equal
deleted
inserted
replaced
24 <desc><p>A device is connected to a mobile network using GPRS. The device |
24 <desc><p>A device is connected to a mobile network using GPRS. The device |
25 comes into range of a Wi-Fi network. The device decides to change to the Wi-Fi |
25 comes into range of a Wi-Fi network. The device decides to change to the Wi-Fi |
26 network and creates a bearer to access the Wi-Fi network. The device then |
26 network and creates a bearer to access the Wi-Fi network. The device then |
27 moves all the existing connections across to the Wi-Fi bearer. In the final |
27 moves all the existing connections across to the Wi-Fi bearer. In the final |
28 step the device disconnects from the GPRS network. </p> </desc> |
28 step the device disconnects from the GPRS network. </p> </desc> |
29 <image href="GUID-65A4BA91-579F-5B9B-ACC1-D3D9B1F233B7_d0e110301_href.png" placement="inline"/> |
29 <image href="GUID-65A4BA91-579F-5B9B-ACC1-D3D9B1F233B7_d0e108136_href.png" placement="inline"/> |
30 </fig> |
30 </fig> |
31 <p>Bearer Mobility operates in response to changes in the environment of the |
31 <p>Bearer Mobility operates in response to changes in the environment of the |
32 device. A bearer is known as <i>available</i> when the device is in range |
32 device. A bearer is known as <i>available</i> when the device is in range |
33 of the bearer and the device can potentially use the bearer. </p> |
33 of the bearer and the device can potentially use the bearer. </p> |
34 <p> <b>NOTE:</b> The bearer can be available but unusable because of the security |
34 <p> <b>NOTE:</b> The bearer can be available but unusable because of the security |