Patent application number | Description | Published |
20090092111 | CONTROL OF WIRELESS TRANSMISSION BASED ON NODE STATUS - Transmission by a first node may be controlled based on a status of a second node. The status of the second node may indicate, for example, whether the second node will be communicating with the first node. Thus, if it is determined based on the status of the second node that the second node may not be communicating with the first node, transmissions by the first node may be temporarily disabled until there is a change in status, and vice versa. | 04-09-2009 |
20090093232 | PROVISIONING COMMUNICATION NODES - Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon. | 04-09-2009 |
20090094351 | ACCESS TERMINAL CONFIGURATION AND ACCESS CONTROL - Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon. | 04-09-2009 |
20090094680 | ACCESS MANAGEMENT FOR WIRELESS COMMUNICATION - Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon. | 04-09-2009 |
20090129291 | CONFIGURING AN IDENTIFIER FOR AN ACCESS POINT - An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server. | 05-21-2009 |
20090129327 | SECTOR IDENTIFICATION USING SECTOR PARAMETERS SIGNATURES - Systems and methodologies are described that facilitate identifying sectors using sector parameters signatures. The signatures can be generated as a known function of a previous sector parameters signature (or message parameters), system time, and an identifier. In this regard, mobile devices can determine an expected identifier from comparing the sector parameters signature to a sector parameters signature computed based at least in part on the system time known to the mobile device. In addition, the mobile device can utilize a known or an inferred previous parameters signature to determine the expected identifier. Multiple signatures can be evaluated to determine expected identifiers to increase the likelihood of correct identification since the signatures are generated using the known variables along with the identifier. | 05-21-2009 |
20090129338 | UTILIZING BROADCAST SIGNALS TO CONVEY RESTRICTED ASSOCIATION INFORMATION - Systems and methodologies are described that facilitate transmitting access point types and/or restricted association parameters using broadcast signals, such as beacons, pilot signals, etc. The type or restricted association information can be indicated by one or more intrinsic aspects of the signal, such as specified parameters. In addition, the type or information can be indicated by one or more extrinsic signal aspects, such as frequency, interval, periodicity, etc. Using this information, a mobile device can determine whether an access point implements restricted association. If so, the mobile device can request an access point or related group identifier before determining whether to establish connection therewith. The identifier can be verified against a list of accessible access points and/or groups to make the determination. | 05-21-2009 |
20090129341 | SOURCE INITIATED COMMUNICATION HANDOVER - In a handover operation an access terminal is handed over from a source access point to a target access point. To facilitate efficient identification of a target access point, a handover operation may be initiated by the target access point. A candidate frequency search also may be invoked to confirm that an access terminal identified by a target access point for a handover is in the vicinity of the target access point. A source access point may verify whether an access terminal is in a vicinity of a target access point to determine whether to perform a handover operation. A source access point may handle potential ambiguity between several target access points by sending handover commands to each of these target access points. An access terminal also may assist in the determination of whether to perform a handover operation. | 05-21-2009 |
20090129354 | ACCESS POINT CONFIGURATION SCHEMES - An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server. | 05-21-2009 |
20090132674 | RESOLVING NODE IDENTIFIER CONFUSION - Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects an access point and/or an access terminal may perform operations relating to detecting confusion and/or providing a unique identifier to resolve confusion. | 05-21-2009 |
20090132675 | USING IDENTIFIERS TO ESTABLISH COMMUNICATION - Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects an access point and/or an access terminal may perform operations relating to detecting confusion and/or providing a unique identifier to resolve confusion. | 05-21-2009 |
20090135784 | CLASSIFYING ACCESS POINTS USING PILOT IDENTIFIERS - Systems and methodologies are described that facilitate grouping pilot identifies to indicate type and/or classification information regarding one or more access points. The access points can select or be assigned pilot identifiers from the group indicating a type or classification related to the access points. Thus, identifiers can be grouped into macrocell and/or femtocell groups or ranges such that an access point can indicate, and mobile devices can efficiently determine, whether the access point provides macrocell or femtocell coverage based on a range from which its pilot identifier is selected or assigned. In addition, the pilot identifiers can be utilized to indicate restricted association information regarding the access points. | 05-28-2009 |
20090137228 | UTILIZING RESTRICTION CODES IN WIRELESS ACCESS POINT CONNECTION ATTEMPTS - Systems and methodologies are described that facilitate utilizing restriction codes in rejecting connection requests with restricted association access points to indicate a reason for the rejection. Mobile devices can maintain a list of accessible access points and/or groups of access points, which can be consulted during cell reselection to ensure unsuitable restricted association access points are not utilized in cell reselection. Based on receiving a rejection code from a restricted association access point, a mobile device can remove the access point, or a related group, from its maintained list so that subsequent reselection attempts avoid the access point and/or access points in the related group. | 05-28-2009 |
20090137249 | FAVORING ACCESS POINTS IN WIRELESS COMMUNICATIONS - Systems and methodologies are described that facilitate applying offsets and/or selectable hysteresis values to favor access points in cell reselection. In measuring and ranking surrounding access points in reselection, offsets can be applied to favorable access points to facilitate cell reselection thereto. The offset can positively affect measurements, and thus ranking as well, in some cases. Negative offsets can also be applied to lower measurements (and thus ranking) of some access points. Moreover, hysteresis values can be applied in measuring current cells to prevent frequent reselection. The hysteresis values can be selected based on a type of the current cell or related access point to expand the coverage area where desired. Thus, where the current access point is favorable, a larger hysteresis can be added to measurements related to the current access point. | 05-28-2009 |
