which the access terminals (that access node 105 is serving) are communicating. That network element could be access node 105, but could instead be any other element, such as but not limited to a base station, a BTS, a BSC, an RNC, an MSC, and a PDSN. As above, at least one of the endpoints could be a mobile station, an access terminal, a landline phone, a conference server, or a gateway, among many possible examples.
Note that, in general, step 304 may involve measuring each packet-transport metric in the set of one or more packet-transport metrics for at least one type of packet-data communication selected from the group consisting of VoIP, PTT, videoconferencing, and streaming media. That is, decisions regarding the setting or clearing of DRCLocks for one or more access terminals could be conducted so as to take into account the packet-transport metrics being experienced by VoIP users (which may include PTT users) in particular, or perhaps some different or larger class of latency-sensitive types of packet-data communication. It is also possible to use the metrics being experienced sector wide in connection with all types of packet-data communication. And other possibilities exist as well.
At step 306, access node 105 sets a DRCLock for at least one of the access terminals based at least in part on the one or more measured packet-transport metrics. Note that access node 105 may maintain a set of one or more packet-transport-metric thresholds, where each packet-transport-metric threshold corresponds to a respective packet-transport metric in the set of one or more packet-transport metrics.
Thus, if the set of metrics was {delay, jitter, packet loss}, then access node 105 may maintain a table such as threshold table 200 of
In another embodiment in which metric thresholds are maintained for each respective metric, access node 105 may receive a DRC request from an access terminal, and responsively determine whether a most-recent measurement of each packet-transport metric is less than that metric's corresponding threshold: if so, access node 105 may grant the DRC request; if not, access node 105 may set a DRCLock for the access terminal.
Note that step 306 may involve access node setting a DRCLock for a random selection of the access terminals. In another embodiment, step 306 may involve access node 105 setting a DRCLock for those access terminals engaged in a certain type of packet-data communication (e.g. best-efforts communication, so as to improve performance for latency-sensitive types of communication such as VoIP or PTT). In another embodiment, step 306 may involve access node 105 setting a DRCLock for access terminals associated with a lower tier of service. In another embodiment, step 306 may involve access node 105 setting a DRCLock for at least one of the access terminals based (a) at least in part on the one or more measured packet-transport metrics and (b) at least in part on whether DRC requests from respective access terminals are able to be properly received (and/or at least in part on one or more other conditions). And certainly other possibilities exist as well.
In one embodiment, access node 105 may determine that each packet-transport metric in the set of packet-transport metrics has reverted below a respective threshold value for that metric, and responsively clear at least one DRCLock for at least one of the access terminals.
Various exemplary embodiments have been described above. Those skilled in the art will understand, however, that changes and modifications may be made to those examples without departing from the scope of the claims.
Number | Name | Date | Kind |
---|---|---|---|
5649299 | Battin et al. | Jul 1997 | A |
5890067 | Chang et al. | Mar 1999 | A |
