Patent application number | Description | Published |
20080247360 | Handoff of Data Attachment Point - In a communication system in which a gateway entity is linked to a plurality of infrastructure entities which in turn are operable to communicate with an access terminal, the access terminal needs first to establish a data attachment point (DAP) with one of the infrastructure entities. Handoff of the DAP from one infrastructure entity to another infrastructure entity is initiated by the access terminal. The access terminal weighs factors such as the link conditions with the various infrastructure entities, the time since the last DAP handoff, and time duration communicating with the current infrastructure entity before proceeding with the DAP handoff. | 10-09-2008 |
20090082072 | SEMI-CONNECTED OPERATIONS FOR WIRELESS COMMUNICATIONS - Systems and methodologies are described that facilitate reducing battery consumption during periods of inactivity intermixed with traffic bursts in wireless communications systems. A semi-connected mode is provided that fast recognition of mobile devices upon wakeup and access while enabling mobile devices to operate in reduce power states. A mobile device operates in a semi-connected mode with all base stations in an active set of the mobile device. Moreover, mechanisms are provided to notify mobile devices of pending data while avoiding latency associated with paging channels. | 03-26-2009 |
20090093232 | PROVISIONING COMMUNICATION NODES - Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon. | 04-09-2009 |
20090094351 | ACCESS TERMINAL CONFIGURATION AND ACCESS CONTROL - Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon. | 04-09-2009 |
20090094680 | ACCESS MANAGEMENT FOR WIRELESS COMMUNICATION - Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon. | 04-09-2009 |
20090129291 | CONFIGURING AN IDENTIFIER FOR AN ACCESS POINT - An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server. | 05-21-2009 |
20090129327 | SECTOR IDENTIFICATION USING SECTOR PARAMETERS SIGNATURES - Systems and methodologies are described that facilitate identifying sectors using sector parameters signatures. The signatures can be generated as a known function of a previous sector parameters signature (or message parameters), system time, and an identifier. In this regard, mobile devices can determine an expected identifier from comparing the sector parameters signature to a sector parameters signature computed based at least in part on the system time known to the mobile device. In addition, the mobile device can utilize a known or an inferred previous parameters signature to determine the expected identifier. Multiple signatures can be evaluated to determine expected identifiers to increase the likelihood of correct identification since the signatures are generated using the known variables along with the identifier. | 05-21-2009 |
20090129338 | UTILIZING BROADCAST SIGNALS TO CONVEY RESTRICTED ASSOCIATION INFORMATION - Systems and methodologies are described that facilitate transmitting access point types and/or restricted association parameters using broadcast signals, such as beacons, pilot signals, etc. The type or restricted association information can be indicated by one or more intrinsic aspects of the signal, such as specified parameters. In addition, the type or information can be indicated by one or more extrinsic signal aspects, such as frequency, interval, periodicity, etc. Using this information, a mobile device can determine whether an access point implements restricted association. If so, the mobile device can request an access point or related group identifier before determining whether to establish connection therewith. The identifier can be verified against a list of accessible access points and/or groups to make the determination. | 05-21-2009 |
20090129354 | ACCESS POINT CONFIGURATION SCHEMES - An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server. | 05-21-2009 |
20090132674 | RESOLVING NODE IDENTIFIER CONFUSION - Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects an access point and/or an access terminal may perform operations relating to detecting confusion and/or providing a unique identifier to resolve confusion. | 05-21-2009 |
20090132675 | USING IDENTIFIERS TO ESTABLISH COMMUNICATION - Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects an access point and/or an access terminal may perform operations relating to detecting confusion and/or providing a unique identifier to resolve confusion. | 05-21-2009 |
20090135784 | CLASSIFYING ACCESS POINTS USING PILOT IDENTIFIERS - Systems and methodologies are described that facilitate grouping pilot identifies to indicate type and/or classification information regarding one or more access points. The access points can select or be assigned pilot identifiers from the group indicating a type or classification related to the access points. Thus, identifiers can be grouped into macrocell and/or femtocell groups or ranges such that an access point can indicate, and mobile devices can efficiently determine, whether the access point provides macrocell or femtocell coverage based on a range from which its pilot identifier is selected or assigned. In addition, the pilot identifiers can be utilized to indicate restricted association information regarding the access points. | 05-28-2009 |
20090137228 | UTILIZING RESTRICTION CODES IN WIRELESS ACCESS POINT CONNECTION ATTEMPTS - Systems and methodologies are described that facilitate utilizing restriction codes in rejecting connection requests with restricted association access points to indicate a reason for the rejection. Mobile devices can maintain a list of accessible access points and/or groups of access points, which can be consulted during cell reselection to ensure unsuitable restricted association access points are not utilized in cell reselection. Based on receiving a rejection code from a restricted association access point, a mobile device can remove the access point, or a related group, from its maintained list so that subsequent reselection attempts avoid the access point and/or access points in the related group. | 05-28-2009 |
20090137249 | FAVORING ACCESS POINTS IN WIRELESS COMMUNICATIONS - Systems and methodologies are described that facilitate applying offsets and/or selectable hysteresis values to favor access points in cell reselection. In measuring and ranking surrounding access points in reselection, offsets can be applied to favorable access points to facilitate cell reselection thereto. The offset can positively affect measurements, and thus ranking as well, in some cases. Negative offsets can also be applied to lower measurements (and thus ranking) of some access points. Moreover, hysteresis values can be applied in measuring current cells to prevent frequent reselection. The hysteresis values can be selected based on a type of the current cell or related access point to expand the coverage area where desired. Thus, where the current access point is favorable, a larger hysteresis can be added to measurements related to the current access point. | 05-28-2009 |
20090176489 | Apparatus and Methods to Facilitate Seamless Handoffs between Wireless Communication Networks - Apparatus and methods for facilitating a handover of a wireless communication device on a first wireless communication network to a second wireless communication network, wherein the first and second wireless communication networks include communications protocols that are incompatible, are disclosed. The facilitation can include establishing communications between the wireless communication device and an interworking component of the second wireless communication network using a transparent tunnel through the first wireless communication network so that a message containing session information for the second wireless communication network can be exchanged. The facilitation further includes creating a profile on the second wireless communication network for a communication session between the wireless communication device and the second wireless communication network. | 07-09-2009 |
20090181672 | WIRELESS COMMUNICATION PAGING UTILIZING MULTIPLE TYPES OF NODE IDENTIFIERS - Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service. | 07-16-2009 |
20090182871 | BACKUP PAGING FOR WIRELESS COMMUNICATION - A backup page is provided for a node that misses a page. In some aspects, a first type of access point in a system provides a backup page for an access terminal that is idling on a second of access point in the system in the event the access terminal misses a page by the second of access point in the system. An access point of the first type may page the access terminal according to a first paging schedule while an access point of the second type may page the access terminal according to a second paging schedule. In some aspects an access point of the first type (e.g., a macro node) provides service over a macro coverage area and an access point of the second type (e.g., a femto node) provides service over a smaller coverage area and/or provides restricted service. | 07-16-2009 |
