Patent application number | Description | Published |
20080240151 | POWER CONTROL IN ORTHOGONAL SUB-CHANNELS IN WIRELESS COMMUNICATIONS - A method and apparatus for power control in a wireless communication involves establishing at least two orthogonal sub-channels within a channel for communication and controlling transmitted power in each sub-channel independently. | 10-02-2008 |
20080267114 | HOME (e)NODE-B WITH NEW FUNCTIONALITY - A wireless communication device is configured as an in-home node-B (H(e)NB). The H(e)NB is configured to perform a locking function to control modification of carrier and user controlled parameters, and also configured to detect a change in location. | 10-30-2008 |
20080274698 | METHOD AND APPARATUS FOR INDICATING A TEMPORARY BLOCK FLOW TO WHICH A PIGGYBACKED ACK/NACK FIELD IS ADDRESSED - A method and an apparatus for indicating a temporary block flow (TBF) to which a piggybacked acknowledgement/non-acknowledgement (PAN) field is addressed. A method and apparatus of performing receive processing to reduce the probability of false acceptance of erroneous PANs are also disclosed. A transmit station generates a PAN check sequence (PCS) and performs a channel coding on a PAN field and the PCS. The transmit station scrambles the encoded bits of the PAN field and the PCS with a TBF-specific scrambling code. Because of the scrambling, the PCS decoding at a receive station will pass if the data block is received by an intended receive station, while the PCS decoding will fail if received by a non-intended receive station. Alternatively, the scrambling may be performed before the channel coding. Alternatively, the transmit station may combine the PAN field and a temporary flow identity (TFI) to generate a PCS. | 11-06-2008 |
20080279211 | METHOD AND APPARATUS FOR PROVIDING PIGGYBACKED POSITIVE ACKNOWLEDGEMENT/NEGATIVE ACKNOWLEDGEMENT FIELD INDICATOR AND A POLLING INDICATOR - A method and apparatus of providing a piggybacked positive acknowledgement/negative acknowledgement (ACK/NACK) (PAN) field indicator (PANI) and a polling indicator are disclosed. A combined field of a PANI bit, a relative reserved block period (RRBP) bit and an EGPRS supplementary polling (ES/P) field may indicate a polling scheme and a presence of a PAN field. Alternatively, the presence of the PAN field in the data block may be indicated by using a specific training sequence. Alternatively, a forward error correction (FEC) coding may be performed on the data block including the header, and the presence of the PAN field may be indicated by scrambling the encoded bits corresponding the header with a specific scrambling sequence. Alternatively, a header check sequence (HCS) may be generated and the presence of the PAN field is indicated by mixing a predetermined sequence with the HCS. | 11-13-2008 |
20080285506 | METHOD AND APPARATUS FOR INDICATING A TEMPORARY BLOCK FLOW TO WHICH A PIGGYBACKED ACKNOWLEDGEMENT/NON-ACKNOWLEDGEMENT FIELD IS ADDRESSED - A method and apparatus for indicating a temporary block flow (TBF) to which a piggybacked acknowledgement/non-acknowledgement (PAN) field is addressed. A PAN check sequence (PCS) is created, for example using a cyclic redundancy check (CRC) encoding. The PCS is masked with a temporary flow identity (TFI) assigned to a TBF or a mask generated based on the TFI. A data block including the PAN field and the masked PCS is then processed for transmission. The mask may be generated by converting the TFI using an (M, N) code, M being not greater than the number of bits of the PCS and N being the number of bits of the TFI. With this scheme, a TFI may be transmitted in a PAN field without using explicit bits to identify the TBF. | 11-20-2008 |
20080307284 | METHOD AND APPARATUS FOR INDICATING A TEMPORARY BLOCK FLOW TO WHICH A PIGGYBACKED ACK/NACK FIELD IS ADDRESSED - A method and apparatus for indicating a temporary block flow (TBF) to which a piggybacked acknowledgement/non-acknowledgement (PAN) field is addressed are disclosed. A sequence may be generated from a temporary flow identity (TFI) to which the PAN field is addressed and masked with a PAN check sequence (PCS). A radio block including a PAN field and a masked PCS is transmitted. The PCS may be masked with one of TFIs which is selected in accordance with a rule pre-agreed. A secondary identifier may indicate a TBF to which the PAN field is addressed. A special value may be used to represent all TBFs assigned and a secondary identifier may indicate a TBF to which the PAN field is addressed. A special value on the PAN field may be used for control purposes for indicating an action affecting a group of receiving stations listening to the radio block. | 12-11-2008 |
20080310388 | TRANSMISSION OF RADIO BLOCKS IN REDUCED TRANSMISSION TIME INTERVAL MODE - A method and apparatus for operating a wireless transmit receive unit (WTRU) in basic transmission time interval (BTTI) and reduced transmission time interval (RTTI) mode includes a WTRU in RTTI mode and a WTRU in BTTI mode receiving a plurality of coded radio blocks, the WTRU in RTTI mode decoding all of the plurality of coded radio blocks and the WTRU is in BTTI mode decoding a portion of the plurality of coded radio blocks. | 12-18-2008 |
20090022137 | SIGNALING IN A WIRELESS COMMUNICATION SYSTEM - A method of operating a wireless transmit receive unit (WTRU) and a WTRU configured to receive a radio link control (RLC)/a medium access control (MAC) header. The header is coded for reduced transmission time interval (RTTI) operation. The header includes a 16-bit cyclic redundancy check (CRC) of an RLC/MAC payload associated with the RLC/MAC header. | 01-22-2009 |
