Patent application number | Description | Published |
20090093232 | PROVISIONING COMMUNICATION NODES - Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon. | 04-09-2009 |
20090094680 | ACCESS MANAGEMENT FOR WIRELESS COMMUNICATION - Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon. | 04-09-2009 |
20090098885 | SYSTEM AND METHOD FOR STORING INFORMATION TO LOCATE A FEMTO CELL - A system, method and computer product for augmenting a user's equipment (UE) database with information measured by a femto cell, the method comprising: (a) performing RF measurements by a femto cell; (b) connecting the UE to the femto cell; (c) downloading the RF measurements taken by the femto cell into the UE custom database; (d) maintaining a central database of femto cell measurements, to be used for updating custom UE databases; (e) comparing current RF measurements taken by the UE with the femto cell own RF measurements to estimate proximity to the femto cell. | 04-16-2009 |
20090129291 | CONFIGURING AN IDENTIFIER FOR AN ACCESS POINT - An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server. | 05-21-2009 |
20090129354 | ACCESS POINT CONFIGURATION SCHEMES - An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server. | 05-21-2009 |
20090132674 | RESOLVING NODE IDENTIFIER CONFUSION - Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects an access point and/or an access terminal may perform operations relating to detecting confusion and/or providing a unique identifier to resolve confusion. | 05-21-2009 |
20090132675 | USING IDENTIFIERS TO ESTABLISH COMMUNICATION - Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects an access point and/or an access terminal may perform operations relating to detecting confusion and/or providing a unique identifier to resolve confusion. | 05-21-2009 |
20090176503 | FLEXIBLE MEDIUM ACCESS CONTROL (MAC) FOR AD HOC DEPLOYED WIRELESS NETWORKS - Systems and methods are disclosed that facilitate wireless communication using resource utilization messages (RUMs), in accordance with various aspects. A RUM may be generated for a first node, such as an access point or an access terminal, to indicate that a first predetermined threshold has been met or exceeded. The RUM may be weighted to indicate a degree to which a second predetermined threshold has been exceeded. The first and/or second predetermined thresholds may be associated with various parameters associated with the node, such as latency, throughput, data rate, spectral efficiency, carrier-to-interference ratio, interference-over-thermal level, etc. The RUM may then be transmitted to one or more other nodes to indicate a level of disadvantage experienced by the first node. | 07-09-2009 |
20090181672 | WIRELESS COMMUNICATION PAGING UTILIZING MULTIPLE TYPES OF NODE IDENTIFIERS - Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service. | 07-16-2009 |
20090182871 | BACKUP PAGING FOR WIRELESS COMMUNICATION - A backup page is provided for a node that misses a page. In some aspects, a first type of access point in a system provides a backup page for an access terminal that is idling on a second of access point in the system in the event the access terminal misses a page by the second of access point in the system. An access point of the first type may page the access terminal according to a first paging schedule while an access point of the second type may page the access terminal according to a second paging schedule. In some aspects an access point of the first type (e.g., a macro node) provides service over a macro coverage area and an access point of the second type (e.g., a femto node) provides service over a smaller coverage area and/or provides restricted service. | 07-16-2009 |
20090190521 | MANAGEMENT OF WIRELESS RELAY NODES USING IDENTIFIERS - A set of wireless relay nodes are managed to facilitate inter-node routing of packets in the set. In some aspects, unique identifiers are defined for the wireless relay nodes to facilitate routing packets within the set. In some aspect a routing table is provided to each of the wireless relay nodes, wherein the routing table identifies each wireless relay node in the set and a next-hop entity for each of these wireless relay nodes. Each of the wireless relay nodes may then define a forwarding table based on the routing table. | 07-30-2009 |
20090190522 | MANAGEMENT OF WIRELESS RELAY NODES USING ROUTING TABLE - A set of wireless relay nodes are managed to facilitate inter-node routing of packets in the set. In some aspects, unique identifiers are defined for the wireless relay nodes to facilitate routing packets within the set. In some aspect a routing table is provided to each of the wireless relay nodes, wherein the routing table identifies each wireless relay node in the set and a next-hop entity for each of these wireless relay nodes. Each of the wireless relay nodes may then define a forwarding table based on the routing table. | 07-30-2009 |
20090196221 | METHOD AND APPARATUS FOR PROVIDING SIGNALING ACCESS - Signaling-only access may be established with an access node under certain circumstances such as, for example, upon determining that a node is not authorized for data access at the access node. A node that is not authorized for data access at an access node may still be paged by the access node through the use of signaling-only access. In this way, transmissions by the access node may not interfere with the reception of pages at the node. A first node may be selected for providing paging while a second node is selected for access under certain circumstances such as, for example, upon determining that the second node provides more desirable service than the first node. | 08-06-2009 |