20090190521 | MANAGEMENT OF WIRELESS RELAY NODES USING IDENTIFIERS - A set of wireless relay nodes are managed to facilitate inter-node routing of packets in the set. In some aspects, unique identifiers are defined for the wireless relay nodes to facilitate routing packets within the set. In some aspect a routing table is provided to each of the wireless relay nodes, wherein the routing table identifies each wireless relay node in the set and a next-hop entity for each of these wireless relay nodes. Each of the wireless relay nodes may then define a forwarding table based on the routing table. | 07-30-2009 |
20090190522 | MANAGEMENT OF WIRELESS RELAY NODES USING ROUTING TABLE - A set of wireless relay nodes are managed to facilitate inter-node routing of packets in the set. In some aspects, unique identifiers are defined for the wireless relay nodes to facilitate routing packets within the set. In some aspect a routing table is provided to each of the wireless relay nodes, wherein the routing table identifies each wireless relay node in the set and a next-hop entity for each of these wireless relay nodes. Each of the wireless relay nodes may then define a forwarding table based on the routing table. | 07-30-2009 |
20090196221 | METHOD AND APPARATUS FOR PROVIDING SIGNALING ACCESS - Signaling-only access may be established with an access node under certain circumstances such as, for example, upon determining that a node is not authorized for data access at the access node. A node that is not authorized for data access at an access node may still be paged by the access node through the use of signaling-only access. In this way, transmissions by the access node may not interfere with the reception of pages at the node. A first node may be selected for providing paging while a second node is selected for access under certain circumstances such as, for example, upon determining that the second node provides more desirable service than the first node. | 08-06-2009 |
20090196277 | WIRELESS NETWORK SYNCHRONIZATION - Systems and methodologies are described that facilitate synchronizing timing among wireless nodes in a wireless communication network. A tracking wireless node can synchronize to a global positioning system (GPS) signal if available. Alternatively, the tracking wireless node can receive quality metrics related to one or more target nodes. The quality metrics can relate to parameters that can be utilized to evaluate the target node for timing synchronization. Based on the quality metrics, the tracking wireless node can select a target wireless node for timing synchronization. The tracking wireless node can subsequently synchronize timing with the target wireless node. In addition, the tracking wireless node can continually evaluate surrounding wireless nodes to detect whether other wireless nodes have higher quality metrics than the current target wireless nodes and can accordingly resynchronize with nodes having higher metrics. | 08-06-2009 |
20090197570 | PAGING AND ACCESS VIA DIFFERENT NODES - Signaling-only access may be established with an access node under certain circumstances such as, for example, upon determining that a node is not authorized for data access at the access node. A node that is not authorized for data access at an access node may still be paged by the access node through the use of signaling-only access. In this way, transmissions by the access node may not interfere with the reception of pages at the node. A first node may be selected for providing paging while a second node is selected for access under certain circumstances such as, for example, upon determining that the second node provides more desirable service than the first node. | 08-06-2009 |
20090201818 | VARIABLE ABORT TIMER - Depending on channel conditions, a variable abort timer can be set in relation to wireless communication of data packets. Additionally, available buffer size can be evaluated and used to set a length of the variable abort timer. When a packet sequence is sent, packets can become lost in communication. When a lost packet is recognized, the timer can be initiated and a request for re-transmission of the lost packet can is sent. If the lost packet does not arrive during running of the variable abort timer, then the packet sequence can be processed without the missing packet. | 08-13-2009 |
20090201948 | METHODS AND APPARATUS FOR FORMATTING HEADERS IN A COMMUNICATION FRAME - Methods and apparatus for formatting headers for data packets within a communication frame for use in a wireless communication system are presented. Formatting headers includes determining the size of a wireless communication frame, and formatting the payloads and associated headers within the communication frame according to the determined size. This formatting includes placing headers at the beginning of the frame before the data packets corresponding to the headers to optimize processing of the headers at a receiver. Formatting may also include formatting the headers according to a first format within the frame when the determined frame size is below a predetermined size to optimize the size of the headers, and formatting according to a second format within the frame size of the data packet is equal to or greater than the predetermined size to optimize processing for frames having large data packets. | 08-13-2009 |
20090213825 | METHODS AND APPARATUS FOR CONTROLLING TRANSMISSION OF A BASE STATION - Methods and apparatus for controlling transmission of a base station, such as a Femto cell, based on the determined quality of a backhaul connection to a network are disclosed. In particular, a quality of a backhaul connection of a base station to a node in a communication network is determined. Based on this quality determination, transmission from the base station is either limited or stopped when the determined quality fails to meet a predefined condition. The degradation in quality of the backhaul connection, for example, affects the ability of the base station to offer sufficient service to access terminals. By limiting or stopping wireless transmission of the base station when the backhaul quality is degraded, access terminals either currently accessing the base station or attempting to connect to the base station can then more efficaciously hand off to another base station or access point. | 08-27-2009 |
20090232019 | PROVIDING MULTIPLE LEVELS OF SERVICE FOR WIRELESS COMMUNICATION - Local breakout is provided by one or more nodes (e.g., a local access point and/or a local gateway) in a wireless network to facilitate access to one or more local services. In conjunction with local breakout, multiple IP points of presence relating to different levels of service may be provided for an access point. For example, one point of presence may relate to a local service while another point of presence may relate to a core network service. IP point of presence may be identified for an over-the-air packet to indicate a termination point for the packet. Also, different mobility management functionality may be provided at different nodes in a system whereby mobility management for a given node may be provided by a different node for different types of traffic. Thus, an access terminal may support multiple NAS instances. In addition, different types of paging may be provided for different types of traffic. Furthermore, messages associated with one protocol may be carried over another protocol to reduce complexity in the system. | 09-17-2009 |
20090238106 | SIGNALING AND MANAGEMENT OF BROADCAST-MULTICAST WAVEFORM EMBEDDED IN A UNICAST WAVEFORM - Embodiments describe overlaying a broadcast multicast channel on top of a unicast network. Messages can be generated by protocols in a broadcast/multicast (BCMC) stack and tunneled through an IRTP of a serving access node. These messages can be transmitted on a BCMC channel and/or a unicast channel. Other messages can be generated by protocols in a unicast stack and tunneled to a B-IRTP of a BCMC Access node and transmitted on a BCMC channel to an access terminal. | 09-24-2009 |
20090238185 | RELAY BASED HEADER COMPRESSION - Relays can be used to facilitate communication of a packet, such as from a base station to a mobile device. The packet can include a header that designates an intended destination for the packet. The header can transfer such that the intended destination designation can be sent with or without being decompressed at a relay. If there is more than one relay involved in communication, then the header can configure such that the header is accessible without performing decompression. However, if there is one relay stop, then the header can compress the designator in such a way that decompression should occur. | 09-24-2009 |