20090052378 | METHOD AND APPARATUS FOR RELIABLY TRANSMITTING RADIO BLOCKS WITH PIGGYBACKED ACK/NACK FIELDS - Piggybacked acknowledgement/non-acknowledgement (PAN) bits in unreliable bit positions of a modulated symbol are swapped with data bits located in more reliable bit positions. In addition, a power offset value may be applied to the symbols containing the PAN bits. | 02-26-2009 |
20090054094 | METHOD FOR IDENTIFYING A CODE GROUP REPRESENTATIVE OF A NUMBER OF BASE STATIONS - A method and apparatus for identifying a code group representative of a predetermined number of base stations is disclosed. A chip offset within a frame is input into a first correlator. A plurality of samples of chips at which a primary synchronization code (PSC) has been detected are input into the first correlator. Output of the first correlator is multiplied by the complex conjugate of the PSC to obtain a magnitude for the signals being transmitted at the chips inputted into the first correlator. The magnitude is summed over four frames. The summed signals view of a predetermined set of decision variables is evaluated. A case number, a code group, a timeslot location, and a system frame number are determined based on the evaluation and noise estimation. | 02-26-2009 |
20090080565 | PULSE SHAPING FOR EGPRS-2 - A method and apparatus are disclosed for wireless transmission using two or more pulse shaping filters. Wireless transmit/receive units (WTRUs) and network entities are capable of utilizing a narrow band pulse shaping filter, a wideband pulse shaping filter, or both. The network entity and/or the WTRU select a pulse shaping filter to be used and transmits the selection by means of signaling. The signaling may be performed through layer | 03-26-2009 |
20090086685 | METHOD AND APPARATUS FOR TIME-BASED FAST ACK/NACK RESPONSE OPERATION WITH ENHANCED GENERAL PACKET RADIO SERVICE 2 UPLINK - A method and apparatus for time-based fast positive acknowledgement (ACK)/negative acknowledgement (NACK) reporting (FANR) operation with enhanced general packet radio service 2 uplink (HUGE) are disclosed. A wireless transmit/receive unit (WTRU) configures downlink FANR operation and EGPRS-2 mode uplink transmission not to be in conflict. A modulation and coding scheme (MCS) for the EGPRS-2 mode may be limited to an MCS containing at most two RLC data blocks. Alternatively, three or more piggybacked ACK/NACK (PAN) bits may be used for a time-based FANR operation if an EGPRS-2 mode is configured. Alternatively, at least one PAN bit may indicate an ACK/NACK for a group of RLC data blocks. The number of PAN bits for a time-based FANR operation may be configured by the network. The downlink FANR operation may be dynamically switched between time-based and SSN-based. | 04-02-2009 |
20090086686 | METHOD TO SIMPLIFY UPLINK STATE FLAG (USF) DECODING COMPLEXITY FOR REDHOT A AND B WIRELESS TRANSMIT/RECEIVE UNITS - A method and apparatus allow for reliable and low-complexity decoding of EGPRS2 communication bursts when RTTI and BTTI equipment operate on the same timeslot(s). Various configurations for the Uplink State Flag (USF) mapping employ adjustable bit swapping of some or all USF channel-coded bits in communication bursts. Configurations that allow for an adjustable use of the symbol mapping stage in the transmitter and receiver to allow for more throughput and/or reduced complexity are also disclosed. Admissible mapping rules are known to the receiver and transmitter and therefore reduce the complexity of decoding this information. In order to increase throughput for EGPRS2 communication bursts, RTTI transmissions of different modulation types or EGPRS/EGPRS2 modulation and coding schemes during a BTTI interval are introduced that allow for reliable USF decoding and reduced decoder complexity. | 04-02-2009 |
20090135773 | MEASUREMENT REPORTING FOR TRANSMISSIONS SUPPORTING LATENCY REDUCTION - A method for accounting for the presence of a piggybacked acknowledgement/negative acknowledgement (PAN) field in reporting a received signal quality for a current wireless transmit/receive unit (WTRU) is disclosed. A determination is made whether a received radio block is intended for the current WTRU. The received signal quality of the radio block is measured if the radio block is intended for the current WTRU. Bits from the PAN field are included in determining the received signal quality of the radio block based on a preconfigured option. The radio block measurement is included in a measurement report if a data header of the radio block is not addressed to the current WTRU but the PAN field is addressed to the current WTRU. | 05-28-2009 |
20090141782 | VOICE AND DATA COMMUNICATION SERVICES USING ORTHOGONAL SUB-CHANNELS - A method for using orthogonal sub-channels (OSCs) in a wireless transmit/receive unit (WTRU). A capability report is received from the WTRU, including an indication whether the WTRU supports OSCs. A determination is made whether to use OSCs for the WTRU and the result of the determination is signaled to the WTRU. If OSCs are used with the WTRU, the signaling includes an OSC assignment for the WTRU. In one embodiment, two resources are assigned to the WTRU and each resource is assigned to a different OSC. | 06-04-2009 |
20090163158 | SUPPORT OF DOWNLINK DUAL CARRIERS AND OTHER FEATURES OF EVOLVED GERAN NETWORKS - A wireless transmit receive unit (WTRU) configured to indicate REDHOT and HUGE multi-slot capability to a network. The REDHOT multi-slot capability is included in a MS Classmark | 06-25-2009 |
