Patent application number | Description | Published |
20090093232 | PROVISIONING COMMUNICATION NODES - Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon. | 04-09-2009 |
20090094351 | ACCESS TERMINAL CONFIGURATION AND ACCESS CONTROL - Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon. | 04-09-2009 |
20090094680 | ACCESS MANAGEMENT FOR WIRELESS COMMUNICATION - Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon. | 04-09-2009 |
20090181672 | WIRELESS COMMUNICATION PAGING UTILIZING MULTIPLE TYPES OF NODE IDENTIFIERS - Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service. | 07-16-2009 |
20090232019 | PROVIDING MULTIPLE LEVELS OF SERVICE FOR WIRELESS COMMUNICATION - Local breakout is provided by one or more nodes (e.g., a local access point and/or a local gateway) in a wireless network to facilitate access to one or more local services. In conjunction with local breakout, multiple IP points of presence relating to different levels of service may be provided for an access point. For example, one point of presence may relate to a local service while another point of presence may relate to a core network service. IP point of presence may be identified for an over-the-air packet to indicate a termination point for the packet. Also, different mobility management functionality may be provided at different nodes in a system whereby mobility management for a given node may be provided by a different node for different types of traffic. Thus, an access terminal may support multiple NAS instances. In addition, different types of paging may be provided for different types of traffic. Furthermore, messages associated with one protocol may be carried over another protocol to reduce complexity in the system. | 09-17-2009 |
20090247159 | METHOD AND SYSTEM FOR FACILITATING EXECUTION OF AUTOMATIC NEIGHBOR RELATION FUNCTIONS - Methods and apparatuses for facilitating execution of automatic neighbor relation (ANR) functions are provided. A base station and operation and maintenance (OAM) system are disclosed. The base station receives neighbor cell detection data identifying neighbor cells detected by an access terminal. The base station also receives neighbor cell management data generated by the OAM system, which facilitates performing an ANR function. The base station then automatically updates a neighbor list according to the neighbor cell management data and the neighbor cell detection data. | 10-01-2009 |
20090247176 | MANAGEMENT OF WIRELESS CONNECTIONS - Techniques for signaling whether or not a radio resource control (RRC) connection should be maintained are provided. The signaling may be provided, for example, in existing NAS transport messages, or in separate messages. The signaling may be provided in the uplink and/or downlink direction. | 10-01-2009 |
20090252132 | SELECTIVE BEARER ESTABLISHMENT IN E-UTRAN/EPS - Systems and methodologies are described that facilitate selectively and simultaneously establishing multiple bearers in wireless communication networks. A core network entity in a wireless network can transmit a bearer establishment request to an access point comprising a list of bearers to establish with a related mobile device. The bearer establishment request comprising list of bearers includes separate non-access stratum (NAS) messages corresponding to each bearer in the list. The separate NAS messages can be linked to each bearer entry in the list. The access point can receive the list and attempt to initialize one or more radio bearers in the list. Since the NAS messages individually correspond to a given bearer, the access point can forward NAS messages to the mobile device only for bearers that are successfully initialized allowing selective establishment thereof. In addition, the access point can provide initialization status for the individual bearers to the core network. | 10-08-2009 |
20090257353 | METHOD OF NETWORK MANAGEMENT BY ASSISTANCE FROM TERMINAL USING CONTROL-PLANE SIGNALING BETWEEN TERMINAL AND NETWORK - Systems and methodologies are described that facilitate network management and optimization. As described herein, a network and a device communicating with the network can exchange network management information, thereby supporting a Self Organized Network (SON) architecture for improved network management and optimization performance. A Non-Access Stratum (NAS) layer protocol and/or an Internet Protocol (IP) application, in combination with a set of associated network management messages, can be utilized to exchange network management information between a device and a network. As further described herein, various procedures can be utilized to install a SON policy to a device in order to define device behavior for operations such as collecting and reporting information related to network management. Additionally, a set of standardized events can be defined, based on which a device can detect the occurrence of an event and report the occurrence to an associated network. | 10-15-2009 |
20090303971 | Method and Apparatus For Transmitting/Receiving Control Message Related to Packet Call Service in an IP Multimedia Subsystem - Apparatus and Method for transmitting control message related to a packet call service in an IP multimedia subsystem (IMS) that transmits/receives an IMS control message using a control plane to reduce a delay caused by setting of a user plane in a packet call setup process. A user equipment (UE) determines whether an IMS service is registered in response to a radio resource control (RRC) connection request. The UE sets an SRB_IMS request parameter requiring that the IMS control message be processed through a signaling radio bearer (SRB) depending on whether the IMS service is registered. The UE transmits an RRC connection request message including the SRB_IMS request parameter to a radio network controller (RNC). The UE configures an SRB_IMS entity. | 12-10-2009 |
20090305699 | REGISTRATION AND ACCESS CONTROL IN FEMTO CELL DEPLOYMENTS - Systems and methodologies are described that facilitate distributing and/or utilizing a Closed Subscriber Group (CSG) Identifier (ID) that identifies a CSG corresponding to a base station and a CSG indication that distinguishes between the base station permitting access to members of the CSG and permitting access to members and non-members of the CSG. For instance, the CSG ID can uniquely identify the CSG corresponding to the base station. A mobile device can receive the CSG ID and the CSG indication from the base station. Further, the received CSG ID can be compared to CSG IDs included in an allowed CSG list to recognize whether the mobile device is a member or a non-member of the CSG. Moreover, a preference for selecting the base station as compared to a disparate base station can be generated as a function of the received CSG ID and CSG indication. | 12-10-2009 |
20090316629 | CONCENTRATOR FOR MULTIPLEXING ACCESS POINT TO WIRELESS NETWORK CONNECTIONS - Systems and methodologies are described that facilitate multiplexing communications from multiple downstream access points to one or more mobility management entities (MME). In particular, a concentrator component is provided that can establish a single transport layer connection with an MME along with multiple application layer connections over the single transport layer connection for each of multiple downstream access points and/or related mobile devices. The downstream access points and/or mobile devices can provide identifiers, such as tracking identifiers, to the concentrator component, which can utilize the identifiers to track communications with the MME. In this regard, the MME can send paging messages, and the concentrator component can determine downstream access points related to the paging messages based on a stored association with a tracking identifier in the paging message. | 12-24-2009 |
20090316657 | CONCENTRATOR FOR MULTIPLEXING ACCESS POINT TO WIRELESS NETWORK CONNECTIONS - Systems and methodologies are described that facilitate multiplexing communications from multiple downstream access points to one or more mobility management entities (MME). In particular, a concentrator component is provided that can establish a single transport layer connection with an MME along with multiple application layer connections over the single transport layer connection for each of multiple downstream access points and/or related mobile devices. The downstream access points and/or mobile devices can provide identifiers to the concentrator component, which can utilize the identifiers to track communications with the MME. In this regard, the MME can additionally include identifiers received from the concentrator component in subsequent communications to facilitate identifying the appropriate downstream access point and/or mobile device. | 12-24-2009 |