20090197570 | PAGING AND ACCESS VIA DIFFERENT NODES - Signaling-only access may be established with an access node under certain circumstances such as, for example, upon determining that a node is not authorized for data access at the access node. A node that is not authorized for data access at an access node may still be paged by the access node through the use of signaling-only access. In this way, transmissions by the access node may not interfere with the reception of pages at the node. A first node may be selected for providing paging while a second node is selected for access under certain circumstances such as, for example, upon determining that the second node provides more desirable service than the first node. | 08-06-2009 |
20090213825 | METHODS AND APPARATUS FOR CONTROLLING TRANSMISSION OF A BASE STATION - Methods and apparatus for controlling transmission of a base station, such as a Femto cell, based on the determined quality of a backhaul connection to a network are disclosed. In particular, a quality of a backhaul connection of a base station to a node in a communication network is determined. Based on this quality determination, transmission from the base station is either limited or stopped when the determined quality fails to meet a predefined condition. The degradation in quality of the backhaul connection, for example, affects the ability of the base station to offer sufficient service to access terminals. By limiting or stopping wireless transmission of the base station when the backhaul quality is degraded, access terminals either currently accessing the base station or attempting to connect to the base station can then more efficaciously hand off to another base station or access point. | 08-27-2009 |
20090219905 | WIRELESS COMMUNICATION COLLISION DETECTION - Collisions in a wireless network are detected and resolved through the use of transmissions by access points in the network. In some aspects, each access point may select a resource from a set of resources and transmit an indication of a unique identifier (e.g., a long identifier) of that access point on the selected resource. In some aspects, each access point may select a bit and append that bit to a reused identifier (e.g., a short identifier) of that access point to provide a channelization parameter that is used to channelize signals transmitted by the access point. The selection by a given access point may be based on a unique identifier assigned to that access point. The selection by a given access point may be a pseudorandom selection (e.g., based on a corresponding unique identifier). Another node (e.g., an access terminal) in the network may identify a collision based on the transmissions by the access points. In this case, the node may transmit an indication of the collision to cause one of the access points to cease transmitting. The node may then inform one colliding access point of the existence and identity of the other colliding access point to enable the access points to resolve the collision. | 09-03-2009 |
20090232019 | PROVIDING MULTIPLE LEVELS OF SERVICE FOR WIRELESS COMMUNICATION - Local breakout is provided by one or more nodes (e.g., a local access point and/or a local gateway) in a wireless network to facilitate access to one or more local services. In conjunction with local breakout, multiple IP points of presence relating to different levels of service may be provided for an access point. For example, one point of presence may relate to a local service while another point of presence may relate to a core network service. IP point of presence may be identified for an over-the-air packet to indicate a termination point for the packet. Also, different mobility management functionality may be provided at different nodes in a system whereby mobility management for a given node may be provided by a different node for different types of traffic. Thus, an access terminal may support multiple NAS instances. In addition, different types of paging may be provided for different types of traffic. Furthermore, messages associated with one protocol may be carried over another protocol to reduce complexity in the system. | 09-17-2009 |
20090268668 | LOCAL IP ACCESS SCHEME - Local IP access is provided in a wireless network to facilitate access to one or more local services. In some implementations, different IP interfaces are used for accessing different services (e.g., local services and operator network services). A list that maps packet destinations to IP interfaces may be employed to determine which IP interface is to be used for sending a given packet. In some implementations an access point provides a proxy function (e.g., a proxy ARP function) for an access terminal. In some implementations an access point provides an agent function (e.g., a DHCP function) for an access terminal. NAT operations may be performed at an access point to enable the access terminal to access local services. In some aspects, an access point may determine whether to send a packet from an access terminal via a protocol tunnel based on the destination of the packet. | 10-29-2009 |