20090175214 | METHOD AND APPARATUS FOR COOPERATIVE WIRELESS COMMUNICATIONS - A method and apparatus for cooperation in wireless communications. Cooperation is considered among a number of network elements, including at least one wireless transmit-receive unit, at least one relay station, and at least one base station. | 07-09-2009 |
20090238145 | METHOD AND APPARATUS FOR WIRELESS COMMUNICATION WITH LOW-OVERHEAD MOBILITY MANAGEMENT - A method and apparatus for supporting handover of mobile communications is provided. A router performs routing services in a service area. The router maintains a location table configured to store current router addresses of mobile nodes that have the router as a home router. The router receives data intended for mobile nodes that are listed in the location table and are in the routers service area. The router receives a user datagram protocol (UDP) message from a mobile node when it leaves the service area. The UDP message includes an IP address of a new router in the mobile node's new service area. The router updates the location table with the new IP address and transmits data intended for the mobile node to the new router until the data is redirected at the source. | 09-24-2009 |
20090303967 | USER EQUIPMENT (UE) ASSISTED SYSTEM DATABASE UPDATE - A wireless communication system includes a base station that receives information regarding neighboring wireless systems and updates and stores this information for use in handover of user equipments (UEs). | 12-10-2009 |
20100003977 | METHOD AND APPARATUS FOR USE IN COOPERATIVE RELAYS USING INCREMENTAL REDUNDANCY AND DISTRIBUTED SPATIAL MULTIPLEXING - A method and apparatus are used in cooperative relays with incremental redundancy (IR) and distributed spatial multiplexing. A wireless transmit/receive unit (WTRU) may listen to the base station (BS) transmission during Phase 1 of the communication, and use cooperation between a relay station (RS) and the BS for the data transmission during Phase 2 to improve performance. During Phase 2, both the BS and the RS may transmit data to the WTRU, using either distributed Space Time Block Codes/Space Frequency Block Codes (STBC/SFBC) or distributed spatial multiplexing. | 01-07-2010 |
20100008283 | FRAME STRUCTURES TO SUPPORT MULTICAST COOPERATIVE RELAY SCHEMES - A plurality of time frame structures that support the use of multicast cooperative relay schemes are disclosed. These time frame structures are used in IEEE 802.16j networks as well as other wireless networks. Furthermore, modifications to the frame structures used in IEEE 802.16j networks are disclosed. | 01-14-2010 |
20100008287 | SYSTEM LEVEL ARCHITECTURES FOR RELAYED UPLINK COMMUNICATION - A wireless communication method and apparatus are disclosed for assigning different phases, (i.e., time periods), to perform data transmissions over designated frequency bands in a cooperative relaying system. In phase 1, a relay station (RS) listens to a wireless transmit/receive unit (WTRU) and successfully receives b information bits. In phase 2, the RS and WTRU cooperatively transmit these b information bits to the destination. These transmissions may be performed in a unicast scheme, wherein a WTRU sends information to a selected RS in phase 1, and the RS forwards the information to a base station (BS) in phase 2. The transmission may also be performed in a multicast scheme, wherein the WTRU sends information to the RS and the BS in phase 1, and the RS transmits a subset the information to the BS in phase 2. | 01-14-2010 |
20100122085 | SYSTEM AND METHOD FOR PROVIDING VARIABLE SECURITY LEVEL IN A WIRELESS COMMUNICATION SYSTEM - A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone. | 05-13-2010 |
20100137017 | UPLINK POWER CONTROL FOR DISTRIBUTED WIRELESS COMMUNICATION - A method and apparatus for power control for distributed wireless communication is disclosed including one or more power control loops associated with a wireless transmit/receive unit (WTRU). Each power control loop may include open loop power control or closed loop power control. A multi-phase power control method is also disclosed with each phase representing a different time interval and a WTRU sends transmissions at different power levels to different set of node-Bs or relay stations during different phases to optimize communications. | 06-03-2010 |
20100162379 | UNSOLICITED COMMUNICATION MITIGATION - A method and apparatus for mitigating unwanted communication are disclosed. A request to establish communications is received at a first Protection Against Unsolicited Communications in Internet Protocol Multimedia Subsystem (PUC) server. The PUC server determines whether to block the communication. If the communication is blocked, the sender is informed and a record of the blocked communication may be stored. Alternatively, the communication may be delivered to a subsequent PUC server (along with appended information about the sender), the receiver or sent to storage. | 06-24-2010 |
20100296431 | METHOD AND APPARATUS FOR USING A RELAY TO PROVIDE PHYSICAL AND HYBRID AUTOMATIC REPEAT REQUEST FUNCTIONALITIES - Methods and apparatus are described for performing automatic repeat request (ARQ) and hybrid-ARQ (HARQ) assisted ARQ procedures in a relay-based wireless communication system. Triggers for radio link control (RLC)/ARQ retransmissions and RLC/ARQ status reporting are also described. | 11-25-2010 |