20090181672 | WIRELESS COMMUNICATION PAGING UTILIZING MULTIPLE TYPES OF NODE IDENTIFIERS - Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service. | 07-16-2009 |
20090182871 | BACKUP PAGING FOR WIRELESS COMMUNICATION - A backup page is provided for a node that misses a page. In some aspects, a first type of access point in a system provides a backup page for an access terminal that is idling on a second of access point in the system in the event the access terminal misses a page by the second of access point in the system. An access point of the first type may page the access terminal according to a first paging schedule while an access point of the second type may page the access terminal according to a second paging schedule. In some aspects an access point of the first type (e.g., a macro node) provides service over a macro coverage area and an access point of the second type (e.g., a femto node) provides service over a smaller coverage area and/or provides restricted service. | 07-16-2009 |
20090190521 | MANAGEMENT OF WIRELESS RELAY NODES USING IDENTIFIERS - A set of wireless relay nodes are managed to facilitate inter-node routing of packets in the set. In some aspects, unique identifiers are defined for the wireless relay nodes to facilitate routing packets within the set. In some aspect a routing table is provided to each of the wireless relay nodes, wherein the routing table identifies each wireless relay node in the set and a next-hop entity for each of these wireless relay nodes. Each of the wireless relay nodes may then define a forwarding table based on the routing table. | 07-30-2009 |
20090190522 | MANAGEMENT OF WIRELESS RELAY NODES USING ROUTING TABLE - A set of wireless relay nodes are managed to facilitate inter-node routing of packets in the set. In some aspects, unique identifiers are defined for the wireless relay nodes to facilitate routing packets within the set. In some aspect a routing table is provided to each of the wireless relay nodes, wherein the routing table identifies each wireless relay node in the set and a next-hop entity for each of these wireless relay nodes. Each of the wireless relay nodes may then define a forwarding table based on the routing table. | 07-30-2009 |
20090196221 | METHOD AND APPARATUS FOR PROVIDING SIGNALING ACCESS - Signaling-only access may be established with an access node under certain circumstances such as, for example, upon determining that a node is not authorized for data access at the access node. A node that is not authorized for data access at an access node may still be paged by the access node through the use of signaling-only access. In this way, transmissions by the access node may not interfere with the reception of pages at the node. A first node may be selected for providing paging while a second node is selected for access under certain circumstances such as, for example, upon determining that the second node provides more desirable service than the first node. | 08-06-2009 |
20090196277 | WIRELESS NETWORK SYNCHRONIZATION - Systems and methodologies are described that facilitate synchronizing timing among wireless nodes in a wireless communication network. A tracking wireless node can synchronize to a global positioning system (GPS) signal if available. Alternatively, the tracking wireless node can receive quality metrics related to one or more target nodes. The quality metrics can relate to parameters that can be utilized to evaluate the target node for timing synchronization. Based on the quality metrics, the tracking wireless node can select a target wireless node for timing synchronization. The tracking wireless node can subsequently synchronize timing with the target wireless node. In addition, the tracking wireless node can continually evaluate surrounding wireless nodes to detect whether other wireless nodes have higher quality metrics than the current target wireless nodes and can accordingly resynchronize with nodes having higher metrics. | 08-06-2009 |
20090197538 | INTERFERENCE REDUCTION REQUEST IN A WIRELESS COMMUNICATION SYSTEM - Techniques for transmitting data with short-term interference mitigation in a wireless communication system are described. In one design, a first station (e.g., a base station or a terminal) may send a first message to at least one interfering station to request reduction of interference on at least one resource. The first station may send the first message in anticipation of receiving data on the at least one resource. An interfering station may receive the first message from the first station and may reduce interference on the at least one resource by reducing its transmit power and/or by steering its power in a direction different from the first station. The first station may thereafter receive data from a second station on the at least one resource. The techniques may be used for data transmission on the forward and reverse links. | 08-06-2009 |
20090197570 | PAGING AND ACCESS VIA DIFFERENT NODES - Signaling-only access may be established with an access node under certain circumstances such as, for example, upon determining that a node is not authorized for data access at the access node. A node that is not authorized for data access at an access node may still be paged by the access node through the use of signaling-only access. In this way, transmissions by the access node may not interfere with the reception of pages at the node. A first node may be selected for providing paging while a second node is selected for access under certain circumstances such as, for example, upon determining that the second node provides more desirable service than the first node. | 08-06-2009 |
20090197588 | BACKHAUL SIGNALING FOR INTERFERENCE AVOIDANCE - Providing for interference reduction and/or avoidance utilizing backhaul signaling between wireless access points (APs) of a wireless access network (AN) is described herein. By way of example, an interference avoidance request (IAR) can be issued by an AP to reduce signal interference on forward link (FL) and/or downlink (DL) transmissions by neighboring APs. The IAR can be routed via a backhaul network and/or over-the-air via access terminals (ATs) coupled with the AP or one or more interfering APs. Upon receiving the IAR, an interfering AP can determine reduced transmit power levels for FL and/or RL transmissions and respond to the IAR. The response can include reduced power levels and can be sent via the backhaul network or OTA. By employing the backhaul network in full or in part, interference avoidance can be conducted even for semi-planned or unplanned heterogeneous networks coupled by the backhaul. | 08-06-2009 |
