Abstract:
A radio frequency receive chain of an access point is reused for different functions. For example, the same RF receive chain may be used to receive on a downlink at certain points in time and on an uplink at other points in time. An RF receive chain that is used to derive synchronization from downlink signals received from a macro system also may be used to receive uplink signals from an access terminal to provide assistance for hand-in of the access terminal. Accelerated searching for hand-in may be provided through the use of a relatively small search window for hand-in of an access terminal to a small coverage access point. In some aspects, the search window may be defined based on the distance between access points or calibration of synchronization error between access points.
Abstract:
A method for managing access to a macro mobile operator core network (250) by a guest terminal device (225) through a femto cell (210), and more particularly through a femto cell (210) connected to the Internet (240). When a guest terminal seeks guest access to network services at a site for example while a guest at a person's home, or a customer in a shop, or a traveler in a transportation station, access may be granted by information exchange between the proprietor of the site and the macro mobile operator core network (250). Access may be granted via the proprietor via a terminal device (220) connected wirelessly to the core network, or by any device connected to the Internet. Once access is granted, the guest terminal device (225) receives sufficient information to initiate communication with femto cells (210) in the proximity of the site, and thereby begin using Internet-based communication.
Abstract:
Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal