Patent application number | Description | Published |
20080247360 | Handoff of Data Attachment Point - In a communication system in which a gateway entity is linked to a plurality of infrastructure entities which in turn are operable to communicate with an access terminal, the access terminal needs first to establish a data attachment point (DAP) with one of the infrastructure entities. Handoff of the DAP from one infrastructure entity to another infrastructure entity is initiated by the access terminal. The access terminal weighs factors such as the link conditions with the various infrastructure entities, the time since the last DAP handoff, and time duration communicating with the current infrastructure entity before proceeding with the DAP handoff. | 10-09-2008 |
20080259869 | METHOD AND APPARATUS FOR HANDOFF BETWEEN ACCESS SYSTEMS - Systems and methods for switching among networks (e.g., heterogeneous) and inter-working between a source access system and a target access system, by implementing tunneling from the AT to the target access system via the source access system. An inter-system handoff control component can facilitate setting tunneling by the mobile unit to the target access and/or between the source access system and the target access system—wherein signaling/packeting associated with the target system can be transferred over the source system. | 10-23-2008 |
20080261598 | METHOD AND APPARATUS FOR TRANSFER OF SESSION REFERENCE NETWORK CONTROLLER - Systems and methods of decoupling session management from connection management of a wireless network by enabling transfer of a session between session controllers. A session transfer component transfers ownership of a session from a source session controller to a target session controller, wherein the session transfer does not necessarily require moving the associated connections therewith. Such transfer employs a Unicast Access Terminal Identifier (UATI) that is updated to inform the related base stations regarding transfer of the session. | 10-23-2008 |
20080268851 | CHANGES OF FORWARD-LINK AND REVERSE-LINK SERVING ACCESS POINTS - In a communication system in which a mobile station accessing the main network via a plurality of base stations, the mobile station can freely select any of the base stations as a forward link (FL) serving station. In addition, the mobile station can also freely select another or the same base station as a reverse link (RL) serving station. The mobile station has stored in its memory a plurality of routes corresponding to the plurality of base stations, with each route dedicatedly assigned to a particular base station. During handoff of one base station to another as either the FL or the RL serving station, exchanged data packets are processed in the respective routes of the base stations involved. | 10-30-2008 |
20080274751 | DELAY AND BACKHAUL-EFFICIENT PAGING METHOD AND APPARATUS - Described herein is methodologies for efficient utilization of backhaul resources of a network for delivering paging data to an access terminal (AT) without sacrificing delay performance. A location that buffers data for an AT can be adaptively changed based on factors such as the location of the AT, applications utilized by the AT, and a recent activity level of the AT. To facilitate this determination, an AT can be configured with one or more registration boundaries. An AT can be configured with a small registration radius such that it the AT does not move outside of the small registration radius, data can be delivered directly to a data attachment point for the AT. If the AT moves outside of the small registration radius, the registration radius can be switched to a large registration radius and the access gateway can instead locally buffer data for the AT. | 11-06-2008 |
20080294897 | METHOD AND APPARATUS FOR EFFICIENT SUPPORT FOR MULTIPLE AUTHENTICATIONS - Disclosed is a method for multiple EAP-based authentications in a wireless communication system. In the method, a first master session key (MSK) is generated in a first EAP-based authentication for a first-type access. A first temporal session key (TSK) is generated from the first master session key (MSK). A second EAP-based authentication is performed, using the first temporal session key (TSK), for a second-type access. First-type access and second-type access are provided after the first and second EAP-based authentications are successfully completed. | 11-27-2008 |
20080310303 | QUALITY OF SERVICE INFORMATION CONFIGURATION - Quality of service information can be used to facilitate wireless communication. A network entity, such as a terminal, as well as a network can initialize an authorization to establish a link using quality of service information. Various features can be integrated with the use of quality of service information, such as having quality of service reservation before a call and supplying a permanent identity for use in correlation. | 12-18-2008 |
20080310335 | METHOD AND APPARATUS FOR ACCOUNTING IN A MOBILE DATA PACKET NETWORK - In a converged communication network, IP data packet services are provided by a core network to access terminals via radio access nodes (RAN). By positioning accounting report triggering closer to the usage, accuracy and comprehensive of accounting is achieved, which can also reduce overhead burdens on the core network. Additional responsibility is given to an access gateway (AGW) between an enhanced base station (eBS) of the RAN and the core network that can reduce the volume and increase the accuracy of accounting message traffic to an authentication, authorization and accounting (AAA) server of the core network. The AGW informs the eBS of accounting rules to be used in making air link records that are merged and formatted in accordance with an accounting protocol for sending to the AAA server, to address duration and volume based accounting needs, postpaid and prepaid accounting types, and user, service and flow based accounting categories. | 12-18-2008 |
20080310349 | MULTIPLE BINDINGS HAVING INDEPENDENT FORWARD AND REVERSE LINK BINDINGS FOR MOBILE INTERNET PROTOCOLS - Methods, apparatus, systems and computer program products are defined that provide multiple bindings in a Mobile Internet Protocol (MIP) network environment. The multiple bindings that are established are independent of one another, such that a forward link binding is decoupled from, or otherwise does not affect, a reverse link binding and vice versa. Multiple reverse link-only bindings may be established within an active route set for an access terminal. Additionally a single primary binding may be established that provides a forward link binding and reverse link binding. At any point in time, the access terminal may maintain only one primary binding. | 12-18-2008 |
20080311914 | METHODS AND APPARATUS FOR NEIGHBOR DISCOVERY OF BASE STATIONS IN A COMMUNICATION SYSTEM - An automated neighbor discovery by a base station with the assistance of an access terminal are disclosed. An exemplary method includes receiving a first message from an access terminal based on detecting an identification signal by the access terminal from the first base station in a communication system. Determination whether the first base station is a known base station is then made. If the first base station is not known, a second message is transmitted to the access terminal requesting a network identification of the first base station. A third message from the access terminal is received in response to the second message including the requested network identification. A request for identification data is sent by the second base station to the first base station via a network link based on the network identification. Corresponding apparatus and other exemplary methods are also disclosed. | 12-18-2008 |
20080313332 | METHODS AND APPARATUS FOR RESOURCE MANAGEMENT IN A COMMUNICATION NETWORK - A method for resource management in a communication network may include monitoring whether a Proxy Mobile Internet Protocol (PMIP) tunnel between a network entity and another network entity is still needed. The method may also include detecting an event which indicates that the PMIP tunnel is no longer needed. The method may also include cleaning resources of the network entity that support the PMIP tunnel. | 12-18-2008 |
20080318575 | METHOD AND APPARATUS FOR HANDOFF BETWEEN SOURCE AND TARGET ACCESS SYSTEMS - Systems and methods for switching among heterogeneous networks and inter-working between a source access system and a target access system. An inter-system handoff control component can facilitate setting an IP tunneling by the mobile unit, wherein IP addresses for inter-working security gateway and Radio Access Network of the target access system can be identified. The inter-system handoff control component can then implement tunneling between the source system and the target system, wherein signaling/packeting associated with the target system can be transferred over the source system. | 12-25-2008 |
20090003242 | DATA ATTACHMENT POINT SELECTION - An algorithm for improving efficiency of data attachment points (DAPs) in a wireless access network (AN) is provided herein. By way of example, the algorithm can identify a serving access point (APs) coupling an access terminal (AT) to the wireless AN. A cost metric for the serving AP can be determined with respect to at least one data network access gateway (AGW) of the wireless AN. The cost metric can be compared with a similar cost metric of a current or default DAP assigned to the AT. If the cost metric of the serving AP is lower than the cost metric of the current/default DAP, the DAP can be re-assigned to the serving AP, minimizing wireless AN resource costs associated with the DAP. | 01-01-2009 |
20090034610 | Video rate adaptation to reverse link conditions - The disclosure relates to video rate adaptation techniques that may use information from a medium access control (MAC) layer and radio link protocol (RLP) layer. The techniques may greatly reduce video delay by adjusting video encoding rate. For real-time video telephony (VT) applications, these techniques may provide graceful quality degradation and improve user experience, especially when the channel conditions degrade. | 02-05-2009 |
20090040981 | METHODS AND APPARATUS FOR IN-ORDER DELIVERY OF DATA PACKETS DURING HANDOFF - Methods, apparatus, systems and computer program products are defined that provide for in-order deliver of data packets during hand-off. The aspects provide for in-order delivery at Forward Link Serving eBS/Data Attachment Point (FLSE/DAP) switch and Reverse Link Serving eBS/Data Attachment Point (RLSE/DAP) switch. As such, present aspects provide for significant improvement in the throughput of applications, such as applications relying on Transmission Control Protocol (TCP), during handoff, in such networks as Ultra Mobile Broadband (UMB) and the like. | 02-12-2009 |
20090046767 | Method and Apparatus for Communication Handoff - Seamless communication handoff is achieved by establishing a protocol tunnel to route leftover packets between network access nodes during the handoff. For example, in a mobile IP-based system, a mobile node may perform a handoff from a first access node that is associated with a first routing node to a second access node that is associated with a second routing node. To prevent the loss of any packets that may be in route for delivery to or from the first routing node during the handoff, the mobile node establishes a protocol tunnel with the first access node via the second access node. On the forward-link, packets being delivered from the first routing node are routed over the protocol tunnel to the second access node and then to the mobile node. On the reverse-link, packets being sent to the first routing node are routed over the protocol tunnel from the mobile node to the second access node and then to the first routing node. In conjunction with these operations, the mobile node concurrently maintains separate IP interfaces for the routing nodes. In addition, steps are taken to ensure that packets are routed to the appropriate IP interface during the handoff. | 02-19-2009 |
20090129291 | CONFIGURING AN IDENTIFIER FOR AN ACCESS POINT - An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server. | 05-21-2009 |
20090129354 | ACCESS POINT CONFIGURATION SCHEMES - An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server. | 05-21-2009 |
20090176489 | Apparatus and Methods to Facilitate Seamless Handoffs between Wireless Communication Networks - Apparatus and methods for facilitating a handover of a wireless communication device on a first wireless communication network to a second wireless communication network, wherein the first and second wireless communication networks include communications protocols that are incompatible, are disclosed. The facilitation can include establishing communications between the wireless communication device and an interworking component of the second wireless communication network using a transparent tunnel through the first wireless communication network so that a message containing session information for the second wireless communication network can be exchanged. The facilitation further includes creating a profile on the second wireless communication network for a communication session between the wireless communication device and the second wireless communication network. | 07-09-2009 |