20100009690 | MANAGING NETWORK-INITIATED QUALITY OF SERVICE SETUP IN MOBILE DEVICE AND NETWORK - Systems, methodologies, and devices are described that manage employment of network (NW)-initiated resource allocation and user equipment (UE)-initiated resource allocation for a UE. To employ NW-initiated resource allocation, a core network can transmit an indicator to the UE indicating that Policy and Charging Control (PCC) is supported by a network associated with the UE. The UE receives the indicator and other information, such as indicator regarding whether the current access network supports NW-initiated resource allocation and whether the current application prefers NW-initiated resource allocation, determines that NW-initiated resource allocation is to be employed, and the core network initiates resource allocation for the UE. If any indicator is not received by the UE, or the UE receives an indicator that indicates PCC is not supported or not preferred, the UE determines that UE-initiated resource allocation is to be employed, and transmits a request for resource allocation to the core network. | 01-14-2010 |
20100034083 | METHOD AND APPARATUS FOR PACKET DIFFERENTIATION IN A WIRELESS COMMUNICATION SYSTEM - Systems and methodologies are described herein that facilitate efficient packet differentiation and forwarding in a wireless communication system. As described herein, identifiers or tags (e.g., corresponding to radio bearers, logical channels, Internet Protocol (IP) addresses, etc.) can be applied to respective packets based on their destinations as determined by traffic flow templates (TFTs) associated with the packets. Further, techniques are provided for establishing radio bearers, IP addresses, and/or other resources for transmission of packets associated with respective TFTs in a manner irrespective of associated quality of service (QoS) policies for the TFTs. Upon an establishment of resources, techniques are described herein for tagging packets with resources associated with TFTs corresponding to the packets to facilitate forwarding of respective packets to their intended destinations with lowered required processing cost. Additionally, techniques are described herein for offloading packet analysis and/or forwarding functionality from a terminal to a device tethered to the terminal. | 02-11-2010 |
20100046418 | RELAY ARCHITECTURE FRAMEWORK - Systems and methodologies are described that facilitate providing relay nodes in wireless networks. In particular, cluster nodes, which can be regular eNBs, can provide wireless network access to the relay nodes over a backhaul link, and the relay nodes can offer access to devices or other relay nodes to expand network coverage and/or provide increased throughput. User equipment (UE) relays can function as UEs according to a cluster node such that UE relays receive network addressing and can tunnel communications through the cluster node using the backhaul link. Cell relays can function as a cell of the cluster node, such that transport layer communications terminate at the cluster node. In this regard, cell relays can define transport layers to use in communicating with the cluster nodes over the backhaul and with other devices over a provided access link. | 02-25-2010 |
20100069062 | WIRELESS COMMUNICATION PAGING AND REGISTRATION UTILIZING MULTIPLE TYPES OF NODE IDENTIFIERS - Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service. | 03-18-2010 |
20100080116 | RE-ESTABLISHING A RADIO RESOURCE CONTROL CONNECTION WITH A NON-PREPARED BASE STATION - A method for establishing a radio resource control connection is disclosed. A wireless communication device may establish a radio resource control connection with a first base station. The wireless communication device may send a message to a second base station that requests re-establishment of the radio resource control connection. The wireless communication device may receive a message from the second base station that initiates setup of a new radio resource control connection. | 04-01-2010 |
20100081444 | SYNCHRONIZING BEARER CONTEXT - Bearer context maintained by an access terminal is synchronized with a network so that a change in the status of the bearer context may be reflected at the network. For example, if an access terminal determines that a resource previously requested by the access terminal is no longer needed, the access terminal may deactivate the bearer context locally in a case where the access terminal is unable to communicate with the network. In such a case, the access terminal may synchronize its bearer context with the network once the access terminal reestablishes communication with the network. For example, the access terminal may send a message to the network indicating that the access terminal has deactivated the bearer context. | 04-01-2010 |
20100110987 | SELECTION OF WIRELESS NETWORK IN CONJUNCTION WITH SELECTION OF A WIRELESS CELL SET - An access terminal may switch to a different mode of wireless network selection as a result of manual selection of a wireless cell set (e.g., a closed subscriber group) associated with one or more wireless cells. For example, if the user of an access terminal selects a closed subscriber group in a wireless network that is different than the current wireless network, the access terminal may enter a manual mode of wireless network selection, select the wireless network corresponding to the closed subscriber group, and register on a closed subscriber group cell in the selected wireless network. In addition, an access terminal may automatically switch to a different mode of wireless network selection (e.g., the prior mode) upon losing coverage of a wireless cell set. An access terminal may also automatically select a cell of a wireless cell set if the access terminal returns to a cell of the cell set within a defined period of time after losing coverage of the cell set. Furthermore, an access terminal may return to a prior wireless network upon losing coverage of a wireless cell set. | 05-06-2010 |
20100112980 | SUPPORT FOR MULTIPLE ACCESS MODES FOR HOME BASE STATIONS - Systems and methodologies are described that facilitate supporting multiple access modes for a base station in a wireless communication environment. The base station can leverage hybrid, closed, or open access mode. A whitelist of a mobile device that successfully registers on the base station can be selectively updated to include a CSG ID of the base station. For example, the CSG ID of the base station can be added to the whitelist when the base station operates in closed access mode, while adding the CSG ID can be skipped when the base station operates in hybrid access mode. According to another example, the CSG ID can be selectively added based upon a received accept cause value. Additionally or alternatively, a CSG ID and an access mode indicator can be transmitted from a base station to a network node for implementing access control and/or paging optimization at the network node. | 05-06-2010 |
20100113010 | REPRIORITIZATION OF WIRELESS NETWORKS FOR RESELECTION TO SUPPORT VOICE CALL - Techniques for originating a voice call by a UE after performing reselection with reprioritization are described. The UE may operate in an idle mode and may camp on a first wireless network of a first radio access technology (RAT), which may not support voice service. The first wireless network may have the highest priority among all wireless networks detected by the UE. The UE may receive an indication to originate a voice call. The UE may then perform reselection from the first wireless network to a second wireless network of a second RAT by modifying the priorities of the frequencies of the first wireless network and/or the second wireless network. The UE may then originate the voice call with the second wireless network, instead of the first wireless network, in order to avoid having to perform circuit-switched (CS) fallback from the first wireless network to the second wireless network. | 05-06-2010 |
20100113020 | SWITCHING WIRELESS NETWORK SELECTION MODES IN CONJUNCTION WITH SELECTION OF A WIRELESS CELL SET - An access terminal may switch to a different mode of wireless network selection as a result of manual selection of a wireless cell set (e.g., a closed subscriber group) associated with one or more wireless cells. For example, if the user of an access terminal selects a closed subscriber group in a wireless network that is different than the current wireless network, the access terminal may enter a manual mode of wireless network selection, select the wireless network corresponding to the closed subscriber group, and register on a closed subscriber group cell in the selected wireless network. In addition, an access terminal may automatically switch to a different mode of wireless network selection (e.g., the prior mode) upon losing coverage of a wireless cell set. An access terminal may also automatically select a cell of a wireless cell set if the access terminal returns to a cell of the cell set within a defined period of time after losing coverage of the cell set. Furthermore, an access terminal may return to a prior wireless network upon losing coverage of a wireless cell set. | 05-06-2010 |