20090264123 | SERVING BASE STATION SELECTION USING BACKHAUL QUALITY INFORMATION - Techniques for selecting a serving base station for a terminal by taking into consideration the backhaul quality of candidate base stations are described. In one design, a base station may determine backhaul quality information indicative of its current backhaul quality. The base station may send the backhaul quality information, e.g., in an overhead message sent over the air to terminals or in a backhaul message sent to neighbor base stations or a network controller. A server selection entity may receive backhaul quality information for at least one candidate base station for the terminal. The server selection entity may also determine at least one metric for each candidate base station. The server selection entity may then select the serving base station for the terminal based on the backhaul quality information and the at least one metric for the at least one candidate base station. | 10-22-2009 |
20090268668 | LOCAL IP ACCESS SCHEME - Local IP access is provided in a wireless network to facilitate access to one or more local services. In some implementations, different IP interfaces are used for accessing different services (e.g., local services and operator network services). A list that maps packet destinations to IP interfaces may be employed to determine which IP interface is to be used for sending a given packet. In some implementations an access point provides a proxy function (e.g., a proxy ARP function) for an access terminal. In some implementations an access point provides an agent function (e.g., a DHCP function) for an access terminal. NAT operations may be performed at an access point to enable the access terminal to access local services. In some aspects, an access point may determine whether to send a packet from an access terminal via a protocol tunnel based on the destination of the packet. | 10-29-2009 |
20090290540 | SYSTEMS AND METHODS FOR MULTIPLEXING MULTIPLE CONNECTIONS IN MOBILE IP NETWORK - Disclosed are systems, methods and computer program products for facilitating multiplexing of simultaneous multiple connections between a mobile device and its IP mobility anchors, such as mobile IP home agents or proxy mobile IP local mobility anchors. An example method comprises assigning a unique IP mobility anchor identifier to each IP mobility anchor associated with the mobile device. The method further comprises negotiating an IP flow reservation for each IP mobility anchor identifier and signaling a request to associate each negotiated IP flow with an IP tunnel to a particular IP mobility anchor. The method further comprises sending packets through each negotiated IP flow and associated IP tunnel to each IP mobility anchor. | 11-26-2009 |
20090305699 | REGISTRATION AND ACCESS CONTROL IN FEMTO CELL DEPLOYMENTS - Systems and methodologies are described that facilitate distributing and/or utilizing a Closed Subscriber Group (CSG) Identifier (ID) that identifies a CSG corresponding to a base station and a CSG indication that distinguishes between the base station permitting access to members of the CSG and permitting access to members and non-members of the CSG. For instance, the CSG ID can uniquely identify the CSG corresponding to the base station. A mobile device can receive the CSG ID and the CSG indication from the base station. Further, the received CSG ID can be compared to CSG IDs included in an allowed CSG list to recognize whether the mobile device is a member or a non-member of the CSG. Moreover, a preference for selecting the base station as compared to a disparate base station can be generated as a function of the received CSG ID and CSG indication. | 12-10-2009 |
20090316652 | UTILIZING SYSTEM ACCESS SEQUENCES TO REQUEST RESOURCES FOR GCI REPORTING IN WIRELESS NETWORKS - Systems and methodologies are described that facilitate indicating global cell identifier (GCI) reporting in wireless communication to mitigate confusion caused by physical cell identifier (PCI) reporting in heterogeneous deployments. In particular, mobile devices can report GCI of access points to disparate access points to facilitate communication therebetween, such as during handover. Mobile devices can indicate GCI reporting during a system access request by selecting an access sequence corresponding to subsequent GCI reporting. Based on the access sequence, an access point can grant additional resources to receive the GCI, and the mobile device can communicate GCI over the resources. Using the GCI, the access point can communicate with a disparate access point related to the GCI. | 12-24-2009 |
20090316654 | ACCESS TERMINAL ASSISTED NODE IDENTIFIER CONFUSION RESOLUTION USING A TIME GAP - Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects a network may provide a time gap (e.g., an asynchronous time gap) during which an access terminal may temporarily cease monitoring transmissions from a source node so that the access terminal may acquire a unique identifier from a target node. In some aspects an access terminal may commence handover operations at a target node after determining whether the access terminal is allowed to access the target node. In some aspects a source node may prepare several target nodes for potential handover in the event confusion is detected or likely. Here, the source node may send information relating to the preparation of the potential target nodes to the access terminal whereby the access terminal uses the handover preparation information to initiate a handover at that target node. | 12-24-2009 |
20090316655 | ACCESS TERMINAL ASSISTED NODE IDENTIFIER CONFUSION RESOLUTION - Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects a network may provide a time gap (e.g., an asynchronous time gap) during which an access terminal may temporarily cease monitoring transmissions from a source node so that the access terminal may acquire a unique identifier from a target node. In some aspects an access terminal may commence handover operations at a target node after determining whether the access terminal is allowed to access the target node. In some aspects a source node may prepare several target nodes for potential handover in the event confusion is detected or likely. Here, the source node may send information relating to the preparation of the potential target nodes to the access terminal whereby the access terminal uses the handover preparation information to initiate a handover at that target node. | 12-24-2009 |
20090323577 | BROADCAST-MULTICAST TRANSMISSION WITH RATE ADAPTION - Techniques for supporting broadcast/multiple transmission to multiple terminals with feedback and rate adaptation are described. In an aspect, a combination of HARQ and at least one shared feedback channel may be used to support broadcast/multicast transmission. In one design, a base station may send at least one transmission of a packet to multiple terminals, one transmission at a time. The base station may receive feedback information (e.g., NAK) for the packet from the terminals on the shared feedback channel(s). The base station may determine whether to terminate the packet early and/or may select at least one transmission parameter for another packet based on the feedback information for the packet. In another aspect, a transport format for a broadcast/multicast transmission may be selected based on CQI information from terminals receiving the transmission. The terminals may send CQI information at a slow rate and/or only certain terminals may send CQI information. | 12-31-2009 |
20100002603 | NETWORK ELEMENT CONFIGURATION SCHEME - In a configuration scheme for one or more network elements, a network management entity determines a set of at least one parameter value from a set of operable parameter values and sends the determined set to a network element. The network element then selects a parameter value from the received set and uses the selected parameter value to configure one or more aspects of the network element. | 01-07-2010 |
20100008234 | PAGING SCHEMES FOR LOCAL NETWORK ACCESS - Paging and power consumption are managed in conjunction with providing local breakout in a wireless wide area network. In some aspects, if a packet destined for an access terminal is received at an access point that provides local breakout, the access point may inform the network so that the network will cause the access point to page the access terminal. Alternatively, in some aspects an access point that provides local breakout may maintain idle context of the access terminal, whereby the access point may autonomously page the access terminal (i.e., without involving the core network). In some aspects local breakout traffic is filtered at an access point to reduce the number of pages or packets sent to an access terminal. In some aspects an indication of a packet type is provided with a page message to enable an access terminal to determine whether to receive the packet. In some aspects a local link interface may be selectively disabled or enabled to limit traffic at an access terminal. | 01-14-2010 |
