摘要:
A method and a device for adjusting downlink power in a wireless communication system are disclosed. A method for receiving control information according to an embodiment of the present disclosure may comprise the steps of: receiving, from a base station, first configuration information related to a serving cell and second configuration information related to a CSI-RS resource, the first configuration information including information on energy per resource element (EPRE) of a secondary synchronization signal (SSS), the second configuration information including information on a first power offset of EPRE of the CSI-RS resource against the EPRE of the SSS; and receiving control information for adjustment of downlink transmission power from the base station. The control information may include an index of a CSI-RS resource related to the adjustment of the downlink transmission power.
摘要:
Embodiments of the present invention disclose a hierarchical network registration method. The method is applied to a hierarchical network formed by a terrestrial network and at least one layer of an air network, and the method includes: obtaining, by a radio network node, a registration result of an air network node, where the radio network node is located in the terrestrial network; the air network node is located in the air network, and covers the radio network node; and the registration result includes attribute information and beam information of the air network node; and broadcasting, by the radio network node, the registration result to a mobile user covered by the radio network node. The air network in the method of the present invention may be a satellite network, and the hierarchical network is a hierarchical network formed by the satellite network and the terrestrial radio network. The air network in the method of the present invention may be a balloon network, and the hierarchical network is a hierarchical network formed by the balloon network and the terrestrial radio network.
摘要:
A method for powering voice over long term evolution (VoLTE) in long term evolution networks. A VoLTE/VoWiFi is centrally enabled for any sized network without implementing an IMS core, but rendering almost the same user experience as standard VoLTE (except voice call continuity). A conventional 2G/3G CS roaming model is enabled for both signaling and media routing. A subscriber profile is cached at a carrier VoLTE platform to enable optimized call routing. A validation mechanism is provided in case IMS AKA authentication is not possible due to an operator not being able to provision authentication vectors via Cx, S6a or MAP interfaces. Terminating access domain selection is implemented whenever an MT call arrives, whereby a T-ADS application server is eliminated. Voice call continuity is implemented whenever a VoLTE customer in a call leaves LTE coverage in favor of 2G/3G coverage. A novel method to actuate call continuity is proposed using a call back and call merge method.
摘要:
The present disclosure provides in some embodiments a communication system, a communication network, a communication device and a communication method. The communication system includes a self organizing MESH access network, a cellular access network, a backhaul network and a core network. The MESH access network is connected to the core network through the backhaul network, and the cellular access network is connected to the core network through the backhaul network.
摘要:
A method for distributing keys in a wireless communication network includes: receiving, by a mobility management entity, MME, a root key from a home subscriber server, HSS; deducing, by the MME, the keys for protecting the security of an access stratum, AS, signaling, a non-access stratum, NAS, signaling and user data according to the root key; and sending, by the MME, the keys to entities performing security operation; so that the keys for protecting the security of the AS signaling, the NAS signaling and user data in a wireless communication network are deduced and distributed and the security of network communication is guaranteed.
摘要:
The invention proposes several embodiments related to the management of secure elements, like UICCs embedding Sim applications, these secure elements being installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications. One particular embodiment relates to a method for downloading a subscription from an operator platform (90) to a UICC (91). Downloading is only performed if the device is authorised as indicated in a table (94).
摘要:
Adaptive ambient services are provided. In some embodiments, an adaptive ambient service includes providing an ambient service profile. In some embodiments, an ambient service includes implementing an ambient service profile for assisting control of the communications device use of an ambient service on a wireless network, in which the ambient service profile includes a plurality of service policy settings, and in which the ambient service profile is associated with an ambient service plan that provides for initial access to the ambient service with limited service capabilities prior to activation of a new service plan; monitoring use of the ambient service based on the ambient service profile; and adapting the ambient service profile based on the monitored use of the ambient service.