20090190521 | MANAGEMENT OF WIRELESS RELAY NODES USING IDENTIFIERS - A set of wireless relay nodes are managed to facilitate inter-node routing of packets in the set. In some aspects, unique identifiers are defined for the wireless relay nodes to facilitate routing packets within the set. In some aspect a routing table is provided to each of the wireless relay nodes, wherein the routing table identifies each wireless relay node in the set and a next-hop entity for each of these wireless relay nodes. Each of the wireless relay nodes may then define a forwarding table based on the routing table. | 07-30-2009 |
20090190522 | MANAGEMENT OF WIRELESS RELAY NODES USING ROUTING TABLE - A set of wireless relay nodes are managed to facilitate inter-node routing of packets in the set. In some aspects, unique identifiers are defined for the wireless relay nodes to facilitate routing packets within the set. In some aspect a routing table is provided to each of the wireless relay nodes, wherein the routing table identifies each wireless relay node in the set and a next-hop entity for each of these wireless relay nodes. Each of the wireless relay nodes may then define a forwarding table based on the routing table. | 07-30-2009 |
20090232019 | PROVIDING MULTIPLE LEVELS OF SERVICE FOR WIRELESS COMMUNICATION - Local breakout is provided by one or more nodes (e.g., a local access point and/or a local gateway) in a wireless network to facilitate access to one or more local services. In conjunction with local breakout, multiple IP points of presence relating to different levels of service may be provided for an access point. For example, one point of presence may relate to a local service while another point of presence may relate to a core network service. IP point of presence may be identified for an over-the-air packet to indicate a termination point for the packet. Also, different mobility management functionality may be provided at different nodes in a system whereby mobility management for a given node may be provided by a different node for different types of traffic. Thus, an access terminal may support multiple NAS instances. In addition, different types of paging may be provided for different types of traffic. Furthermore, messages associated with one protocol may be carried over another protocol to reduce complexity in the system. | 09-17-2009 |
20090238185 | RELAY BASED HEADER COMPRESSION - Relays can be used to facilitate communication of a packet, such as from a base station to a mobile device. The packet can include a header that designates an intended destination for the packet. The header can transfer such that the intended destination designation can be sent with or without being decompressed at a relay. If there is more than one relay involved in communication, then the header can configure such that the header is accessible without performing decompression. However, if there is one relay stop, then the header can compress the designator in such a way that decompression should occur. | 09-24-2009 |
20090245517 | SYSTEMS AND METHODS FOR GROUP KEY DISTRIBUTION AND MANAGEMENT FOR WIRELESS COMMUNICATIONS SYSTEMS - A novel group key distribution and management scheme for broadcast message security is provided that allows an access terminal to send a single copy of a broadcast message encrypted with a group key. Access nodes that are members of an active set of access nodes for the access terminal may decrypt and understand the message. The group key is generated and distributed by the access terminal to the access nodes in its active set using temporary unicast keys to secure the group key during distribution. A new group key is provided every time an access node is removed from the active set of access nodes for the access terminal. | 10-01-2009 |
20090268668 | LOCAL IP ACCESS SCHEME - Local IP access is provided in a wireless network to facilitate access to one or more local services. In some implementations, different IP interfaces are used for accessing different services (e.g., local services and operator network services). A list that maps packet destinations to IP interfaces may be employed to determine which IP interface is to be used for sending a given packet. In some implementations an access point provides a proxy function (e.g., a proxy ARP function) for an access terminal. In some implementations an access point provides an agent function (e.g., a DHCP function) for an access terminal. NAT operations may be performed at an access point to enable the access terminal to access local services. In some aspects, an access point may determine whether to send a packet from an access terminal via a protocol tunnel based on the destination of the packet. | 10-29-2009 |
20090279482 | TECHNIQUES FOR ENHANCED BACKHAUL FLOW CONTROL - Techniques for enhanced backhaul flow control are provided. In an exemplary embodiment, a backhaul control system is described that comprises a base station controller (BSC), a backhaul network, and a base transceiver station (BTS). Each is responsive to data and messaging transmitted and received. In one aspect, the BTS includes a queue and a controller. The amount of data in a queue is adjusted by a controller based upon calculating a target queue size value. The controller non-uniformly adjusts the amount of data in a queue based upon a target queue size value which is based upon communication system parameters. The target queue size and amount of data in a queue is adjusted so as to reduce buffer underrun, decrease system latency, and increase communication system throughput. | 11-12-2009 |
20090290502 | METHOD AND APPARATUS FOR SENDING INFORMATION VIA SELECTION OF RESOURCES USED FOR TRANSMISSION - Techniques for transmitting information in a wireless network are described. In an aspect, information may be conveyed based on specific resources used to send a signal, e.g., a pilot. A pseudo-random function may receive the information to convey via the signal and possibly other information and may provide pseudo-random values, which may be used to select the resources to use to send the signal. In one design, a transmitter (e.g., a base station for a sector) may determine first information (e.g., a sector ID) to convey via a pilot and may also determine second information for absolute time (e.g. a pilot cycle index). The transmitter may determine resources (e.g., slots) to use to send the pilot based on the first and second information and possibly based further on a PN offset assigned to the sector. The transmitter may transmit the pilot in the determined resources. | 11-26-2009 |
20090316629 | CONCENTRATOR FOR MULTIPLEXING ACCESS POINT TO WIRELESS NETWORK CONNECTIONS - Systems and methodologies are described that facilitate multiplexing communications from multiple downstream access points to one or more mobility management entities (MME). In particular, a concentrator component is provided that can establish a single transport layer connection with an MME along with multiple application layer connections over the single transport layer connection for each of multiple downstream access points and/or related mobile devices. The downstream access points and/or mobile devices can provide identifiers, such as tracking identifiers, to the concentrator component, which can utilize the identifiers to track communications with the MME. In this regard, the MME can send paging messages, and the concentrator component can determine downstream access points related to the paging messages based on a stored association with a tracking identifier in the paging message. | 12-24-2009 |
20090316657 | CONCENTRATOR FOR MULTIPLEXING ACCESS POINT TO WIRELESS NETWORK CONNECTIONS - Systems and methodologies are described that facilitate multiplexing communications from multiple downstream access points to one or more mobility management entities (MME). In particular, a concentrator component is provided that can establish a single transport layer connection with an MME along with multiple application layer connections over the single transport layer connection for each of multiple downstream access points and/or related mobile devices. The downstream access points and/or mobile devices can provide identifiers to the concentrator component, which can utilize the identifiers to track communications with the MME. In this regard, the MME can additionally include identifiers received from the concentrator component in subsequent communications to facilitate identifying the appropriate downstream access point and/or mobile device. | 12-24-2009 |
20100008235 | REPORTING AND RESOLVING CONFLICTING USE OF A NODE IDENTIFIER - Conflicting use of a node identifier in a wireless network is reported and resolved. In some aspects, a wireless node receives wireless signals and determines, based on those signals, that more than one node uses the same node identifier. The wireless node may then report the conflicting use to a network node. Here, the wireless node may delay for a period of time before reporting the conflicting use. In some aspects, an access point that discovers a conflicting use (e.g., based on a received signal that indicates that another access point is using that same node identifier) may report the conflicting use and/or elect to use a different node identifier. In some aspects, a stateful procedure is used to resolve a conflicting use where, upon identification of a conflicting use, an access point negotiates with another access point to cause one of these access points to use a different node identifier. In some aspects, a stateless procedure is used to resolve a conflicting use where, upon identification of a conflicting use, an access point delays for a period of time before determining whether a different node identifier is to be used at one of the nodes. | 01-14-2010 |
20100008293 | X2 INTERFACES FOR ACCESS POINT BASE STATIONS IN SELF-ORGANIZING NETWORKS (SON) - Systems and methodologies are described that facilitate leveraging an X2-AP interface for data exchange between an access terminal and a Home access terminal. Based upon a received request from a Home access terminal, the access terminal can activate an X2-AP interface connection on demand over Stream Control Transmission Protocol (SCTP) based upon a maximum number of connections not being met and/or a timer evaluation that indicates the request is within an allowed time period. The capacity of the access terminal related to the amount of X2-AP connections can be managed based upon at least one of a timer evaluation, or a maximum number of X2-AP connections. The systems and methodologies provide an optimal and efficient technique in order to enable data to be exchanged between an access terminal and a Home access terminal utilizing an X2-AP interface. | 01-14-2010 |
20100020710 | CELL IDENTIFIER ASSIGNMENT AND SELECTION - Systems and methodologies are described that facilitate providing physical cell identifier (PCI) assignment. Neighboring access point parameters can be collected and transmitted to a PCI assigning component, which can generate a PCI based on the parameters as well as other local parameters. The neighboring access point parameters can be received by evaluating signals transmitted by the neighboring access points, from a UE communicating with the neighboring access points, over a backhaul link, etc. The parameters can include signal strength, identification, and/or the like. In addition, prioritized lists of PCIs can be provided to an access point, which can utilize the neighborhood parameters to select an optimal PCI from the list. | 01-28-2010 |
20100040019 | WIRELESS COMMUNICATION SYSTEMS WITH FEMTO NODES - Systems and methods for performing a handoff of an access terminal from a macro node to a femto node are disclosed. In one embodiment, the femto node is configured to transmit a predetermined signal for determining signal quality and an identifier that uniquely identifies the femto node to the access terminal. The access terminal is configured to transmit the identifier to the macro node. The femto node is identified as a hand in target based on the transmitted identifier and the macro node is configured to hand in the access terminal to the femto node. | 02-18-2010 |
20100040038 | WIRELESS COMMUNICATION SYSTEMS WITH FEMTO CELLS - Systems and methods of uniquely identifying communication nodes in a wireless communication system are described herein. One embodiment of the disclosure provides a wireless apparatus comprising a transceiver configured to receive a first identifier during at least one time slot. The first identifier identifies a first communication node. The apparatus further comprises a processing circuit configured to determine if the first identifier is received during a first time slot that is different from at least one pre-assigned time slot. | 02-18-2010 |
20100048217 | PROVISIONING FEMTOCELL DEPLOYMENT INFORMATION - Systems and methodologies are described that facilitate provisioning cell information to mobile devices via provisioning mechanisms. The cell information relates to cell characteristics within a wireless communication network. The cell information can be stored on the mobile devices and employed to detect the cell characteristics and adjust the handoff behavior based at least in part on characteristics of signals received from one or more base stations. | 02-25-2010 |
20100067371 | USING IDENTIFIER MAPPING TO RESOLVE ACCESS POINT IDENTIFIER AMBIGUITY - Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal. | 03-18-2010 |
20100069072 | USING SIGNAL MONITORING TO RESOLVE ACCESS POINT IDENTIFIER AMBIGUITY - Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal. In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal. | 03-18-2010 |
20100093354 | SYSTEM AND METHOD TO UTILIZE PRE-ASSIGNED RESOURCES TO SUPPORT HANDOFF OF A MOBILE STATION FROM A MACRO BASE STATION TO A FEMTO BASE STATION - Apparatus and methods of hand-in of a call from a macro node to a femto node include receiving, at a target interface to a plurality of access points, a handoff request to handoff a call of a mobile station, wherein the handoff request comprises a cellular identifier corresponding to a pilot identifier of a pilot signal. Further, the apparatus and methods include determining that the plurality of access points share the cell identifier, and forwarding the handoff request to the plurality of access points that share the cell identifier. Additionally, the apparatus and methods include generating a handoff request acknowledgement comprising a pre-reserved resource that is common to the plurality of access points, wherein the pre-reserved resource enables the mobile station to communicate with the plurality of access points, and transmitting the handoff request acknowledgement to initiate the hand-in to one of the plurality of access points. | 04-15-2010 |
20100124228 | REMOTE ACCESS TO LOCAL NETWORK - Multiple protocol tunnels (e.g., IPsec tunnels) are deployed to enable an access terminal that is connected to a network to access a local network associated with a femto access point. A first protocol tunnel is established between a security gateway and the femto access point. A second protocol tunnel is then established in either of two ways. In some implementations the second protocol tunnel is established between the access terminal and the security gateway. In other implementations the second protocol tunnel is established between the access terminal and the femto access point, whereby a portion of the tunnel is routed through the first tunnel. | 05-20-2010 |
20100125899 | REMOTE ACCESS TO LOCAL NETWORK VIA SECURITY GATEWAY - Multiple protocol tunnels (e.g., IPsec tunnels) are deployed to enable an access terminal that is connected to a network to access a local network associated with a femto access point. A first protocol tunnel is established between a security gateway and the femto access point. A second protocol tunnel is then established in either of two ways. In some implementations the second protocol tunnel is established between the access terminal and the security gateway. In other implementations the second protocol tunnel is established between the access terminal and the femto access point, whereby a portion of the tunnel is routed through the first tunnel. | 05-20-2010 |
20100135206 | Radio Access Technology Interworking - Radio access interworking technologies allow a target network to notify a source network that a mobile device has moved from source network to target network, wherein mobile device does not need to perform notification to source network. Further, source network can provide a first subset of overhead information to mobile device and, after moving to target network, mobile device can receive a second subset of overhead information from target network. Further, mobile device can perform prehashing prior to moving to target network based on a channel list received from source network. | 06-03-2010 |
20100208701 | High Rate Packet Data (HRPD) Idle State Handout From Femto Access Point to Macro Access Network - Systems and methods for identifying an address of a femto node during handoff of an access terminal from a femto node to a macro node. In one embodiment, the femto node assigns a unique identifier to the access terminal. The access terminal passes the unique identifier to the macro node. The macro node partitions the unique identifier to determine the address of the femto node. In another embodiment, the femto node registers its address with a domain name system. The macro node queries the domain name system to obtain the address of the femto node. In another embodiment, the macro node sends the unique identifier to a proxy. The proxy partitions the unique identifier to determine the address of the femto node. | 08-19-2010 |
20100208702 | High Rate Packet Data (HRPD) Idle State Handout From Femto Access Point to Macro Access Network - Systems and methods for identifying an address of a femto node during handoff of an access terminal from a femto node to a macro node. In one embodiment, the femto node assigns a unique identifier to the access terminal. The access terminal passes the unique identifier to the macro node. The macro node partitions the unique identifier to determine the address of the femto node. In another embodiment, the femto node registers its address with a domain name system. The macro node queries the domain name system to obtain the address of the femto node. In another embodiment, the macro node sends the unique identifier to a proxy. The proxy partitions the unique identifier to determine the address of the femto node. | 08-19-2010 |
20100208703 | High Rate Packet Data (HRPD) Idle State Handout From Femto Access Point to Macro Access Network - Systems and methods for identifying an address of a femto node during handoff of an access terminal from a femto node to a macro node. In one embodiment, the femto node assigns a unique identifier to the access terminal. The access terminal passes the unique identifier to the macro node. The macro node partitions the unique identifier to determine the address of the femto node. In another embodiment, the femto node registers its address with a domain name system. The macro node queries the domain name system to obtain the address of the femto node. In another embodiment, the macro node sends the unique identifier to a proxy. The proxy partitions the unique identifier to determine the address of the femto node. | 08-19-2010 |
20100279689 | IDLE HANDOFF TO HYBRID FEMTO CELL BASED ON SYSTEM SELECTION DATABASE - Devices and methods are provided for facilitating handing over to a hybrid femto access point that implements multiple radio access technologies (RATs), including a first RAT and a second RAT. In one embodiment, the method involves detecting a pilot from the hybrid femto access point, wherein the pilot is associated with the first RAT. The method involves registering with the hybrid femto access point on a first channel associated with the first RAT based upon the detected pilot. A system selection database is analyzed to identify a second channel associated with the second RAT, and a selection to handover to the identified second channel is effectuated. | 11-04-2010 |
20100284304 | METHOD AND APPARATUS TO ESTABLISH TRUST AND SECURE CONNECTION VIA A MUTUALLY TRUSTED INTERMEDIARY - Systems and methods for establishing secure communications between two network elements through a trusted intermediary when no direct communication path is available. Separate secure communication links are established between the network elements and the trusted intermediary to facilitate secure end to end communication. | 11-11-2010 |
20100285793 | WIRELESS COMMUNICATION SYSTEMS WITH FEMTO NODES - Systems and methods for storing information in a user zone list are described herein. According to the systems and methods herein, the user zone list includes multiple user zone files and the user zone files include information regarding a communication interface type. | 11-11-2010 |
20100293275 | METHOD AND APPARATUS FOR MANAGING CONGESTION IN A WIRELESS SYSTEM - Systems and methodologies are described herein that facilitate congestion control in a wireless communication system. As described herein, an access network and associated terminals can utilize a token bucket access control mechanism, through which respective terminals can be allotted access tokens and/or other units for access to the access network. For example, upon requesting access to a given network, a user of the network can determine whether sufficient access tokens have been accumulated, based on which the request can be selectively allowed or denied. As further described herein, multiple token bucket mechanisms can be utilized, which can correspond to respective packet flows or the like. Additionally, token bucket access control can be implemented as described herein in cooperation with conventional access persistence functionality. Further aspects described herein facilitate the adjustment of token bucket parameters for network access control based on network loading. | 11-18-2010 |
20100322196 | Methods and Apparatus for Providing Broadcast Content Over a Unicast Channel - A method and apparatus providing broadcast content over a unicast channel. The method and apparatus may be configured to determine whether content received using a broadcast type format is to be transmitted using a unicast type format, and to map the content to a unicast reservation upon a determination that the content is to be transmitted using the unicast type format. | 12-23-2010 |
20110105118 | DELAY AND BACKHAUL-EFFICIENT PAGING METHOD AND APPARATUS - Described herein is methodologies for efficient utilization of backhaul resources of a network for delivering paging data to an access terminal (AT) without sacrificing delay performance. A location that buffers data for an AT can be adaptively changed based on factors such as the location of the AT, applications utilized by the AT, and a recent activity level of the AT. To facilitate this determination, an AT can be configured with one or more registration boundaries. An AT can be configured with a small registration radius such that if the AT does not move outside of the small registration radius, data can be delivered directly to a data attachment point for the AT. If the AT moves outside of the small registration radius, the registration radius can be switched to a large registration radius and the access gateway can instead locally buffer data for the AT. | 05-05-2011 |
20110134837 | FEMTOCELL ACCESS CONTROL - Access by a mobile station to a femto access point (FAP) of a wireless communication system is controlled by an enforcement point in response to mobile station authorization data provided from a storage point that is remote from the FAP. The authorization data is provided in response to FAP authentication data. The authentication data may include a FAP identifier and a message authenticator that the FAP generates by hashing shared secret information. The storage point may provide the authorization data in response to determining that the message authenticator is a hash of the shared secret information. | 06-09-2011 |
20110189986 | MESSAGE-BASED EXCHANGE OF ACCESS POINT PILOT SIGNATURE INDICATORS - An access point is identified based on a plurality of pilot signatures. Here, in addition to transmitting a pilot signal that is encoded (e.g., spread/scrambled) using a particular pilot signature, an access point transmits a message that includes at least one indication of at least one other pilot signature. For example, an access point may use one PN offset to generate a pilot signal and transmit a message that identifies at least one other PN offset. An access terminal that receives the pilot signal and the message may then generate a pilot report that identifies all of these pilot signatures. Upon receiving a handover message including this pilot-related information, a target network entity with knowledge of the pilot signatures assigned to that access point may then accurately identify the access point as a target for handover of the access terminal. | 08-04-2011 |
20110189995 | ACCESS POINT IDENTIFICATION BASED ON MULTIPLE PILOT SIGNATURE INDICATORS - An access point is identified based on a plurality of pilot signatures. Here, in addition to transmitting a pilot signal that is encoded (e.g., spread/scrambled) using a particular pilot signature, an access point transmits a message that includes at least one indication of at least one other pilot signature. For example, an access point may use one PN offset to generate a pilot signal and transmit a message that identifies at least one other PN offset. An access terminal that receives the pilot signal and the message may then generate a pilot report that identifies all of these pilot signatures. Upon receiving a handover message including this pilot-related information, a target network entity with knowledge of the pilot signatures assigned to that access point may then accurately identify the access point as a target for handover of the access terminal. | 08-04-2011 |