20090316652 | UTILIZING SYSTEM ACCESS SEQUENCES TO REQUEST RESOURCES FOR GCI REPORTING IN WIRELESS NETWORKS - Systems and methodologies are described that facilitate indicating global cell identifier (GCI) reporting in wireless communication to mitigate confusion caused by physical cell identifier (PCI) reporting in heterogeneous deployments. In particular, mobile devices can report GCI of access points to disparate access points to facilitate communication therebetween, such as during handover. Mobile devices can indicate GCI reporting during a system access request by selecting an access sequence corresponding to subsequent GCI reporting. Based on the access sequence, an access point can grant additional resources to receive the GCI, and the mobile device can communicate GCI over the resources. Using the GCI, the access point can communicate with a disparate access point related to the GCI. | 12-24-2009 |
20090316654 | ACCESS TERMINAL ASSISTED NODE IDENTIFIER CONFUSION RESOLUTION USING A TIME GAP - Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects a network may provide a time gap (e.g., an asynchronous time gap) during which an access terminal may temporarily cease monitoring transmissions from a source node so that the access terminal may acquire a unique identifier from a target node. In some aspects an access terminal may commence handover operations at a target node after determining whether the access terminal is allowed to access the target node. In some aspects a source node may prepare several target nodes for potential handover in the event confusion is detected or likely. Here, the source node may send information relating to the preparation of the potential target nodes to the access terminal whereby the access terminal uses the handover preparation information to initiate a handover at that target node. | 12-24-2009 |
20090316655 | ACCESS TERMINAL ASSISTED NODE IDENTIFIER CONFUSION RESOLUTION - Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects a network may provide a time gap (e.g., an asynchronous time gap) during which an access terminal may temporarily cease monitoring transmissions from a source node so that the access terminal may acquire a unique identifier from a target node. In some aspects an access terminal may commence handover operations at a target node after determining whether the access terminal is allowed to access the target node. In some aspects a source node may prepare several target nodes for potential handover in the event confusion is detected or likely. Here, the source node may send information relating to the preparation of the potential target nodes to the access terminal whereby the access terminal uses the handover preparation information to initiate a handover at that target node. | 12-24-2009 |
20090316657 | CONCENTRATOR FOR MULTIPLEXING ACCESS POINT TO WIRELESS NETWORK CONNECTIONS - Systems and methodologies are described that facilitate multiplexing communications from multiple downstream access points to one or more mobility management entities (MME). In particular, a concentrator component is provided that can establish a single transport layer connection with an MME along with multiple application layer connections over the single transport layer connection for each of multiple downstream access points and/or related mobile devices. The downstream access points and/or mobile devices can provide identifiers to the concentrator component, which can utilize the identifiers to track communications with the MME. In this regard, the MME can additionally include identifiers received from the concentrator component in subsequent communications to facilitate identifying the appropriate downstream access point and/or mobile device. | 12-24-2009 |
20100002603 | NETWORK ELEMENT CONFIGURATION SCHEME - In a configuration scheme for one or more network elements, a network management entity determines a set of at least one parameter value from a set of operable parameter values and sends the determined set to a network element. The network element then selects a parameter value from the received set and uses the selected parameter value to configure one or more aspects of the network element. | 01-07-2010 |
20100008234 | PAGING SCHEMES FOR LOCAL NETWORK ACCESS - Paging and power consumption are managed in conjunction with providing local breakout in a wireless wide area network. In some aspects, if a packet destined for an access terminal is received at an access point that provides local breakout, the access point may inform the network so that the network will cause the access point to page the access terminal. Alternatively, in some aspects an access point that provides local breakout may maintain idle context of the access terminal, whereby the access point may autonomously page the access terminal (i.e., without involving the core network). In some aspects local breakout traffic is filtered at an access point to reduce the number of pages or packets sent to an access terminal. In some aspects an indication of a packet type is provided with a page message to enable an access terminal to determine whether to receive the packet. In some aspects a local link interface may be selectively disabled or enabled to limit traffic at an access terminal. | 01-14-2010 |
20100008235 | REPORTING AND RESOLVING CONFLICTING USE OF A NODE IDENTIFIER - Conflicting use of a node identifier in a wireless network is reported and resolved. In some aspects, a wireless node receives wireless signals and determines, based on those signals, that more than one node uses the same node identifier. The wireless node may then report the conflicting use to a network node. Here, the wireless node may delay for a period of time before reporting the conflicting use. In some aspects, an access point that discovers a conflicting use (e.g., based on a received signal that indicates that another access point is using that same node identifier) may report the conflicting use and/or elect to use a different node identifier. In some aspects, a stateful procedure is used to resolve a conflicting use where, upon identification of a conflicting use, an access point negotiates with another access point to cause one of these access points to use a different node identifier. In some aspects, a stateless procedure is used to resolve a conflicting use where, upon identification of a conflicting use, an access point delays for a period of time before determining whether a different node identifier is to be used at one of the nodes. | 01-14-2010 |