20090197590 | SHORT-TERM INTERFERENCE MITIGATION IN A WIRELESS COMMUNICATION SYSTEM - Techniques for transmitting data with short-term interference mitigation in a wireless communication system are described. In one design, a serving base station may send a message to a terminal to trigger short-term interference mitigation. In response, the terminal may send a message to request at least one interfering base station to reduce interference on at least one resource. Each interfering base station may determine a transmit power level to be used for the at least one resource and may send a pilot at this transmit power level. The terminal may estimate the channel quality of the at least one resource based on at least one pilot received from the at least one interfering base station. The terminal may send information indicative of the estimated channel quality to the serving base station. The serving base station may send a data transmission on the at least one resource to the terminal. | 08-06-2009 |
20090201846 | SYSTEM AND METHOD FOR SCHEDULING OVER MULTIPLE HOPS - Systems and methodologies are described that facilitate scheduling over multiple hops in a wireless communication network. Radio resources can be partitioned into sets of sub-frames that can be allocated statically and/or dynamically. Statically allocated radio resources can be reassigned over time based on the loading on each hop and/or throughput imbalance. In addition, dynamic assignment of sub-frames to each hop can be based on traffic or channel conditions. Moreover, the radio resources can be dynamically allocated in a distributed scheme, wherein a base station controls the scheduling of resources, or a centralized scheme, wherein a relay station controls the scheduling of resources. Furthermore the allocation of radio resources can be transparent or explicit. In the transparent case, the access terminal listens directly to the base station, and the relay station does not transmit control information, such as DL or UL assignments. Conversely, when the allocation of resources is explicit the relay station does transmit control information. | 08-13-2009 |
20090213825 | METHODS AND APPARATUS FOR CONTROLLING TRANSMISSION OF A BASE STATION - Methods and apparatus for controlling transmission of a base station, such as a Femto cell, based on the determined quality of a backhaul connection to a network are disclosed. In particular, a quality of a backhaul connection of a base station to a node in a communication network is determined. Based on this quality determination, transmission from the base station is either limited or stopped when the determined quality fails to meet a predefined condition. The degradation in quality of the backhaul connection, for example, affects the ability of the base station to offer sufficient service to access terminals. By limiting or stopping wireless transmission of the base station when the backhaul quality is degraded, access terminals either currently accessing the base station or attempting to connect to the base station can then more efficaciously hand off to another base station or access point. | 08-27-2009 |
20090232019 | PROVIDING MULTIPLE LEVELS OF SERVICE FOR WIRELESS COMMUNICATION - Local breakout is provided by one or more nodes (e.g., a local access point and/or a local gateway) in a wireless network to facilitate access to one or more local services. In conjunction with local breakout, multiple IP points of presence relating to different levels of service may be provided for an access point. For example, one point of presence may relate to a local service while another point of presence may relate to a core network service. IP point of presence may be identified for an over-the-air packet to indicate a termination point for the packet. Also, different mobility management functionality may be provided at different nodes in a system whereby mobility management for a given node may be provided by a different node for different types of traffic. Thus, an access terminal may support multiple NAS instances. In addition, different types of paging may be provided for different types of traffic. Furthermore, messages associated with one protocol may be carried over another protocol to reduce complexity in the system. | 09-17-2009 |
20090238185 | RELAY BASED HEADER COMPRESSION - Relays can be used to facilitate communication of a packet, such as from a base station to a mobile device. The packet can include a header that designates an intended destination for the packet. The header can transfer such that the intended destination designation can be sent with or without being decompressed at a relay. If there is more than one relay involved in communication, then the header can configure such that the header is accessible without performing decompression. However, if there is one relay stop, then the header can compress the designator in such a way that decompression should occur. | 09-24-2009 |
20090245176 | DEVICE MANAGED ACCESS POINT LISTS IN WIRELESS COMMUNICATIONS - Systems and methodologies are described that facilitate device-side access point list management. Blacklists of access points unsuitable for providing network access to a related mobile device can be maintained as well as whitelists of suitable access points. The lists can be managed using an interface provided at the mobile device. In addition, lists can be modified according to provisioned network updates. Also, the lists can be of maximum size such that older entries can be purged upon insertion of newer entries based on a number of factors; timed entry deletion is provided as well. Access points in the lists can be stored and presented according to various identifiers related to the access points. | 10-01-2009 |
20090305699 | REGISTRATION AND ACCESS CONTROL IN FEMTO CELL DEPLOYMENTS - Systems and methodologies are described that facilitate distributing and/or utilizing a Closed Subscriber Group (CSG) Identifier (ID) that identifies a CSG corresponding to a base station and a CSG indication that distinguishes between the base station permitting access to members of the CSG and permitting access to members and non-members of the CSG. For instance, the CSG ID can uniquely identify the CSG corresponding to the base station. A mobile device can receive the CSG ID and the CSG indication from the base station. Further, the received CSG ID can be compared to CSG IDs included in an allowed CSG list to recognize whether the mobile device is a member or a non-member of the CSG. Moreover, a preference for selecting the base station as compared to a disparate base station can be generated as a function of the received CSG ID and CSG indication. | 12-10-2009 |
