Abstract:
Briefly, in accordance with one or more embodiments, user equipment (UE) comprises processing circuitry to connect to a network via an untrusted wireless local area network (WLAN) and determine a location of the UE to provide the location of the UE if a voice call is made by the UE via the untrusted WLAN. The UE provides the location of the UE to a Public-Safety Answering Point (PSAP) via one or more network nodes of the network via the untrusted WLAN.
Abstract:
A user equipment (UE) is configured to receive, from a network, a first access control message and a second access control message. The first access control message corresponds to a first access control service, and the second access control message corresponds to a second access control service. The first and second access control messages include access control information for controlling access to the network for at least one application on the UE. The UE is also configured to determine a combined access level for the at least one application based on the first and second access control messages and to limit access to wireless communications for the at least one application based on the combined access level.
Abstract:
Technology for using an open mobile alliance (OMA) management object (MO) for congestion control in mobile networks is described. A novel type of OMA MO for application specific access control (ASAC) can include internet protocol (IP) flow descriptions that can be used to characterize applications with fine granularity. Priorities can be assigned to IP flows based on the IP flow descriptions. A user equipment (UE) can receive such an OMA MO and also receive application-barring information regarding a congestion level in a mobile network with which an application at the UE wishes to connect. The UE can have a connectivity manager (CM) that determines whether to allow the application to establish a connection with the mobile network based on the priority level of the application's associated IP flow and the application-barring information.
Abstract:
Technology for provisioning categories of applications on a mobile device is disclosed. A wireless network element can communicate Application Specific Congestion Control for Data Communications (ACDC)/Application and Service Access Control (ASAC) information to the mobile device. The ACDC/ASAC information can include a preconfigured list of application categories. Each application category can include a set of applications that are allowed to access a wireless network from the mobile device during at least one defined condition level. The wireless network element can activate ACDC/ASAC for one or more condition levels while a capacity threshold of the wireless network is exceeded. The wireless network element can allow a set of applications for a selected application category to communicate with the wireless network when the ACDC/ASAC is activated based on the one or more condition levels for the selected application category.
Abstract:
A user equipment (UE) is configured to receive, from a network, a first access control message and a second access control message. The first access control message corresponds to a first access control service, and the second access control message corresponds to a second access control service. The first and second access control messages include access control information for controlling access to the network for at least one application on the UE. The UE is also configured to determine a combined access level for the at least one application based on the first and second access control messages and to limit access to wireless communications for the at least one application based on the combined access level.
Abstract:
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP) addressing. The non-IP D2D PDCP-encapsulated communication can further include two forms of secure data transfer. A first non-IP D2D PDCP-encapsulated communication can be a negotiated non-IP D2D PDCP-encapsulated communication. A second non-IP D2D PDCP-encapsulated communication can be a non-negotiated non-IP D2D communication. The non-negotiated non-IP D2D PDCP-encapsulated communication can include a common key management server (KMS) version and a distributed KMS version. The encapsulated communication can be used with various protocols, including a PC5 protocol (such as the PC5 Signaling Protocol) and wireless access in vehicular environments (WAVE) protocols.
Abstract:
Briefly, in accordance with one or more embodiments, a user equipment (UE) may enter into an E-UTRAN Routing Area Paging Channel state, and is configured with an E-UTRAN Routing Area and an Anchor identifier to identify an anchor evolved Node B (eNB) for the UE. The UE selects to a new cell without performing a handover procedure, and performs a cell update procedure. The UE also may enter into a Cell Update Connected state, and is configured with an Anchor identifier. The UE selects to a new cell, performs a cell update procedure, performs a buffer request procedure, and performs a cell update procedure to download buffered data and to perform data transmission with the new cell.
Abstract:
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP) addressing. The non-IP D2D PDCP-encapsulated communication can further include two forms of secure data transfer. A first non-IP D2D PDCP-encapsulated communication can be a negotiated non-IP D2D PDCP-encapsulated communication. A second non-IP D2D PDCP-encapsulated communication can be a non-negotiated non-IP D2D communication. The non-negotiated non-IP D2D PDCP-encapsulated communication can include a common key management server (KMS) version and a distributed KMS version. The encapsulated communication can be used with various protocols, including a PC5 protocol (such as the PC5 Signaling Protocol) and wireless access in vehicular environments (WAVE) protocols.
Abstract:
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP) addressing. The non-IP D2D PDCP-encapsulated communication can further include two forms of secure data transfer. A first non-IP D2D PDCP-encapsulated communication can be a negotiated non-IP D2D PDCP-encapsulated communication. A second non-IP D2D PDCP-encapsulated communication can be a non-negotiated non-IP D2D communication. The non-negotiated non-IP D2D PDCP-encapsulated communication can include a common key management server (KMS) version and a distributed KMS version. The encapsulated communication can be used with various protocols, including a PC5 protocol (such as the PC5 Signaling Protocol) and wireless access in vehicular environments (WAVE) protocols.
Abstract:
A method configured to selectively retransmit a message includes analyzing a message received by a device to determine a set of radio access technologies (RATs) in which the message has been transmitted. If the device supports a device RAT that is different from set of RATS the message is updated to include the device RAT and the updated message is transmitted using the device RAT.