20100315989 | METHOD AND APPARATUS FOR COOPERATIVE RELAYING IN WIRELESS COMMUNICATIONS - A method and apparatus for cooperative relaying in wireless communications is provided. An efficient and simplified relay scheme is disclosed that transitions between different modes on a per packet basis using scheduling information or switching information included in the packet, without requiring link reconfiguration. The cooperative relay scheme benefits further from the use of cooperative relaying protocols that emphasize centralized scheduling. One protocol emphasizes physical layer cooperation via synchronized transmissions and distributed space-time coding and the other protocol emphasizes medium access control (MAC) layer cooperation using different MAC flows or messages. | 12-16-2010 |
20100318796 | METHOD AND SYSTEM FOR SECURING WIRELESS COMMUNICATIONS - A method for transmitting an encrypted signal to a wireless transmit/receive unit (WTRU) such that decryption of the encrypted signal depends on a trust zone associated with the WTRU is disclosed. The encryption may be performed using hierarchical modulation, scrambling, authentication, location validation, or a combination thereof. The size of a trust zone may also be adjusted. | 12-16-2010 |
20110161673 | METHOD AND APPARATUS FOR ENHANCING SECURITY OF WIRELESS COMMUNICATIONS - The present invention is related to a method and apparatus for enhancing security of communications. The apparatus comprises a security processing unit, a data processing unit, a cross-layer watermarking unit, and optionally a smart antenna processor. The security processing unit generates a token/key to be used in watermarking and sends a node security policy to other components. The data processing unit generates user data. The cross-layer watermarking unit includes at least one of Layer-2/3, Layer-1 and Layer-0. Each layer performs a different scheme or degree of watermarking. The cross-layer watermarking unit embeds the token/key into the user data transmission on at least one of the layers selectively in accordance with a security policy. | 06-30-2011 |
20110170488 | METHOD AND APPARATUS FOR PROVIDING PIGGYBACKED POSITIVE ACKNOWLEDGEMENT/NEGATIVE ACKNOWLEDGEMENT FIELD INDICATOR AND A POLLING INDICATOR - A method and apparatus of providing a piggybacked positive acknowledgement/negative acknowledgement (ACK/NACK) (PAN) field indicator (PANI) and a polling indicator are disclosed. A combined field of a PANI bit, a relative reserved block period (RRBP) bit and an EGPRS supplementary polling (ES/P) field may indicate a polling scheme and a presence of a PAN field. Alternatively, the presence of the PAN field in the data block may be indicated by using a specific training sequence. Alternatively, a forward error correction (FEC) coding may be performed on the data block including the header, and the presence of the PAN field may be indicated by scrambling the encoded bits corresponding the header with a specific scrambling sequence. Alternatively, a header check sequence (HCS) may be generated and the presence of the PAN field is indicated by mixing a predetermined sequence with the HCS. | 07-14-2011 |
20110216727 | VOICE AND DATA COMMUNICATION SERVICES USING ORTHOGONAL SUB-CHANNELS - A method for using orthogonal sub-channels (OSCs) in a wireless transmit/receive unit (WTRU). A capability report is received from the WTRU, including an indication whether the WTRU supports OSCs. A determination is made whether to use OSCs for the WTRU and the result of the determination is signaled to the WTRU. If OSCs are used with the WTRU, the signaling includes an OSC assignment for the WTRU. In one embodiment, two resources are assigned to the WTRU and each resource is assigned to a different OSC. | 09-08-2011 |
20110228750 | Extended Local IP Access For A Converged Gateway In A Hybrid Network - The implementation of Local IP Access (LIPA), “Extended” LIPA (ELIPA), and Selected IP Traffic Offload (SIPTO) for the design of a “Converged Gateway” (CGW) are disclosed. The gateway system may provide various features such as femtocell access to local networks, public Internet, and private service provider networks. | 09-22-2011 |
20110252111 | METHOD AND APPARATUS FOR DATA PARCEL COMMUNICATION SYSTEMS - A device and method for registering devices on advanced networks as well as providing operative communications between a legacy device and a advanced network. The legacy device may contain data, such as sensor data, which is being collected on a network outside the communication range/abilities of the legacy device. An intermediary device may receive the data via a first communication scheme and send the device to a server collecting the data via a second communication scheme. | 10-13-2011 |
20110252241 | USING WATERMARKING TO REDUCE COMMUNICATION OVERHEAD - A method for reducing overhead when transmitting and receiving an Internet Protocol (IP) packet by a device begins with receiving of the IP packet by the device. In the packet, an IP address of the packet has been removed and replaced with a watermarking signature based on the IP address. The IP address is obtained using the watermarking signature. The IP address is attached to the packet and the packet is forwarded by the device to a destination over a network using the IP address. | 10-13-2011 |