20100008235 | REPORTING AND RESOLVING CONFLICTING USE OF A NODE IDENTIFIER - Conflicting use of a node identifier in a wireless network is reported and resolved. In some aspects, a wireless node receives wireless signals and determines, based on those signals, that more than one node uses the same node identifier. The wireless node may then report the conflicting use to a network node. Here, the wireless node may delay for a period of time before reporting the conflicting use. In some aspects, an access point that discovers a conflicting use (e.g., based on a received signal that indicates that another access point is using that same node identifier) may report the conflicting use and/or elect to use a different node identifier. In some aspects, a stateful procedure is used to resolve a conflicting use where, upon identification of a conflicting use, an access point negotiates with another access point to cause one of these access points to use a different node identifier. In some aspects, a stateless procedure is used to resolve a conflicting use where, upon identification of a conflicting use, an access point delays for a period of time before determining whether a different node identifier is to be used at one of the nodes. | 01-14-2010 |
20100008293 | X2 INTERFACES FOR ACCESS POINT BASE STATIONS IN SELF-ORGANIZING NETWORKS (SON) - Systems and methodologies are described that facilitate leveraging an X2-AP interface for data exchange between an access terminal and a Home access terminal. Based upon a received request from a Home access terminal, the access terminal can activate an X2-AP interface connection on demand over Stream Control Transmission Protocol (SCTP) based upon a maximum number of connections not being met and/or a timer evaluation that indicates the request is within an allowed time period. The capacity of the access terminal related to the amount of X2-AP connections can be managed based upon at least one of a timer evaluation, or a maximum number of X2-AP connections. The systems and methodologies provide an optimal and efficient technique in order to enable data to be exchanged between an access terminal and a Home access terminal utilizing an X2-AP interface. | 01-14-2010 |
20100008341 | PAGING AND POWER MANAGEMENT SCHEMES FOR LOCAL NETWORK ACCESS - Paging and power consumption are managed in conjunction with providing local breakout in a wireless wide area network. In some aspects, if a packet destined for an access terminal is received at an access point that provides local breakout, the access point may inform the network so that the network will cause the access point to page the access terminal. Alternatively, in some aspects an access point that provides local breakout may maintain idle context of the access terminal, whereby the access point may autonomously page the access terminal (i.e., without involving the core network). In some aspects local breakout traffic is filtered at an access point to reduce the number of pages or packets sent to an access terminal. In some aspects an indication of a packet type is provided with a page message to enable an access terminal to determine whether to receive the packet. In some aspects a local link interface may be selectively disabled or enabled to limit traffic at an access terminal. | 01-14-2010 |
20100009690 | MANAGING NETWORK-INITIATED QUALITY OF SERVICE SETUP IN MOBILE DEVICE AND NETWORK - Systems, methodologies, and devices are described that manage employment of network (NW)-initiated resource allocation and user equipment (UE)-initiated resource allocation for a UE. To employ NW-initiated resource allocation, a core network can transmit an indicator to the UE indicating that Policy and Charging Control (PCC) is supported by a network associated with the UE. The UE receives the indicator and other information, such as indicator regarding whether the current access network supports NW-initiated resource allocation and whether the current application prefers NW-initiated resource allocation, determines that NW-initiated resource allocation is to be employed, and the core network initiates resource allocation for the UE. If any indicator is not received by the UE, or the UE receives an indicator that indicates PCC is not supported or not preferred, the UE determines that UE-initiated resource allocation is to be employed, and transmits a request for resource allocation to the core network. | 01-14-2010 |
20100020710 | CELL IDENTIFIER ASSIGNMENT AND SELECTION - Systems and methodologies are described that facilitate providing physical cell identifier (PCI) assignment. Neighboring access point parameters can be collected and transmitted to a PCI assigning component, which can generate a PCI based on the parameters as well as other local parameters. The neighboring access point parameters can be received by evaluating signals transmitted by the neighboring access points, from a UE communicating with the neighboring access points, over a backhaul link, etc. The parameters can include signal strength, identification, and/or the like. In addition, prioritized lists of PCIs can be provided to an access point, which can utilize the neighborhood parameters to select an optimal PCI from the list. | 01-28-2010 |
20100027471 | SYSTEM AND METHOD FOR DISTRIBUTED MULTIPLE-INPUT MULTIPLE-OUTPUT (MIMO) IN A WIRELESS COMMUNICATION SYSTEM - Systems and methodologies are described herein that facilitate distributed multiple-input multiple-output (MIMO) or cooperative multipoint (CoMP) communication in a wireless communication system. As described herein, multiple cells, such as a serving cell and an auxiliary cell, can cooperate to conduct communication with one or more associated terminals. In one example described herein, an associated core network can exchange data and/or control signaling with a single cell communicating with a given terminal, which can then tunnel respective data and/or control signaling to other cell(s). By doing so, CoMP communication can be made transparent to the core network and can be achieved without requiring changes to the network. As further described herein, a terminal can exchange Physical Downlink Control Channel (PDCCH) assignments and/or other information exclusively with the serving cell in addition to or in place of other information exchanged with a serving cell and/or an auxiliary cell. | 02-04-2010 |
20100029274 | SYSTEM AND METHOD FOR CELL SEARCH AND SELECTION IN A WIRELESS COMMUNICATION SYSTEM - Systems and methodologies are described herein that facilitate improved cell search and selection in a wireless communication system. For example, a terminal as described herein can utilize one or more Closed Subscriber Group (CSG)-specific offset and/or hysteresis parameters as described herein to increase the amount of time on which the terminal is allowed to camp on a desirable cell. Additionally, specialized reselection timing can be employed as described herein to increase a delay associated with selecting a Home Node B (HNB) or Home Evolved Node B (HeNB) cell, thereby reducing power consumption associated with rapid cell reselection operations in a densely populated network environment. Further, a two-step reselection process can be performed as described herein in the context of selecting a frequency for cell reselection, thereby mitigating the effects of rapid reselection between cells and/or frequencies due to CSG cell prioritization. | 02-04-2010 |
20100034083 | METHOD AND APPARATUS FOR PACKET DIFFERENTIATION IN A WIRELESS COMMUNICATION SYSTEM - Systems and methodologies are described herein that facilitate efficient packet differentiation and forwarding in a wireless communication system. As described herein, identifiers or tags (e.g., corresponding to radio bearers, logical channels, Internet Protocol (IP) addresses, etc.) can be applied to respective packets based on their destinations as determined by traffic flow templates (TFTs) associated with the packets. Further, techniques are provided for establishing radio bearers, IP addresses, and/or other resources for transmission of packets associated with respective TFTs in a manner irrespective of associated quality of service (QoS) policies for the TFTs. Upon an establishment of resources, techniques are described herein for tagging packets with resources associated with TFTs corresponding to the packets to facilitate forwarding of respective packets to their intended destinations with lowered required processing cost. Additionally, techniques are described herein for offloading packet analysis and/or forwarding functionality from a terminal to a device tethered to the terminal. | 02-11-2010 |
20100035615 | INTRA-FREQUENCY CELL RESELECTION RESTRICTION IN WIRELESS COMMUNICATIONS - Systems and methodologies are described that facilitate utilizing reselection indicators in reselecting access points in wireless communications. In particular, an indicator can be provided relating to a restricted association access point that specifies whether intra-frequency reselection is allowed. If so, a mobile device receiving the indicator can reselect to other access points, to which it has access, operating in a similar frequency. If not, the mobile device can evaluate access points in other frequencies so as not to cause substantial interference to the restricted association access point. In addition, a predicted level of interference caused by communicating with an intra-frequency access point can be computed and evaluated to override the reselection indicator, in some cases. Thus, a restricted association access point can control reselection for some devices to mitigate interference while allowing the devices to override prohibitive restricted access points. | 02-11-2010 |