5995923 | Mermelstein et al. | Nov 1999 | A |
6014568 | Alperovich et al. | Jan 2000 | A |
6021328 | Curtis et al. | Feb 2000 | A |
6081229 | Soliman et al. | Jun 2000 | A |
6148207 | Baum | Nov 2000 | A |
6161022 | Hwang et al. | Dec 2000 | A |
6172974 | Tseng et al. | Jan 2001 | B1 |
6208631 | Kim | Mar 2001 | B1 |
6223041 | Egner et al. | Apr 2001 | B1 |
6243590 | Reddy et al. | Jun 2001 | B1 |
6272358 | Brent et al. | Aug 2001 | B1 |
6418147 | Wiedeman | Jul 2002 | B1 |
6480541 | Girod et al. | Nov 2002 | B1 |
6501736 | Smolik et al. | Dec 2002 | B1 |
6522888 | Garceran et al. | Feb 2003 | B1 |
6526029 | Zhong | Feb 2003 | B1 |
6577616 | Chaudry et al. | Jun 2003 | B1 |
6591110 | Kim et al. | Jul 2003 | B1 |
6606496 | Salvarani et al. | Aug 2003 | B1 |
RE38244 | Han et al. | Sep 2003 | E |
6625119 | Schuster et al. | Sep 2003 | B1 |
6718183 | Blust et al. | Apr 2004 | B1 |
6745012 | Ton et al. | Jun 2004 | B1 |
6757520 | Attar et al. | Jun 2004 | B2 |
6775252 | Bayley | Aug 2004 | B1 |
6839356 | Barany et al. | Jan 2005 | B2 |
6856954 | Su | Feb 2005 | B1 |
6944454 | Lee et al. | Sep 2005 | B1 |
6970437 | Lott et al. | Nov 2005 | B2 |
6970871 | Rayburn | Nov 2005 | B1 |
6975609 | Khaleghi et al. | Dec 2005 | B1 |
6980523 | Lipford et al. | Dec 2005 | B1 |
7058124 | Koo | Jun 2006 | B2 |
7099283 | Matta et al. | Aug 2006 | B2 |
7120447 | Chheda et al. | Oct 2006 | B1 |
7130287 | Nounin et al. | Oct 2006 | B2 |
7130311 | Yavuz et al. | Oct 2006 | B2 |
7142562 | Yavuz et al. | Nov 2006 | B2 |
7190958 | Yarkosky | Mar 2007 | B1 |
7209758 | Moll et al. | Apr 2007 | B1 |
7236796 | Soliman | Jun 2007 | B2 |
7245915 | Matta et al. | Jul 2007 | B2 |
7328027 | Mangal | Feb 2008 | B1 |
7394789 | Sakawa et al. | Jul 2008 | B2 |
7406319 | Kostic et al. | Jul 2008 | B2 |
7411923 | Attar et al. | Aug 2008 | B2 |
7411974 | Attar et al. | Aug 2008 | B2 |
7426180 | Xu | Sep 2008 | B2 |
7426395 | Stephens | Sep 2008 | B2 |
7433682 | Moll et al. | Oct 2008 | B1 |
7440431 | Sindhushayana et al. | Oct 2008 | B2 |
7474627 | Chheda et al. | Jan 2009 | B2 |
7486645 | Li et al. | Feb 2009 | B2 |
7496058 | Kim et al. | Feb 2009 | B2 |
7602722 | Chheda | Oct 2009 | B2 |
7729243 | Ananthaiyer | Jun 2010 | B2 |
7742768 | Liu et al. | Jun 2010 | B2 |
7746816 | Attar et al. | Jun 2010 | B2 |
7751839 | Bowers et al. | Jul 2010 | B2 |
7764651 | Kwon | Jul 2010 | B2 |
7822064 | Thubert | Oct 2010 | B2 |
7852759 | Stephenson | Dec 2010 | B2 |
7921348 | Seidel et al. | Apr 2011 | B2 |
7953048 | Yoon et al. | May 2011 | B2 |
8014280 | Zhang et al. | Sep 2011 | B2 |
8040803 | Pawar et al. | Oct 2011 | B1 |
8094623 | Attar et al. | Jan 2012 | B2 |
20020061749 | Hunzinger | May 2002 | A1 |
20020151310 | Chung et al. | Oct 2002 | A1 |
20020191693 | Nakagaki | Dec 2002 | A1 |
20030017831 | Lee et al. | Jan 2003 | A1 |
20030064741 | Silva et al. | Apr 2003 | A1 |
20030072278 | Wu et al. | Apr 2003 | A1 |
20030095551 | Gotoh et al. | May 2003 | A1 |
20030114172 | Soliman | Jun 2003 | A1 |
20030117956 | Lee | Jun 2003 | A1 |
20030129982 | Perini | Jul 2003 | A1 |
20030163558 | Cao et al. | Aug 2003 | A1 |
20030195006 | Choong et al. | Oct 2003 | A1 |
20040017860 | Liu | Jan 2004 | A1 |
20040037291 | Attar et al. | Feb 2004 | A1 |
20040057420 | Curcio et al. | Mar 2004 | A1 |
20040071086 | Haumont et al. | Apr 2004 | A1 |
20040179525 | Balasubramanian et al. | Sep 2004 | A1 |
20040196852 | Aksu et al. | Oct 2004 | A1 |
20040213182 | Huh et al. | Oct 2004 | A1 |
20040218533 | Kim et al. | Nov 2004 | A1 |
20040259565 | Lucidarme | Dec 2004 | A1 |
20050032522 | Soong et al. | Feb 2005 | A1 |
20050052996 | Houck et al. | Mar 2005 | A1 |
20050111397 | Attar et al. | May 2005 | A1 |
20050130663 | Hong et al. | Jun 2005 | A1 |
20050153695 | Cho | Jul 2005 | A1 |
