Patent application number | Description | Published |
20090040982 | Handover In A Wireless Data Packet Communication System That Avoid User Data Loss - An apparatus, method, processor(s), and computer program product avoids user data loss by network-controlled, user equipment assisted handover in a wireless data packet communication system. A wireless receiver receives radio link control (RLC) packet data units (PDUs) from user equipment (UE) being served by a source node. A wireless transmitter commands the UE to handover. A network communication interface transmits RLC Uplink (UL) context from the source node to the target node, and transmits RLC Downlink (DL) initialization message and buffered in-transit DL RLC PDUs from the source node to the target node. | 02-12-2009 |
20090041247 | KEY IDENTIFIER IN PACKET DATA CONVERGENCE PROTOCOL HEADER - Systems and methodologies are described that facilitate identifying a plurality of keysets utilized in a communications network. The keysets can include ciphering keys that provide data encryption and decryption and integrity keys that provide data integrity protection. A key identifier can be included in a packet data convergence protocol header that indicates a keyset employed in connection with data in a protocol data unit. In addition, a route indicator can be provided in a radio link control header that distinguishes a source cell and a target cell in networks configured without RLC reset. | 02-12-2009 |
20090086676 | METHODS FOR INTRA BASE STATION HANDOVER OPTIMIZATIONS - The method and apparatus as described are directed toward techniques and mechanisms to improve efficiency in wireless communication networks through optimization of handover scenarios. Determining whether an intra-base station or inter-node-B handover is too performed, and determining the protocol layers to reset during the handover based at least in part on the type of handover to be performed increases the overall efficiency of the wireless network. | 04-02-2009 |
20090116399 | SERVICE DATA UNIT DISCARD TIMERS - Systems and methodologies are described that facilitate enforcing quality of service requirements. A first timer is employed for each data packet arriving at a packet data convergence protocol layer of a wireless communications apparatus. The first timer can be configured based upon delay tolerance specified according to quality of service requirements imposed on the data packet. The data packet can be discarded if the timer expires before the data packet leaves the protocol data convergence protocol layer. In addition, a second time is utilized for the data packet as it arrives at a radio link control layer. The data packet can be discarded if the second timer expires before the data packet is successfully transmitted to a receiver. | 05-07-2009 |
20090124259 | LAYER 2 TUNNELING OF DATA DURING HANDOVER IN A WIRELESS COMMUNICATION SYSTEM - Techniques for sending data during handover with Layer 2 tunneling are described. In one design, a user equipment (UE) sends first Layer 2 packets to a source base station prior to handover to a target base station. The UE sends at least one second Layer 2 packet to the target base station, which identifies the second Layer 2 packet(s) as being intended for the source base station and thus forwards the second Layer 2 packet(s) to the source base station via a Layer 2 tunnel. The UE sends third Layer 2 packets to the target base station after the handover. The target base station processes the third Layer 2 packets to obtain IP packets and sends the IP packets to a serving gateway after a trigger condition, which may be defined to achieve in-order delivery of IP packets from the source and target base stations to the serving gateway. | 05-14-2009 |
20100054472 | INTEGRITY PROTECTION AND/OR CIPHERING FOR UE REGISTRATION WITH A WIRELESS NETWORK - Techniques for performing registration with a wireless network using integrity protection and/or ciphering are described. A user equipment (UE) may perform a security procedure with the wireless network for a first session and may generate UE security context data at the UE. The UE security context data may include a cipher key used for ciphering, an integrity key used for integrity protection, a temporary UE identity, and/or other information. The UE may use the UE security context data for secure communication with the wireless network during the first session. The UE may store the UE security context data upon termination of the first session. The UE may thereafter use the stored UE security context data for registration with the wireless network for a second session following the first session. The UE may perform integrity protection and/or ciphering for message(s) for registration based on the stored UE security context data. | 03-04-2010 |
20110294474 | Multi-Homed Peer-to-Peer Network - Techniques are provided for efficient peer-to-peer (P2P) service discovery and group formation, as well as maintenance of P2P session continuity. In one example, there is provided a method, operable by an originating user equipment (UE), that may involve transmitting a request for P2P service discovery and group formation assistance to a discovery server via a serving node over an air-interface channel. The method may involve receiving scoped information from the discovery server for participating in a P2P communication session, and establishing the P2P communication session with at least one terminating UE based at least in part on the received scoped information. The method may involve maintaining P2P communication session continuity by reverting to bearer signaling via a packet core. | 12-01-2011 |