20120047551 | Machine-To-Machine Gateway Architecture - Systems, methods, and instrumentalities are disclosed that provide for a gateway outside of a network domain to provide services to a plurality of devices. For example, the gateway may act as a management entity or as a proxy for the network domain. As a management entity, the gateway may perform a security function relating to each of the plurality of devices. The gateway may perform the security function without the network domain participating or having knowledge of the particular devices. As a proxy for the network, the gateway may receive a command from the network domain to perform a security function relating to each of a plurality of devices. The network may know the identity of each of the plurality of devices. The gateway may perform the security function for each of the plurality of devices and aggregate related information before sending the information to the network domain. | 02-23-2012 |
20120071168 | Bandwidth Management For A Converged Gateway In A Hybrid Network - Systems and methods for integrating bandwidth management (BWM) equipment into a network in order to manage the use of bandwidth over multiple radio access technologies (RATs) relating to communications between a wireless transmit receive unit and a mobile core network (MCN). When integrating itself into the network, a BWM server may be placed between a MCN and an femto access point. In order for WTRUs to communicate with the MCN through the femto access point and a BWM server, a BWM server may need deep packet inspection capabilities. | 03-22-2012 |
20120128158 | SYSTEM AND METHOD FOR PROVIDING VARIABLE SECURITY LEVEL IN A WIRELESS COMMUNICATION SYSTEM - A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone. | 05-24-2012 |
20120155394 | METHOD AND APPARATUS FOR INDICATING A TEMPORARY BLOCK FLOW TO WHICH A PIGGYBACKED ACKNOWLEDGEMENT/NON-ACKNOWLEDGEMENT FIELD IS ADDRESSED - A method and apparatus for indicating a temporary block flow (TBF) to which a piggybacked acknowledgement/non-acknowledgement (PAN) field is addressed. A PAN check sequence (PCS) is created, for example using a cyclic redundancy check (CRC) encoding. The PCS is masked with a temporary flow identity (TFI) assigned to a TBF or a mask generated based on the TFI. A data block including the PAN field and the masked PCS is then processed for transmission. The mask may be generated by converting the TFI using an (M, N) code, M being not greater than the number of bits of the PCS and N being the number of bits of the TFI. With this scheme, a TFI may be transmitted in a PAN field without using explicit bits to identify the TBF. | 06-21-2012 |
20120281834 | Generation of Perfectly Secret Keys in Wireless Communication Networks - A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification. | 11-08-2012 |
20120324100 | METHODS, SYSTEMS AND APPARATUS FOR MANAGING AND/OR ENFORCING POLICIES FOR MANAGING INTERNET PROTOCOL ("IP") TRAFFIC AMONG MULTIPLE ACCESSES OF A NETWORK - Methods, systems and apparatus for managing and/or enforcing one or more policies for managing internet protocol (“IP”) traffic among multiple accesses of a network in accordance with a policy for managing bandwidth among the multiple accesses are disclosed. Among the methods, systems and apparatus is a method that may include obtaining performance metrics associated with the multiple accesses. The method may also include adapting one or more rules of one or more the policies for managing IP traffic among the plurality of accesses based, at least in part, on the performance metrics and the policy for managing bandwidth among the plurality of accesses. The method may further include managing IP traffic associated with at least one wireless transmit and/or receive unit (“WTRU”) among the plurality of accesses responsive to the adapted rules. | 12-20-2012 |
20130021968 | METHOD AND APPARATUS FOR BANDWIDTH AGGREGATION FOR IP FLOW - A method and apparatus for bandwidth aggregation for an Internet protocol (IP) flow are disclosed. A sender may split IP packets on a single IP flow, and transmit the IP packets to a receiver via at least two interfaces. The sender splitting the IP packets over multiple interfaces may not send any signaling to the receiver. Alternatively, the sender may send information to the receiver for configuring distribution of the IP packets over multiple interfaces. The information may be carried on a binding update message, a binding acknowledgement message, or a binding refresh request message. The IP packets may be split and transmitted by a logical interface that sits between an IP layer and a layer | 01-24-2013 |
20130039210 | METHOD AND APPARATUS FOR INDICATING A TEMPORARY BLOCK FLOW TO WHICH A PIGGYBACKED ACK/NACK FIELD IS ADDRESSED - A method and an apparatus for indicating a temporary block flow (TBF) to which a piggybacked acknowledgement/non-acknowledgement (PAN) field is addressed. A method and apparatus of performing receive processing to reduce the probability of false acceptance of erroneous PANs are also disclosed. A transmit station generates a PAN check sequence (PCS) and performs a channel coding on a PAN field and the PCS. The transmit station scrambles the encoded bits of the PAN field and the PCS with a TBF-specific scrambling code. Because of the scrambling, the PCS decoding at a receive station will pass if the data block is received by an intended receive station, while the PCS decoding will fail if received by a non-intended receive station. Alternatively, the scrambling may be performed before the channel coding. Alternatively, the transmit station may combine the PAN field and a temporary flow identity (TFI) to generate a PCS. | 02-14-2013 |
20130094431 | METHOD AND APPARATUS FOR USING A RELAY TO PROVIDE PHYSICAL AND HYBRID AUTOMATIC REPEAT REQUEST FUNCTIONALITIES - Methods and apparatus are described for performing automatic repeat request (ARQ) and hybrid-ARQ (HARQ) assisted ARQ procedures in a relay-based wireless communication system. Triggers for radio link control (RLC)/ARQ retransmissions and RLC/ARQ status reporting are also described. | 04-18-2013 |