20050159165 | Argyropoulos et al. | Jul 2005 | A1 |
20050201289 | Smolinske et al. | Sep 2005 | A1 |
20050250509 | Choksi | Nov 2005 | A1 |
20050286440 | Strutt et al. | Dec 2005 | A1 |
20060077994 | Spindola et al. | Apr 2006 | A1 |
20060121855 | Dillon | Jun 2006 | A1 |
20060126509 | Abi-Nassif et al. | Jun 2006 | A1 |
20060159051 | English | Jul 2006 | A1 |
20060182062 | Sdralia et al. | Aug 2006 | A1 |
20060223585 | Legg | Oct 2006 | A1 |
20060229087 | Davis, III et al. | Oct 2006 | A1 |
20060250953 | Mooney | Nov 2006 | A1 |
20060252429 | Chen et al. | Nov 2006 | A1 |
20060268764 | Harris | Nov 2006 | A1 |
20060291383 | Bi et al. | Dec 2006 | A1 |
20070060165 | Black et al. | Mar 2007 | A1 |
20070099648 | Kim et al. | May 2007 | A1 |
20070109967 | Ha | May 2007 | A1 |
20070127407 | Attar et al. | Jun 2007 | A1 |
20070127522 | Lundh et al. | Jun 2007 | A1 |
20070177510 | Natarajan et al. | Aug 2007 | A1 |
20070178906 | Gao et al. | Aug 2007 | A1 |
20070183427 | Nylander et al. | Aug 2007 | A1 |
20070197223 | Jung et al. | Aug 2007 | A1 |
20070201438 | Yoon et al. | Aug 2007 | A1 |
20070201439 | Sun et al. | Aug 2007 | A1 |
20070242702 | Shim | Oct 2007 | A1 |
20070274257 | Bae et al. | Nov 2007 | A1 |
20080008093 | Wang | Jan 2008 | A1 |
20080049699 | Li et al. | Feb 2008 | A1 |
20080049706 | Khandekar et al. | Feb 2008 | A1 |
20080130495 | Dos Remedios et al. | Jun 2008 | A1 |
20080186862 | Corbett et al. | Aug 2008 | A1 |
20080188228 | Pecen et al. | Aug 2008 | A1 |
20080207170 | Khetawat et al. | Aug 2008 | A1 |
20080233967 | Montojo et al. | Sep 2008 | A1 |
20080247450 | Alexander et al. | Oct 2008 | A1 |
20080280615 | Vinayakray-Jani | Nov 2008 | A1 |
20090059790 | Calvert et al. | Mar 2009 | A1 |
20090088157 | Aaron | Apr 2009 | A1 |
20090141683 | Grinshpun et al. | Jun 2009 | A1 |
20090170547 | Raghothaman et al. | Jul 2009 | A1 |
20090187690 | Smart et al. | Jul 2009 | A1 |
20090257361 | Deshpande et al. | Oct 2009 | A1 |
20090262720 | Kwon et al. | Oct 2009 | A1 |
20090285159 | Rezaiifar et al. | Nov 2009 | A1 |
20090288145 | Huber et al. | Nov 2009 | A1 |
20100014487 | Attar et al. | Jan 2010 | A1 |
20100189096 | Flynn et al. | Jul 2010 | A1 |
20100240373 | Ji et al. | Sep 2010 | A1 |
20100271962 | Han et al. | Oct 2010 | A1 |
20100296407 | Medvedev et al. | Nov 2010 | A1 |
20100309861 | Gorokhov et al. | Dec 2010 | A1 |
20110053596 | Wohlert et al. | Mar 2011 | A1 |
20110085607 | Dhandu et al. | Apr 2011 | A1 |
20110116419 | Cholas et al. | May 2011 | A1 |
20110292785 | Hardin | Dec 2011 | A1 |
20120044908 | Spinelli et al. | Feb 2012 | A1 |
Number | Date | Country |
---|---|---|
WO 2004004249 | Jan 2004 | WO |
2004028095 | Apr 2004 | WO |
Entry |
---|
First Action Interview Pilot Program Pre-Interview Communication from U.S. Appl. No. 11/746,229, mailed Dec. 30, 2009. |
U.S. Appl. No. 12/538,624, Final Office Action dated Dec. 19, 2011. |
U.S. Appl. No. 12/478,318, Notice of Allowance dated Jan. 30, 2012. |
U.S. Appl. No. 12/731,895, Non Final Office Action dated Mar. 23, 2012. |
U.S. Appl. No. 12/432,736, Non Final Office Action dated Mar. 27, 2012. |
U.S. Appl. No. 12/756,629, Non Final Office Action dated Mar. 29, 2012. |
U.S. Appl. No. 12/494,999, Notice of Allowance dated Mar. 30, 2012. |
Rosenberg, J. et al., “SIP: Session Initiation Protocol,” Network Working Group, Request for Comments: 3261, Jun. 2002, pp. 1-265. |
3rd Generation Partnership Project, “cdma2000 Femtocell Network: 1x and IMS Network Aspects,” 3GPP2 X. S0059-2000-0, Version 1.0, Jan. 2010. |
Kjellberg, Richard, “Analysis of an AIS Implementation in Tokyo Bay,” web.archive.org/web/20090427053120/ http://www.gpc.se/tokyo/tokyo.htm (Apr. 27, 2009). |