20110194530 | Systems and Methods of Advertising Handoff - A heterogeneous communication system enables femto Access Points (APs) to advertise handoff related information on a first Radio Access Technology (RAT), such as for receipt by a multi mode mobile device (e.g., a mobile device capable of operation on a plurality of RATs), wherein the handoff related information permits the multi mode mobile device to identify the femto access point on a second RAT. The multi mode mobile device can be connected to a macro node (e.g., a macro base station, an evolved Base Node, etc.) using the first RAT via a Wireless Wide Area Network (WWAN) air-interface (e.g., 1×, HRPD, eHRPD), while independently reading/decoding overhead messages on the second RAT for connection thereto (e.g., connection to the femto access point on the second RAT.) The second RAT can be another WWAN, a Wireless Local Access Network (WLAN) or a Personal Access Network. | 08-11-2011 |
20110223886 | ACCESS POINT-BASED CONTROL OF ACCESS CONTROL LIST - Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point. | 09-15-2011 |
20110223902 | ACCESS CONTROL BASED ON RECEIPT OF DEFINED INFORMATION FROM ACCESS TERMINAL - Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point. | 09-15-2011 |
20110223912 | ACCESS CONTROL BASED ON RECEIPT OF MESSAGE FROM ACCESS TERMINAL - Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point. | 09-15-2011 |
20110235563 | FEMTOCELL ONE-TO-MANY PACKET DELIVERY - Femto nodes provide Local IP Access (LIPA) which allows terminals to communicate with local area networks that the femtocells reside in using cellular air-interfaces (such as cdma2000, UMTS or LTE). Femto nodes also enable Remote IP Access (RIPA) service, which allows the terminals to access the local area network from the Internet as if they were present in the local area networks. Further, to avoid degradation of standby time of the terminals or the capacity of the femto node, or both, apparatus and methods are described herein in which a femto node consolidates received Broadcast/Multicast IP packets from a local area network prior to delivering the packets to terminals over a cellular air-interface. In other aspects, a femto node may deliver the received Broadcast/Multicast IP packets via a cellular one-to-many transmission, either with or without consolidation. | 09-29-2011 |
20110243053 | FEMTOCELL ONE-TO-MANY PACKET DELIVERY - Femto nodes provide Local IP Access (LIPA) which allows terminals to communicate with local area networks that the femtocells reside in using cellular air-interfaces (such as cdma2000, UMTS or LTE). Femto nodes also enable Remote IP Access (RIPA) service, which allows the terminals to access the local area network from the Internet as if they were present in the local area networks. Further, to avoid degradation of standby time of the terminals or the capacity of the femto node, or both, apparatus and methods are described herein in which a femto node consolidates received Broadcast/Multicast IP packets from a local area network prior to delivering the packets to terminals over a cellular air-interface. In other aspects, a femto node may deliver the received Broadcast/Multicast IP packets via a cellular one-to-many transmission, either with or without consolidation. | 10-06-2011 |
20110249636 | APPARATUS AND METHOD FOR CONNECTION ESTABLISHMENT IN A COMMUNICATIONS NETWORK - An apparatus and method for establishing a connection including reserving a common connection for use by more than one access terminal (AT); associating the common connection with a network identifier corresponding to the AT; deleting a network identifier-related context while maintaining the network identifier; and transmitting a message, based on a call to the AT, via the common connection and based on the network identifier, wherein a specific connection for carrying the call is based on a response to the message. In one example, the apparatus and method include conducting a registration session with a wireless communications network; obtaining a network identifier corresponding to the AT based on the registration session; deleting a network identifier-related context for the AT while maintaining the network identifier; receiving a message indicating a call destined for the AT; and establishing, based on the message, a specific connection for carrying the call. | 10-13-2011 |
20110263242 | UNIQUELY IDENTIFYING TARGET FEMTOCELL TO FACILITATE FEMTO-ASSISTED ACTIVE HAND-IN - Systems, methods, devices, and computer program products are described for supporting macrocell-to-femtocell hand-ins of active macro communications for mobile access terminals. An out-of-band (OOB) link is used to detect that an access terminal is in proximity of a femtocell (e.g., using an OOB radio integrated with the femtocell or in a common subnet with the femtocell). Having detected the access terminal in proximity to the femtocell, an OOB presence indication is communicated to a femto convergence system disposed in a core network in communication with the macro network to effectively pre-register the access terminal with the femto-convergence system. When the femto convergence system receives a handoff request from the macro network implicating the pre-registered access terminal, it is able to reliably determine the appropriate target femtocell to use for the hand-in according to the pre-registration, even where identification of the appropriate target femtocell would otherwise be unreliable. | 10-27-2011 |
20110286389 | NETWORK REGISTRATION PROCEDURES - A method of communication involves sending a request from a first network entity (e.g., a femto convergence server) to a second network entity (e.g., a home subscriber server) for user data relating to an access point, receiving a response to the request, wherein the response identifies at least one application server, and sending registration status information to the identified at least one application server. | 11-24-2011 |
20120094660 | METHOD AND APPARATUS FOR PROVIDING ENHANCED INTERFERENCE MANAGEMENT AT RESTRICTED ACCESS POINTS - Methods and apparatuses are provided that facilitate providing access point measurements to restricted access points. Restricted access points can lessen restrictions to allow devices to register with the restricted access point for providing measurements thereto. Additionally or alternatively, access point measurements can be provided to a minimization of drive tests (MDT) server for providing to the restricted access points. Thus, restricted access points can obtain the access point measurements for performing enhanced interference management or other functionality based at least in part on the measurements. | 04-19-2012 |
20120258720 | ACTIVE HAND-IN FOR MULTI-FEMTO DEPLOYMENTS - A method for enabling an active hand-in from a macro base station network to a femtocell network includes servicing an active hand-in of a mobile entity from a macro base station to a femtocell network, using a first femtocell of the femtocell network. The active hand-in includes a hard handoff of the mobile entity from the macro base station with soft handoff of the mobile entity enabled between the first femtocell and one or more neighboring femtocells in the femtocell network. The hard handoff with soft handoff enabled may be implemented using novel procedures implemented by one or more entities of a wireless communications network including the femtocells and macro base station. | 10-11-2012 |
20120258730 | ESTIMATING ACCESS TERMINAL LOCATION BASED ON BEACON SIGNALS FROM FEMTO CELLS - A location of an access terminal is estimated based on signals received by the access terminal. The manner in which a femto cell transmits signals and/or the manner in which the access terminal monitors for signals may be controlled in some cases to facilitate the reception of signals at the access terminal during a location determination operation. In some embodiments, the number of femto cells for which the access terminal monitors for signals may be controlled by controlling the manner in which the access terminal maintains its active set. In some embodiments, in the event a given femto cell is interfering with the ability of an access terminal to receive signals from other femto cells, that femto cell may be instructed to temporarily stop transmissions (e.g., on the traffic channel and/or a beacon channel). | 10-11-2012 |
20120302261 | CONTROL SCHEMES FOR DETERMINING ACCESS TERMINAL LOCATION - A location of an access terminal is estimated based on signals received by the access terminal. The manner in which a femto cell transmits signals and/or the manner in which the access terminal monitors for signals may be controlled in some cases to facilitate the reception of signals at the access terminal during a location determination operation. In some embodiments, the number of femto cells for which the access terminal monitors for signals may be controlled by controlling the manner in which the access terminal maintains its active set. In some embodiments, in the event a given femto cell is interfering with the ability of an access terminal to receive signals from other femto cells, that femto cell may be instructed to temporarily stop transmissions (e.g., on the traffic channel and/or a beacon channel). | 11-29-2012 |
20120302263 | ESTIMATING ACCESS TERMINAL LOCATION BASED ON UPLINK SIGNALS - A location of an access terminal is estimated based on uplink signals that a plurality of femto cells receive from the access terminal. The transmit power of the access terminal may be adjusted in some cases to facilitate the reception of signals at the femto cells during a location determination operation. In some embodiments, a location of an access terminal is estimated based on relative path loss values derived from the signals received by the femto cells. | 11-29-2012 |
20120314692 | METHOD AND APPARATUS FOR PRIORITIZING FEMTO NODE COMMUNICATIONS - Methods and apparatuses are provided that include providing switching functionality at a low power base station to allow the low power base station to route communications related to mobile devices and a local area network (LAN) over one or more broadband connections. In this configuration, the low power base station communicates over the one or more broadband connections without traversing the LAN, and can thus implement quality-of-service (QoS) or other parameters for connections from various devices and the LAN. In addition, the low power base station can provide additional switching to route communications between the mobile devices and LAN devices using local internet protocol access. | 12-13-2012 |
20120329456 | BEACON TRANSMISSION FOR A SET OF FEMTOCELLS - Transmissions of beacons by a set of access points (e.g., femtocells) are synchronized to facilitate discovery of the access points by an access terminal moving through the coverage areas of the access points. In some embodiments, periodic beacon transmissions are synchronized across all of the femtocells of a set of femtocells such that each femtocell transmits a beacon signal according to a similar pattern and at the same time. In some embodiments, an opportunistic beacon control scheme involves commencing beacon transmissions by at least one femtocell of a set of femtocells upon determining that an access terminal has communicated with one or more of the femtocells. | 12-27-2012 |
20130064198 | MULTIPATH TRANSPORT TUNNEL OVER MULTIPLE AIR INTERFACES CONNECTING WIRELESS STATIONS - A method and apparatus for wireless communication between stations addressable via an Internet Protocol (IP) network that includes a first station wirelessly communicating with a second station via a multi-path transport protocol (MTP) tunnel The MTP tunnel manages at least a first IP data sub-flow over a first air interface and at least a second IP data sub-flow over a second air interface and allocates a first IP data flow to the at least two distinct IP data sub-flows over the at least two distinct air interfaces. | 03-14-2013 |
20130102313 | SWITCHING BETWEEN RADIO ACCESS TECHNOLOGIES AT A MULTI-MODE ACCESS POINT - A multi-mode access point supports different radio access technologies (e.g., Wi-Fi and cellular) for serving multi-mode access terminals. To provide improved service for such an access terminal, the access point may redirect the access terminal from a first type of radio access technology to a second type of radio access technology under certain circumstances. A decision to invoke such a redirection may be based on, for example, at least one of: traffic conditions on the first type of radio access technology, traffic conditions on the second type of radio access technology, and whether a backhaul for the access point is currently a bottleneck for access point communication. | 04-25-2013 |
20130103378 | ELECTRICITY DEMAND PREDICTION - Various arrangements for anticipating an electrical load are presented. A plurality of indications of locations of a vehicle may be received. A travel pattern of the vehicle based on the plurality of indications of locations of the vehicle may be determined. The travel pattern may indicate a destination and an expected travel time to arrive at the destination. A current location of the vehicle may be received. At least partially based on the current location of the vehicle, whether the vehicle is expected to conform to the travel pattern may be determined. An anticipated electrical load at the destination may be determined at least partially based on the travel pattern. | 04-25-2013 |
20130107702 | PROVIDING MULTIPLE LEVELS OF SERVICE FOR WIRELESS COMMUNICATION | 05-02-2013 |
20130109387 | RANGE TUNING FOR OPEN ACCESS SMALL CELLS | 05-02-2013 |