20090316604 | CONCENTRATOR FOR MULTIPLEXING ACCESS POINT TO WIRELESS NETWORK CONNECTIONS - Systems and methodologies are described that facilitate multiplexing communications from multiple downstream access points to one or more upstream access points. In particular, a concentrator component is provided that can establish a single transport layer connection with an upstream access point along with multiple application layer connections over the single transport layer connection for each of multiple downstream access points and/or related mobile devices. The downstream access points and/or mobile devices can provide identifiers to the concentrator component, which can utilize the identifiers to track communications with the upstream access points. In this regard, the upstream access points can additionally include identifiers received from the concentrator component in subsequent communications to facilitate identifying the appropriate downstream access point and/or mobile device. | 12-24-2009 |
20090316629 | CONCENTRATOR FOR MULTIPLEXING ACCESS POINT TO WIRELESS NETWORK CONNECTIONS - Systems and methodologies are described that facilitate multiplexing communications from multiple downstream access points to one or more mobility management entities (MME). In particular, a concentrator component is provided that can establish a single transport layer connection with an MME along with multiple application layer connections over the single transport layer connection for each of multiple downstream access points and/or related mobile devices. The downstream access points and/or mobile devices can provide identifiers, such as tracking identifiers, to the concentrator component, which can utilize the identifiers to track communications with the MME. In this regard, the MME can send paging messages, and the concentrator component can determine downstream access points related to the paging messages based on a stored association with a tracking identifier in the paging message. | 12-24-2009 |
20090316654 | ACCESS TERMINAL ASSISTED NODE IDENTIFIER CONFUSION RESOLUTION USING A TIME GAP - Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects a network may provide a time gap (e.g., an asynchronous time gap) during which an access terminal may temporarily cease monitoring transmissions from a source node so that the access terminal may acquire a unique identifier from a target node. In some aspects an access terminal may commence handover operations at a target node after determining whether the access terminal is allowed to access the target node. In some aspects a source node may prepare several target nodes for potential handover in the event confusion is detected or likely. Here, the source node may send information relating to the preparation of the potential target nodes to the access terminal whereby the access terminal uses the handover preparation information to initiate a handover at that target node. | 12-24-2009 |
20090316655 | ACCESS TERMINAL ASSISTED NODE IDENTIFIER CONFUSION RESOLUTION - Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects a network may provide a time gap (e.g., an asynchronous time gap) during which an access terminal may temporarily cease monitoring transmissions from a source node so that the access terminal may acquire a unique identifier from a target node. In some aspects an access terminal may commence handover operations at a target node after determining whether the access terminal is allowed to access the target node. In some aspects a source node may prepare several target nodes for potential handover in the event confusion is detected or likely. Here, the source node may send information relating to the preparation of the potential target nodes to the access terminal whereby the access terminal uses the handover preparation information to initiate a handover at that target node. | 12-24-2009 |
20090316657 | CONCENTRATOR FOR MULTIPLEXING ACCESS POINT TO WIRELESS NETWORK CONNECTIONS - Systems and methodologies are described that facilitate multiplexing communications from multiple downstream access points to one or more mobility management entities (MME). In particular, a concentrator component is provided that can establish a single transport layer connection with an MME along with multiple application layer connections over the single transport layer connection for each of multiple downstream access points and/or related mobile devices. The downstream access points and/or mobile devices can provide identifiers to the concentrator component, which can utilize the identifiers to track communications with the MME. In this regard, the MME can additionally include identifiers received from the concentrator component in subsequent communications to facilitate identifying the appropriate downstream access point and/or mobile device. | 12-24-2009 |
20100008235 | REPORTING AND RESOLVING CONFLICTING USE OF A NODE IDENTIFIER - Conflicting use of a node identifier in a wireless network is reported and resolved. In some aspects, a wireless node receives wireless signals and determines, based on those signals, that more than one node uses the same node identifier. The wireless node may then report the conflicting use to a network node. Here, the wireless node may delay for a period of time before reporting the conflicting use. In some aspects, an access point that discovers a conflicting use (e.g., based on a received signal that indicates that another access point is using that same node identifier) may report the conflicting use and/or elect to use a different node identifier. In some aspects, a stateful procedure is used to resolve a conflicting use where, upon identification of a conflicting use, an access point negotiates with another access point to cause one of these access points to use a different node identifier. In some aspects, a stateless procedure is used to resolve a conflicting use where, upon identification of a conflicting use, an access point delays for a period of time before determining whether a different node identifier is to be used at one of the nodes. | 01-14-2010 |