20100008293 | X2 INTERFACES FOR ACCESS POINT BASE STATIONS IN SELF-ORGANIZING NETWORKS (SON) - Systems and methodologies are described that facilitate leveraging an X2-AP interface for data exchange between an access terminal and a Home access terminal. Based upon a received request from a Home access terminal, the access terminal can activate an X2-AP interface connection on demand over Stream Control Transmission Protocol (SCTP) based upon a maximum number of connections not being met and/or a timer evaluation that indicates the request is within an allowed time period. The capacity of the access terminal related to the amount of X2-AP connections can be managed based upon at least one of a timer evaluation, or a maximum number of X2-AP connections. The systems and methodologies provide an optimal and efficient technique in order to enable data to be exchanged between an access terminal and a Home access terminal utilizing an X2-AP interface. | 01-14-2010 |
20100008341 | PAGING AND POWER MANAGEMENT SCHEMES FOR LOCAL NETWORK ACCESS - Paging and power consumption are managed in conjunction with providing local breakout in a wireless wide area network. In some aspects, if a packet destined for an access terminal is received at an access point that provides local breakout, the access point may inform the network so that the network will cause the access point to page the access terminal. Alternatively, in some aspects an access point that provides local breakout may maintain idle context of the access terminal, whereby the access point may autonomously page the access terminal (i.e., without involving the core network). In some aspects local breakout traffic is filtered at an access point to reduce the number of pages or packets sent to an access terminal. In some aspects an indication of a packet type is provided with a page message to enable an access terminal to determine whether to receive the packet. In some aspects a local link interface may be selectively disabled or enabled to limit traffic at an access terminal. | 01-14-2010 |
20100020710 | CELL IDENTIFIER ASSIGNMENT AND SELECTION - Systems and methodologies are described that facilitate providing physical cell identifier (PCI) assignment. Neighboring access point parameters can be collected and transmitted to a PCI assigning component, which can generate a PCI based on the parameters as well as other local parameters. The neighboring access point parameters can be received by evaluating signals transmitted by the neighboring access points, from a UE communicating with the neighboring access points, over a backhaul link, etc. The parameters can include signal strength, identification, and/or the like. In addition, prioritized lists of PCIs can be provided to an access point, which can utilize the neighborhood parameters to select an optimal PCI from the list. | 01-28-2010 |
20100039992 | ACQUISITION OF ACCESS POINT INFORMATION WITH ASSISTANCE FROM OTHER ACCESS POINTS - An access point acquires information about another access point from at least one other access point. For example, the access point may send a query to one or more neighbor access points to obtain information about the other access point. In some aspects these operations may be employed in conjunction with establishing neighbor relations in a network. For example, in the event a neighbor list of a given access point does not have certain information about another access point (e.g., an IP address), the given access point may query its neighbor access points to see whether those access points have information about the other access point in their neighbor lists. Upon receipt of this information, the given access point may use the information to establish neighbor relations with the other access point. | 02-18-2010 |
20100067371 | USING IDENTIFIER MAPPING TO RESOLVE ACCESS POINT IDENTIFIER AMBIGUITY - Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal. | 03-18-2010 |
20100069062 | WIRELESS COMMUNICATION PAGING AND REGISTRATION UTILIZING MULTIPLE TYPES OF NODE IDENTIFIERS - Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service. | 03-18-2010 |
20100069072 | USING SIGNAL MONITORING TO RESOLVE ACCESS POINT IDENTIFIER AMBIGUITY - Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal. In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal. | 03-18-2010 |
20100074180 | SYNCHRONIZING A BASE STATION IN A WIRELESS COMMUNICATION SYSTEM - A method for synchronizing a wireless communication system is disclosed. A silence duration for a base station is determined based on the time required for a neighbor base station to obtain or maintain synchronization. All transmissions from the base station are ceased for the silence duration. Multiple base stations level may cease transmissions at the same time, thus mitigating interference. | 03-25-2010 |