20130137423 | ALLOCATING ACCESS TO MULTIPLE RADIO ACCESS TECHNOLOGIES VIA A MULTI-MODE ACCESS POINT - A multi-mode access point supports multiple radio access technologies (e.g., Wi-Fi and cellular) and allocates access to the radio access technologies for various access terminals. To provide improved service for access terminals that are a member of a group associated with the access point, the access point may give priority access to member access terminals as compared to non-member access terminals. For example, the access point may give member access terminals exclusive access to one radio access technology, while giving non-member access terminals access to another (e.g., shared) radio access technology. As another example, the access point may provide a higher level of service for member access terminals on at least one type of radio access technology, while providing a lower level of service for non-member access terminals on the at least one type of radio access technology. | 05-30-2013 |
20130143555 | MANAGING ACCESS TERMINAL HANDOVER IN VIEW OF ACCESS POINT PHYSICAL LAYER IDENTIFIER CONFUSION - Confusion associated with a physical layer identifier is detected and action taken to address this confusion. In some aspects, confusion detection involves determining whether signals such as beacons or pilots that are associated with the same physical layer identifier are also associated with different timing (e.g., different observed time difference (OTD) values). In some aspects, confusion detection involves determining whether an inordinate number of handover failures is associated with a particular physical layer identifier. In some aspects, the action taken upon detecting physical layer identifier confusion involves ensuring that an access terminal is not handed over to an access point that uses that physical layer identifier. In some aspects, the action taken upon detecting physical layer identifier confusion involves resolving the confusion. | 06-06-2013 |
20130143562 | Methods and Apparatuses for Improved Paging Area Identifier Selection in Wireless Networks Containing Low Power Base Stations - The present disclosure presents methods and apparatuses for improved paging area identifier selection in femto nodes and other low power base stations. In some examples described in the present disclosure, a method is provided for selecting a paging area identifier at a low power base station, which includes determining whether a neighboring high power base station is detectable. Additionally, the method can include observing, where the neighboring high power base station is detectable, a broadcasted paging area identifier of the neighboring high power base station. Furthermore, example methods may include selecting a paging area identifier of the low power base station to be the broadcasted paging area identifier and transmitting the paging area identifier. | 06-06-2013 |
20130143563 | Methods and Apparatuses for Improved Paging Area Identifier Selection in Wireless Networks Containing Low Power Base Stations - The present disclosure presents methods and apparatuses for improved paging area identifier selection in low power base stations. In some examples described in the present disclosure, a method is provided for updating a paging area identifier, which may include observing one or more parameters of signals received in a wireless network, updating a previously selected paging area identifier to a new paging area identifier based at least in part on the one or more parameters, and transmitting the new paging area identifier. In addition, example methods are provided for paging devices in a wireless network, which may include determining a paging area identifier related to a last known low power base station for a device, determining a plurality of low power base stations using the paging area identifier, and causing the plurality of low power base stations to transmit a paging signal for the device. | 06-06-2013 |
20130148632 | USING IDENTIFIER MAPPING TO RESOLVE ACCESS POINT IDENTIFIER AMBIGUITY - Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal | 06-13-2013 |
20130150046 | USING IDENTIFIER MAPPING TO RESOLVE ACCESS POINT IDENTIFIER AMBIGUITY - Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal. In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal. | 06-13-2013 |
20130223279 | SENSOR BASED CONFIGURATION AND CONTROL OF NETWORK DEVICES - A mobile device, such as a smartphone or a tablet computer, can execute functionality for configuring a network device in a communication network and for subsequently controlling the operation of the network device with little manual input. The mobile device can detect, from the network device, sensor information that is indicative of configuration information associated with the network device. The mobile device can decode the received sensor information to determine the configuration information and can accordingly enroll the network device in the communication network. In response to determining to control the enrolled network device, the mobile device can capture an image of the network device and can use the captured image to unambiguously identify the network device. The mobile device can establish a communication link with the network device and can transmit one or more commands to vary operating parameters of the network device. | 08-29-2013 |
20130225167 | METHOD AND APPARATUS FOR EXPANDING FEMTOCELL COVERAGE FOR HIGH CAPACITY OFFLOAD - Systems and methods are provided for deploying a femto node with expanded coverage. This may be achieved, for example, by operating a femto node in an open or hybrid access mode to allow registration from both member and non-member devices, monitoring conditions on a backhaul link maintained with a wireless network over a broadband connection configured to provide internet access to the devices and to other devices operating independent of the femto node, and managing resources or mobility for each device based on whether the device is a member device or a non-member device and based on the conditions over on the backhaul link. | 08-29-2013 |
20130225168 | METHOD AND APPARATUS FOR BASE STATION IDENTIFICATION DISCOVERY IN WIRELESS COMMUNICATIONS - Systems and methods are provided for facilitating base station identity discovery in a wireless communications system. This may be achieved, for example, by exchanging with a User Equipment (UE) a message including a Universal Terrestrial Radio Access Network Radio Network Temporary Identifier (U-RNTI) of the UE, wherein the U-RNTI comprises an indicator representative of a base station identifier of a Home NodeB (HNB) associated with the UE. | 08-29-2013 |
20130225171 | METHOD AND SYSTEM FOR REGULATING FREQUENT HANDOVER BY MOBILE DEVICES BETWEEN FEMTOCELLS - Disclosed are systems and methods for regulating frequent handovers by mobile devices between adjacent femtocells. In one aspect, the method includes determining if a mobile device is experiencing frequent handovers between femtocells, classifying frequent handovers based on cause (e.g., ping-pong between the two femtocells or high speed mobile device crossing a number of femtocells, etc.), and determining one or more remedial actions for regulation of frequent handovers based on the number of frequent handovers and their classification. | 08-29-2013 |
20130225172 | METHOD AND SYSTEM FOR REGULATING FREQUENT CELL RESELECTIONS BY IDLE-MODE MOBILE DEVICES - Disclosed are systems and methods for regulating system reselections by idle-mode mobile devices. In one aspect, a femtocell may be configured to reduce frequency of its reselection beacon, which reduces probability that a fast moving mobile device will detect the reselection beacon and reselect to that femtocell. This aspect may also delay femtocell reselection for slow moving mobile devices. In another aspect, a macrocell may slow down system reselection by adjusting cell reselection parameters used by mobile devices to determine the time needed to evaluate cell reselection criteria. Yet in another aspect, a macrocell may instruct a collocated femtocell to decrease its effective coverage area to avoid premature reselection by fast moving mobile devices. Yet in another aspect, a femtocell may use power boosting techniques to increase its reselection radius. | 08-29-2013 |
20130225181 | MANAGING COMMUNICATION OPERATIONS BASED ON RESOURCE USAGE AND ACCESS TERMINAL CATEGORY - An access point may handle an access terminal in different ways based on resource usage at the access point and/or based on at least one category associated with the access terminal. This handling of an access terminal by an access point may involve, for example, a reduction or an increase in service, access to specific resources, handout, and long term adjustments. If usage of one or more resources at the access point exceeds a corresponding usage threshold, the access point may reduce the service available to lower priority access terminals and/or increase the service available to higher priority access terminals. In some aspects, access terminals may be handled differently according to the serving access point's bandwidth, capacity, cost, or resource usage regarding backhaul, over-the-air, or other access point resources. In some aspects, access terminals may be handled differently according to a category (or categories) associated with the access terminals. | 08-29-2013 |
20130225182 | METHOD AND SYSTEM FOR JOINT PARAMETER OPTIMIZATION FOR MACRO AND FEMTO CELLS - Disclosed are systems and methods for joint parameter optimization for collocated macrocells and femtocells in a wireless communication network. In one aspect, the method comprises: collecting one or more performance parameters from the one or more collocated macrocells and femtocells, detecting frequent cell reselections or frequent cell handovers by mobile devices between the one or more collocated macrocells and femtocells, optimizing one or more cell reselection and handover parameters for the one or more collocated macrocells and femtocells based on the performance parameters, and overwriting one or more corresponding parameters of the collocated macrocells and femtocells with the one or more optimized cell reselection and handover parameters in order to reduce frequent cell reselections or frequent cell handovers by mobile devices between the one or more collocated macrocells and femtocells in a wireless communication network. | 08-29-2013 |
20130225183 | METHODS AND APPARATUS FOR TURNING OFF MACRO CARRIERS TO DEPLOY FEMTOCELLS - Methods and apparatus are disclosed for deploying at least one small-coverage base station in a coverage area. The method includes configuring the at least one small-coverage base station to operate on a given channel. The method includes detecting usage information of the at least one small-coverage base station on the given channel. The method includes adjusting an overall transmit power of at least one large-coverage base station in the coverage area based at least in part on the usage information. | 08-29-2013 |
20130225195 | METHODS AND APPARATUS FOR SELECTING FEMTOCELL ACCESS MODES AND OPERATIONAL PARAMETERS BASED ON THE PRESENCE OF NEARBY MACROCELLS - Methods and apparatus are disclosed for configuring an access mode of a femtocell. The method includes determining whether a target channel is being used by a macrocell. The method includes, in response to the target channel being used by the macrocell, configuring the access mode to a closed access mode. The method includes in response to the target channel not being used by the macrocell, configuring the access mode to an open or hybrid access mode. | 08-29-2013 |
20130231099 | METHOD AND APPARATUS FOR DETERMINING MOBILITY PARAMETERS BASED ON NEIGHBORING ACCESS POINTS - Methods and apparatus are provided for configuring mobility or paging parameters of a femto node. A method includes determining capabilities of one or more neighboring access points based in part on signals received from the one or more neighboring access points. The method includes comparing the capabilities to one or more capabilities of the femto node to determine a mobility or paging parameter adjustment. The method includes adjusting one or more mobility or paging parameters based on the mobility or paging parameter adjustment. | 09-05-2013 |
20130235759 | METHODS AND APPARATUS FOR ADAPTING FEMTOCELL PROPERTIES BASED ON CHANGES DETECTED IN NETWORK TOPOLOGY - Methods and apparatus are provided for adapting femtocell properties based on changes detected in network topology. A method includes detecting a network topology change associated with a network node. The method includes determining an availability factor of the network node based on the topology change. The method includes setting mobility parameters of at least one mobile entity serviced by the network entity and mitigating interference with at least one neighboring network node based at least in part on the network topology and on at least one adjusted resource parameter of the network entity. | 09-12-2013 |
