摘要:
Systems and methods for managing packetized data handoff between base stations in a mobile communication system are described. In one aspect, a timer is utilized to decide when to perform path switch from serving traffic forwarded by the source station to traffic received by the serving gateway, and to preserve, to a large degree, the packet order from a gateway device to a terminal, during the handoff between base stations. When handoff is indicated, the timer is started and only packets that are received by the source base station is forwarded to the terminal, while the timer runs. When the timer expires, the target station switches to transmit fresh packets received from the serving gateway. The timer can be adjusted “on the fly” and has been demonstrated to maximize TCP throughput as compared to a fixed switch timer.
摘要:
Beacons may be grouped to facilitate neighbor discovery in a wireless network. For example, neighboring access devices such as IEEE 802.11 access points may cooperate to transmit beacons in a group. In this way, a wireless device seeking to discover the neighboring access devices may scan for the beacons for a shorter period of time. An indication may be provided to enable a wireless device to more efficiently scan the beacons. For example, the indication may indicate the channel the wireless device should scan to receive the next beacon that is to be transmitted. In addition, the indication may include information relating to the transmission time of the next beacon.
摘要:
Broadcast or multicast traffic is classified into different types of traffic such that different types of traffic are transmitted over different sub-networks. In addition, different transmission schedules may be associated with each of the different sub-networks. A device may thus be configured to receive only a selected portion of the different types of traffic by only waking from a power save mode at the intervals at which the corresponding sub-network sends the traffic. The standby time of the wireless station may thus be improved because the wireless station may awaken less frequently and for shorter periods of time. Different sub-networks carrying different types of broadcast and multicast traffic may be implemented in an 802.11-based system. For example, a single access point may define multiple basic service set identifiers for a single wireless channel.
摘要:
Techniques for avoiding collision of traffic in a wireless network are described. A station detects for synchronization of its traffic with traffic of other stations. The station may detect for synchronization based on, e.g., percentage of first transmission failures, counters indicative of statistics of transmitted frames, and/or other information. The station may confirm synchronization of its traffic, e.g., by monitoring for traffic from another station during a service period for the station. The station adjusts transmission of its traffic when synchronization is detected to avoid collision with the traffic of the other stations. The station may delay transmission of its traffic by a predetermined amount of time, by a pseudo-random amount, or until after the other stations finish their transmissions.
摘要:
Systems and methodologies are described that facilitate increased communication channel bandwidth efficiency in association with scheduled time periods that allocate channel access to particular stations. According to various aspects, systems and methods are described that facilitate providing and/or utilizing reverse direction grants in connection with scheduled channel access. Such systems and/or method can mitigate an amount of unused channel access time after a station completes data transmission prior to an end of the allocated period.
摘要:
Methods, systems, and devices are described for intercepting requests from applications installed on a mobile device. The requests are system calls that establish communication channels for the mobile device. The requests are captured and held from reaching TCP/IP stack of an operating system executing on the mobile device. An intercepted request is aggregated with other intercepted requests. The aggregated requests are bundled together and released to the operating system upon the detection of a triggering event. The capture, holding, and aggregation of requests from applications occur when the mobile device is in a background mode.
摘要:
Techniques for sending a message for random access by a user equipment (UE) are described. In an aspect, the UE may send the message on a control channel for random access and may send a reserved channel identifier to indicate the message being sent on the control channel. In another aspect, the UE may send the message in a protocol data unit (PDU) and may send additional information (e.g., a buffer status report) in the PDU if it can accommodate the additional information. In yet another aspect, the UE may generate a short message authentication code for integrity protection (MAC-I) for the message. The short MAC-I may have a smaller size and may be used to authenticate the UE. In yet another aspect, the UE may send a UE ID of one of multiple types for random access and may convey the UE ID type via a format field in the message.
摘要:
The disclosure is directed to an access terminal, and method for selecting an access point in a communications system. The access terminal may include memory and a processor. The processor may be configured to maintain in the memory a database containing a list of access points that have previously served the access terminal with at least a minimum quality of service, the processor being further configured to use the list to search for an access point to associate with, or search for an access point to handoff the access terminal to during operation. In addition to, or alternatively, the processor may also be configured to maintain in the database a second list of access points. The database may be used by the processor to search for an access point that is not on the second list to associate with, or handoff the access terminal to.
摘要:
Systems and methodologies are described that facilitate effectuating a random access procedure in a wireless communication environment. A random access preamble can be sent from an access terminal to a base station, and a random access response can be sent from the base station to the access terminal in response. The random access response can allocate resources to be utilized by the access terminal for a scheduled transmission (e.g., message 3, . . . ). Further, a plurality of Transmission Time Intervals (TTIs) can be bundled for the scheduled transmission. Moreover, a payload of the scheduled transmission can be transmitted to the base station from the access terminal within a common Transport Block (TB) using the bundled plurality of TTIs. According to an example, employment of TTI bundling can be controlled on a per network basis, per base station basis, or per access terminal basis.
摘要:
Techniques to support beamforming for stations in a wireless network are described. In one aspect, a station may support beamforming with implicit feedback or explicit feedback by having capabilities to transmit and receive sounding frames, respond to training request by sending a sounding frame, and respond to request for explicit feedback. In one design of explicit beamforming, the station may send a first frame with a request for explicit feedback and may also send a Null Data Packet (NDP) having at least one training field but no data field. The station may receive a second frame with the explicit feedback, which may be derived based on the NDP. The station may derive steering information (e.g., steering matrices) based on the explicit feedback and may then send a steered frame with beamforming based on the steering information. The station may also perform implicit beamforming using NDP for sounding.