20130095878 | UPLINK POWER CONTROL FOR DISTRIBUTED WIRELESS COMMUNICATION - A method and apparatus for power control for distributed wireless communication is disclosed including one or more power control loops associated with a wireless transmit/receive unit (WTRU). Each power control loop may include open loop power control or closed loop power control. A multi-phase power control method is also disclosed with each phase representing a different time interval and a WTRU sends transmissions at different power levels to different set of node-Bs or relay stations during different phases to optimize communications. | 04-18-2013 |
20130129092 | SYSTEM AND METHOD FOR PROVIDING VARIABLE SECURITY LEVEL IN A WIRELESS COMMUNICATION SYSTEM - A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone. | 05-23-2013 |
20130142167 | METHOD AND APPARATUS FOR WIRELESS COMMUNICATION WITH LOW-OVERHEAD MOBILITY MANAGEMENT - A method and apparatus for supporting handover of mobile communications is provided. A router performs routing services in a service area. The router maintains a location table configured to store current router addresses of mobile nodes that have the router as a home router. The router receives data intended for mobile nodes that are listed in the location table and are in the routers service area. The router receives a user datagram protocol (UDP) message from a mobile node when it leaves the service area. The UDP message includes an IP address of a new router in the mobile node's new service area. The router updates the location table with the new IP address and transmits data intended for the mobile node to the new router until the data is redirected at the source. | 06-06-2013 |
20130217408 | LOCATION DETERMINATION OF INFRASTRUCTURE DEVICE AND TERMINAL DEVICE - A method and apparatus determines a physical location of a wireless infrastructure device. At least one coarse location data from an associated terminal device is determined. Additional coarse location data are stored and accumulated. The device location is considered accurate by determining that enough received coarse location data has been received. | 08-22-2013 |
20130235833 | RLAN WIRELESS TELECOMMUNICATIONS WITH RADIO ACCESS NETWORK (RAN) GATEWAY AND METHODS - Methods and apparatus for communicating with the Internet via a gateway are disclosed. The gateway may be a Radio Access Network (RAN) gateway. The gateway may communicate data with at least one user equipment (UE). The gateway may route the data via one or more interfaces. The data may be routed by bypassing a core network. | 09-12-2013 |
20130272245 | POWER CONTROL IN ORTHOGONAL SUB-CHANNELS IN WIRELESS COMMUNICATIONS - A method and apparatus for power control in a wireless communication involves establishing at least two orthogonal sub-channels within a channel for communication and controlling transmitted power in each sub-channel independently. | 10-17-2013 |
20130326320 | METHOD AND APPARATUS FOR INDICATING A TEMPORARY BLOCK FLOW TO WHICH A PIGGYBACKED ACK/NACK FIELD IS ADDRESSED - A method and an apparatus for indicating a temporary block flow (TBF) to which a piggybacked acknowledgement/non-acknowledgement (PAN) field is addressed. A method and apparatus of performing receive processing to reduce the probability of false acceptance of erroneous PANs are also disclosed. A transmit station generates a PAN check sequence (PCS) and performs a channel coding on a PAN field and the PCS. The transmit station scrambles the encoded bits of the PAN field and the PCS with a TBF-specific scrambling code. Because of the scrambling, the PCS decoding at a receive station will pass if the data block is received by an intended receive station, while the PCS decoding will fail if received by a non-intended receive station. Alternatively, the scrambling may be performed before the channel coding. Alternatively, the transmit station may combine the PAN field and a temporary flow identity (TFI) to generate a PCS. | 12-05-2013 |
20130326631 | LAWFUL INTERCEPTION FOR LOCAL SELECTED IP TRAFFIC OFFLOAD AND LOCAL IP ACCESS PERFORMED AT A NON-CORE GATEWAY - Systems, methods, and instrumentalities are described to implement reporting of surveillance information associated with a device. A gateway device may intercept a communication associated with the device. The gateway device may route the communication such that the communication bypasses a core network. The gateway device may report information associated with the communication to a core network entity. The gateway device may receive a command message. The command message may include a request for a surveillance status of the device. The gateway device may send a response message. The response message may indicate a surveillance status of the device. The gateway device may receive an activate surveillance signal for the device. The gateway device may receive a deactivate surveillance signal for the device. Upon receiving the deactivate surveillance signal, the gateway device may stop further reporting. | 12-05-2013 |
20130329598 | BANDWIDTH MANAGEMENT (BWM) OPERATION WITH OPPORTUNISTIC NETWORKS - A BWM controller may be provide the capability to combine a lower speed, wide area network (WAN) that may have connectivity with an ONW that may have intermittent connectivity. This may be done, for example, to generate a multi-connection service that may provide connectivity that may take advantage of occasional high-speed ONW connection events. | 12-12-2013 |