20100106772 | ADDRESS UPDATING SCHEME FOR WIRELESS COMMUNICATION - In an address updating scheme, a server accesses clients with intermittent connectivity by using addresses specified in a local client address list. The clients are responsible for updating the list whenever the address of the client changes as a result of intermittent client connectivity or other conditions. | 04-29-2010 |
20100112982 | SYSTEM AND METHOD TO PERFORM ACCESS CONTROL AND PAGING USING FEMTO CELLS - Methods and apparatus for performing femto cell access and paging control for a wireless access terminal (e.g. a cell phone handset) within a network of multiple femto cell components (e.g. HNBs) and an access control component (e.g. a mobile operator's core network). One method comprises storing a first group association of femto cells, using common characteristic (e.g. a Closed Subscriber Group ID), storing a second group association among access terminals (e.g. defining which access terminals belong to which Closed Subscriber Group), and authorizing access to an access terminal to all of the femto cell components belonging to the first group. The access terminal may receive pages from any or all of the femto cells belonging to the group. Residential and enterprise deployments may be co-located. | 05-06-2010 |
20100169412 | INTERFACE AUTHORIZATION SCHEME - An authorization scheme controls whether an interface is established between communication nodes. Such a scheme may be used, for example, to determine whether to establish a direct interface (e.g., an X2 interface) between a pair of access points. A decision to establish a direct interface between nodes may be based on a node type of one or both of the nodes. A decision to establish a direct interface between nodes may be based on whether the nodes belong to the same group. | 07-01-2010 |
20100172259 | Detection Of Falsified Wireless Access Points - Apparatuses and methods for detecting falsified wireless access points are presented. A method includes identifying a target wireless access point for validation and measuring a round trip time delay to the wireless access point. The method also includes determining an expected processing delay of the wireless access point, analyzing the measured round trip time delay and the expected processing delay, and validating the wireless access point based upon the analysis. An apparatus includes a wireless transceiver, a processing unit coupled to the wireless transceiver, and a memory coupled to the processing unit. The processing unit is configured to identify a target wireless access point for validation, measure a round trip time delay to the wireless access point, determine an expected processing delay of the wireless access point, analyze the measured round trip time delay and the expected processing delay, and validate the wireless access point based upon the analysis. | 07-08-2010 |
20100173626 | ADAPTATION OF HANDOVER PARAMETERS - Handover parameter settings are automatically adapted in access points in a system to improve handover performance. Reactive detection techniques are employed for identifying different types of handover-related failures and adapting handover parameters based on this detection. Messaging schemes are also employed for providing handover-related information to access points. Proactive detection techniques also may be used for identifying conditions that may lead to handover-related failures and then adapting handover parameters in an attempt to prevent such handover-related failures. Ping-ponging may be mitigated by adapting handover parameters based on analysis of access terminal visited cell history acquired by access points in the system. In addition, configurable parameters (e.g., timer values) may be used to detect handover-related failures. | 07-08-2010 |
20100173633 | HANDOVER FAILURE MESSAGING SCHEMES - Handover parameter settings are automatically adapted in access points in a system to improve handover performance. Reactive detection techniques are employed for identifying different types of handover-related failures and adapting handover parameters based on this detection. Messaging schemes are also employed for providing handover-related information to access points. Proactive detection techniques also may be used for identifying conditions that may lead to handover-related failures and then adapting handover parameters in an attempt to prevent such handover-related failures. Ping-ponging may be mitigated by adapting handover parameters based on analysis of access terminal visited cell history acquired by access points in the system. In addition, configurable parameters (e.g., timer values) may be used to detect handover-related failures. | 07-08-2010 |
20100195573 | SELECTIVELY INCLUDING ALLOWED CSG LIST IN PAGE MESSAGE - Problems caused by interaction between paging optimization and synchronizing CSG information are mitigated by setting a network indication indicating, for example, that a subscriber is no longer a member of a CSG, but the network has not yet received confirmation that an access terminal associated with the subscriber has been informed of this. A timer-based scheme may be employed for removing a CSG ID from the subscriber information for a subscriber once it is determined that the subscriber is no longer a member of the CSG. In addition, a temporary member of a CSG may determine whether it is still a member of a CSG upon expiration of a CSG timer. Also, the frequency with which an access terminal registers may be changed based on various criteria. Furthermore, an allowed CSG list may be selectively included in a page message depending on the destination of the page message. | 08-05-2010 |