20130235761 | METHODS AND APPARATUSES FOR PAGING IN HETEROGENEOUS NETWORKS - Wireless communication in a heterogeneous network may be facilitated by establishing connections with femto nodes based on page notifications from macro nodes to user equipment (UE). A UE in idle mode may monitor paging resources provided by a macro node, discover presence of a femto node based on signals received from the femto node, and establish a communicative connection with the femto node based on a page notification received from the macro node over the paging resources. | 09-12-2013 |
20130235816 | METHOD AND SYSTEM FOR COMMUNICATING BETWEEN SMALL CELLS USING OVER-THE-AIR TRANSMISSIONS - A system performs an over-the-air transmission from a source small cell to a destination small cell. A channel for the over-the-air transmission is selected based on information to be sent. The system determines an information attribute for an over-the-air transmission from the source small cell to the destination small cell. The system selects an over-the-air channel, from a set of channels, based on the information attribute. The source small cell sends the over-the-air transmission on the selected over-the-air channel to the destination small cell. | 09-12-2013 |
20130237202 | USING LOW-POWER ACCESS POINTS TO IDENTIFY TRAFFIC CONGESTION ZONES - Low-power access points are used to identify traffic congestion zones in a network. The low-power access points collect metrics that are used identify high demand areas. The locations of the traffic congestion zones are then determined based on the locations of the low-power access points that identified high demand. In some embodiments, metrics are collected and processed in a distributed fashion at each femtocell. Each femtocell then outputs an indication of high demand in the area and/or takes action to address the high demand at an identified traffic congestion zone. Alternatively, the femtocells may collectively take action to address the high demand at one or more identified traffic congestion zones. In other embodiments, metrics may be collected from the femtocells at a central entity and processed to identifying any traffic congestion zones near the femtocells, whereby the central entity takes appropriate action to address the high demand. | 09-12-2013 |
20130237231 | USING ACCESS POINTS TO IDENTIFY COVERAGE HOLES - Coverage holes are identified and appropriate action taken in response thereto. The identification of a coverage hole may be based on, for example, measurements taken at an access point, measurement report messages from an access terminal, idle user registrations, active user handovers, or handover history. Upon identification of a coverage hole, action may be taken to mitigate (e.g., reduce or eliminate) the coverage hole and/or avoid the coverage hole. For example, in some embodiments, access point resources such as power, frequency and time are allocated accordingly. The action to be taken may depend on whether a coverage hole is noise-limited or interference-limited. In some embodiments, the manner in which handovers are conducted is modified upon identification of a coverage hole. The above actions may be performed entirely at an access point. | 09-12-2013 |
20130237233 | METHOD AND APPARATUS FOR OFFLOADING DEVICES IN FEMTOCELL COVERAGE - A method, an apparatus, and a computer program product for wireless communication are provided in connection with determining whether to offload a device from a femto node. In one example, a serving femto node is equipped to obtain load information regarding a target node, compare an expected throughput at the target node, estimated based in part on the load information, to a threshold, and determine whether to handover a device to the target node based in part on the comparing. In an aspect, the serving node is further equipped to compute its own throughput based on parameters specific to the serving femto node or the device, and the threshold is the throughput at the serving femto node. | 09-12-2013 |
20130237245 | METHOD AND SYSTEM FOR DETERMINING LOCATION OF MOBILE DEVICES IN A FEMTOCELL - Disclosed are system and method for classifying location of a mobile device in a femtocell. In an aspect, the system and method are configured to receive, by a femtocell, location measurement information and performance measurement reports from a mobile device; classify location of the mobile device as indoors or outdoors based on the received location measurement information; and adjust a coverage area, transmit power, and/or radio frequency (RF) channel/band of the femtocell based on the location classification of the mobile device and performance measurements reports. | 09-12-2013 |
20130242844 | ACCESS POINT COMMUNICATION BASED ON UPLINK TRANSMISSION - Uplink transmissions by an access terminal are used to communicate information from one access point to another access point. For example, a first access point that is serving an access terminal and wishes to communicate certain information to a second access point configures the access terminal to conduct an uplink transmission using a specified physical layer parameter. The specified physical layer parameter is different from the physical layer parameter normally used by the access terminal for uplink transmissions to the first access point. The second access point monitors for uplink transmissions that are based on the specified physical layer parameter. Detection of an uplink transmission (based on the specified physical layer parameter) by the second access point results in the information being conveyed to the second access point. | 09-19-2013 |
20130242943 | TRANSMITTING INDICATION OF ACCESS POINT LOADING - An access point is identified for providing service for an access terminal. In some aspects, the identification of an access point is based on loading at one or more access points. In some implementations, an access terminal selects a cell (e.g., the cell that provides maximum throughput) based on the cell load at one or more cells. In some implementations, load estimation is based on information acquired by an access terminal from nearby access points. | 09-19-2013 |
20130242966 | INITIATING ACCESS TERMINAL COMMUNICATION BASED ON ACCESS POINT LOADING - An access point is identified for providing service for an access terminal. In some aspects, the identification of an access point is based on loading at one or more access points. In some implementations, an access terminal selects a cell (e.g., the cell that provides maximum throughput) based on the cell load at one or more cells. In some implementations, load estimation is based on information acquired by an access terminal from nearby access points. | 09-19-2013 |
20130244641 | ACCESS POINT COMMUNICATION BASED ON TRANSMISSION OF PHYSICAL LAYER IDENTIFIERS ACCORDING TO AT LEAST ONE TIME OFFSET - Information is communicated between access points to cause a recipient access point to invoke an action. In some aspects, a mapping is defined between: 1) sets of physical layer identifiers and/or associated time offsets; and 2) different types of information. The mapping information is provided to access points in a wireless communication system such that an access point can use this scheme to communicate specified types of information to another access point. Based on the mapping, an access point that receives a set of physical layer identifiers from another access point is able to determine the type of information being communicated. The recipient access point may then invoke a specific action based on the type of information that was communicated. | 09-19-2013 |
20130244648 | ACCESS POINT COMMUNICATION BASED ON TRANSMISSION OF MULTIPLE PHYSICAL LAYER IDENTIFIERS - Information is communicated between access points to cause a recipient access point to invoke an action. In some aspects, a mapping is defined between: 1) sets of physical layer identifiers and/or associated time offsets; and 2) different types of information. The mapping information is provided to access points in a wireless communication system such that an access point can use this scheme to communicate specified types of information to another access point. Based on the mapping, an access point that receives a set of physical layer identifiers from another access point is able to determine the type of information being communicated. The recipient access point may then invoke a specific action based on the type of information that was communicated. | 09-19-2013 |
20130272219 | METHODS AND APPARATUS FOR BACKHAUL SHARING BY FEMTOCELLS - Methods and apparatus are disclosed for femtocell backhaul sharing. The method includes determining whether an available bandwidth for communication by the network entity is below a bandwidth threshold. The method includes requesting additional bandwidth from at least one neighbor network node in response to determining that the available bandwidth is below the bandwidth threshold. The method includes receiving configuration information from the at least one neighbor network node to increase the available bandwidth by at least a portion of the requested additional bandwidth. | 10-17-2013 |
20130286889 | USING A MOBILE DEVICE TO ENABLE ANOTHER DEVICE TO CONNECT TO A WIRELESS NETWORK - A method includes, at a first device while the first device is connected to a wireless local area network (WLAN) and a second device is unconnected to the WLAN, establishing a secure channel to the second device using an EAP exchange. The method also includes sending at least one credential associated with the WLAN to the second device via the secure channel to enable the second device to connect to the WLAN. | 10-31-2013 |
20130294405 | APPARATUS AND METHOD FOR A CONNECTED MODE WITH REDUCED SIGNALING - A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus preserves a state of a UE in an anchor eNB, wherein the anchor eNB is one of a set of connected cells, the UE being in a connected mode. Each cell of the connected set has a corresponding coverage area. The apparatus then maintains the state of the UE in the anchor eNB when the UE moves from a coverage area of the anchor eNB to a coverage area of another one of the cells from the set of connected cells. | 11-07-2013 |
20130303222 | CONNECTED-STATE RADIO SESSION TRANSFER IN WIRELESS COMMUNICATION SYSTEMS - Embodiments described herein relate to connected-state radio session transfer in wireless communications. A target access network controller may create a radio session associated with an access terminal, the radio session corresponding with a source radio session at a source access network controller. The target access network controller may also establish a communication route between a data network and the access terminal via the target access network controller. The target access network controller may further receive a frozen state associated with the source radio session from the source access network controller. In an aspect, the frozen state may include a snapshot of any data being communicated through the source radio session when freezing occurred. The target access network controller may subsequently unfreeze the received state. | 11-14-2013 |
20140018076 | METHOD AND APPARATUS FOR BLOCKING HIGH MOBILITY USERS IN WIRELESS NETWORKS - Systems and methods are provided for reporting high mobility user equipment (UE) in a wireless network. This may be achieved, for example, by detecting a high mobility UE at a network node and reporting the high mobility UE in a blocking message to one or more other network nodes. | 01-16-2014 |
20140053281 | CONFIGURATION OF A NEW ENROLLEE DEVICE FOR USE IN A COMMUNICATION NETWORK - An electronic device obtains a device password associated with the new enrollee device to be configured for a communication network. The device password is provided to a network registrar to cause the network registrar to configure the new enrollee device for the communication network. The network registrar performs an enrollment process based upon the device password and provides feedback to the electronic device to indicate whether or not the new enrollee device was successfully added to the communication network. Alternatively, when an electronic device detects the presence of a new enrollee device to be configured for the communication network, the electronic device generates a device password for the new enrollee device and provides the device password to the new enrollee device and to the network registrar, thereby causing the network registrar to initiate an enrollment process for the new enrollee device based upon the device password. | 02-20-2014 |
20140071891 | METHOD AND APPARATUS FOR PHYSICAL CELL IDENTIFIER COLLISION DETECTION AND NEIGHBORING CELL LIST CONSTRUCTION - System, apparatus, and methods are provided for preventing the collision of physical cell identifiers. A network entity broadcasts via a first radio technology a physical cell identifier of a second radio technology, where the first and second radio technologies are co-located in the network entity. The network entity receives from a neighboring network entity another physical cell identifier of the second radio technology used by the neighboring network entity, where the neighboring network entity broadcasts the another physical cell identifier via the first radio technology, and where the first and second radio technologies are co-located in the neighboring network entity. The network entity changes the physical cell identifier, in response to the physical cell identifier being the same as the another physical cell identifier. | 03-13-2014 |