20140056255 | METHOD AND APPARATUS FOR INDICATING A TEMPORARY BLOCK FLOW TO WHICH A PIGGYBACKED ACK/NACK FIELD IS ADDRESSED - Methods and apparatus are described. A wireless transmit/receive unit (WTRU) generates a piggybacked acknowledgement/non-acknowledgement (PAN) field and a PAN check sequence (PCS) from the PAN field. The WTRU masks the PCS with a temporary flow identity (TFI) that includes a specific sequence of a plurality of bit values that represents information other than an identification of a particular TBF. The WTRU transmits data that includes the PAN field and the masked PCS. | 02-27-2014 |
20140064191 | METHOD AND APPARATUS FOR RELIABLY TRANSMITTING RADIO BLOCKS WITH PIGGYBACKED ACK/NACK FIELDS - A method and apparatus are described. A wireless transmit/receive unit (WTRU) generates data bits and piggybacked acknowledgement/non-acknowledgement (PAN) bits and generates a plurality of symbols based on the data bits and the PAN bits. Each symbol of the plurality of symbols represents a plurality of bits and has a least significant bit (LSB) position, and no PAN bits are present in the LSB position of each of the plurality of symbols. The plurality of symbols are transmitted. | 03-06-2014 |
20140071896 | SYSTEM LEVEL ARCHITECTURES FOR RELAYED UPLINK COMMUNICATION - A wireless communication method and apparatus are disclosed for assigning different phases, (i.e., time periods), to perform data transmissions over designated frequency bands in a cooperative relaying system. In phase 1, a relay station (RS) listens to a wireless transmit/receive unit (WTRU) and successfully receives b information bits. In phase 2, the RS and WTRU cooperatively transmit these b information bits to the destination. These transmissions may be performed in a unicast scheme, wherein a WTRU sends information to a selected RS in phase 1, and the RS forwards the information to a base station (BS) in phase 2. The transmission may also be performed in a multicast scheme, wherein the WTRU sends information to the RS and the BS in phase 1, and the RS transmits a subset the information to the BS in phase 2. | 03-13-2014 |
20140098769 | METHOD AND APPARATUS FOR INDICTATING A TEMPORARY BLOCK FLOW TO WHICH A PIGGYBACKED ACKNOWLEDGEMENT/NON-ACKNOWLEDGEMENT FIELD IS ADDRESSED - Methods and base stations are described. A base station includes a receiver, a processor and a transmitter. The receiver receives a first data block associated with an uplink temporary block flow (TBF), and the first data block includes a first header that includes a temporary flow identity (TFI) that identifies the uplink TBF. The processor generate a piggybacked acknowledgement/non-acknowledgement (PAN) field corresponding to the uplink TBF and a PAN check sequence (PCS) based on the PAN field, masks a subset of PCS bits with the TFI to generate a masked PCS, and generates a second data block, associated with a downlink TBF, that includes a second header, a data part corresponding to the downlink TBF, the PAN field, and the masked PCS. The transmitter transmits the second data block. | 04-10-2014 |
20140105139 | BANDWIDTH MANAGEMENT FOR A CONVERGED GATEWAY IN A HYBRID NETWORK - Systems and methods for integrating bandwidth management (BWM) equipment into a network in order to manage the use of bandwidth over multiple radio access technologies (RATs) relating to communications between a wireless transmit receive unit and a mobile core network (MCN). When integrating itself into the network, a BWM server may be placed between a MCN and an femto access point. In order for WTRUs to communicate with the MCN through the femto access point and a BWM server, a BWM server may need deep packet inspection capabilities. | 04-17-2014 |
20140119285 | METHOD AND APPARATUS FOR DELIVERY OF DATA-BASED/VOICE SERVICES OVER PICONETS AND WIRELESS LANs (WLANs) COUPLED TO 3GPP DEVICES INCLUDING PROTOCOL ARCHITECTURE AND INFORMATION ELEMENTS RELATING TO SHORT MESSAGE SERVICE (SMS) OVER WLANs - Method and apparatus delivering voice/data services within a piconet operating over a limited range or over a WLAN communicating with 3GPP devices by reformatting data into IP format before delivering to the WLAN. The service is short message service (SMS). Upon receipt of an SMS message, relevant routing information is retrieved. A PDGW address for the SMS message is identified and is sent to the PDGW address which identifies the WLAN user equipment (UE) for receiving the SMS and reformats the SMS message into IP format (text or encapsulation) for delivery to the UE. A protocol architecture is provided for SMS delivery over WLANs, in particular, for UMTS/CDMA based SMS over WLAN through two alternative mechanisms, i.e., SMS tunneling and SMS proxy, for protocols for the delivery of SMS across the WLAN. The invention enhances standard 802.11 in the context of UMTS and CDMA 2000; as well as other scenarios. | 05-01-2014 |
20140146801 | METHOD AND APPARATUS FOR SUPPORTING FEMTOCELL SERVICE CAPABILITIES FOR SERVICES - Techniques for supporting utilization of femtocell service capabilities for services are disclosed. A network device may be configured to implement a femto services gateway. The femto services gateway may reside in a femtocell and provide application programming interfaces (APIs) to services to enable applications implementing the services to make use of functionalities of femtocell service capabilities. The APIs may be a subset of or an extended set of Open Service Access Parlay or Parlay-X APIs. The services may be either femtocell-hosted, mobile APIs network operator core network-hosted, or Internet-hosted. The femtocell service capabilities may include a framework service capability feature (SCF), a call control SCF, a user interaction SCF, a mobility SCF, a terminal capability SCF, a data session control SCF, a connectivity manager SCF, an account management SCF, a charging management SCF, a policy management SCF, a presence and availability management SCF, or a multimedia messaging SCF. | 05-29-2014 |