20120231796 | METHODS FOR INTRA BASE STATION HANDOVER OPTIMIZATIONS - The method and apparatus as described are directed toward techniques and mechanisms to improve efficiency in wireless communication networks through optimization of handover scenarios. Determining whether an intra-base station or inter-node-B handover is to be performed, and determining the protocol layers to reset during the handover based at least in part on the type of handover to be performed increases the overall efficiency of the wireless network. | 09-13-2012 |
20130083702 | ACTIVATING AND DEACTIVATING SEMI-PERSISTENT SCHEDULING FOR AN LTE VOIP RADIO BEARER - A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus determines an operational state of a header compressor or a header decompressor by determining a transition between different operational states associated with the header compressor and/or by determining a transition between different operational states associated with the header decompressor. A persistent scheduling mode is changed in response to a change in the operational state of the header compressor. The persistent scheduling mode may be changed by activating uplink persistent scheduling when the operational state of the header compressor changes from a first order state to a second order state, and/or by deactivating the uplink persistent scheduling when the operational state of the header compressor exits the second order state. | 04-04-2013 |
20140153500 | METHODS, SYSTEMS, AND DEVICES FOR CONFIGURING MAXIMUM TRANSMIT POWER - Methods, systems, and devices are disclosed for configuring maximum allowed transmit power for wireless communications systems. Some embodiments treat multiple traffic types, such as voice traffic and data traffic, separately with respect to one or more maximum allowed transmit power limits. In some cases, at least first transmit power limit for at least a first traffic type and/or at least a second transmit power limit for at least a second traffic type may be determined. At least the first transmit power limit with respect to the first traffic type or the second transmit power limit with respect to the second traffic type may be utilized. Some embodiments are configured to utilize flexible bandwidth carriers. | 06-05-2014 |
20140307603 | DISCONTINUOUS RECEPTION FOR MULTICARRIER SYSTEMS WITH FLEXIBLE BANDWIDTH CARRIER - Methods, systems, and devices are provided for discontinuous reception (DRX) alignment for multicarrier systems that may utilize one or more flexible bandwidth carriers. Tools and techniques are provided that may help ensure signaling alignment, such as with respect to DRX cycles, in multicarrier systems that may utilize one or more flexible bandwidth carriers and/or systems that may utilize multiple different flexible bandwidth carriers. Some methods may include identifying a DRX cycle for a first cell and/or adjusting a boundary for a DRX cycle for a second cell such that the boundary for the DRX cycle for the second cell coincides with a boundary for the DRX cycle for the first cell, where at least the first cell or the second cell comprises at least one of the one or more flexible bandwidth carriers. | 10-16-2014 |
20140307717 | FEEDBACK MESSAGE ALIGNMENT FOR MULTICARRIER SYSTEMS WITH FLEXIBLE BANDWIDTH CARRIER - Methods, systems, and devices are provided for signaling alignment for multicarrier systems that may utilize one or more flexible bandwidth carriers. Tools and techniques are provided that may help ensure signaling alignment with respect to feedback messages, such as ACK/NACK messages, in multicarrier systems that may utilize one or more flexible bandwidth carriers and/or systems that may utilize multiple different flexible bandwidth carriers. Some methods may include identifying timing for one or more subframes that carry one or more feedback messages for a first cell; and/or adjusting a timing for one or more subframes that carry one or more feedback messages for a second cell to align with the one or more subframes that carry the one or more feedback messages for the first cell. The first cell and/or the second cell may include at least one of the one or more flexible bandwidth carriers. | 10-16-2014 |
20140362748 | LOGICAL OPERATING BANDS FOR SCALABLE UMTS - Apparatus and methods are described for selecting or identifying a first band number from one or more additional band numbers mapped to a frequency division duplexing (FDD) band used in universal mobile telecommunications (UMTS). The one or more additional band numbers may be different from a second band number assigned to the FDD band. Each of the one or more additional band numbers may correspond to a different factor N (e.g., N=2, N=4) for use in UMTS scaling. A signal indicative of the first band number may be transmitted to, for example, a network entity, where the signal indicates support of UMTS scaling operations in the FDD band using the factor N corresponding to the first band number. | 12-11-2014 |