20100120420 | METHOD AND APPARATUS TO ENABLE PATCHING OF USER EQUIPMENT CONTEXT THROUGH RETRIEVAL OF PARTIAL CONTEXTS FROM VARIOUS NETWORK SERVERS - Devices and methods are provided for the patching of a UE context via retrieval of partial contexts when a UE transitions from a source system (e.g., UTRAN) to a target system (e.g., an LTE network). In one embodiment, the method may involve receiving a first identifier for a source system server (e.g., SGSN) storing first context information, and a second identifier for a target system server (e.g., MME) storing second context information. The method may involve retrieving and combining the first and second context information to generate the patched context for the UE. | 05-13-2010 |
20100130237 | METHOD AND APPARATUS FOR DETERMINING DRX CYCLE USED FOR PAGING - Techniques for determining a discontinuous reception (DRX) cycle used to receive paging are described. A user equipment (UE) may have (i) a first DRX cycle used by a first network (e.g., a core network) to page the UE and (ii) a second DRX cycle used by a second network (e.g., a RAN) to page the UE. In an aspect, the UE may use the longer DRX cycle and ignore the shorter DRX cycle, when allowed, to extend battery life. In one design, the UE may receive an indication of whether the second DRX cycle can be ignored or is to be considered by the UE. The UE may use the longer DRX cycle if the second DRX cycle can be ignored and may receive paging from the first network and/or the second network based on the longer DRX cycle. In another aspect, the UE may negotiate a DRX cycle with a network. | 05-27-2010 |
20100135206 | Radio Access Technology Interworking - Radio access interworking technologies allow a target network to notify a source network that a mobile device has moved from source network to target network, wherein mobile device does not need to perform notification to source network. Further, source network can provide a first subset of overhead information to mobile device and, after moving to target network, mobile device can receive a second subset of overhead information from target network. Further, mobile device can perform prehashing prior to moving to target network based on a channel list received from source network. | 06-03-2010 |
20100157850 | IN-BAND PROVISIONING FOR A CLOSED SUBSCRIBER GROUP - In-band provisioning enables subscribers to manually provision themselves via an access point at which the subscribers would not otherwise be allowed access. For example, a subscriber may be temporarily accepted by a restricted access point (e.g., an access point that belongs to a closed subscriber group). The subscriber is then given limited access to enable the subscriber to be provisioned at the access point. For example, the subscriber may be provisioned for full access at the access point if the subscriber presents a valid authorization credential to a provisioning entity. | 06-24-2010 |
20100159899 | IN-BAND PROVISIONING FOR A CLOSED SUBSCRIBER GROUP - In-band provisioning enables subscribers to manually provision themselves via an access point at which the subscribers would not otherwise be allowed access. For example, a subscriber may be temporarily accepted by a restricted access point (e.g., an access point that belongs to a closed subscriber group). The subscriber is then given limited access to enable the subscriber to be provisioned at the access point. For example, the subscriber may be provisioned for full access at the access point if the subscriber presents a valid authorization credential to a provisioning entity. | 06-24-2010 |
20100161794 | MAINTAINING CLOSED SUBSCRIBER GROUP INFORMATION FOR ACCESS CONTROL - Information is maintained to assist in determining whether an access terminal is allowed to establish communication with an access point associated with a closed subscriber group (CSG). For example, CSG subscription information for visiting access terminals may be maintained at a local server. In this way, a network may use the locally stored CSG subscription information for a given access terminal to determine whether to allow that access terminal to access an access point in the network. In addition, multiple CSG lists may be maintained at an access terminal. For example, an access terminal may maintain a first list that is updateable by an operator and a second list that is updateable by a user. Here, the updating of one list may be based on a change in the other list. | 06-24-2010 |
20100177737 | CONTEXT FETCHING AFTER INTER-SYSTEM HANDOVER - Systems and methodologies are described that facilitate fetching a native security context between network nodes in a core network after an inter-system handover of a mobile device. For instance, a mobility message that is integrity protected by a security context (e.g., the native security context, a mapped security context, . . . ) can be obtained at a network node from the mobile device. Further, the network node can send a request to a disparate network node within a core network. The request can include information that can be used by the disparate network node to establish that the mobile device is authenticated. Moreover, the native security context can be received from the disparate network node in response to the request. Accordingly, the native security context need not be recreated between the network node and the mobile device. | 07-15-2010 |
20100195573 | SELECTIVELY INCLUDING ALLOWED CSG LIST IN PAGE MESSAGE - Problems caused by interaction between paging optimization and synchronizing CSG information are mitigated by setting a network indication indicating, for example, that a subscriber is no longer a member of a CSG, but the network has not yet received confirmation that an access terminal associated with the subscriber has been informed of this. A timer-based scheme may be employed for removing a CSG ID from the subscriber information for a subscriber once it is determined that the subscriber is no longer a member of the CSG. In addition, a temporary member of a CSG may determine whether it is still a member of a CSG upon expiration of a CSG timer. Also, the frequency with which an access terminal registers may be changed based on various criteria. Furthermore, an allowed CSG list may be selectively included in a page message depending on the destination of the page message. | 08-05-2010 |
20100197285 | CSG MEMBERSHIP INDICATION - Problems caused by interaction between paging optimization and synchronizing CSG information are mitigated by setting a network indication indicating, for example, that a subscriber is no longer a member of a CSG, but the network has not yet received confirmation that an access terminal associated with the subscriber has been informed of this. A timer-based scheme may be employed for removing a CSG ID from the subscriber information for a subscriber once it is determined that the subscriber is no longer a member of the CSG. In addition, a temporary member of a CSG may determine whether it is still a member of a CSG upon expiration of a CSG timer. Also, the frequency with which an access terminal registers may be changed based on various criteria. Furthermore, an allowed CSG list may be selectively included in a page message depending on the destination of the page message. | 08-05-2010 |
20100198968 | INCLUSION/EXCLUSION MESSAGING SCHEME FOR INDICATING WHETHER A NETWORK ENTITY PERFORMS ACCESS CONTROL - An access point sends an indication or message to a network entity to indicate whether the network entity is to perform access control for an access terminal. In some implementations the indication/message may comprise an explicit indication of whether or not that network entity is to perform the access control. In some implementations, the inclusion of information (e.g., a CSG identifier) in the message or the exclusion of information from the message indicates whether the network entity is to perform the access control. | 08-05-2010 |
20100199326 | CONTROLLING WHETHER A NETWORK ENTITY PERFORMS ACCESS CONTROL BASED ON AN INDICATION FROM AN ACCESS POINT - An access point sends an indication or message to a network entity to indicate whether the network entity is to perform access control for an access terminal. In some implementations the indication/message may comprise an explicit indication of whether or not that network entity is to perform the access control. In some implementations, the inclusion of information (e.g., a CSG identifier) in the message or the exclusion of information from the message indicates whether the network entity is to perform the access control. | 08-05-2010 |
20100203865 | MANAGING ACCESS CONTROL TO CLOSED SUBSCRIBER GROUPS - Systems and methodologies are described that facilitate managing access control to Closed Subscriber Groups (CSGs) in a wireless communication environment. A user equipment (UE) can store an operator CSG list, which can be read only and controlled by an operator. Further, the operator CSG list can lack synchronization to a CSG subscription for the UE retained in the network. Thus, upon selecting to access a CSG cell associated with a CSG with a corresponding CSG Identifier (ID) included in the operator CSG list of the UE, a reject message that indicates that the UE lacks authorization for the CSG can be received. Moreover, the CSG ID can be stored as a forbidden CSG ID of the UE in a set of forbidden CSG IDs in response to receipt of the reject message when the CSG ID is included in the operator CSG list. | 08-12-2010 |
