摘要:
Certain aspects of the present disclosure propose techniques for avoiding a disruption in synchronous hybrid automatic repeat request operation at system time rollover. The techniques define the behavior of a system before and after the system frame number (SFN) rollover point to ensure a known relationship between a hybrid automatic repeat request (HARQ) process identification number and system time.
摘要:
In a wireless communication system, user equipment (UE) has autonomy provided by one or more set of rules to handle processing during a measurement gap. UE can ignore or use only a portion of the whole measurement gap if not needed. Thereby, an urgent need for remaining tuned to source carrier frequency can be supported, such as utilizing Random Access Channel (RACH) procedure. UE can also choose to tune to a target carrier frequency supporting timely handovers. Depending on the type of processing required (download shared channel (DL-SCH, UL-SCH, TTI bundling, RACH or SR), the UE may store requests and process the measurements during the gap or ignore the gap measurement as if there were no gaps.
摘要:
Techniques for sending packets and maintaining synchronization during handover is described. A user equipment (UE) may be handed over from a source base station to a target base station. The source base station may forward packets for the UE to the target base station, which may receive the packets out of order. In one design, the target base station may determine whether each packet can be sent in order to the UE, send the packet if it can be sent in order, and discard the packet otherwise. In another design, the target base station may re-order packets received within a re-ordering window and may send the re-ordered packets to the UE. In yet another design, the target base station may process each packet received out of order as if the packet is in order, e.g., by incrementing a hyper-frame number (HFN) or re-assigning the packet with a later sequence number.
摘要:
Systems and methods for managing packetized data handoff between base stations in a mobile communication system are described. In one aspect, a timer is utilized to decide when to perform path switch from serving traffic forwarded by the source station to traffic received by the serving gateway, and to preserve, to a large degree, the packet order from a gateway device to a terminal, during the handoff between base stations. When handoff is indicated, the timer is started and only packets that are received by the source base station is forwarded to the terminal, while the timer runs. When the timer expires, the target station switches to transmit fresh packets received from the serving gateway. The timer can be adjusted “on the fly” and has been demonstrated to maximize TCP throughput as compared to a fixed switch timer.
摘要:
Beacons may be grouped to facilitate neighbor discovery in a wireless network. For example, neighboring access devices such as IEEE 802.11 access points may cooperate to transmit beacons in a group. In this way, a wireless device seeking to discover the neighboring access devices may scan for the beacons for a shorter period of time. An indication may be provided to enable a wireless device to more efficiently scan the beacons. For example, the indication may indicate the channel the wireless device should scan to receive the next beacon that is to be transmitted. In addition, the indication may include information relating to the transmission time of the next beacon.
摘要:
Broadcast or multicast traffic is classified into different types of traffic such that different types of traffic are transmitted over different sub-networks. In addition, different transmission schedules may be associated with each of the different sub-networks. A device may thus be configured to receive only a selected portion of the different types of traffic by only waking from a power save mode at the intervals at which the corresponding sub-network sends the traffic. The standby time of the wireless station may thus be improved because the wireless station may awaken less frequently and for shorter periods of time. Different sub-networks carrying different types of broadcast and multicast traffic may be implemented in an 802.11-based system. For example, a single access point may define multiple basic service set identifiers for a single wireless channel.
摘要:
Techniques for avoiding collision of traffic in a wireless network are described. A station detects for synchronization of its traffic with traffic of other stations. The station may detect for synchronization based on, e.g., percentage of first transmission failures, counters indicative of statistics of transmitted frames, and/or other information. The station may confirm synchronization of its traffic, e.g., by monitoring for traffic from another station during a service period for the station. The station adjusts transmission of its traffic when synchronization is detected to avoid collision with the traffic of the other stations. The station may delay transmission of its traffic by a predetermined amount of time, by a pseudo-random amount, or until after the other stations finish their transmissions.
摘要:
Systems and methodologies are described that facilitate increased communication channel bandwidth efficiency in association with scheduled time periods that allocate channel access to particular stations. According to various aspects, systems and methods are described that facilitate providing and/or utilizing reverse direction grants in connection with scheduled channel access. Such systems and/or method can mitigate an amount of unused channel access time after a station completes data transmission prior to an end of the allocated period.
摘要:
Methods, systems, and devices are described for intercepting requests from applications installed on a mobile device. The requests are system calls that establish communication channels for the mobile device. The requests are captured and held from reaching TCP/IP stack of an operating system executing on the mobile device. An intercepted request is aggregated with other intercepted requests. The aggregated requests are bundled together and released to the operating system upon the detection of a triggering event. The capture, holding, and aggregation of requests from applications occur when the mobile device is in a background mode.
摘要:
Techniques for sending a message for random access by a user equipment (UE) are described. In an aspect, the UE may send the message on a control channel for random access and may send a reserved channel identifier to indicate the message being sent on the control channel. In another aspect, the UE may send the message in a protocol data unit (PDU) and may send additional information (e.g., a buffer status report) in the PDU if it can accommodate the additional information. In yet another aspect, the UE may generate a short message authentication code for integrity protection (MAC-I) for the message. The short MAC-I may have a smaller size and may be used to authenticate the UE. In yet another aspect, the UE may send a UE ID of one of multiple types for random access and may convey the UE ID type via a format field in the message.