20100046418 | RELAY ARCHITECTURE FRAMEWORK - Systems and methodologies are described that facilitate providing relay nodes in wireless networks. In particular, cluster nodes, which can be regular eNBs, can provide wireless network access to the relay nodes over a backhaul link, and the relay nodes can offer access to devices or other relay nodes to expand network coverage and/or provide increased throughput. User equipment (UE) relays can function as UEs according to a cluster node such that UE relays receive network addressing and can tunnel communications through the cluster node using the backhaul link. Cell relays can function as a cell of the cluster node, such that transport layer communications terminate at the cluster node. In this regard, cell relays can define transport layers to use in communicating with the cluster nodes over the backhaul and with other devices over a provided access link. | 02-25-2010 |
20100046494 | BASE STATION SYNCHRONIZATION - Systems and methodologies are described that facilitate synchronizing base stations in a wireless communication environment. A base station can receive a synchronization signal sent via a low reuse channel, which can be shared by a group of base stations. Further, the base station can align a clock associated therewith to the received synchronization signal. Moreover, the base station can coarsely align the clock to a first synchronization signal received upon a first subset of resources of the low reuse channel, and finely align the clock to a second synchronization signal received upon a second subset of resources (e.g., of the low reuse channel, of a separate channel, . . . ), where the second subset of resources can be reserved for transmission from at least one base station with at least a predetermined level of synchronous accuracy. | 02-25-2010 |
20100048206 | METHOD AND APPARATUS FOR BROADCAST SERVICES IN A COMMUNICATION SYSTEM - A method, apparatus and system provide for efficient use of communication resources for providing broadcast services in a communication system. A receiver receives a first broadcast controller identification from a first base station, and a second broadcast controller identification from a second base station. A controller coupled to the receiver determines whether the first and second broadcast controller identifications are associated with use of a common set of broadcast parameters. A transmitter transmits a request for transmission of a new set of broadcast parameters when the first and second broadcast controller identifications are not associated with use of the common set of broadcast parameters. After receiving the new set of broadcast parameters, the receiver uses the new set of broadcast parameters for receiving broadcast services. | 02-25-2010 |
20100069062 | WIRELESS COMMUNICATION PAGING AND REGISTRATION UTILIZING MULTIPLE TYPES OF NODE IDENTIFIERS - Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service. | 03-18-2010 |
20100074180 | SYNCHRONIZING A BASE STATION IN A WIRELESS COMMUNICATION SYSTEM - A method for synchronizing a wireless communication system is disclosed. A silence duration for a base station is determined based on the time required for a neighbor base station to obtain or maintain synchronization. All transmissions from the base station are ceased for the silence duration. Multiple base stations level may cease transmissions at the same time, thus mitigating interference. | 03-25-2010 |
20100080116 | RE-ESTABLISHING A RADIO RESOURCE CONTROL CONNECTION WITH A NON-PREPARED BASE STATION - A method for establishing a radio resource control connection is disclosed. A wireless communication device may establish a radio resource control connection with a first base station. The wireless communication device may send a message to a second base station that requests re-establishment of the radio resource control connection. The wireless communication device may receive a message from the second base station that initiates setup of a new radio resource control connection. | 04-01-2010 |
20100087166 | Systems and Methods to Enable Authentication of the Location of Access Point Base Stations and/or User Equipment - Systems and methods for communication include components and methods for detecting, at an access point base station, location-verification data transmitted by at least one macro cell. Further, the components and method include transmitting a response message, including location information, via a backhaul network to a location authentication component to authenticate a location of the access point base station based on the location information, wherein the location information includes location data that is a function of the location-verification data. In some aspects, an operation of the access point base station may be allowed or disallowed based on an authentication of the location information. | 04-08-2010 |
20100093354 | SYSTEM AND METHOD TO UTILIZE PRE-ASSIGNED RESOURCES TO SUPPORT HANDOFF OF A MOBILE STATION FROM A MACRO BASE STATION TO A FEMTO BASE STATION - Apparatus and methods of hand-in of a call from a macro node to a femto node include receiving, at a target interface to a plurality of access points, a handoff request to handoff a call of a mobile station, wherein the handoff request comprises a cellular identifier corresponding to a pilot identifier of a pilot signal. Further, the apparatus and methods include determining that the plurality of access points share the cell identifier, and forwarding the handoff request to the plurality of access points that share the cell identifier. Additionally, the apparatus and methods include generating a handoff request acknowledgement comprising a pre-reserved resource that is common to the plurality of access points, wherein the pre-reserved resource enables the mobile station to communicate with the plurality of access points, and transmitting the handoff request acknowledgement to initiate the hand-in to one of the plurality of access points. | 04-15-2010 |
20100103845 | CELL RELAY MOBILITY PROCEDURES - Systems and methodologies are described that facilitate performing intra-cluster and inter-cluster reselection for relay eNBs. In intra-cluster reselection, a relay eNB can reselect a disparate relay eNB and indicate its identifier in a bearer list update message. The disparate relay eNB and upstream eNBs (including the donor eNB) can update routing tables based at least in part on the identifier. In addition, the relay eNB can provide identifiers of downstream relay eNBs to facilitate updating routing tables for those identifiers as well. In an inter-cluster reselection, relay eNBs can release connection to downstream relay eNBs and re-attach to a wireless network to receive an identifier from a new donor eNB in the new cluster. Alternatively, the relay eNB can request an identifier from the donor eNB during reselection, notify downstream relay eNBs of the reselection, and/or request identifiers for one or more downstream relay eNBs. | 04-29-2010 |
20100103857 | CELL RELAY NETWORK ATTACHMENT PROCEDURES - Systems and methodologies are described that facilitate attaching cell relays to a wireless network. During the attachment procedure, a relay eNB can request assignment of an identifier, or a portion thereof, from a donor eNB for subsequent packet routing to the relay eNB. This can occur through one or more intermediary relay eNBs, where present. Donor eNB can assign an identifier or portion thereof (or confirm/deny an explicit identifier request from the relay eNB) and can forward establishment information downstream to the relay eNB. Donor eNB and intermediary relay eNBs, where present, can store the identifier for subsequent use in routing packets to the relay eNB. The identifier can be a terminal endpoint identifier (TEID) utilized in a tunneling protocol, a relay identifier utilized in a relay protocol, and/or the like. | 04-29-2010 |
20100103861 | CELL RELAY PACKET ROUTING - Systems and methodologies are described that facilitate packet routing among relay eNBs in a wireless network. A donor eNB can create at least a portion of a tunnel endpoint identifier (TEID) for a relay eNB communicating with a UE or other device. In addition, the relay eNB communicating with the UE can create a portion of the TEID. Upon receiving packets with a TEID, the donor eNB can route the packets to downstream eNBs based on the portion of the TEID that it created. Other downstream eNBs can continue to route packets to next hop eNBs based on the portion of the TEID created by the donor eNB or the downstream eNBs themselves. The relay eNB communicating with the UE can route packets to the UE based on the portion of the TEID it created and/or the portion created by the donor eNB. | 04-29-2010 |