20140073317 | UE-ASSISTED NETWORK OPTIMIZATION METHODS - A UE or mobile entity in a wireless communication may assist network optimization by determining a location uncovered by a wireless network, generate a coverage hole detected message if one or more conditions associated with the uncovered location are satisfied, and determining a time to transmit the coverage hole detected message to a covered wireless network. The covered network may act on the message to add covered in a second network so that the second network covers the UE. In other aspects, a UE or mobile entity may detect cell congestion in a first cell and assist the network in offloading congestion from the congested cell. In other aspects, a UE or mobile entity may detect backhaul congestion on a first cell, and assist in offloading backhaul communication for the first cell via a second cell. | 03-13-2014 |
20140080491 | BEACON TIMESLOT ALLOCATION - Beacon transmissions by access points (e.g., femtocells) are controlled in an attempt to increase the number of beacons seen by the access terminals in the vicinity of the access points. In some aspects, interference between beacons is reduced by, for example, scheduling beacon transmissions of neighboring access points at different times. In some aspects, beacon transmissions are scheduled in a manner (e.g., allocated in substantially contiguous timeslots and/or allocated to different frequencies) that enables access terminals to acquire all relevant beacons in a relatively short time frame. | 03-20-2014 |
20140092870 | METHOD AND APPARATUS FOR HANDOFF BETWEEN SOURCE AND TARGET ACCESS SYSTEMS - Systems and methods for switching among heterogeneous networks and inter-working between a source access system and a target access system. An inter-system handoff control component can facilitate setting an IP tunneling by the mobile unit, wherein IP addresses for inter-working security gateway and Radio Access Network of the target access system can be identified. The inter-system handoff control component can then implement tunneling between the source system and the target system, wherein signaling/packeting associated with the target system can be transferred over the source system. | 04-03-2014 |
20140098796 | INTERFACE SELECTION IN A HYBRID COMMUNICATION DEVICE - A hybrid device can be configured to select a transmit interface to attempt to ensure that each network interface of the hybrid device supports unidirectional traffic. Each of the plurality of network interfaces of the hybrid device can be categorized into one of a set of interface classes based on whether incoming traffic is received at the network interface and/or whether outgoing traffic is transmitted from the network interface. A transmit interface class is selected from the set of interface classes based, at least in part, on a priority level associated with each of the interface classes. One of the network interfaces that belongs to the transmit interface class is selected as a transmit interface for transmitting the frame on the communication network. | 04-10-2014 |
20140112169 | USER ADMISSION FOR CO-EXISTENCE WIRELESS SYSTEMS - Techniques for admitting user equipments (UEs) to wireless systems are disclosed. UEs may be assigned priorities for admission to a given wireless system. The UEs may then be admitted to the wireless system based on the priorities of the UEs for the wireless system. In one design, a UE may be identified for admission to a first wireless system among a plurality of wireless systems. Attributes (e.g., capabilities) of the UE for the plurality of wireless systems may be determined. An admission priority of the UE for the first wireless system may be determined based on the attributes of the UE for the plurality of wireless systems. Whether to admit the UE to the first wireless system may be determined based on the admission priority of the UE for the first wireless system and possibly the current resource usage of the first wireless system. | 04-24-2014 |
20140112170 | BROADCAST OF INFORMATION TO ASSIST SYSTEM SELECTION BY USER EQUIPMENTS - Techniques for supporting system selection by user equipments (UEs) are disclosed. In one design, a UE may receive an indication that a first wireless system supports system selection by UEs. The UE may be within the coverage of a plurality of wireless systems, which may include the first wireless system. The UE may receive system selection information from at least one of the plurality of wireless systems. The system selection information may convey system loading, UE performance, system recommendation, etc. The UE may determine performance metrics for the plurality of wireless systems based on the system selection information. The UE may then select one wireless system among the plurality of wireless systems based on the performance metrics for the plurality of wireless systems and the indication that the first wireless system supports system selection by UEs. | 04-24-2014 |
20140112306 | PRIORITIZATION OF USERS FOR SWITCHING BETWEEN CO-EXISTENCE WIRELESS SYSTEMS - Techniques for prioritizing user equipments (UEs) for switching between wireless systems are disclosed. The wireless systems may be part of a small cell and may include a WLAN system and a cellular system. In one design, a network entity (e.g., the small cell) may identify a plurality of UEs communicating with a first wireless system. The first wireless system may be one of a plurality of wireless systems providing communication coverage for the UEs. The network entity may determine priorities of the UEs for switching from the first wireless system to a second wireless system. The network entity may then select at least one UE among the plurality of UEs to switch from the first wireless system to the second wireless system based on the priorities of the UEs. | 04-24-2014 |
20140113590 | INTER-SYSTEM CALL SWITCHING BETWEEN CO-EXISTENCE WIRELESS SYSTEMS - Techniques for switching a user equipment (UE) between wireless systems by first establishing a connection with a target system before disconnecting from a serving system are disclosed. In one design, the UE may initially communicate with a first wireless system (e.g., a WLAN system) of a first radio technology. The UE may receive a page to establish a connection with a second wireless system (e.g., a cellular system) of a second radio technology. The first and second wireless systems may be part of a small cell. The page may be sent by the second wireless system to the UE in response to a decision by a network entity to switch the UE from the first wireless system to the second wireless system. The UE may establish a connection with the second wireless system in response to the page and may thereafter terminate communication with the first wireless system. | 04-24-2014 |
20140113628 | NETWORK DIRECTED SYSTEM SELECTION USING WIRELESS DEVICE INPUT - Methods, systems, and devices are described for network directed system selection. A wireless device may identify a trigger associated with system selection by a network device for the wireless device. The wireless device may identify system selection data for use by the network device in performing a network directed system selection decision for the wireless device. The system selection data may include an indication of one or more networks through which the wireless device has verified that data access is available to the wireless device. The system selection data may be transmitted from the wireless device to a first network for use by the network device. The system selection data may be transmitted in response to the identified trigger. | 04-24-2014 |
20140113631 | SWITCHING OF USERS BETWEEN CO-EXISTENCE WIRELESS SYSTEMS - Techniques for switching user equipments (UEs) between wireless systems are disclosed. A UE may be located within the coverage of a plurality of wireless systems and may communicate with a first wireless system among the plurality of wireless systems. The plurality of wireless systems may include a WLAN system and a cellular system and/or may be part of a small cell. Metrics of the UE for the plurality of wireless systems may be determined. The metrics may be related to one or more of efficiency, service charge, service subscription, application type, or buffer size. Whether to switch the UE from the first wireless system to another wireless system may be determined based on the metrics. In one design, switching priorities of the UE for the plurality of wireless systems may be determined based on the metrics and may be used to determine whether to switch the UE. | 04-24-2014 |
20140148213 | RANGE TUNING FOR OPEN ACCESS SMALL CELLS - Range tuning for open access small cells may be achieved, for example, by determining a likelihood of handoff for a mobile device around a small cell coverage area, and adjusting a range of the small cell coverage area by controlling a transmit power level of the small cell based on the likelihood of handoff. | 05-29-2014 |
20140169383 | SEAMLESS SWITCHING FOR MULTIHOP HYBRID NETWORKS - Seamless path switching is made possible in a multi-hop network based upon stream marker packets and additional path distinguishing operations. A device receiving out-of-order packets on the same ingress interface is capable of determining a proper order for the incoming packets having different upstream paths. Packets may be reordered at a relay device or a destination device based upon where a path update is initiated. Reordering packets from the various upstream paths may be dependent upon a type of service associated with the packet. | 06-19-2014 |
20140219250 | High Rate Packet Data (HRPD) Idle State Handout From Femto Access Point to Macro Access Network - Systems and methods for identifying an address of a femto node during handoff of an access terminal from a femto node to a macro node. In one embodiment, the femto node assigns a unique identifier to the access terminal. The access terminal passes the unique identifier to the macro node. The macro node partitions the unique identifier to determine the address of the femto node. In another embodiment, the femto node registers its address with a domain name system. The macro node queries the domain name system to obtain the address of the femto node. In another embodiment, the macro node sends the unique identifier to a proxy. The proxy partitions the unique identifier to determine the address of the femto node. | 08-07-2014 |
20140269652 | AUTOMATIC SELECTION OF COORDINATING FUNCTIONALITY IN A HYBRID COMMUNICATION NETWORK - A hybrid device can be configured to execute operations to select singleton coordinating functionality in a hybrid communication network. In one embodiment, a single master device (e.g., a hybrid device configured as both a registrar and a central access point (CAP)) can be selected. The hybrid device can transmit search messages to detect an existing master device and/or to identify other hybrid devices contending to become the master device. The hybrid device with the preferred device identifier is selected as the master device. In another embodiment, operations for selecting the coordinating functionality are split into two independent stages—a CAP selection stage and a registrar selection stage. In the CAP selection stage, the hybrid device with a preferred device weight (or a preferred device weight and a preferred device identifier) is configured as the CAP. In the registrar selection stage, similar operations can be executed to select the registrar. | 09-18-2014 |
20140269691 | DISTRIBUTED PATH SELECTION IN HYBRID NETWORKS - A hybrid device may select a next hop for a packet stream based upon a path selection. The path selection includes calculating end-to-end path capacity for candidate paths to a destination device. End-to-end path capacity is calculated based upon contention groups of particular links in at least one of the plurality of paths. Selected paths are recorded in a stream forwarding table for use with subsequent packets of a packet stream. In some embodiments, each hybrid device independently performs path selection logic or path update logic for a packet stream. | 09-18-2014 |
20140282960 | SEAMLESS DEVICE CONFIGURATION IN A COMMUNICATION NETWORK - One embodiment of seamless device configuration between a network device and an access point sends a device credential associated with the network device to the access point before the network device communicates with the access point. The device credential can be used to verify the identity of the network device and can authenticate the network device with the access point without requiring user interaction. Another embodiment can incorporate a central authority maintaining a database of network devices, access points and associated users. The central authority can determine when one or more network devices can seamlessly be configured for use with a particular access point. The central authority can send the device credential associated with the one or more network devices to the access point before the network device communicates with the access point. | 09-18-2014 |