20100265827 | SYSTEMS, METHODS AND DEVICES TO ENABLE MANAGEMENT OF WIRELESS NETWORK RESOURCES - The present disclosure provides systems, methods and devices for selectively adjusting a quality of service QoS of communication between a wireless access point and a UE based on both a value indicative of system resources and closed subscriber group (CSG) subscription data, such that a member has priority access to system resources over a non-member. The systems, methods and devices described herein allow an access point operating in a hybrid mode to discriminate between CSG members and non-members, without having to terminate communication links in order to provide CSG members with particular QoS levels. In some embodiments, non-members can maintain or establish new communication links with lower QoS levels in order to utilize unused and available capacity, thereby increasing the utilization of system resources available through femto nodes operating in a hybrid mode. | 10-21-2010 |
20100265914 | SYSTEMS, METHODS, AND DEVICES TO ENABLE SELECTION OF RADIO ACCESS TECHNOLOGY - In some embodiments, an access terminal is configured to select a first set of system resources, and communicate a message to acquire access to the first set of system resources, wherein the message conceals that the access terminal is capable of communication with a second set of system resources. In one embodiment, the first set of system resources includes circuit-switched system resources, the second set of system resources includes packet-switched system resources, and an access terminal conceals from the network that it is operable using the packet-switched system resources in order to acquire and/or maintain connected mode access to the circuit-switched system resources. Such embodiments allow an access terminal to use circuit-switched system resources even if the network does not support CS fallback or has refused a CS fallback request. | 10-21-2010 |
20100279648 | SYSTEMS, APPARATUS AND METHODS FOR FACILITATING EMERGENCY CALL SERVICE IN WIRELESS COMMUNICATION SYSTEMS - Systems and methods for facilitating emergency call service are provided. The method can include modifying a configuration parameter of a user equipment (UE), wherein the configuration parameter is related to at least one of: network selection, cell selection or reselection or service selection within a wireless communication system, and wherein a modified configuration parameter results in a preference by the UE for a network, cell or service configured to support emergency calls at the UE. The method can also include prioritizing circuit-switched services over packet-switched services, utilizing the circuit-switched voice service preferentially or exclusively and/or prioritizing a network configured to offer emergency call service over the original serving network of the UE, based, at least, on the modifying the configuration parameter. Modifying the configuration parameter can be performed autonomously by the UE. The modified configuration can also enable callback services to a UE from the network. | 11-04-2010 |
20100322069 | BEARER QUALITY OF SERVICE SELECTION - In the event an entity receives a message including an unknown quality of service parameter (e.g., class identifier) for a bearer, the entity may select a quality of service parameter for the bearer from a set of known quality of service parameters. Here, a guaranteed bit rate quality of service parameter may be selected from the set upon determining that the unknown quality of service parameter is associated with a guaranteed bit rate bearer. Conversely, a non-guaranteed bit rate quality of service parameter may be selected from the set upon determining that the unknown quality of service parameter is not associated with a guaranteed bit rate bearer. | 12-23-2010 |
20110130157 | TRANSACTION MANAGEMENT - Transaction identifiers for transactions are managed to mitigate potential mismatches that may occur in the event a message associated with the transaction is not delivered to the intended destination. For example, in the event an access terminal accepts a bearer context request, the access terminal may not immediately release the transaction identifier associated with that transaction. In this way, in the event the access terminal receives a second bearer context request associated with that same transaction identifier (e.g., due to the accept message not reaching the network), the access terminal may send a second accept message in response to the second bearer context request. | 06-02-2011 |
20110141890 | RADIO ACCESS NETWORK CONTROL OF MULTIMEDIA APPLICATION DATA RATES - This disclosure enables a radio access network to control media data rates and codec parameters selected during multimedia session establishment. As the load on a radio network changes, operators desire to have the ability to control what data rate new multimedia sessions (e.g., VoIP) are to utilize, thereby allowing the operator to conduct a trade-off between voice/video quality and capacity during heavy loading periods. The multimedia communication session may be initiated with a determined guaranteed bit rate, where the guaranteed bit rate is requested, negotiated as one of several acceptable guaranteed bit rates, or based upon maximum system capacity, to take advantage of maximum data rate for the equipment in use. The session may also be initiated with a determined Quality of Service based upon either a network or user equipment installed policy. | 06-16-2011 |
20110149848 | HEADER COMPRESSION FOR RELAY NODES - Systems and methodologies are described that facilitate compressing headers for relay nodes. In particular, a plurality of internet protocol (IP) headers, tunneling protocol headers, and/or other routing headers in a packet can be compressed to facilitate efficient communications of packets between relay nodes and/or a donor access point. An access point receiving packets to be compressed can provide a disparate access point with a compression context and an uncompressed packet. The disparate access point can generate a decompression context related to subsequent packets having similar header values and can store the decompression context with the context identifier. The access point can subsequently compress received packets having similar header values and communicate the compressed packets with the context identifier to the disparate access point. The disparate access point can apply the previously generated decompression context associated with the context identifier to decompress the packets. | 06-23-2011 |
20110159841 | SYSTEMS, APPARATUS AND METHODS TO FACILITATE HANDOVER SECURITY - Systems, methods and apparatus for facilitating handover security are provided. In some embodiments, the method can include deriving a key value for handover from a GERAN/UTRAN system to an E-UTRAN system using a first input value. The method can also include deriving a key value for a connection establishment using a second input value, wherein the first input value is different from the second input value and is different from input values derived subsequent to the second input value, and wherein the first input value, the second input value and the input values derived subsequent to the second input value are configured to be input to a same key derivation function configured to output a key for use between a network entity and user equipment. | 06-30-2011 |
20110188448 | IDENTIFYING A DOMAIN FOR DELIVERY OF MESSAGE SERVICE INFORMATION - An indication is used to control how message service information is routed over different domains. For example, an access terminal may be configured with an indication that indicates that a message service is preferred to be invoked over an IP domain or that the message service is not be invoked over the IP domain. The access terminal then delivers message service information based on the value of the indication. In some cases, a network entity generates the indication and sends the indication to the access terminal. In some cases, a domain for delivery of message service information is selected based on a domain that was selected for particular type of traffic. | 08-04-2011 |
20110188451 | METHOD AND APPARATUS TO ENABLE INTER-SYSTEM TRANSFER OF A PACKET SWITCHED SESSION - Apparatus and methods for a user equipment (UE) to initiate an inter-system transfer of a communication session include listening for communications from a first and a second technology type network. Further, the aspects include establishing a circuit switched session with the first technology type network and establishing a packet switched session with a serving node of a first one of the first or the second technology type network. Also, the aspects include determining to transfer the packet switched session to a target node of a second one of the first or the second technology type network. Additionally, the aspects include transmitting a message, by the UE, to the target node, thereby causing the technology type network of the target node to fetch information about the packet switched session from the other network of the serving node in order to effect the transfer and continuation of the packet switched session. | 08-04-2011 |