20100029274 | SYSTEM AND METHOD FOR CELL SEARCH AND SELECTION IN A WIRELESS COMMUNICATION SYSTEM - Systems and methodologies are described herein that facilitate improved cell search and selection in a wireless communication system. For example, a terminal as described herein can utilize one or more Closed Subscriber Group (CSG)-specific offset and/or hysteresis parameters as described herein to increase the amount of time on which the terminal is allowed to camp on a desirable cell. Additionally, specialized reselection timing can be employed as described herein to increase a delay associated with selecting a Home Node B (HNB) or Home Evolved Node B (HeNB) cell, thereby reducing power consumption associated with rapid cell reselection operations in a densely populated network environment. Further, a two-step reselection process can be performed as described herein in the context of selecting a frequency for cell reselection, thereby mitigating the effects of rapid reselection between cells and/or frequencies due to CSG cell prioritization. | 02-04-2010 |
20100035615 | INTRA-FREQUENCY CELL RESELECTION RESTRICTION IN WIRELESS COMMUNICATIONS - Systems and methodologies are described that facilitate utilizing reselection indicators in reselecting access points in wireless communications. In particular, an indicator can be provided relating to a restricted association access point that specifies whether intra-frequency reselection is allowed. If so, a mobile device receiving the indicator can reselect to other access points, to which it has access, operating in a similar frequency. If not, the mobile device can evaluate access points in other frequencies so as not to cause substantial interference to the restricted association access point. In addition, a predicted level of interference caused by communicating with an intra-frequency access point can be computed and evaluated to override the reselection indicator, in some cases. Thus, a restricted association access point can control reselection for some devices to mitigate interference while allowing the devices to override prohibitive restricted access points. | 02-11-2010 |
20100046418 | RELAY ARCHITECTURE FRAMEWORK - Systems and methodologies are described that facilitate providing relay nodes in wireless networks. In particular, cluster nodes, which can be regular eNBs, can provide wireless network access to the relay nodes over a backhaul link, and the relay nodes can offer access to devices or other relay nodes to expand network coverage and/or provide increased throughput. User equipment (UE) relays can function as UEs according to a cluster node such that UE relays receive network addressing and can tunnel communications through the cluster node using the backhaul link. Cell relays can function as a cell of the cluster node, such that transport layer communications terminate at the cluster node. In this regard, cell relays can define transport layers to use in communicating with the cluster nodes over the backhaul and with other devices over a provided access link. | 02-25-2010 |
20100069062 | WIRELESS COMMUNICATION PAGING AND REGISTRATION UTILIZING MULTIPLE TYPES OF NODE IDENTIFIERS - Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service. | 03-18-2010 |
20100103845 | CELL RELAY MOBILITY PROCEDURES - Systems and methodologies are described that facilitate performing intra-cluster and inter-cluster reselection for relay eNBs. In intra-cluster reselection, a relay eNB can reselect a disparate relay eNB and indicate its identifier in a bearer list update message. The disparate relay eNB and upstream eNBs (including the donor eNB) can update routing tables based at least in part on the identifier. In addition, the relay eNB can provide identifiers of downstream relay eNBs to facilitate updating routing tables for those identifiers as well. In an inter-cluster reselection, relay eNBs can release connection to downstream relay eNBs and re-attach to a wireless network to receive an identifier from a new donor eNB in the new cluster. Alternatively, the relay eNB can request an identifier from the donor eNB during reselection, notify downstream relay eNBs of the reselection, and/or request identifiers for one or more downstream relay eNBs. | 04-29-2010 |
20100103857 | CELL RELAY NETWORK ATTACHMENT PROCEDURES - Systems and methodologies are described that facilitate attaching cell relays to a wireless network. During the attachment procedure, a relay eNB can request assignment of an identifier, or a portion thereof, from a donor eNB for subsequent packet routing to the relay eNB. This can occur through one or more intermediary relay eNBs, where present. Donor eNB can assign an identifier or portion thereof (or confirm/deny an explicit identifier request from the relay eNB) and can forward establishment information downstream to the relay eNB. Donor eNB and intermediary relay eNBs, where present, can store the identifier for subsequent use in routing packets to the relay eNB. The identifier can be a terminal endpoint identifier (TEID) utilized in a tunneling protocol, a relay identifier utilized in a relay protocol, and/or the like. | 04-29-2010 |
20100103861 | CELL RELAY PACKET ROUTING - Systems and methodologies are described that facilitate packet routing among relay eNBs in a wireless network. A donor eNB can create at least a portion of a tunnel endpoint identifier (TEID) for a relay eNB communicating with a UE or other device. In addition, the relay eNB communicating with the UE can create a portion of the TEID. Upon receiving packets with a TEID, the donor eNB can route the packets to downstream eNBs based on the portion of the TEID that it created. Other downstream eNBs can continue to route packets to next hop eNBs based on the portion of the TEID created by the donor eNB or the downstream eNBs themselves. The relay eNB communicating with the UE can route packets to the UE based on the portion of the TEID it created and/or the portion created by the donor eNB. | 04-29-2010 |
20100103862 | DEVICE ATTACHMENT AND BEARER ACTIVATION USING CELL RELAYS - Systems and methodologies are described that facilitate assigning TEIDs, or portions thereof, to UEs or other devices during network attachment and/or dedicated bearer activation using one or more cell relays. Relay eNBs can request bearer establishment from a UE, which can be based on receiving an attach accept from an upstream node during attachment for the UE, receiving a bearer setup request from the upstream node, and/or the like. Once a bearer establishment response is received from the UE, the relay eNBs can store a TEID relating to the bearer. This can be a TEID that is at least partially received in the attach accept or bearer setup message, generated for the UE upon receiving the bearer establishment response, and/or the like. The TEID, or portion thereof, can be utilized for subsequent packet routing to the UE through one or more cell relays. | 04-29-2010 |