20100197239 | GEOGRAPHIC-BASED MEASUREMENT AND LOGGING OF RADIO COVERAGE RELATED INFORMATION BY MOBILE DEVICES - Providing for automated wireless network signal analysis by mobile devices as a function of their geographic locations is described herein. By way of example, a wireless network can transmit a set of geographic data defining a geographic region to a mobile device. The mobile device can compare its current location to the geographic region, and begin measuring downlink signals, or recording such measurements when within the geographic region, and terminate the recording when the mobile device leaves the geographic region. Recorded measurements can be subsequently uploaded to the wireless network for analysis. In some aspects, the mobile device can refrain from uploading the measurements until within a defined reporting region. By providing mobile device network analysis triggered on device geographic location, analysis data that is well tailored to a particular problem area can be obtained, increasing quality of the analysis data and significantly reducing cost of acquiring such data. | 08-05-2010 |
20100220597 | TIME DIVISION DUPLEXING (TDD) CONFIGURATION FOR ACCESS POINT BASE STATIONS - Systems and methodologies are described that facilitate establishing synchronization and/or mitigating interference with a time division duplexing (TDD) access point base station in a wireless communication environment. For example, a TDD configuration can be selected for the access point base station based upon received information to control interference. By way of another example, the access point base station can be synchronized with a disparate base station based upon the received information. Moreover, the received information can relate to the disparate base station, a served user equipment (UE) (e.g., served by the access point base station, . . . ), and/or a non-served UE (e.g., served by a base station other than the access point base station, . . . ). For example, the served UE can transmit a measurement related to the disparate base station to the access point base station. | 09-02-2010 |
20100227603 | METHOD AND APPARATUS FOR FACILITATING A COMMUNICATION BETWEEN AN ACCESS POINT BASE STATION AND A NEIGHBORING BASE STATION - Aspects are disclosed for self-configuring an access point via a backhaul connection. A backhaul connection is established between an access point base station and a neighboring base station. Information associated with an external neighbor parameter is then received via the backhaul connection, and an internal neighbor parameter is self-configured based on the external neighbor parameter. | 09-09-2010 |
20100241496 | TIME AND WAYPOINT-BASED INCENTIVES FOR MOBILE DEVICES - The subject matter disclosed herein relates to a system and method for influencing behavior of a user of a mobile device. A determination may be made regarding whether a mobile device is within an area associated with one or more predefined waypoints. An incentive may be provided to the mobile device based at least in part on a location of the mobile device to influence behavior of a user of the mobile device. | 09-23-2010 |
20100260133 | FLEXIBLE MEDIUM ACCESS CONTROL (MAC) FOR AD HOC DEPLOYED WIRELESS NETWORKS - Systems and methods are disclosed that facilitate wireless communication using resource utilization messages (RUMs), in accordance with various aspects. A RUM may be generated for a first node, such as an access point or an access terminal, to indicate that a first predetermined threshold has been met or exceeded. The RUM may be weighted to indicate a degree to which a second predetermined threshold has been exceeded. The first and/or second predetermined thresholds may be associated with various parameters associated with the node, such as latency, throughput, data rate, spectral efficiency, carrier-to-interference ratio, interference-over-thermal level, etc. The RUM may then be transmitted to one or more other nodes to indicate a level of disadvantage experienced by the first node. | 10-14-2010 |
20100278147 | ACCESS MODE-BASED ACCESS CONTROL - Access control for an access point (e.g., a cell of the access point) may be based on an access mode associated with the access point. For example, depending on the access mode, access control may involve performing a membership check for the access point. Such a membership check may be performed at a network entity, a source access point, or some other suitable location in a network. In some aspects, access control may involve performing a membership check for an access point in conjunction with a context fetch procedure. Such a procedure may be performed, for example, when an access terminal arrives at the access point after experiencing RLF at another access point. | 11-04-2010 |
20100279687 | ACCESS MODE-BASED ACCESS CONTROL - Access control for an access point (e.g., a cell of the access point) may be based on an access mode associated with the access point. For example, depending on the access mode, access control may involve performing a membership check for the access point. Such a membership check may be performed at a network entity, a source access point, or some other suitable location in a network. In some aspects, access control may involve performing a membership check for an access point in conjunction with a context fetch procedure. Such a procedure may be performed, for example, when an access terminal arrives at the access point after experiencing RLF at another access point. | 11-04-2010 |