20110191430 | DOMAIN SELECTION FOR MOBILE-ORIGINATED MESSAGE SERVICE - An indication is used to control how message service information is routed over different domains. For example, an access terminal may be configured with an indication that indicates that a message service is preferred to be invoked over an IP domain or that the message service is not be invoked over the IP domain. The access terminal then delivers message service information based on the value of the indication. In some cases, a network entity generates the indication and sends the indication to the access terminal. In some cases, a domain for delivery of message service information is selected based on a domain that was selected for particular type of traffic. | 08-04-2011 |
20110202647 | Method and Apparatus for Handling Policy and Charging Control Rule or Quality of Service Rule Modification Failures - Methods and apparatuses are provided that facilitate handling failures in policy rule installation and/or related bearer modification procedures. A set of modified policy rules can be provided to a gateway for enforcement thereof and/or correlation with a bearer of a device. The gateway can attempt to install the modified rules and can utilize a credit control request (CCR)/credit control answer (CCA) exchange to notify of a status of the modified rule installation and/or related bearer modification. A policy charging and rules function (PCRF) can, thus, determine the status based on the CCR/CCA exchange. If the status indicates failure, the PCRF can revert to previous policy rules. In addition, an application function can be notified of the status. | 08-18-2011 |
20110216645 | CIRCUIT SWITCHED FALLBACK PROCEDURE - A CS fallback procedure handles conflict that may arise when handover operations occur during CS fallback. If CS fallback is initiated for an access terminal and handover of that access terminal is then initiated before the CS fallback completes, the target for the handover is informed of the CS fallback so that the target may perform the appropriate CS fallback operations. | 09-08-2011 |
20110235546 | MANAGING A DATA NETWORK CONNECTION FOR MOBILE COMMUNICATIONS BASED ON USER LOCATION - Providing for select Internet Protocol traffic offload (SIPTO) in a mobile communication environment is described herein. By way of example, SIPTO traffic can be facilitated via local packet gateways (P-GWs) that provide an interface to the Internet or a like data network, in addition to a centralized gateway GPRS support node (GGSN). Eligibility for SIPTO can be on a user equipment (UE) by UE basis; for instance, relying on stored subscription or account information to determine SIPTO eligibility. In particular aspects, eligibility for SIPTO can also be based on a packet network by packet network basis, or a combination of the foregoing. This enables flexibility in determining whether SIPTO can be established for a given UE in a given location, and can be based for instance on UE capability, subscription status information, data network capability, tariff rates, and so on, as well as different legal requirements of government jurisdictions. | 09-29-2011 |
20110237250 | MANAGEMENT OF ALLOWED CSG LIST AND VPLMN-AUTONOMOUS CSG ROAMING - Systems and methodologies are described that facilitate supporting VPLMN-autonomous CSG roaming in a wireless communication environment. A UE can access a CSG list server associated with a VPLMN. A trust relation can be established between the UE and the CSG list server, for example. Moreover, the CSG list server can update a VPLMN allowed CSG list associated with the VPLMN stored by the UE. Hence, the UE can receive the VPLMN allowed CSG list from the CSG list server associated with the VPLMN. Further, the UE can store the VPLMN allowed CSG list as part of an allowed CSG list. The VPLMN allowed CSG list can include one or more entries associated with the VPLMN. Moreover, the allowed CSG list can be under control of at least one operator and the UE. | 09-29-2011 |
20110237257 | CELLULAR NETWORK ENERGY SAVING - Various arrangements for managing wireless network communication are described. Two cells using different radio access technologies (RATs), such as a 3G cell and a 4G cell, may provide overlapping coverage. A first cell using a first RAT, under certain circumstances, may be permitted to enter a powered down state such that less power is consumed. User equipment may communicate with the cell using the second RAT as the preferred network and only communicate with the cell using the first RAT when a service available through the first RAT but not the second RAT has been requested. Upon a request from the second cell, the first cell may enter a powered up state. | 09-29-2011 |
20110249642 | ADAPTIVE RESOURCE NEGOTIATION BETWEEN BASE STATIONS FOR ENHANCED INTERFERENCE COORDINATION - Methods and apparatus for supporting adaptive resource negotiation between evolved node Bs (eNBs) for enhanced inter-cell interference coordination (eICIC) are provided. This resource negotiation may occur via a network backhaul between the eNBs or, in some cases, using over-the-air messages (OAMs). For certain aspects, a first eNB may propose its adaptive resource partitioning information (ARPI) to a second eNB, where the second eNB may accept or reject the proposed resource partitioning. If the second eNB accepts the proposed partitioning, the second eNB may schedule resources, such as subframes, based on the accepted partitioning. | 10-13-2011 |
20110250913 | RANDOM ACCESS PROCEDURE ENHANCEMENTS FOR HETEROGENEOUS NETWORKS - Certain aspects of the present disclosure provide various mechanisms that allow a user equipment to convey information regarding one or more attributes to a base station during a random access (RA) procedure. The attributes may include, for example a capability of the UE (e.g., to support a particular feature or version of a standard) or a condition of the UE (e.g., if it is currently experiencing an interference condition). | 10-13-2011 |
20110275394 | RESOURCE PARTITIONING INFORMATION FOR ENHANCED INTERFERENCE COORDINATION - Methods and apparatus for partitioning resources for enhanced inter-cell interference coordination (eICIC) are provided. Certain aspects involve broadcasting a message indicating time-domain resource partitioning information (RPI), where a user equipment (UE) may be operating in idle mode. With the RPI, the UE may be able to identify protected resources with reduced/eliminated interference from neighboring cells. The RPI in this broadcasted message may be encoded as a bitmap as an alternative or in addition to enumeration of the U/N/X subframes. Other aspects entail transmitting a dedicated or unicast message indicating the time-domain RPI, where a UE may be operating in connected mode. With the RPI, the UE may be able to determine channel state information (CSI), make radio resource management (RRM) measurements, or perform radio link monitoring (RLM), based on one or more signals from a serving base station during the protected time-domain resources. | 11-10-2011 |
20110286407 | SYSTEMS AND METHODS FOR ENHANCING UPLINK COVERAGE IN INTERFERENCE SCENARIOS - A method and apparatus are for communication in a wireless network in which a User Equipment (UE) associated with a first evolved Node B (eNB) experiences interference from a second eNB. The method includes negotiating by the first eNB of the wireless network with a second eNB of the wireless network for a partitioning of subband resources on an uplink. A first subset of subband resources is assigned to the first eNB, and a second subset of subband resources is assigned to the second eNB. A method and apparatus are for communication in a wireless network. The method includes decoding a downlink control channel received during a protected downlink subframe to determine an uplink subframe n containing a protected subband for uplink transmission. The method also includes transmitting data during the uplink subframe n on the protected subband. | 11-24-2011 |
20110310791 | AUTOMATIC NEIGHBOR RELATION (ANR) FUNCTIONS FOR RELAY NODES, HOME BASE STATIONS, AND RELATED ENTITIES - Certain aspects of the present disclosure provide methods and apparatus for implementing Automatic Neighbor Relation (ANR) functions for relay nodes (RNs), home base stations (e.g., home evolved Node Bs (HeNBs), and related entities (e.g., donor evolved Node Bs (DeNBs) and HeNB gateways). X2 is designed to be an end-to-end protocol between two evolved Node Bs (eNBs). However, for the case of RNs or HeNBs, this protocol may involve a proxy function (e.g., where the DeNB acts a proxy for the RN). This creates several issues, such as how to manage a potentially very large set of cells under a gateway and how to route S1 messages used for X2 endpoint discovery. Therefore, certain aspects of the present disclosure generally relate to methods and apparatus for maintaining the X2 connections intelligently and hiding the large number of nodes from the X2 endpoints based on various triggers. | 12-22-2011 |