20100103863 | BEARER QoS MAPPING FOR CELL RELAYS - Systems and methodologies are described that facilitate mapping multiple evolved packet system (EPS) bearers to a single relay eNB radio bearer. In particular, an upstream eNB can select a radio bearer of a downstream eNB for association to an EPS bearer; the selection can be based on a best effort match or substantially any logic. The upstream eNB can store an association between the radio bearer and EPS bearer for subsequent downstream packet routing. The upstream eNB can also provide an indication of the selected radio bearer to the downstream relay eNB to facilitate upstream packet routing therefrom. The upstream eNB can alternatively select the radio bearer of the downstream eNB for association to the EPS bearer based on a quality of service (QoS) class identifier (QCI) of the EPS bearer. | 04-29-2010 |
20100103864 | CELL RELAY PROTOCOL - Systems and methodologies are described that facilitate providing a relay protocol to facilitate communicating upper layer protocol data among relay and donor nodes. In particular, a donor node can create a relay protocol packet upon receiving data for a relay node from a core network. Donor node can indicate an assigned relay identifier in the relay protocol packet header to facilitate routing the packet among related downstream relay nodes to arrive at the appropriate relay node, which can process the upper layer protocol data. In addition, a relay node can formulate a relay protocol packet for communication to a donor node through zero or more intermediary upstream relay nodes. Similarly, the relay node can insert the assigned relay identifier in the header to allow the donor node to associate response or related packets from the core network with the relay node. | 04-29-2010 |
20100103865 | HEADER COMPRESSION FOR CELL RELAY COMMUNICATIONS - Systems and methodologies are described that facilitate compressing packet headers for cell relay communications. Since cell relays can support a number of evolved packet system (EPS) bearers over a given dedicated radio bearer (DRB), robust header compression (RoHC) can be multiplexed for communications to/from a given cell relay. Thus, an upstream node compressing one or more packet headers can indicate a RoHC context, which can be represented by a RoHC context identifier in a RoHC header. A receiving entity can decompress the headers based on determining the RoHC context. Alternatively, the RoHC context can be associated with an identifier of a related UE bearer such as a tunnel endpoint identifier (TEID), a relay identifier, and/or the like, that is received in a tunneling protocol header to facilitate packet routing. | 04-29-2010 |
20100110987 | SELECTION OF WIRELESS NETWORK IN CONJUNCTION WITH SELECTION OF A WIRELESS CELL SET - An access terminal may switch to a different mode of wireless network selection as a result of manual selection of a wireless cell set (e.g., a closed subscriber group) associated with one or more wireless cells. For example, if the user of an access terminal selects a closed subscriber group in a wireless network that is different than the current wireless network, the access terminal may enter a manual mode of wireless network selection, select the wireless network corresponding to the closed subscriber group, and register on a closed subscriber group cell in the selected wireless network. In addition, an access terminal may automatically switch to a different mode of wireless network selection (e.g., the prior mode) upon losing coverage of a wireless cell set. An access terminal may also automatically select a cell of a wireless cell set if the access terminal returns to a cell of the cell set within a defined period of time after losing coverage of the cell set. Furthermore, an access terminal may return to a prior wireless network upon losing coverage of a wireless cell set. | 05-06-2010 |
20100112980 | SUPPORT FOR MULTIPLE ACCESS MODES FOR HOME BASE STATIONS - Systems and methodologies are described that facilitate supporting multiple access modes for a base station in a wireless communication environment. The base station can leverage hybrid, closed, or open access mode. A whitelist of a mobile device that successfully registers on the base station can be selectively updated to include a CSG ID of the base station. For example, the CSG ID of the base station can be added to the whitelist when the base station operates in closed access mode, while adding the CSG ID can be skipped when the base station operates in hybrid access mode. According to another example, the CSG ID can be selectively added based upon a received accept cause value. Additionally or alternatively, a CSG ID and an access mode indicator can be transmitted from a base station to a network node for implementing access control and/or paging optimization at the network node. | 05-06-2010 |
20100113020 | SWITCHING WIRELESS NETWORK SELECTION MODES IN CONJUNCTION WITH SELECTION OF A WIRELESS CELL SET - An access terminal may switch to a different mode of wireless network selection as a result of manual selection of a wireless cell set (e.g., a closed subscriber group) associated with one or more wireless cells. For example, if the user of an access terminal selects a closed subscriber group in a wireless network that is different than the current wireless network, the access terminal may enter a manual mode of wireless network selection, select the wireless network corresponding to the closed subscriber group, and register on a closed subscriber group cell in the selected wireless network. In addition, an access terminal may automatically switch to a different mode of wireless network selection (e.g., the prior mode) upon losing coverage of a wireless cell set. An access terminal may also automatically select a cell of a wireless cell set if the access terminal returns to a cell of the cell set within a defined period of time after losing coverage of the cell set. Furthermore, an access terminal may return to a prior wireless network upon losing coverage of a wireless cell set. | 05-06-2010 |
20100157850 | IN-BAND PROVISIONING FOR A CLOSED SUBSCRIBER GROUP - In-band provisioning enables subscribers to manually provision themselves via an access point at which the subscribers would not otherwise be allowed access. For example, a subscriber may be temporarily accepted by a restricted access point (e.g., an access point that belongs to a closed subscriber group). The subscriber is then given limited access to enable the subscriber to be provisioned at the access point. For example, the subscriber may be provisioned for full access at the access point if the subscriber presents a valid authorization credential to a provisioning entity. | 06-24-2010 |
