Abstract:
A portable communication device operating of a first WWAN can receive an identifier from a WLAN access point indicating that one or more devices operating on a second WWAN are in the vicinity of the WLAN access point. In response, the portable communication device invokes an interference mitigation process while the identifier indicates that devices operating on the second WWAN are present.
Abstract:
A method, a subscriber unit, and a system provide concurrent voice and data systems and methods that “steal bits” from voice frames for low-speed concurrent data. In this manner, concurrent voice and data is supported over protocols that require voice-only in current operation such as Project 25 (P25). The stealing of bits from voice is done in a manner that is transparent and not noticeable to users. The systems and methods enable replication of signaling on the downlink and wireline segments that is replaced on the uplink, encoding of interleaving blocks that extend across multiple Layer 2 voice logical data units (LDUs), flexibility in replacing voice data in LDUs, indication of the availability of the service and an interleaving schedule, notification of upcoming stealing events via signaling, and the like.