20110310802 | ADAPTIVE RESOURCE PARTITIONING INFORMATION (ARPI) TRANSITION BEHAVIOR IN HETEROGENEOUS NETWORKS - One aspect discloses transition behavior of dynamically changing subframe interlaces and the corresponding behavior of the bases stations during the changing. A method of wireless communication includes receiving a request to dynamically change a subframe interlace. The subframe interlace is transitioned and during the transition either new data transmission is prevented on the prohibited subframe interlace and/or retransmissions are allowed on the prohibited subframe interlace. | 12-22-2011 |
20110319090 | Resource Utilization Measurements for Heterogeneous Networks - Interference issues between wireless network devices are mitigated. An evolved node B (eNodeB) may experience higher cell load or higher interference when serving user equipment (UEs) that are operating in an cell range extension (CRE) area in which the UEs are strongly affected by aggressor eNodeBs. An eNodeB experiencing higher cell load or serving user equipments (UEs) under higher interference generally requests an interfering/aggressor eNodeB to repartition some of its resources. Repartitioning of resources, however, may have a negative impact on the eNodeB serving CRE area UEs. In one aspect, a new measurement of utilization accounts for CRE status and differentiates between protected and unprotected resources, such as subframes. | 12-29-2011 |
20120069756 | METHOD AND APPARATUS FOR INTERFERENCE MITIGATION IN WIRELESS NETWORKS - Methods and apparatuses are provided that include mitigating interference for devices communicating with femto nodes or other low power base stations by assigning protected resources for communicating therewith. The protected resources can be negotiated with a macrocell base station using interference cancellation. The protected resources can be assigned based on an early or late handover event, which can indicate that the device may be susceptible to interference from the macrocell base station. | 03-22-2012 |
20120082064 | CONFIGURATION CONTROL OF INTER-CELL SIGNALING BASED ON POWER STATE - An access point may control reporting configurations based on current power state of a cell in wireless communications network. The first cell may provide reporting configuration instructions to a second cell, instructing selection between at least two defined configurations for reporting system information or load information from the second cell, based on whether the first cell is in a powered up state or a powered down state. The first cell may transmit notifications to the second cell indicating when the first cell is transitioning to a current power state, which may be one of the powered up state or the powered down state. The first cell may select one of the at least two configurations for interpreting reporting data received from the second cell, based its current power state, to obtain the system information or the load information from the second cell. | 04-05-2012 |
20120087250 | DETERMINATION OF RADIO LINK FAILURE WITH ENHANCED INTERFERENCE COORDINATION AND CANCELLATION - Existing criteria for analyzing radio link failure conditions may not satisfactorily address the conditions between cells that support cooperative resource coordination. Generally, when the UE declares radio link failure, the UE discontinues communication with a serving base station and searches for a new base station. When the UE lies in a region with severe interference, where the interference is coordinated between base stations by the interfering cell yielding part of its resources, the UE measurements for determining radio link failure (RLF) may vary considerably, depending on whether the measured resources were yielded by the interfering cell. When the UE measures resources which were not yielded by the interfering cell, the UE can erroneously declare RLF (e.g., due to high interference), although the UE can still access the serving cell using resources yielded by the interfering cell. Accordingly, disclosed are aspects for determining RLF based by accounting for cooperative resource coordination employing yielded resources. | 04-12-2012 |
20120088516 | HETEROGENEOUS NETWORK (HETNET) USER EQUIPMENT (UE) RADIO RESOURCE MANAGEMENT (RRM) MEASUREMENTS - Methods and apparatus for performing radio resource management (RRM) measurements in a heterogeneous network (HetNet) are provided in an effort to prevent failure of RRM measurement procedures in a dominant interference scenario. Several alternatives are provided for determining particular resources (e.g., subframes) to use for performing the RRM measurements, wherein the particular resources are based on cooperative resource partitioning between cells of the HetNet, wherein the cells may be of different types (e.g., macro, pico, or femto cells). These alternatives include, for example: (1) intra-frequency or intra-RAT (radio access technology) alternatives, which may involve transmitting resource partitioning information (RPI) in or deriving non-serving cell RPI based on the serving cell's RPI, as well as (2) inter-frequency or inter-RAT alternatives, where the RRM measurements may be performed during a measurement gap. | 04-12-2012 |
20120093095 | METHOD AND APPARATUS FOR SUPPORTING COMMUNICATIONS IN A HETEROGENEOUS NETWORK - A method, an apparatus, and a computer program product for wireless communication are provided in which an apparatus may determine broadcast channel scheduling information for one or more broadcasts of a payload by a broadcast channel associated with a first base station based on one or more broadcast channel interference coordination schemes, wherein reception of the broadcast channel associated with the first base station is interfered at least in part based on one or more transmissions from a second base station, and receive the payload based on the determined broadcast channel scheduling information. | 04-19-2012 |
20120100884 | NEIGHBOR RELATION INFORMATION MANAGEMENT - Neighbor relation information management involves, for example: acquiring, reporting, and exchanging neighbor relation information. In some cases, neighbor relation information is acquired and/or reported in a manner that does not significantly impact other functionality of the access terminal. For example, an access terminal may be configured to acquire and/or report neighbor relation information only during one or more defined radio states. In some cases, the acquisition of neighbor relation information is based on a neighbor relation threshold. In some cases, an access terminal does not immediately report measured neighbor relation information and instead stores the information for reporting at a later time. In some cases, a transmitted indication is used to facilitate retrieval of neighbor relation information from an access terminal. In some cases, neighbor relation information acquired from an access terminal is exchanged over a direct interface between access points. | 04-26-2012 |
20120106370 | NEIGHBOR RELATION INFORMATION MANAGEMENT - Neighbor relation information management involves, for example: acquiring, reporting, and exchanging neighbor relation information. In some cases, neighbor relation information is acquired and/or reported in a manner that does not significantly impact other functionality of the access terminal. For example, an access terminal may be configured to acquire and/or report neighbor relation information only during one or more defined radio states. In some cases, the acquisition of neighbor relation information is based on a neighbor relation threshold. In some cases, an access terminal does not immediately report measured neighbor relation information and instead stores the information for reporting at a later time. In some cases, a transmitted indication is used to facilitate retrieval of neighbor relation information from an access terminal. In some cases, neighbor relation information acquired from an access terminal is exchanged over a direct interface between access points. | 05-03-2012 |
20120106445 | METHOD AND APPARATUS FOR ESTABLISHING AN INTERFACE BETWEEN ACCESS POINTS - Methods and apparatuses are provided that facilitate establishing an interface for communications between access points. Where access points operate in a same local or enterprise network, an interface can be established via the local or enterprise network instead of (or in addition to) a wireless operator network. A source access point can determine an address over which to request establishment of the interface based at least in part on an identifier of a target access point. In another example, target access point can determine an address to provide to the source access point for establishing the interface based at least in part on an identifier of the source access point. | 05-03-2012 |
20120106476 | METHODS AND APPARATUS FOR DEFINING AND USING SEQUENCES FOR RESOURCE SETS FOR ENHANCED INTER-CELL INTERFERENCE COORDINATION - Aspects of the present disclosure may simplify the negotiation of resources by defining and/or using sequences for sets of resources for enhanced inter-cell interference coordination. According to aspects, a configuration of protected resources may have an ordering such that a pattern representing ‘k’ protected resources overlaps with a pattern representing ‘k+1’ protected resources. In an aspect, each pattern may comprise a bitmap with one or more bits set to a value to indicate the one or more protected subframes. In an aspect, a bitmap of a pattern corresponding to ‘k’ protected subframes differs from a bitmap of a pattern corresponding to ‘k+1’ protected subframes by a single bit value. According to aspects, an interfering evolved Node B may limit transmissions during protected subframes based on the selected pattern. | 05-03-2012 |
