Forbidden Tracking Area Optimization For Private/Home Networks

作者: Ivan Ore , Jarkko T. Koskela , Kari Sipila , Lars Dalsgaard

DOI:

关键词:

摘要: Access verification is adaptively done using an identifier of a first or second length, by comparing field node address that has the determined length against locally stored access list. At least compared either added to list cell selection candidate nodes where allowed identifiers, excluded from it restricted identifiers. The in three sections. section service type, which UE can use determine whether not restricted/allowed. section, area ID group network nodes. plus third identifies one

参考文章(12)
Edward G. Tiedemann, Nobuyuki Uchida, Andrew T. Hunter, Rotem Cooper, Vera Kripalani, Alejandro R. Holcman, Network operator identification for cdma communication networks ,(2003)
Hyung-Nam Choi, Michael Eckert, Achim Luft, Method for operating terminals of a mobile radio communication system ,(2003)
Victor Poznanski, Anthony Hull, Ryoichi Sato, Kozob Takahashi, Staffan J. Corley, Philip G. Edmonds, David Robinson, Remote access system and method ,(2004)
Kevin Kerstens, Jim Doree, Allan Van Schaick, Proxy method and system for secure wireless administration of managed entities ,(2006)
Whui Mei Yeo, Lars Dalsgaard, Cell reselection for improving network interconnection ,(2004)