摘要:
Techniques are described for wireless communication. One method includes receiving a first transmission according to a first radio access technology (RAT); determining a transmitter of the wireless communication device is tuned to a second RAT during a default feedback transmission time for the first transmission; and transmitting feedback for the first transmission at a delayed feedback transmission time for the first transmission. The delayed feedback transmission time is based at least in part on a timing for tuning the transmitter from the second RAT to the first RAT. Another method includes transmitting a first transmission, in which the first transmission is associated with a default feedback transmission time for the first transmission; and receiving feedback for the first transmission at a delayed feedback transmission time for the first transmission.
摘要:
The disclosure relates in some aspects to establishing connectivity with a network using a first set of credentials and determining whether additional connectivity needs to be established (e.g., using a second set of credentials) to communicate data. The disclosure relates in some aspects to the use of multiple credentials for access and service connectivity. For example, traffic generated by a device may be authorized based on a different set of credentials than the set of credentials used to access the network (e.g., to connect to an LTE network for a PDN connection). In this way, traffic belonging to a specific service or application can be charged and policed based on service specific needs. The disclosure thus relates in some aspects to the use of access credentials and service credentials. These different types of credentials can be used to enable traffic differentiation and policing based on the credentials in use.
摘要:
Aspects generally relate to a priority mechanism for handing potentially conflicting triggers related to offloading rules and RAN aggregation. As described, a UE may receive, from a BS, configuration information for RAN aggregation of one or more data bearers and offloading rules for WLAN offloading. The UE may determine a priority for communicating using the RAN aggregation and offloading rules based, at least in part, on the received configuration information. The UE may perform the RAN aggregation or the WLAN offloading according to the offloading rules based on the determined priority. The priorities may be established in an effort to generally give priority to RAN aggregation over offloading rules and/or give priority to UE-specific instructions over broadcasted instructions.
摘要:
A core network (CN) may establish and distribute a quality of service (QoS) policy across a wireless communication system, e.g., by sending QoS policy information to an access network and to user equipment. The QoS policy may be implemented with respect to data network (DN) sessions as well as data sessions. For each DN session or data session, the QoS policy may be applied by explicit or implicit request, and data sessions may in some examples utilize pre-authorized QoS policies without the need to request the QoS. Other aspects, embodiments, and features may also be claimed and described.
摘要:
Systems and techniques are disclosed to facilitate the sponsored connectivity of a user equipment on a serving network so that the UE may access a service whose connectivity is sponsored by an application service provider. The application service provider provisions the serving network so that it is aware of the sponsored connectivity. In an attach attempt to the serving network, the UE provides a client token based on a pre-existing credential (established between the UE and the application service provider) instead of a subscriber identifier with the attach request. The application service provider's server validates the access credential to authenticate the UE and provides information that the serving network uses to mutually authenticate with the UE. The UE may then use the serving network to access the service via the sponsored connection, even where the UE does not have a subscriber identity and subscription with a cellular network.
摘要:
Methods and apparatuses are described in which an unlicensed spectrum is used for Long Term Evolution (LTE) communications. A first method includes synchronizing clear channel assessment (CCA) slots across a plurality of base stations to determine availability of an unlicensed spectrum for transmissions in a next transmission interval. A second method includes performing a CCA during one of a plurality of CCA slots synchronized across a plurality of evolved Node Bs (eNBs) to determine availability of unlicensed spectrum for transmissions in a next transmission interval.
摘要:
Methods and apparatuses are described in which an unlicensed spectrum is used for Long Term Evolution (LTE) communications. A first method includes comparing past transmission activity on an unlicensed spectrum to an activity threshold, transmitting a first subframe type in the unlicensed spectrum during a next active transmission when the past transmission activity is greater than the activity threshold, and transmitting a second subframe type in the unlicensed spectrum during a next active transmission when the past transmission activity is lesser than the activity threshold, the second subframe type comprising a more robust subframe type than the first subframe type. A second method includes generating one or both of PUCCH signals and PUSCH signals based on interleaved signals that increase nominal bandwidth occupancy in an unlicensed spectrum, and transmitting the generated signals in the unlicensed spectrum. A third method includes receiving the PUCCH signals and the PUSCH signals.
摘要:
In an aspect, a network supporting a number of client devices may include a network device that establishes a security context and generates a client device context. The client device context includes network state information that enables the network to communicate with the client device. The network device generates one or more encrypted network reachability contexts based on the client device context, and transmits the one or more encrypted network reachability contexts to a network entity. The one or more encrypted network reachability contexts enable the network device to reconstruct the context for the client device when the network device receives a message to be transmitted to the client device from the network entity. As a result, the network device can reduce an amount of the context for the client device maintained at the network device in order to support a greater number of client devices.
摘要:
Techniques are described for traffic volume determination and reporting by an access node and/or a node of a core network in a wireless communications system. One or more wireless connections may be established with a user equipment (UE) to serve one or more streams of traffic using a first cell and a second cell, which may have different cell characteristics. A first traffic volume for the UE may be determined based on traffic volume served over the first cell, and a second traffic volume for the UE may be determined based on traffic volume served over the second cell. A charging data record may be generated based on the first traffic volume and the second traffic volume. Traffic volume served over the first cell then may be charged at a different rate that traffic served over the second cell.
摘要:
A system and method for mobility tracking of user equipment in a network includes a user equipment. The user equipment includes an antenna for receiving and sending signals to a plurality of network nodes in a network and a processor coupled to the antenna. The processor is configured to broadcast, using the antenna, a pilot signal to advertise the user equipment, receive, using the antenna, a pilot response from a first network node acting as a serving node for the user equipment, and communicate with the network through the serving node. The pilot signal includes a reference sequence for the network nodes to track followed by a payload including information about an identity of the user equipment. In some embodiments, the reference sequence varies based on a state of the user equipment. In some embodiments, the reference sequence is randomly selected.