20100302965 | METHOD AND APPARATUS THAT FACILITATES AUTOMATIC ASSISTANCE FOR POSITIONING OF ACCESS POINT BASE STATIONS - Aspects are disclosed for positioning an access point base station. In a particular aspect, a performance parameter of a communication between a user equipment and the access point base station is monitored. A position of the access point base station is then assessed based on the performance parameter, and an assessment of the location is subsequently communicated. | 12-02-2010 |
20100317379 | SENDING INFORMATION DURING A CHARGING EVENT - A mobile device sends information during a charging event to mitigate potential adverse effects that may occur if the information is sent at other times. For example, after obtaining information, the mobile device may determine whether the information is time-critical. If the information is not time-critical, the mobile device may store the information. Then, once the mobile device determines that a charging event is occurring, the mobile device sends the stored information. | 12-16-2010 |
20110080848 | ROUTING GRAPHS FOR BUILDINGS USING SCHEMATICS - The subject matter disclosed herein relates to systems, methods, etc. for creating a routing graph based at least partly on building information, which may include relatively low-detail schematics. For certain example implementations, a method may include obtaining building information descriptive of at least a portion of a building structure and superimposing a grid of points onto the building information. The building information may be analyzed using the superimposed grid of points by projecting multiple rays from multiple points of the superimposed grid of points. At least one routing graph may be created responsive to the analyzing and based at least in part on the superimposed grid of points and the building information. Other example implementations are described herein. | 04-07-2011 |
20110081918 | VENUE APPLICATION FOR MOBILE STATION POSITION ESTIMATION - Disclosed are a system and method for using an entity hosted on a mobile station to selectively provide portions of infrastructure information to one or more other applications hosted on the mobile station. | 04-07-2011 |
20110081919 | Mobile Device Locating In Conjunction With Localized Enviornments - The subject matter disclosed herein relates to systems, methods, apparatuses, articles, etc. for mobile device locating in conjunction with localized environments. For certain example implementations, a method may comprise obtaining at a mobile device one or more signals comprising information indicative of a location thereof. The information may be transmitted to one or more servers. A location context identifier (LCI) may be received responsive to the transmitting, with the LCI corresponding to a localized environment at which the mobile device is located. The LCI may be transmitted to the one or more servers. Location-based data may be received responsive to the transmitting of the LCI, with the location-based data being associated with the LCI and pertaining to the localized environment. The location of the mobile device may be determined with respect to the localized environment based, at least in part, on the location-based data. Other example implementations are described herein. | 04-07-2011 |
20110082638 | ROUTING GRAPHS FOR BUILDINGS - The subject matter disclosed herein relates to systems, methods, etc. for creating a routing graph based at least partly on building information. For certain example implementations, a method includes obtaining building information descriptive of at least a portion of a building structure. A grid of points may be superimposed onto the building information. At least one routing graph may be created based at least in part on the superimposed grid of points and the building information. Other example implementations are also described. | 04-07-2011 |
20110085707 | METHOD AND APPARATUS FOR AUTOMATED DETERMINATION OF FEATURES ON AN ELECTRONIC MAP - The subject matter disclosed herein relates to a system and method for automatically identifying features of an electronic map. | 04-14-2011 |
20110086646 | Method And Apparatus For Transmitting Indoor Context Information - The subject matter disclosed herein relates to a system and method for determining indoor context information relating to a location of a mobile device. Indoor context information may be utilized by a mobile device or a network element to obtain an estimate of a location of the mobile device within an indoor environment. | 04-14-2011 |
20110087431 | METHOD AND APPARATUS FOR IDENTIFICATION OF POINTS OF INTEREST WITHIN A PREDEFINED AREA - The subject matter disclosed herein relates to a system and method for identification of points of interest within a predefined area. Location estimates for substantially stationary mobile devices may be utilized to determine locations of one or more points of interest. Location estimates for mobile devices in motion may be utilized to determine locations of one or more corridors. | 04-14-2011 |
20110137549 | METHOD AND APPARATUS FOR REDUCING INSTRUCTIONS IN AN INDOOR NAVIGATION ENVIRONMENT - The subject matter disclosed herein relates to a system and method for determining navigation instructions in a navigation environment. | 06-09-2011 |
20110144903 | METHOD AND APPARATUS FOR ACCOUNTING FOR USER EXPERIENCE IN PEDESTRIAN NAVIGATION ROUTING - The subject matter disclosed herein relates to a system and method for determining navigation instructions within a pedestrian navigation environment. | 06-16-2011 |
