Abstract:
Methods, apparatuses, and systems are provided for facilitating device-to-device connection establishment. A method may include directing broadcast of an indication of a device-to-device registration area identification in each of one or more cells forming a device-to-device registration area identified by the device-to-device registration area identification. The method may further include directing receipt of a device-to-device registration request originated by a first terminal apparatus in response to the broadcast indication. The first terminal apparatus may be located within the registration area. The method may additionally include registering the first terminal apparatus based at least in part upon the device-to-device registration request. Corresponding apparatuses and systems are also provided.
Abstract:
There are provided measures for lawful interception and security based admission control for proximity service. Such measures could include detecting a requirement for control in relation to setting up or securing a connection of a proximity service between at least two devices, determining availability of at least one lawful interception and security agent capable of performing an operation relating to lawful interception and/or security in relation to the connection of the proximity service, and performing control in relation to setting up or securing the connection of the proximity service when availability of the at least one lawful interception and security agent is determined.
Abstract:
This document discloses a solution for employing proximity discovery devices to carry out discovery of terminal devices registered to proximity services. The proximity discovery device is provided with an identifier that is unique for the discovery procedure, and the proximity discovery device transmits its unique identifier in a discovery signal. Terminal devices registered to the proximity services and detecting the discovery signal indicate their presence to the proximity discovery devices. The proximity discovery device then creates a discovery reports on the basis of the contact(s) from the terminal device(s) and transmits the discovery report to a network element of a cellular communication system managing the proximity services.
Abstract:
Various communication systems may benefit from differentiated quality of service management. For example, specific applications run on a user equipment in a 5G radio access network may benefit from the flexible differentiated quality of service management. A method includes determining a service flow setup, and mapping traffic through the service flow by a common convergence sublayer entity to at least one radio convergence sublayer entity. The method also includes controlling the traffic through the service flow.
Abstract:
The present invention addresses method, apparatus and computer program product for setting up a proximity services device-to-device communication service. Thereby, by a transmitting user equipment, a message including application control information is compiled, a scheduling assignment for scheduling the message transmission is transmitted to a device to be set up, and the message is transmitted to the device according to the scheduling assignment. A receiving user equipment receives a scheduling assignment and at least one of data packets scheduled in the scheduling assignment, determines whether at least one of the received data packets relates to a new proximity services device-to-device communication service traffic flow, determines whether a message including application control information is included in the at least one of the received data packets, and completes the setup based on the application control information.
Abstract:
A method and apparatus may include receiving, by a user equipment from a first access point which supports a first radio access technology, a radio-resource-control (RRC) reconfiguration message including an RRC configuration information of a second access point, after an initiation of a slave RRC at the second access point has been determined. The second access point supports a second radio access technology, and performing, by the user equipment, a random access procedure with the second access point based on the RRC reconfiguration message. The user equipment is configured to have an RRC connection with the first access point and the first access point is a master node.
Abstract:
There is provided a method comprising receiving, at a user device, control information usable for determining whether at least one uplink logical channel is to be transmitted using at least one of a first uplink transport channel and a second uplink transport channel, determining, in dependence on said information, a mapping between the at least one uplink logical channel and at least one of the first uplink transport channel and second uplink transport channel and causing the at least one uplink logical channel to be transmitted using the at least one uplink transport channel to which the at least one uplink logical channel is mapped.
Abstract:
A method and apparatus may include determining, by a network node, that a slave radio-resource-control function is to be initiated. The slave radio-resource-control function may be performed by an access point. The method may also include transmitting a message to the access point. The message includes at least one of a request to initiate the slave radio-resource-control function and a confirmation that the slave radio-resource-control function can be initiated.
Abstract:
A technique is provided for receiving, by a MS from a BS a failure notification message indicating a failure of a BS-core network interface, sending, from the MS to the BS, a security agent (SA) notification including a MSID identifying the MS, a service profile identifying one or more services, and one or more user group IDs that identify one or more user groups of which the MS is a member, and receiving, by the MS from the BS, a SA configuration message including a service identification identifying at least one of the one or more services, one or more user group IDs identifying one or more user groups for which the MS has been configured as a security agent to perform the identified service, and a BS access key to allow one or more other MSs to access or establish a connection with the BS.
Abstract:
A technique is provided for controlling sending, by a user device to a network node in a wireless network via spatial multiplexing during a first transmission time interval, a first instance of a first protocol data unit via a first transport block and a first instance of a second protocol data unit via a second transport block, controlling receiving a first data indicator associated with the first transport block that indicates that the first transport block was not received by the network node, and controlling sending, by the user device to the network node via spatial multiplexing during a second transmission time interval in response to receiving the first data indicator, at least a portion of a second instance of the first protocol data unit via a third transport block and at least a portion of a third instance of the first protocol data unit via a fourth transport block.