20140219248 | Systems and Methods for Establishing and Maintaining Multiple Cellular Connections and/or Interfaces - Systems and methods for providing multiple connections or interfaces at the same time may be disclosed herein. For example, in an embodiment, a first RRC connection may be established between a wireless transmit and receive unit (WTRU) or user equipment (UE) and network node such as an eNB and a second RRC connection may be established between the WTRU or UE and the network node such as the eNB or another network node such as another eNB. The first RRC connection and the second RRC connections may then be maintained in parallel (e.g. at the same time). | 08-07-2014 |
20140269958 | UPLINK POWER CONTROL FOR DISTRIBUTED WIRELESS COMMUNICATION - A method and apparatus for power control for distributed wireless communication is disclosed including one or more power control loops associated with a wireless transmit/receive unit (WTRU). Each power control loop may include open loop power control or closed loop power control. A multi-phase power control method is also disclosed with each phase representing a different time interval and a WTRU sends transmissions at different power levels to different set of node-Bs or relay stations during different phases to optimize communications. | 09-18-2014 |
20140307684 | WIRELESS COMMUNICATION METHOD AND APPARATUS FOR ALLOCATING TRAINING SIGNALS AND INFORMATION BITS - Techniques of channel correction and demodulation for wireless systems are enhanced so that higher effective data rates, lower error rates or both can be achieved with a minimal processing load. Pilots are adaptively moved and/or removed, and their positions are changed, to enhance the channel estimation, decoding, and demodulation processes at the receiver. Reception is also enhanced by adding, removing, or changing the positions, of information-carrying data bits. | 10-16-2014 |
20140307875 | METHOD AND SYSTEM FOR SECURING WIRELESS COMMUNICATIONS - A method for transmitting an encrypted signal to a wireless transmit/receive unit (WTRU) such that decryption of the encrypted signal depends on a trust zone associated with the WTRU is disclosed. The encryption may be performed using hierarchical modulation, scrambling, authentication, location validation, or a combination thereof. The size of a trust zone may also be adjusted. | 10-16-2014 |
20140321328 | Methods For IP Mobility Management - Methods, apparatus and systems may support distributed and dynamic mobility management features, including for nodes, functions and interfaces. A distributed gateway (D-GW), which may be a logical entity, may implement functionality of a PDN gateway (PGW) along with additional functionality that may support distributed mobility management (DMM). Additionally, methods, apparatus, and systems may support detecting and discovering capabilities that may be used to support dynamic IP mobility features on mobile node and networks. | 10-30-2014 |
20140341109 | Methods, Apparatus and Systems for Managing Converged Gateway Communications - Systems and methods for providing a converged gateway (CGW) may be disclosed. A policy may be by the CGW to make routing decisions (e.g. segregation and/or aggregation of flows or traffic associated with data) for various interfaces and/or radio access technologies (RATs) that may be included in a LAN, device, and/or communication system. The policy may be locally stored within the CGW. Dynamic flow management, load balancing, offloading, PDF context establishment, prioritization, detection of devices, and the like may also be provided and/or implemented in the CG W and may be used to route flows and/or traffic associated with data. | 11-20-2014 |
20150044994 | SYSTEM AND METHOD FOR PROVIDING VARIABLE SECURITY LEVEL IN A WIRELESS COMMUNICATION SYSTEM - A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone. | 02-12-2015 |
20150045032 | METHOD AND APPARATUS FOR OFFLOADING BACKHAUL TRAFFIC - A method and apparatus for offloading backhaul traffic are disclosed. A first base station may detect a condition triggering backhaul traffic offloading for a wireless transmit/receive unit (WTRU). The first base station may establish a wireless connection with a second base station, and offload at least one bearer of the WTRU onto the second base station via the wireless connection. The first base station may be a macro-cell base station and the second base station may be a femto-cell base station having a wired connection to Internet and a mobile operator core network. The first or second base station may include a relay functionality and act as a relay between the WTRU and the other base station. The backhaul link may be established using a Uu, Un, X2 interface or any other interface over a licensed or license-exempt frequency, a TV white space frequency, etc. | 02-12-2015 |
20150085741 | METHOD AND APPARATUS FOR COOPERATIVE WIRELESS COMMUNICATIONS - A method and apparatus for cooperation in wireless communications. Cooperation is considered among a number of network elements, including at least one wireless transmit-receive unit, at least one relay station, and at least one base station. | 03-26-2015 |