20140295853 | APPARATUS AND METHODS TO FACILITATE SEAMLESS HANDOFFS BETWEEN WIRELESS COMMUNICATION NETWORKS - Apparatus and methods for facilitating a handover of a wireless communication device on a first wireless communication network to a second wireless communication network, wherein the first and second wireless communication networks include communications protocols that are incompatible, are disclosed. The facilitation can include establishing communications between the wireless communication device and an interworking component of the second wireless communication network using a transparent tunnel through the first wireless communication network so that a message containing session information for the second wireless communication network can be exchanged. The facilitation further includes creating a profile on the second wireless communication network for a communication session between the wireless communication device and the second wireless communication network. | 10-02-2014 |
20140321480 | NAMED DATA NETWORKING IN LOCAL AREA NETWORKS - A named data networking (NDN) architecture may be implemented within a local area network. A local area networking naming convention may be used in relation to named content from a variety of NDN-enabled devices. A network node (such as an NDN gateway or NDN bridge) may manage the local area networking naming convention and assign a name for the named content of the NDN-enabled device. A network-assigned name in accordance with a local area networking naming convention may be used for group control of multiple NDN-enabled devices. An NDN gateway may be used for translating NDN protocol layer communication to an IP network protocol layer. An NDN bridge may be used for bridging NDN protocol layer communication between various different segments of a local area network. NDN-enabled devices may benefit from longer sleep cycles based upon NDN content caching implemented in the local area network. | 10-30-2014 |
20140341100 | ACCESS POINT-AIDED COEXISTENCE/CONCURRENCY AT MOBILE DEVICES - Methods, systems, and devices are described that enable a WLAN access point (AP) to schedule packet transmissions to (or from) a mobile device taking into consideration the schedule of various other coexisting transmission/reception (Tx/Rx) activities on the mobile device. Various approaches may increase throughput at the mobile device. Various approaches also may benefit other stations associated with the same AP. | 11-20-2014 |
20140362773 | LOCAL IP ACCESS SCHEME - Local IP access is provided in a wireless network to facilitate access to one or more local services. In some implementations, different IP interfaces are used for accessing different services (e.g., local services and operator network services). A list that maps packet destinations to IP interfaces may be employed to determine which IP interface is to be used for sending a given packet. In some implementations an access point provides a proxy function (e.g., a proxy ARP function) for an access terminal. In some implementations an access point provides an agent function (e.g., a DHCP function) for an access terminal. NAT operations may be performed at an access point to enable the access terminal to access local services. In some aspects, an access point may determine whether to send a packet from an access terminal via a protocol tunnel based on the destination of the packet. | 12-11-2014 |
20140362776 | APPLICATION AWARE ASSOCIATION IN WIRELESS NETWORKS - An application may be associated with an application endpoint that is accessed via a wireless local area network. In this disclosure, a wireless station may select and associated with one of a plurality of access points that provides better application throughput to the application endpoint. The application throughput may be based upon a combination of the wireless link rate (between the wireless station and the access point) as well as a measured application data rate (from the access point to the application endpoint). An access point may measure and advertise application data rates for a plurality of application endpoints, including one or more servers coupled to the local area network, a gateway to a wide area network, and/or a server coupled to the wide area network. | 12-11-2014 |
20140370875 | CONFIGURING AN IDENTIFIER FOR AN ACCESS POINT - An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server. | 12-18-2014 |
20150017991 | ACCESS POINT IDENTIFICATION BASED ON MULTIPLE PILOT SIGNATURE INDICATORS - An access point is identified based on a plurality of pilot signatures. Here, in addition to transmitting a pilot signal that is encoded (e.g., spread/scrambled) using a particular pilot signature, an access point transmits a message that includes at least one indication of at least one other pilot signature. For example, an access point may use one PN offset to generate a pilot signal and transmit a message that identifies at least one other PN offset. An access terminal that receives the pilot signal and the message may then generate a pilot report that identifies all of these pilot signatures. Upon receiving a handover message including this pilot-related information, a target network entity with knowledge of the pilot signatures assigned to that access point may then accurately identify the access point as a target for handover of the access terminal. | 01-15-2015 |
20150018042 | METHOD AND APPARATUS FOR PROVIDING ENHANCED INTERFERENCE MANAGEMENT AT RESTRICTED ACCESS POINTS - Methods and apparatuses are provided that facilitate providing access point measurements to restricted access points. Restricted access points can lessen restrictions to allow devices to register with the restricted access point for providing measurements thereto. Additionally or alternatively, access point measurements can be provided to a minimization of drive tests (MDT) server for providing to the restricted access points. Thus, restricted access points can obtain the access point measurements for performing enhanced interference management or other functionality based at least in part on the measurements. | 01-15-2015 |
20150031370 | ACTIVE HAND-IN FOR MULTI-FEMTO DEPLOYMENTS - A method for enabling an active hand-in from a macro base station network to a femtocell network includes servicing an active hand-in of a mobile entity from a macro base station to a femtocell network, using a first femtocell of the femtocell network. The active hand-in includes a hard handoff of the mobile entity from the macro base station with soft handoff of the mobile entity enabled between the first femtocell and one or more neighboring femtocells in the femtocell network. The hard handoff with soft handoff enabled may be implemented using novel procedures implemented by one or more entities of a wireless communications network including the femtocells and macro base station. | 01-29-2015 |
20150033021 | REMOTE ACCESS TO LOCAL NETWORK VIA SECURITY GATEWAY - Multiple protocol tunnels (e.g., IPsec tunnels) are deployed to enable an access terminal that is connected to a network to access a local network associated with a femto access point. A first protocol tunnel is established between a security gateway and the femto access point. A second protocol tunnel is then established in either of two ways. In some implementations the second protocol tunnel is established between the access terminal and the security gateway. In other implementations the second protocol tunnel is established between the access terminal and the femto access point, whereby a portion of the tunnel is routed through the first tunnel. | 01-29-2015 |
20150036573 | WLAN-CAPABLE REMOTE CONTROL DEVICE - Operations for a WLAN-capable remote control device and a controlled device are disclosed. A first network device (e.g., remote control) may receive a user input for controlling operation of a second network device (e.g., controlled device) of a communication network. The first network device may transition to an active operating state in response to receiving the user input. The first network device may transmit the first user input to the second network device. The first network device may exit the active operating state in response to successfully transmitting the first user input to the second network device. | 02-05-2015 |
20150045037 | MESSAGE-BASED EXCHANGE OF ACCESS POINT PILOT SIGNATURE INDICATORS - An access point is identified based on a plurality of pilot signatures. Here, in addition to transmitting a pilot signal that is encoded (e.g., spread/scrambled) using a particular pilot signature, an access point transmits a message that includes at least one indication of at least one other pilot signature. For example, an access point may use one PN offset to generate a pilot signal and transmit a message that identifies at least one other PN offset. An access terminal that receives the pilot signal and the message may then generate a pilot report that identifies all of these pilot signatures. Upon receiving a handover message including this pilot-related information, a target network entity with knowledge of the pilot signatures assigned to that access point may then accurately identify the access point as a target for handover of the access terminal. | 02-12-2015 |
20150049616 | AUTOMATIC CONFIGURATION OF A NETWORK DEVICE - A hybrid device can implement functionality to automatically configure itself to form a home network with other network devices. If it is determined that the hybrid device is the central access point of a hybrid network, operating parameters are determined for the central access point. The central access point can then operate in conjunction with other non-CAP hybrid devices of the hybrid device to determine how to configure the non-CAP hybrid device. The configuration of the non-CAP hybrid device can be determined based, at least in part, on a communication link performance measurement between the CAP and the non-CAP hybrid device. Furthermore, the hybrid network can also be monitored to ensure that the hybrid devices do not repeatedly or randomly switch between different configurations. | 02-19-2015 |
20150052231 | PROVIDING CUSTOM NAMES FOR HEADLESS DEVICES - A headless device does not have a user interface that conveniently allows the user to enter a custom name for the headless device. In this disclosure, a custom name may be determined (either automatically or via user input) at a user device, such as a user device that has a user interface. The custom name may be based on the type of device, location, services, and/or other information about the headless device. The custom name is introduced to the communications network in association with a network address of the headless device. In some embodiments, forged messages based on conventional network protocols may be used to associate the custom name with the network address of the headless device. | 02-19-2015 |
20150052255 | MINIMIZING COVERAGE HOLES IN A COMMUNICATION NETWORK - Access point functionality of a network device may be disabled, resulting in a coverage hole in a communication network and affecting performance of a client device. Various techniques can be implemented for detecting and minimizing coverage holes. In one embodiment, the network device can selectively establish a communication link with the client device depending on whether the client device is in a coverage hole and depending on whether the client device can detect another access point in the communication network. In some embodiments, the client device can determine that it is in a coverage hole in response to detecting a reserved SSID and can accordingly notify a central coordinator of the communication network. In some embodiments, the central coordinator can identify the network device (with disabled access point functionality) that can eliminate the coverage hole and can cause the network device to enable its access point functionality. | 02-19-2015 |
20150085699 | ADAPTIVE NETWORK CONFIGURATION - A network configurator can dynamically configure a device to couple network data between other devices in a wireless network. The devices can include two independent wireless transceivers that can each operate within different frequency bands, such as the 2.4 GHz and 5.0 GHz frequency bands. The configuration of the independent wireless transceivers can be based, at least in part, on device capabilities of the wireless transceivers, channel conditions, and a quality of service associated with the other wireless stations in the wireless network. | 03-26-2015 |
20150085844 | ACCESS POINT COORDINATED RE-ASSOCIATION OF WIRELESS DEVICES - A first AP in a wireless network determines that a wireless client device should re-associate from the first AP to a second AP of the wireless network. The first AP communicates an AP coordination message from the first AP to the second AP to share coordination information with the second AP. The first AP coordinates with the second AP to cause the re-association of the wireless client device in accordance with the coordination information. The first and second AP may coordinate directly to synchronize re-association activities. Re-association activities may include the use of a configuration message to the wireless client device, managing transmit power of beacon messages from the first and second APs, or forced disassociation and blocking. The first AP may maintain a record of which re-association activity was successful in causing the wireless client device to re-associate to the second AP. | 03-26-2015 |