Abstract:
Handling of related identities may be valuable in communication systems. More particularly, in areas such as long term evolution advanced (LTE-A) proximity services (ProSe), it may be useful to provide for handling of ProSe device to device (D2D) related identities at the radio access network (RAN) level. A method can include deriving an initial layer one identifier corresponding to a target user equipment or group. The method can also include determining whether the initial layer one identifier collides with another layer one identifier corresponding to a different target user equipment or group. The method can further include communicating with the target user equipment or group based on the determination of whether the initial layer one identifier collides with another layer one identifier in use.
Abstract:
There are provided measures for enabling/realizing an inactive communication mode, namely an inactive mode for the operation of terminal equipment and network equipment in a communication system. Such measures exemplarily comprise operation in a connected mode, in which a data plane connection and a control plane connection are established between a terminal equipment and a network equipment, transition from the connected mode to an inactive mode upon data plane inactivity, and operation in the inactive mode, in which the data plane connection is released and the control plane connection is maintained between the terminal equipment and the network equipment.
Abstract:
A method comprising monitoring whether or not an allocation of uplink communication resources on a primary cell of a communication network is successful for a communication element to be scheduled on a downlink channel of at least one secondary cell of the communication network, and incrementing at least one counter according to the monitoring result.
Abstract:
It is provided a method, comprising supervising if an information in a registration request is received from a registrar of a network domain, wherein the information comprises an application identity of a user of a terminal device and a network identity; storing, based on the received information, a binding between the application identity and the network identity; determining the network identity based on the binding and a received first request for establishing a communication to the terminal device; providing, based on the received first request, to the network domain, a second request for establishing the communication towards the terminal device, wherein the second request is based on the determined network identity.
Abstract:
It is provided a method, including detecting an occurrence of a link failure of a link to a secondary cell, wherein, before the occurrence of the link failure, an apparatus performing the method is connected in dual connectivity to the secondary cell via the link and to a master cell different from the secondary cell; informing the master cell on the link failure by a report if the occurrence of the link failure is detected.
Abstract:
There is provided a solution for using application layer information to establish clusters in a cell of a cellular communication system. In an embodiment, there is acquired at least one information element representing application layer networking relationship of a first user account associated with a first terminal device with at least a second user account of a second terminal device. The information element may be used in connection with determining the clusters in the cellular communication system.
Abstract:
Systems, methods, apparatuses, and computer program products that provide flexible support for services are provided. One method includes receiving, by a network node, a request type from a user equipment, where the request type indicates types of services required by the user equipment from the network. The method may also include using the received request type to make determinations regarding a provision of services to the user equipment.
Abstract:
A load balancing process includes determining when the cell is overloaded, determining whether the cell is in a hold state, maintaining a current mitigation state for the cell when the cell is determined to be in a hold state, determining whether traffic has decreased for the cell since a previous time and whether mitigation was applied to the cell at the previous time, applying a hold state to the cell when the traffic is determined to have decreased and the mitigation is determined to have been applied, determining whether performance has decreased by a predetermined level for the cell when the cell is not in the hold state, and applying mitigation to the cell when performance has decreased by at least the predetermined level. Such a process may be implemented as a state machine in a system.
Abstract:
An access device of a communication network system calculates power estimation values for successive time slots of a communication channel based on measurement values for the successive time slots from a user equipment accessing the communication network system via the access device. The access device performs transmit power control based on the power estimation values. If a compressed mode is active for the user equipment, from use for the transmit power control, power estimation values or measurement values for predetermined time slots are excluded, which include no time slot or at least one time slot before a first time point T1 at which the user equipment has entered the compressed mode, at least one time slot after a second time point T2 at which the user equipment has returned from the compressed mode, and each time slot between the first time point T1 and the second time point T2.