20100157943 | ACCESS POINT HANDOVER CONTROL BASED ON CLOSED SUBSCRIBER GROUP SUBSCRIPTION INFORMATION - One or more nodes in a network provide access control for an in-bound handover of an access terminal to a closed subscriber group. For example, at least one of a source access point, a network node, or a target access point may determine whether handover is allowed based on whether a closed subscriber group identifier of the target access point is listed in closed subscriber group subscription information for the access terminal. | 06-24-2010 |
20100157944 | HANDOVER CONTROL BASED ON CLOSED SUBSCRIBER GROUP SUBSCRIPTION INFORMATION - One or more nodes in a network provide access control for an in-bound handover of an access terminal to a closed subscriber group. For example, at least one of a source access point, a network node, or a target access point may determine whether handover is allowed based on whether a closed subscriber group identifier of the target access point is listed in closed subscriber group subscription information for the access terminal. | 06-24-2010 |
20100159899 | IN-BAND PROVISIONING FOR A CLOSED SUBSCRIBER GROUP - In-band provisioning enables subscribers to manually provision themselves via an access point at which the subscribers would not otherwise be allowed access. For example, a subscriber may be temporarily accepted by a restricted access point (e.g., an access point that belongs to a closed subscriber group). The subscriber is then given limited access to enable the subscriber to be provisioned at the access point. For example, the subscriber may be provisioned for full access at the access point if the subscriber presents a valid authorization credential to a provisioning entity. | 06-24-2010 |
20100161794 | MAINTAINING CLOSED SUBSCRIBER GROUP INFORMATION FOR ACCESS CONTROL - Information is maintained to assist in determining whether an access terminal is allowed to establish communication with an access point associated with a closed subscriber group (CSG). For example, CSG subscription information for visiting access terminals may be maintained at a local server. In this way, a network may use the locally stored CSG subscription information for a given access terminal to determine whether to allow that access terminal to access an access point in the network. In addition, multiple CSG lists may be maintained at an access terminal. For example, an access terminal may maintain a first list that is updateable by an operator and a second list that is updateable by a user. Here, the updating of one list may be based on a change in the other list. | 06-24-2010 |
20100173626 | ADAPTATION OF HANDOVER PARAMETERS - Handover parameter settings are automatically adapted in access points in a system to improve handover performance. Reactive detection techniques are employed for identifying different types of handover-related failures and adapting handover parameters based on this detection. Messaging schemes are also employed for providing handover-related information to access points. Proactive detection techniques also may be used for identifying conditions that may lead to handover-related failures and then adapting handover parameters in an attempt to prevent such handover-related failures. Ping-ponging may be mitigated by adapting handover parameters based on analysis of access terminal visited cell history acquired by access points in the system. In addition, configurable parameters (e.g., timer values) may be used to detect handover-related failures. | 07-08-2010 |
20100173633 | HANDOVER FAILURE MESSAGING SCHEMES - Handover parameter settings are automatically adapted in access points in a system to improve handover performance. Reactive detection techniques are employed for identifying different types of handover-related failures and adapting handover parameters based on this detection. Messaging schemes are also employed for providing handover-related information to access points. Proactive detection techniques also may be used for identifying conditions that may lead to handover-related failures and then adapting handover parameters in an attempt to prevent such handover-related failures. Ping-ponging may be mitigated by adapting handover parameters based on analysis of access terminal visited cell history acquired by access points in the system. In addition, configurable parameters (e.g., timer values) may be used to detect handover-related failures. | 07-08-2010 |
20100195573 | SELECTIVELY INCLUDING ALLOWED CSG LIST IN PAGE MESSAGE - Problems caused by interaction between paging optimization and synchronizing CSG information are mitigated by setting a network indication indicating, for example, that a subscriber is no longer a member of a CSG, but the network has not yet received confirmation that an access terminal associated with the subscriber has been informed of this. A timer-based scheme may be employed for removing a CSG ID from the subscriber information for a subscriber once it is determined that the subscriber is no longer a member of the CSG. In addition, a temporary member of a CSG may determine whether it is still a member of a CSG upon expiration of a CSG timer. Also, the frequency with which an access terminal registers may be changed based on various criteria. Furthermore, an allowed CSG list may be selectively included in a page message depending on the destination of the page message. | 08-05-2010 |
20100197285 | CSG MEMBERSHIP INDICATION - Problems caused by interaction between paging optimization and synchronizing CSG information are mitigated by setting a network indication indicating, for example, that a subscriber is no longer a member of a CSG, but the network has not yet received confirmation that an access terminal associated with the subscriber has been informed of this. A timer-based scheme may be employed for removing a CSG ID from the subscriber information for a subscriber once it is determined that the subscriber is no longer a member of the CSG. In addition, a temporary member of a CSG may determine whether it is still a member of a CSG upon expiration of a CSG timer. Also, the frequency with which an access terminal registers may be changed based on various criteria. Furthermore, an allowed CSG list may be selectively included in a page message depending on the destination of the page message. | 08-05-2010 |