20120142328 | SYSTEM AND METHOD FOR ASSISTING IN POWERING ON SLEEPING NETWORK ENTITIES - Techniques are provided to facilitate offloading of mobile entities from a serving network entity. For example, there is provided a location-based method that involves, in response to a load of the requesting entity exceeding a load threshold, identifying candidate network entities to which to offload a user equipment (UE), each of the candidate network entities being in sleep mode. The method may involve determining coverage and location information for the candidate network entities, and determining location information for the UE. The method may involve selecting a given network entity to turn ON based at least in part on the coverage information and the location information. The method may involve sending an ON-request message to the at least one selected network entity, the ON-request message including a timer that can be used to deactivate the selected network entity in case it is not useful in offloading the serving network entity. | 06-07-2012 |
20120207025 | METHODS AND APPARATUS FOR EVALUATING NUMBER OF PROTECTED ACTIVE USERS BASED ON QOS REQUIREMENTS, THROUGHPUT AND TRAFFIC - Certain aspects of the present disclosure propose methods and apparatus to transmit information about number of active UEs in a cell (e.g., pico cell) that need protection to an interfering cell (e.g., a macro cell). The information may be transmitted in a resource status update message. The active users may be defined as users whose downlink performance and/or quality of service are limited by the available number of protected resources. | 08-16-2012 |
20120213108 | RADIO RESOURCE MONITORING (RRM) AND RADIO LINK MONITORING (RLM) PROCEDURES FOR REMOTE RADIO HEAD (RRH) DEPLOYMENTS - Wireless networks may include remote radio heads (RRHs) for extending the coverage of a macro cell. The macro cell may be connected to the RRHs, for example, by optical fiber, and there may be negligible latency between the macro cell and the RRHs. RRH deployment with different cell specific RS transmissions may create many cell edges, which may present challenges in idle state mobility. Certain aspects of the present disclosure may utilize coordinated multipoint (CoMP) transmissions for idle user equipment (UE) support and, in some aspects, may introduce new radio link monitoring (RLM) techniques. As a result, the techniques presented herein may help achieve better idle mode performance and/or better RLM performance. | 08-23-2012 |
20120243488 | METHODS AND APPARATUS FOR EFFECTIVE ALLOCATION OF ADAPTIVE RESOURCE PARTITIONING INFORMATION (ARPI) TO PICO ENHANCED NODE B BY MACRO ENHANCED NODE B IN HETEROGENEOUS NETWORK - Methods and apparatus for effectively allocating resource partitioning information (RPI) in a wireless communication network are provided. For certain aspects, a method for wireless communications generally includes receiving, at a first base station, such as a pico enhanced Node B (eNB), resource partitioning information (RPI) from at least one second base station, such as a macro eNB; determining one or more resources indicated in the RPI actually usable by the first base station; and sending, from the first base station to the at least one second base station, an indication of the actually usable resources. | 09-27-2012 |
20120252355 | APPARATUS AND METHOD FOR HANDING OVER RELAYS - Methods and apparatuses are provided that include handing over relays in wireless networks. Handover request messages for a relay and related user equipment (UE) can be grouped to lessen signaling requirements for handover. Moreover, identifiers can be communicated in the messages to optimize bearer establishment at a target base station to which the relay and related devices are handed over. Also, handover exception cases can occur, which can be handled by the relay and source and target base stations, such as bearer rejection at the target base station, handover failure for one or more devices or the relay, and/or the like. Further, handover of a relay can occur between base stations that house one or more network gateways for the relay, or where the gateways are centralized and accessible by the source and target base stations, where each scenario can include different exception handling. | 10-04-2012 |
20120307808 | DETERMINING UE INTERFERENCE DURING HANDOVER IN ENHANCED INTER-CELL INTERFERENCE COORDINATION - A method of wireless communication determines a UE interference condition during handover. A target cell receives information that indicates an interference condition of a user equipment (UE). Prior to completing handover, the target cell determines an expected UE interference condition that will arise after completing the handover of the UE at a target base station. The information can be determined based on a message from the UE. The UE message may indicate which cell is the strongest, indicate the interference condition at both the source and target cells, or only provide a measurement of the strongest cell. Based on the UE measurements, the target eNodeB may schedule the UE on resources based on the expected interference condition at the UE that may arise after the handover. | 12-06-2012 |
20130017779 | SHORT PACKET DATA SERVICE - A novel message exchange protocol is disclosed. In one example, a method of transmitting data includes generating, with a wireless device, an application data message for an application; evaluating one or more criteria for determining whether to send the application data message via a data radio bearer (DRB) channel or via a signaling radio bearer (SRB) channel that communicatively couples the wireless device to a network resource; and based on determining to send the application data message via the SRB channel, sending the application data message to the network resource via the SRB channel. | 01-17-2013 |
20130053078 | BACKHAUL ENHANCEMENTS FOR COOPERATIVE MULTI-POINT (COMP) OPERATIONS - Certain aspects of the present disclosure relate to techniques for backhaul enhancements for cooperative multi-point (CoMP) operations. An aggressor node may take pre-scheduling decisions in advance of beamformed data transmissions based on the pre-scheduling decisions. The aggressor node may communicate the pre-scheduling decisions to one or more victim nodes, for example, via a backhaul link between the aggressor node and the one or more victim nodes. A victim node may take scheduling decisions based at least on the pre-scheduling decisions of the aggressor node to coordinate beamformed transmissions from the victim node with the beamformed transmissions from the aggressor node. | 02-28-2013 |
20130107702 | PROVIDING MULTIPLE LEVELS OF SERVICE FOR WIRELESS COMMUNICATION | 05-02-2013 |
20130121186 | UPLINK DATA TRANSMISSION WITH INTERFERENCE MITIGATION - Systems and methods providing uplink coordinated multi-point (CoMP) communication are shown. A second cell may identify at least one first UE communicating with a first cell and capable of causing high uplink interference to the second cell. The second cell may estimate uplink interference from the at least one first UE at the second cell. The second cell may estimate uplink interference on specific resources. For example, the second cell may determine resources assigned to the at least one first UE for data transmission to the first cell (e.g., using pre-scheduling information provided by the first cell) and estimate uplink interference from the at least one first UE on the resources assigned to the at least one first UE. The second cell may schedule at least one second UE for uplink data transmission to the second cell based on the estimated uplink interference from the at least one first UE. | 05-16-2013 |
20130121191 | METHODS AND APPARATUS FOR REDUCING INTERFERENCE IN A HETEROGENEOUS NETWORK - Certain aspects relate to methods and apparatus for reducing interference in a heterogeneous network. Certain aspects relate to methods and apparatus for delinking downlink and uplink resource partitioning in a heterogeneous network. In aspects, the delinking is accomplished by reliably delivering uplink grant to a UE, e.g., pico UE in a pico CRE region, without using downlink Almost Blank Subframe (ABS) resources in which an interfering cell limits transmission to reduce interference to other victim cells. In techniques, instead of using the regular PDCCH sent in downlink ABS resources for uplink grant transmission, the uplink grant is sent on another more reliable downlink control channel using resources configured to avoid interference with transmissions from an interfering base station. In techniques, the DL grant is sent on PDCCH in non-downlink ABS resources, but the UE employs enhanced UE capabilities (e.g., interference cancellation) to process the received control information. | 05-16-2013 |