Xing, Jianping et al., “Research and Integration of Marine Embedded AIS Information Terminal,” Proceedings of the 7th World Congress on Intelligent Control and Automation, Jun. 25-27, 2008, Chongqing, China, pp. 3586-3589. |
Openwave, “Overview of Location Technologies,” Nov. 19, 2002, 12 pages. |
Unpublished U.S. Appl. No. 12/141,569, filed Jun. 18, 2008 entitled “Method for Initiating Handoff of a Wireless Access Terminal Based on the Reverse Activity Bit”. |
Unpublished U.S. Appl. No. 11/746,229, filed May 9, 2007 entitled “Using VoIP-Quality Metrics to Dynamically Adjust the EV-DO Reverse Activity Bit”. |
Unpublished U.S. Appl. No. 12/350,694, filed Jan. 8, 2009 entitled “Using Packet-Transport Metrics for Call-Admission Control”. |
Unpublished U.S. Appl. No. 12/432,736, filed Apr. 29, 2009 entitled “Using DRCLocks for Conducting Call Admission Control”. |
Unpublished U.S. Appl. No. 12/494,999, filed Jun. 30, 2009 entitled “Implementing Quality of Service (QoS) by Using Hybrid ARQ (HARQ) Response for Triggering the EV-DO Reverse Activity Bit (RAB)”. |
Unpublished U.S. Appl. No. 12/507,913, filed Jul. 23, 2009 entitled “Achieving Quality of Service (QoS) by Using the Reverse Activity Bit (RAB) in Creation of Neighbor Lists for Selected Access Terminals”. |
U.S. Appl. No. 12/388,199, filed Feb. 18, 2009. |
U.S. Appl. No. 12/478,318, filed Jun. 4, 2009. |
U.S. Appl. No. 12/538,624, filed Aug. 10, 1999. |
U.S. Appl. No. 12/756,629, filed Apr. 8, 2010. |
U.S. Appl. No. 12/731,895, filed Mar. 25, 2010. |
U.S. Appl. No. 11/746,229, First Action Interview Summary dated Jun. 2, 2010. |
U.S. Appl. No. 11/746,229, Notice of Allowance dated Aug. 3, 2010. |
U.S. Appl. No. 11/746,229, Interview Summary dated Apr. 6, 2010. |
U.S. Appl. No. 12/141,569, Non-Final Office Action dated Mar. 22, 2011. |
U.S. Appl. No. 12/350,694, Non-Final Office Action dated Jun. 22, 2010. |
U.S. Appl. No. 12/350,694, Final Office Action dated Dec. 9, 2010. |
U.S. Appl. No. 12/350,694, Non-Final Office Action dated Feb. 18, 2011. |
U.S. Appl. No. 12/350,694, Notice of Allowance mailed Jun. 10, 2011. |
U.S. Appl. No. 12/388,199, Non-Final Office Action dated Mar. 30, 2011. |
U.S. Appl. No. 12/478,318, Non-Final Office Action dated Dec. 8, 2010. |
Ferrus, R. et al., “Evaluation of a Cell Selection Framework for Radio Access Networks considering Blackhaul Resource Limitations,” The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'07). |
Mino, E. et al., “IST-4-027756 Winner II, D4.8.3, Integration of Cooperation on Winner II System Concept,” Information Society Technologies, pp. 1-102, Nov. 29, 2007. |
Conklin, G. et al., “Video Coding for Streaming Media Delivery on the Internet,” IEE Transactions on Circuits and Systems for Video Technology, 11(3):269-281 (Mar. 2001). |
International Search Report and Written Opinion from International Application No. PCT/US2007/009296, dated Oct. 17, 2007. |
Liu, Xiu et al., “Experiences in a 3G Network: Interplay between the Wireless Channel and Applications,” MobiCom'08, pp. 211-222 (Sep. 14-19, 2008). |
Yeo, Woon-Yong et al., “Traffic Management of High-Speed CDMA Systems Base on Loan Prediction,” IEICE Electronics Express, 6(7):389-394 (Apr. 10, 2009). |
3rd Generation Partnership Project 2, “cdma2000 High Rate Packet Data Air Interface,” 3GPP2 C.S0024-0, v. 4.0 (Oct. 2002). |
3rd Generation Partnership Project 2, “cdma2000 High Rate Packet Data Air Interface,” 3GPP2 C.S0024-A, v. 3.0 (Sep. 2006). |
Notice of Allowance for U.S. Appl. No. 12/350,694 dated Jun. 10, 2011. |
Notice of Allowance for U.S. Appl. No. 12/141,569 dated Sep. 28, 2011. |
U.S. Appl. No. 12/141,569, Notice of Allowance dated Sep. 28, 2011. |
U.S. Appl. No. 12/388,199, Final Office Action dated Oct. 11, 2011. |
U.S. Appl. No. 12/478,318, Non-Final Office Action dated Oct. 27, 2011. |