20110178701 | Methods And Apparatuses For Use In Route Navigation Involving A Mobile Station - Techniques are provided which may be implemented using various methods and/or apparatuses to allow for delay zone information to be gathered by one or more mobile stations used in route navigation, provided to one or more computing devices and processed in some manner to establish navigation information that may be of use by mobile stations involved in route navigation. For example, in certain instances navigation information may be indicative of an expected delay with regard to at least one known delay zone that may affect a user of the mobile station attempting to adhere to a route. | 07-21-2011 |
20110178705 | Using Filtering With Mobile Device Positioning In A Constrained Environment - The subject matter disclosed herein relates to systems, methods, apparatuses, devices, articles, and means for using filtering with mobile device positioning in a constrained environment. For certain example implementations, a method may comprise obtaining at least one position measurement of a mobile device and filtering the at least one position measurement to produce at least one filtered position of the mobile device. The at least one filtered position may be adjusted based at least in part on mapping information to produce at least one adjusted position of the mobile device, with the mapping information pertaining to a constrained environment that corresponds to at least a portion of an interior of a building structure. Other example implementations are described herein. | 07-21-2011 |
20110183644 | Method And Apparatus For Dynamic Routing - The subject matter disclosed herein relates to a system and method for emergency event routing. One or more routing instructions may be determined to route one or more individuals away from a location corresponding to the emergency event based at least in part on at least one category associated with the emergency event, a type of the emergency event, and one or more estimated locations of one or more mobile devices associated with the one or more individuals. | 07-28-2011 |
20110184945 | LOCATION AWARE RECOMMENDATION ENGINE - The subject matter disclosed herein relates to a location aware recommendation engine. In response to a recommendation request, relevant recommendations may be ranked based on the current location of a user, location associated with an entity, and/or accessibility criteria. | 07-28-2011 |
20110205980 | MULTI-NODE RESOURCE REQUEST PIPELINING - Systems and methodologies are described that facilitate generating anticipatory resource requests for multiple node communications in wireless networks. In a peer-to-peer, ad hoc, relay network, or similar configuration where one node facilitates communicating between a plurality of additional nodes, the node can generate an anticipatory resource request to a serving node. A number of resources can be determined for at least one of the plurality of additional nodes (from the received resource request, one or more communication parameters, a set of granted resources, etc.). The device can generate an anticipatory resource request for communicating to the serving device based on the number of resources. In addition, the anticipatory resource request can be generated based on parameters and/or resource requests from multiple other devices. | 08-25-2011 |
20120021771 | Methods And Apparatuses For Determining If Access To A Region Is Feasible Or Infeasible For A User Of A Mobile Device - Techniques are provided which may be implemented using various methods and/or apparatuses in a mobile device to allow the mobile device to obtain map information associated with at least a portion of an indoor environment comprising a plurality of regions. The mobile device may also obtain additional measurement information associated with at least the portion of the indoor environment, wherein the additional measurement information is based, at least in part, on previously obtained estimated position measurement information associated with a plurality of mobile devices within the indoor environment. The mobile device may determine whether access to at least one of the plurality of regions is either feasible or infeasible to a user associated with the mobile device. The determination may be based, at least in part, on the map information and the additional measurement information. | 01-26-2012 |
20120029817 | MAP HANDLING FOR LOCATION BASED SERVICES IN CONJUNCTION WITH LOCALIZED ENVIRONMENTS - The subject matter disclosed herein relates to systems, methods, apparatuses, devices, articles, and means for map handling for location based services in conjunction with localized environments. For certain example implementations, a method may comprise storing map information corresponding to a particular localized environment that is associated with a particular location context identifier, with the particular localized environment comprising an indoor environment corresponding to at least a portion of a building structure; receiving update information applicable to the map information corresponding to the particular localized environment, with the update information being associated with the particular location context identifier; updating the map information corresponding to the particular localized environment based at least partly on the update information so as to produce updated map information; and providing the updated map information to one or more mobile devices that are located at the particular localized environment. Other example implementations are described herein. | 02-02-2012 |
20130107702 | PROVIDING MULTIPLE LEVELS OF SERVICE FOR WIRELESS COMMUNICATION | 05-02-2013 |