20130201924 | DATA RADIO BEARER (DRB) ENHANCEMENTS FOR SMALL DATA TRANSMISSIONS APPARATUS, SYSTEMS, AND METHODS - A method of transmitting data packets with a wireless communication device includes requesting a preconfigured data radio bearer (DRB) from a base station during a connection request; receiving the preconfigured DRB from the base station in response to the request; and providing security configuration information to a network control entity that provides the security configuration information to the base station. | 08-08-2013 |
20130229933 | HETEROGENEOUS NETWORK (HETNET) USER EQUIPMENT (UE) RADIO RESOURCE MANAGEMENT (RRM) MEASUREMENTS - Methods and apparatus for performing radio resource management (RRM) measurements in a heterogeneous network (HetNet) are provided in an effort to prevent failure of RRM measurement procedures in a dominant interference scenario. Several alternatives are provided for determining particular resources (e.g., subframes) to use for performing the RRM measurements, wherein the particular resources are based on cooperative resource partitioning between cells of the HetNet, wherein the cells may be of different types (e.g., macro, pico, or femto cells). These alternatives include, for example: (1) intra-frequency or intra-RAT (radio access technology) alternatives, which may involve transmitting resource partitioning information (RPI) in or deriving non-serving cell RPI based on the serving cell's RPI, as well as (2) inter-frequency or inter-RAT alternatives, where the RRM measurements may be performed during a measurement gap. | 09-05-2013 |
20130250927 | Resource Partitioning Information for Enhanced Interference Coordination - Methods and apparatus for partitioning resources for enhanced inter-cell interference coordination (eICIC) are provided. Certain aspects involve broadcasting a message indicating time-domain resource partitioning information (RPI), where a user equipment (UE) may be operating in idle mode. With the RPI, the UE may be able to identify protected resources with reduced/eliminated interference from neighboring cells. The RPI in this broadcasted message may be encoded as a bitmap as an alternative or in addition to enumeration of the U/N/X subframes. Other aspects entail transmitting a dedicated or unicast message indicating the time-domain RPI, where a UE may be operating in connected mode. With the RPI, the UE may be able to determine channel state information (CSI), make radio resource management (RRM) measurements, or perform radio link monitoring (RLM), based on one or more signals from a serving base station during the protected time-domain resources. | 09-26-2013 |
20130272129 | BACKGROUND TRAFFIC HANDLING IN LTE - A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus may be an eNB. In one configuration the eNB may establish a connection to a remote apparatus, receive a message from the remote apparatus indicating that the connection is supporting one of background traffic or active traffic, determine whether the connection is supporting the background traffic or the active traffic using the message, and set a time value for a state timer related to an operating state of the remote apparatus based on whether the connection is supporting the background traffic or the active traffic. In another configuration the eNB may establish a connection to a remote apparatus and disable one or more modes of communication based on whether the connection is supporting the background traffic or the active traffic. | 10-17-2013 |
20130301461 | RESOURCE UTILIZATION MEASUREMENTS FOR HETEROGENEOUS NETWORKS - Interference issues between wireless network devices are mitigated. An evolved node B (eNodeB) may experience higher cell load or higher interference when serving user equipment (UEs) that are operating in an cell range extension (CRE) area in which the UEs are strongly affected by aggressor eNodeBs. An eNodeB experiencing higher cell load or serving user equipments (UEs) under higher interference generally requests an interfering/aggressor eNodeB to repartition some of its resources. Repartitioning of resources, however, may have a negative impact on the eNodeB serving CRE area UEs. In one aspect, a new measurement of utilization accounts for CRE status and differentiates between protected and unprotected resources, such as subframes. | 11-14-2013 |
20130322302 | METHODS AND APPARATUS FOR UPDATING THE UE CAPABILITY IN AN E-UTRAN - A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus transmits a first set of capabilities to a first cell. The first set of capabilities is for communication with the first cell. The apparatus transmits information associated with a second set of capabilities to the first cell. The second set of capabilities is for communication with a second cell. The apparatus moves from the first cell to the second cell. The apparatus communicates with the second cell based on the transmitted information. | 12-05-2013 |
20130329563 | METHOD OF NETWORK MANAGEMENT BY ASSISTANCE FROM TERMINAL USING CONTROL-PLANE SIGNALING BETWEEN TERMINAL AND NETWORK - Systems and methodologies are described that facilitate network management and optimization. As described herein, a network and a device communicating with the network can exchange network management information, thereby supporting a Self Organized Network (SON) architecture for improved network management and optimization performance. A Non-Access Stratum (NAS) layer protocol and/or an Internet Protocol (IP) application, in combination with a set of associated network management messages, can be utilized to exchange network management information between a device and a network. As further described herein, various procedures can be utilized to install a SON policy to a device in order to define device behavior for operations such as collecting and reporting information related to network management. Additionally, a set of standardized events can be defined, based on which a device can detect the occurrence of an event and report the occurrence to an associated network. | 12-12-2013 |
20140094173 | REGISTRATION AND ACCESS CONTROL IN FEMTO CELL DEPLOYMENTS - Systems and methodologies are described that facilitate distributing and/or utilizing a Closed Subscriber Group (CSG) Identifier (ID) that identifies a CSG corresponding to a base station and a CSG indication that distinguishes between the base station permitting access to members of the CSG and permitting access to members and non-members of the CSG. For instance, the CSG ID can uniquely identify the CSG corresponding to the base station. A mobile device can receive the CSG ID and the CSG indication from the base station. Further, the received CSG ID can be compared to CSG IDs included in an allowed CSG list to recognize whether the mobile device is a member or a non-member of the CSG. Moreover, a preference for selecting the base station as compared to a disparate base station can be generated as a function of the received CSG ID and CSG indication. | 04-03-2014 |
20140119320 | RANDOM ACCESS PROCEDURE ENHANCEMENTS FOR HETEROGENEOUS NETWORKS - Certain aspects of the present disclosure provide various mechanisms that allow a user equipment to convey information regarding one or more attributes to a base station during a random access (RA) procedure. The attributes may include, for example a capability of the UE (e.g., to support a particular feature or version of a standard) or a condition of the UE (e.g., if it is currently experiencing an interference condition). | 05-01-2014 |
20140204889 | SYSTEMS AND METHODS FOR ENHANCING UPLINK COVERAGE IN INTERFERENCE SCENARIOS - A method and apparatus are for communication in a wireless network in which a User Equipment (UE) associated with a first evolved Node B (eNB) experiences interference from a second eNB. The method includes negotiating by the first eNB of the wireless network with a second eNB of the wireless network for a partitioning of subband resources on an uplink. A first subset of subband resources is assigned to the first eNB, and a second subset of subband resources is assigned to the second eNB. A method and apparatus are for communication in a wireless network. The method includes decoding a downlink control channel received during a protected downlink subframe to determine an uplink subframe n containing a protected subband for uplink transmission. The method also includes transmitting data during the uplink subframe n on the protected subband. | 07-24-2014 |
20140307714 | METHOD AND APPARATUS FOR INTERFERENCE MITIGATION IN WIRELESS NETWORKS - Methods and apparatuses are provided that include mitigating interference for devices communicating with femto nodes or other low power base stations by assigning protected resources for communicating therewith. The protected resources can be negotiated with a macrocell base station using interference cancellation. The protected resources can be assigned based on an early or late handover event, which can indicate that the device may be susceptible to interference from the macrocell base station. | 10-16-2014 |