20100103862 | DEVICE ATTACHMENT AND BEARER ACTIVATION USING CELL RELAYS - Systems and methodologies are described that facilitate assigning TEIDs, or portions thereof, to UEs or other devices during network attachment and/or dedicated bearer activation using one or more cell relays. Relay eNBs can request bearer establishment from a UE, which can be based on receiving an attach accept from an upstream node during attachment for the UE, receiving a bearer setup request from the upstream node, and/or the like. Once a bearer establishment response is received from the UE, the relay eNBs can store a TEID relating to the bearer. This can be a TEID that is at least partially received in the attach accept or bearer setup message, generated for the UE upon receiving the bearer establishment response, and/or the like. The TEID, or portion thereof, can be utilized for subsequent packet routing to the UE through one or more cell relays. | 04-29-2010 |
20100103863 | BEARER QoS MAPPING FOR CELL RELAYS - Systems and methodologies are described that facilitate mapping multiple evolved packet system (EPS) bearers to a single relay eNB radio bearer. In particular, an upstream eNB can select a radio bearer of a downstream eNB for association to an EPS bearer; the selection can be based on a best effort match or substantially any logic. The upstream eNB can store an association between the radio bearer and EPS bearer for subsequent downstream packet routing. The upstream eNB can also provide an indication of the selected radio bearer to the downstream relay eNB to facilitate upstream packet routing therefrom. The upstream eNB can alternatively select the radio bearer of the downstream eNB for association to the EPS bearer based on a quality of service (QoS) class identifier (QCI) of the EPS bearer. | 04-29-2010 |
20100103864 | CELL RELAY PROTOCOL - Systems and methodologies are described that facilitate providing a relay protocol to facilitate communicating upper layer protocol data among relay and donor nodes. In particular, a donor node can create a relay protocol packet upon receiving data for a relay node from a core network. Donor node can indicate an assigned relay identifier in the relay protocol packet header to facilitate routing the packet among related downstream relay nodes to arrive at the appropriate relay node, which can process the upper layer protocol data. In addition, a relay node can formulate a relay protocol packet for communication to a donor node through zero or more intermediary upstream relay nodes. Similarly, the relay node can insert the assigned relay identifier in the header to allow the donor node to associate response or related packets from the core network with the relay node. | 04-29-2010 |
20100103865 | HEADER COMPRESSION FOR CELL RELAY COMMUNICATIONS - Systems and methodologies are described that facilitate compressing packet headers for cell relay communications. Since cell relays can support a number of evolved packet system (EPS) bearers over a given dedicated radio bearer (DRB), robust header compression (RoHC) can be multiplexed for communications to/from a given cell relay. Thus, an upstream node compressing one or more packet headers can indicate a RoHC context, which can be represented by a RoHC context identifier in a RoHC header. A receiving entity can decompress the headers based on determining the RoHC context. Alternatively, the RoHC context can be associated with an identifier of a related UE bearer such as a tunnel endpoint identifier (TEID), a relay identifier, and/or the like, that is received in a tunneling protocol header to facilitate packet routing. | 04-29-2010 |
20100113010 | REPRIORITIZATION OF WIRELESS NETWORKS FOR RESELECTION TO SUPPORT VOICE CALL - Techniques for originating a voice call by a UE after performing reselection with reprioritization are described. The UE may operate in an idle mode and may camp on a first wireless network of a first radio access technology (RAT), which may not support voice service. The first wireless network may have the highest priority among all wireless networks detected by the UE. The UE may receive an indication to originate a voice call. The UE may then perform reselection from the first wireless network to a second wireless network of a second RAT by modifying the priorities of the frequencies of the first wireless network and/or the second wireless network. The UE may then originate the voice call with the second wireless network, instead of the first wireless network, in order to avoid having to perform circuit-switched (CS) fallback from the first wireless network to the second wireless network. | 05-06-2010 |
20100120420 | METHOD AND APPARATUS TO ENABLE PATCHING OF USER EQUIPMENT CONTEXT THROUGH RETRIEVAL OF PARTIAL CONTEXTS FROM VARIOUS NETWORK SERVERS - Devices and methods are provided for the patching of a UE context via retrieval of partial contexts when a UE transitions from a source system (e.g., UTRAN) to a target system (e.g., an LTE network). In one embodiment, the method may involve receiving a first identifier for a source system server (e.g., SGSN) storing first context information, and a second identifier for a target system server (e.g., MME) storing second context information. The method may involve retrieving and combining the first and second context information to generate the patched context for the UE. | 05-13-2010 |
20100124172 | DECLARING RADIO LINK FAILURE BASED ON TARGET-SPECIFIC THRESHOLD - The number of handover-related failures that occur in a communication system may be reduced by taking target access point conditions into account when declaring radio link failure and/or by delaying certain handover operations. In some aspects, criteria for radio link failure detection and access terminal-controlled mobility may take into account access point parameters related to neighboring cells that may be available as mobility targets. For example, filtering mechanisms for detecting radio link failure based on radio layer problem reports may also take into account the availability of various neighbor access points and their measured signal strengths. In addition, a handover command may be sent earlier than in conventional systems (e.g., the handover command may be sent even though the target access point is weaker than the source access point) and include an indication that instructs the access terminal to delay handover until a specified condition is met. For example, handover may be delayed until the target access point becomes stronger than the source access point. | 05-20-2010 |
20100124173 | RADIO LINK FAILURE REPORTING - A communication node determines that radio link failure occurred during connected state mobility of an access terminal and reports the radio link failure to another communication node. For example, a target access point may determine that radio link failure occurred during handover of an access terminal and send a radio link failure report message to the access point that was previously serving the access terminal or to some other node (e.g., a network node). In the first case, the serving access point may adjust mobility parameters based on this radio link failure information and, optionally, other reported radio link failure information. In the second case, the other node may send a radio link failure report message to the serving access point, or the other node may adjust mobility parameters based on this radio link failure information (and, optionally, other reported radio link failure information) and send the adjusted mobility parameters to the serving access point. | 05-20-2010 |
20100124203 | CONDITIONAL ACCESS TERMINAL INITIATION OF DELAYED HANDOVER - The number of handover-related failures that occur in a communication system may be reduced by taking target access point conditions into account when declaring radio link failure and/or by delaying certain handover operations. In some aspects, criteria for radio link failure detection and access terminal-controlled mobility may take into account access point parameters related to neighboring cells that may be available as mobility targets. For example, filtering mechanisms for detecting radio link failure based on radio layer problem reports may also take into account the availability of various neighbor access points and their measured signal strengths. In addition, a handover command may be sent earlier than in conventional systems (e.g., the handover command may be sent even though the target access point is weaker than the source access point) and include an indication that instructs the access terminal to delay handover until a specified condition is met. For example, handover may be delayed until the target access point becomes stronger than the source access point. | 05-20-2010 |
20100124918 | MOBILITY MANAGEMENT BASED ON RADIO LINK FAILURE REPORTING - A communication node determines that radio link failure occurred during connected state mobility of an access terminal and reports the radio link failure to another communication node. For example, a target access point may determine that radio link failure occurred during handover of an access terminal and send a radio link failure report message to the access point that was previously serving the access terminal or to some other node (e.g., a network node). In the first case, the serving access point may adjust mobility parameters based on this radio link failure information and, optionally, other reported radio link failure information. In the second case, the other node may send a radio link failure report message to the serving access point, or the other node may adjust mobility parameters based on this radio link failure information (and, optionally, other reported radio link failure information) and send the adjusted mobility parameters to the serving access point. | 05-20-2010 |
