Abstract:
Methods and apparatuses for activating lawful interception in a network for devices without MSISDN are provided. One method includes receiving an external identifier for a terminal or subscription in a network, and querying a server for an international mobile subscriber identity (IMSI) that is associated with the terminal or subscription identified by the external identifier. The method may also include activating interception in the network using the international mobile subscriber identity (IMSI).
Abstract:
The specification and drawings present a new method, apparatus and software related product (e.g., a computer readable memory) for load balancing in a network (e.g., LTE wireless network) and between networks based on reselection priority and/or a level of congestion. The embodiments of the invention describe different options to move the UE to another cell which may be in the same or in a different RAT, to avoid congestion and/or overloading of the network. This will help to avoid subsequent RRC connection reject messages being sent to the UE from the congested cell.
Abstract:
Various communications may benefit from enhancements for group communication. For example, evolved packet system including an evolved multimedia broadcast/multicast service may benefit from such enhancements. For example, a method may include preparing a list of area names, identities, or both area names and identities to a network element. Moreover, a method may also include requesting the network to broadcast data to a broadcast area defined by the list. The list can define an allowed area, a broadcast area, or both.
Abstract:
A method and apparatus can be configured to transmit first policy rules to a packet-data-network gateway. The first policy rules are configured to be installed on the packet-data-network gateway. The first policy rules are configured to enable the packet-data-network gateway to create first route-header information. The method can also include transmitting second policy rules to an interworking gateway. The second policy rules are configured to be installed on the interworking gateway. The second policy rules are configured to enable the interworking gateway to create second route-header information.