20100197307 | ACCESS CONTROL FOR ACCESS TERMINALS - Problems caused by interaction between paging optimization and synchronizing CSG information are mitigated by setting a network indication indicating, for example, that a subscriber is no longer a member of a CSG, but the network has not yet received confirmation that an access terminal associated with the subscriber has been informed of this. A timer-based scheme may be employed for removing a CSG ID from the subscriber information for a subscriber once it is determined that the subscriber is no longer a member of the CSG. In addition, a temporary member of a CSG may determine whether it is still a member of a CSG upon expiration of a CSG timer. Also, the frequency with which an access terminal registers may be changed based on various criteria. Furthermore, an allowed CSG list may be selectively included in a page message depending on the destination of the page message. | 08-05-2010 |
20100203865 | MANAGING ACCESS CONTROL TO CLOSED SUBSCRIBER GROUPS - Systems and methodologies are described that facilitate managing access control to Closed Subscriber Groups (CSGs) in a wireless communication environment. A user equipment (UE) can store an operator CSG list, which can be read only and controlled by an operator. Further, the operator CSG list can lack synchronization to a CSG subscription for the UE retained in the network. Thus, upon selecting to access a CSG cell associated with a CSG with a corresponding CSG Identifier (ID) included in the operator CSG list of the UE, a reject message that indicates that the UE lacks authorization for the CSG can be received. Moreover, the CSG ID can be stored as a forbidden CSG ID of the UE in a set of forbidden CSG IDs in response to receipt of the reject message when the CSG ID is included in the operator CSG list. | 08-12-2010 |
20130107702 | PROVIDING MULTIPLE LEVELS OF SERVICE FOR WIRELESS COMMUNICATION | 05-02-2013 |
20130294327 | CHARGING OVER A USER-DEPLOYED RELAY - Network entities in a wireless network cooperate to account and charge for data communicated over the wireless network. Accounting and charging enable the network entities to properly allocate charges to a second user equipment that communicates through a first user equipment, which acts as a relay in the wireless network. A network entity receives a request from the first user equipment related to a packet data network connection relating to the second user equipment. The network entity establishes or modifies a connection between a gateway and the first user equipment in response to the request. Charges for the data may be allocated to the second user equipment for data communicated with the identifier of the second user equipment. | 11-07-2013 |
20140016537 | ASSOCIATING TERMINAL USER EQUIPMENT WITH USER EQUIPMENT RELAYS - An operational characteristic of a relay is determined. The relay is a user equipment (UE) serving as an eNB. The operational characteristic includes one or more of a quality of a relay backhaul and a capacity of the relay backhaul. The relay backhaul includes a communications link between the relay and an eNB. A determination of whether to perform a handover of a UE is made based on the operational characteristic of the relay and a corresponding operational characteristic of the eNB. | 01-16-2014 |
20140016542 | DEVICE MOBILITY FOR SPLIT-CELL RELAY NETWORKS - Systems and methodologies are described that facilitate supporting mobility for UEs and relay eNBs in split-cell relay configurations. Parameters regarding communicating with one or more UEs can be provided to disparate eNBs from a donor eNB to provide mobility for one or more of the UEs or a serving relay eNB. In addition, a donor eNB can request establishment of one or more radio bearers at a target relay eNB for continuing communications with one or more UEs. Moreover, a donor eNB can provide information regarding one or more core network bearers to a target donor eNB to facilitate establishing the core network bearers at the target donor eNB for communicating with the one or more UEs. Furthermore, uplink buffer contents from a relay eNB can be provided to a target donor eNB so communications from the one or more UEs can be continued by the target donor eNB. | 01-16-2014 |
20140064068 | INTERACTIONS BETWEEN RAN-BASED AND LEGACY WLAN MOBILITY - Interactions between radio access network (RAN)-based and legacy wireless local area network (WLAN) mobility is described in which a multi-mode mobile device receives a management indication from a wide area wireless network (WWAN) to manage connectivity with the WLAN, such as in discovery, association, or specific traffic offload for the WLAN. The mobile device obtains a status of its internal WLAN radio and determines whether to process the management indication based on the status. Data offloading is also described in which the mobile device receives an indication from the WWAN to offload data to the WLAN associated with the mobile device. In response, the mobile device suspends application of a current offload policy, which had been received from the core network, based on the indication and transmits its data according to the indication. | 03-06-2014 |
20140334415 | SHORT-TERM INTERFERENCE MITIGATION IN A WIRELESS COMMUNICATION SYSTEM - Techniques for transmitting data with short-term interference mitigation in a wireless communication system are described. In one design, a serving base station may send a message to a terminal to trigger short-term interference mitigation. In response, the terminal may send a message to request at least one interfering base station to reduce interference on at least one resource. Each interfering base station may determine a transmit power level to be used for the at least one resource and may send a pilot at this transmit power level. The terminal may estimate the channel quality of the at least one resource based on at least one pilot received from the at least one interfering base station. The terminal may send information indicative of the estimated channel quality to the serving base station. The serving base station may send a data transmission on the at least one resource to the terminal. | 11-13-2014 |
20150029930 | UTILIZING BROADCAST SIGNALS TO CONVEY RESTRICTED ASSOCIATION INFORMATION - Systems and methodologies are described that facilitate transmitting access point types and/or restricted association parameters using broadcast signals, such as beacons, pilot signals, etc. The type or restricted association information can be indicated by one or more intrinsic aspects of the signal, such as specified parameters. In addition, the type or information can be indicated by one or more extrinsic signal aspects, such as frequency, interval, periodicity, etc. Using this information, a mobile device can determine whether an access point implements restricted association. If so, the mobile device can request an access point or related group identifier before determining whether to establish connection therewith. The identifier can be verified against a list of accessible access points and/or groups to make the determination. | 01-29-2015 |