20100135206 | Radio Access Technology Interworking - Radio access interworking technologies allow a target network to notify a source network that a mobile device has moved from source network to target network, wherein mobile device does not need to perform notification to source network. Further, source network can provide a first subset of overhead information to mobile device and, after moving to target network, mobile device can receive a second subset of overhead information from target network. Further, mobile device can perform prehashing prior to moving to target network based on a channel list received from source network. | 06-03-2010 |
20100165936 | PRE-BUNDLING OF RLC SDUs IN THE RLC LAYER - Certain aspects of the present disclosure provide a technique for pre-bundling the received service data units (SDU) into an SDU bundle in a first communication layer before receiving a scheduling information from a second communication layer and adjusting the SDU bundle when the scheduling information is received. | 07-01-2010 |
20100173626 | ADAPTATION OF HANDOVER PARAMETERS - Handover parameter settings are automatically adapted in access points in a system to improve handover performance. Reactive detection techniques are employed for identifying different types of handover-related failures and adapting handover parameters based on this detection. Messaging schemes are also employed for providing handover-related information to access points. Proactive detection techniques also may be used for identifying conditions that may lead to handover-related failures and then adapting handover parameters in an attempt to prevent such handover-related failures. Ping-ponging may be mitigated by adapting handover parameters based on analysis of access terminal visited cell history acquired by access points in the system. In addition, configurable parameters (e.g., timer values) may be used to detect handover-related failures. | 07-08-2010 |
20100173633 | HANDOVER FAILURE MESSAGING SCHEMES - Handover parameter settings are automatically adapted in access points in a system to improve handover performance. Reactive detection techniques are employed for identifying different types of handover-related failures and adapting handover parameters based on this detection. Messaging schemes are also employed for providing handover-related information to access points. Proactive detection techniques also may be used for identifying conditions that may lead to handover-related failures and then adapting handover parameters in an attempt to prevent such handover-related failures. Ping-ponging may be mitigated by adapting handover parameters based on analysis of access terminal visited cell history acquired by access points in the system. In addition, configurable parameters (e.g., timer values) may be used to detect handover-related failures. | 07-08-2010 |
20100177737 | CONTEXT FETCHING AFTER INTER-SYSTEM HANDOVER - Systems and methodologies are described that facilitate fetching a native security context between network nodes in a core network after an inter-system handover of a mobile device. For instance, a mobility message that is integrity protected by a security context (e.g., the native security context, a mapped security context, . . . ) can be obtained at a network node from the mobile device. Further, the network node can send a request to a disparate network node within a core network. The request can include information that can be used by the disparate network node to establish that the mobile device is authenticated. Moreover, the native security context can be received from the disparate network node in response to the request. Accordingly, the native security context need not be recreated between the network node and the mobile device. | 07-15-2010 |
20100195573 | SELECTIVELY INCLUDING ALLOWED CSG LIST IN PAGE MESSAGE - Problems caused by interaction between paging optimization and synchronizing CSG information are mitigated by setting a network indication indicating, for example, that a subscriber is no longer a member of a CSG, but the network has not yet received confirmation that an access terminal associated with the subscriber has been informed of this. A timer-based scheme may be employed for removing a CSG ID from the subscriber information for a subscriber once it is determined that the subscriber is no longer a member of the CSG. In addition, a temporary member of a CSG may determine whether it is still a member of a CSG upon expiration of a CSG timer. Also, the frequency with which an access terminal registers may be changed based on various criteria. Furthermore, an allowed CSG list may be selectively included in a page message depending on the destination of the page message. | 08-05-2010 |
20100197239 | GEOGRAPHIC-BASED MEASUREMENT AND LOGGING OF RADIO COVERAGE RELATED INFORMATION BY MOBILE DEVICES - Providing for automated wireless network signal analysis by mobile devices as a function of their geographic locations is described herein. By way of example, a wireless network can transmit a set of geographic data defining a geographic region to a mobile device. The mobile device can compare its current location to the geographic region, and begin measuring downlink signals, or recording such measurements when within the geographic region, and terminate the recording when the mobile device leaves the geographic region. Recorded measurements can be subsequently uploaded to the wireless network for analysis. In some aspects, the mobile device can refrain from uploading the measurements until within a defined reporting region. By providing mobile device network analysis triggered on device geographic location, analysis data that is well tailored to a particular problem area can be obtained, increasing quality of the analysis data and significantly reducing cost of acquiring such data. | 08-05-2010 |
20100197285 | CSG MEMBERSHIP INDICATION - Problems caused by interaction between paging optimization and synchronizing CSG information are mitigated by setting a network indication indicating, for example, that a subscriber is no longer a member of a CSG, but the network has not yet received confirmation that an access terminal associated with the subscriber has been informed of this. A timer-based scheme may be employed for removing a CSG ID from the subscriber information for a subscriber once it is determined that the subscriber is no longer a member of the CSG. In addition, a temporary member of a CSG may determine whether it is still a member of a CSG upon expiration of a CSG timer. Also, the frequency with which an access terminal registers may be changed based on various criteria. Furthermore, an allowed CSG list may be selectively included in a page message depending on the destination of the page message. | 08-05-2010 |
20100197307 | ACCESS CONTROL FOR ACCESS TERMINALS - Problems caused by interaction between paging optimization and synchronizing CSG information are mitigated by setting a network indication indicating, for example, that a subscriber is no longer a member of a CSG, but the network has not yet received confirmation that an access terminal associated with the subscriber has been informed of this. A timer-based scheme may be employed for removing a CSG ID from the subscriber information for a subscriber once it is determined that the subscriber is no longer a member of the CSG. In addition, a temporary member of a CSG may determine whether it is still a member of a CSG upon expiration of a CSG timer. Also, the frequency with which an access terminal registers may be changed based on various criteria. Furthermore, an allowed CSG list may be selectively included in a page message depending on the destination of the page message. | 08-05-2010 |
20100202391 | ACCESS POINT RESOURCE NEGOTIATION AND ALLOCATION OVER A WIRELESS INTERFACE - Systems and methodologies are described that facilitate communicating between access points using the same air interface as for serving wireless devices. Access points can communicate with one another over the air interface to exchange interference management messages related to negotiating and/or allocating resources among the access points or other messages. In addition, access points can prepare served wireless devices for time periods where the access points communicate with disparate access points over the air interface to mitigate confusion or radio link failure detection by the served wireless devices. | 08-12-2010 |
20100203865 | MANAGING ACCESS CONTROL TO CLOSED SUBSCRIBER GROUPS - Systems and methodologies are described that facilitate managing access control to Closed Subscriber Groups (CSGs) in a wireless communication environment. A user equipment (UE) can store an operator CSG list, which can be read only and controlled by an operator. Further, the operator CSG list can lack synchronization to a CSG subscription for the UE retained in the network. Thus, upon selecting to access a CSG cell associated with a CSG with a corresponding CSG Identifier (ID) included in the operator CSG list of the UE, a reject message that indicates that the UE lacks authorization for the CSG can be received. Moreover, the CSG ID can be stored as a forbidden CSG ID of the UE in a set of forbidden CSG IDs in response to receipt of the reject message when the CSG ID is included in the operator CSG list. | 08-12-2010 |
20100215006 | RLC FOR MULTI-CARRIER LTE SYSTEMS - Certain embodiments of the present disclosure propose methods for supporting multicarrier in a radio link control (RLC) communication layer. The proposed methods reduce the processing required when scheduling information for each carrier becomes available by generating protocol data units (PDUs) in advance, and storing the PDUs in buffers associated with each carrier. | 08-26-2010 |
20100272124 | METHOD AND SYSTEM FOR REDUCTION OF DECODING COMPLEXITY IN A COMMUNICATION SYSTEM - Method and System for Utilization of an Outer Decoder in a Broadcast Services Communication System is described. Information to be transmitted is provided to a systematic portion of a plurality of transmit buffers and encoded by an outer decoder communicatively coupled to the transmit buffer. The resulting redundant bits are provided to a parity portion of each transmit buffer. The content of the transmit buffers, is multiplexed and encoded by an inner decoder to improve protection by adding redundancy. The receiving station recovers the transmitted information by an inverse process. Because a decoding complexity depends on the size of a systematic portion of the transmit buffer, reasoned compromise between a systematic portion size and number of transmit buffers yields decreased decoding complexity. | 10-28-2010 |
20110039576 | Enhanced Positioning Assistance Data For Reduced Signaling - Apparatus and methods for determining a location estimate of a mobile device based on an extended set of assistance data are presented. The extended assistance data includes assistance data for base stations, such as cellular base stations and access points, not expected to be viewable by the mobile device in a (current) first geographical area but expected to be viewable by the mobile device in a (future) second geographical area. By seeding the mobile device with assistance data expected to be useful in the future, the network reduces messaging between the network and mobile device and battery consumption by the mobile device. | 02-17-2011 |
20110092209 | SYSTEMS, METHODS AND APPARATUS FOR FACILITATING HANDOVER CONTROL USING RESOURCE RESERVATION WITH FREQUENCY REUSE - Systems, methods and apparatus for facilitating handover control using resource reservation with frequency reuse are provided. In one embodiment, the method can include: transmitting scheduling information for the transmission of information on frequencies corresponding to an unreserved portion of a frequency band. The method can also include transmitting scheduling information for the transmission of information on frequencies corresponding to a reserved portion of the frequency band. A frequency reuse scheme can be employed over the frequencies corresponding to the reserved portion of the frequency band, and the information transmitted on the frequencies corresponding to the reserved portion of the frequency band can be handover signalling information. | 04-21-2011 |
20110242999 | METHOD AND APPARATUS FOR CONDUCTING MEASUREMENTS WHEN MULTIPLE CARRIERS ARE SUPPORTED - Measurements are conducted on one or more carriers in a case where an access terminal supports reception on multiple carriers. Upon determining that an access terminal is capable of concurrently receiving on a given set of carriers, a measurement is conducted on one or more carriers of the set while receiving on or more other carriers of the set. Conversely, upon determining that an access terminal is not capable of concurrently receiving on a given set of carriers, a measurement is conducted on one or more carriers of the set while not receiving on or more other carriers of the set. In addition, data transfers to or from an access terminal on a carrier may be restricted (e.g., data transfers not scheduled or only low priority data transfers scheduled) during one or more subframes before or after the access terminal conducts a measurement on another carrier. | 10-06-2011 |
20120008541 | SIGNALING AND MANAGEMENT OF BROADCAST-MULTICAST WAVEFORM EMBEDDED IN A UNICAST WAVEFORM - Embodiments describe overlaying a broadcast multicast channel on top of a unicast network. Messages can be generated by protocols in a broadcast/multicast (BCMC) stack and tunneled through an IRTP of a serving access node. These messages can be transmitted on a BCMC channel and/or a unicast channel. Other messages can be generated by protocols in a unicast stack and tunneled to a B-IRTP of a BCMC Access node and transmitted on a BCMC channel to an access terminal. | 01-12-2012 |
20120008625 | SIGNALING AND MANAGEMENT OF BROADCAST-MULTICAST WAVEFORM EMBEDDED IN A UNICAST WAVEFORM - Embodiments describe overlaying a broadcast multicast channel on top of a unicast network. Messages can be generated by protocols in a broadcast/multicast (BCMC) stack and tunneled through an IRTP of a serving access node. These messages can be transmitted on a BCMC channel and/or a unicast channel. Other messages can be generated by protocols in a unicast stack and tunneled to a B-IRTP of a BCMC Access node and transmitted on a BCMC channel to an access terminal. | 01-12-2012 |
20120014311 | SIGNALING AND MANAGEMENT OF BROADCAST-MULTICAST WAVEFORM EMBEDDED IN A UNICAST WAVEFORM - Embodiments describe overlaying a broadcast multicast channel on top of a unicast network. Messages can be generated by protocols in a broadcast/multicast (BCMC) stack and tunneled through an IRTP of a serving access node. These messages can be transmitted on a BCMC channel and/or a unicast channel. Other messages can be generated by protocols in a unicast stack and tunneled to a B-IRTP of a BCMC Access node and transmitted on a BCMC channel to an access terminal. | 01-19-2012 |
20130107702 | PROVIDING MULTIPLE LEVELS OF SERVICE FOR WIRELESS COMMUNICATION | 05-02-2013 |
20130235848 | SYSTEMS, METHODS AND APPARATUS FOR FACILITATING HANDOVER CONTROL USING RESOURCE RESERVATION WITH FREQUENCY REUSE - Systems, methods and apparatus for facilitating handover control using resource reservation with frequency reuse are provided. In one embodiment, the method can include: transmitting scheduling information for the transmission of information on frequencies corresponding to an unreserved portion of a frequency band. The method can also include transmitting scheduling information for the transmission of information on frequencies corresponding to a reserved portion of the frequency band. A frequency reuse scheme can be employed over the frequencies corresponding to the reserved portion of the frequency band, and the information transmitted on the frequencies corresponding to the reserved portion of the frequency band can be handover signaling information. | 09-12-2013 |
20140140239 | Method and Apparatus for Conducting Measurements when Multiple Carriers are Supported - Measurements are conducted on one or more carriers in a case where an access terminal supports reception on multiple carriers. Upon determining that an access terminal is capable of concurrently receiving on a given set of carriers, a measurement is conducted on one or more carriers of the set while receiving on or more other carriers of the set. Conversely, upon determining that an access terminal is not capable of concurrently receiving on a given set of carriers, a measurement is conducted on one or more carriers of the set while not receiving on or more other carriers of the set. In addition, data transfers to or from an access terminal on a carrier may be restricted (e.g., data transfers not scheduled or only low priority data transfers scheduled) during one or more subframes before or after the access terminal conducts a measurement on another carrier. | 05-22-2014 |
20150029930 | UTILIZING BROADCAST SIGNALS TO CONVEY RESTRICTED ASSOCIATION INFORMATION - Systems and methodologies are described that facilitate transmitting access point types and/or restricted association parameters using broadcast signals, such as beacons, pilot signals, etc. The type or restricted association information can be indicated by one or more intrinsic aspects of the signal, such as specified parameters. In addition, the type or information can be indicated by one or more extrinsic signal aspects, such as frequency, interval, periodicity, etc. Using this information, a mobile device can determine whether an access point implements restricted association. If so, the mobile device can request an access point or related group identifier before determining whether to establish connection therewith. The identifier can be verified against a list of accessible access points and/or groups to make the determination. | 01-29-2015 |