Abstract:
Methods, systems, and apparatuses for mobility management in wireless communications systems that provide both voice connection services and data services are disclosed. In some aspects, enhanced connectivity with wireless networks after a failure of voice connection services is provided. A counter may be utilized in connection with a combined registration procedure in which a device requests registration for both data services and voice connection services in the wireless network. The counter may track failed attempts to register for voice connection services when the request is accepted for data services. The counter may be reset in response to a deregistration event, such as a user input or a network command, allowing a full number of attempts for later registration with the wireless network.
Abstract:
Aspects disclosed herein facilitate security handling of 5GS to EPC reselection are disclosed herein. An example method at a UE includes transmitting a first TAU request, the first TAU request encoded using a first security context associated with a first RAT, the first TAU request being integrity protected using a first uplink count based on the first security context, and the first TAU request including a first set of information including an identifier mapped to a second RAT associated with the first network entity. The example method also includes transmitting a second TAU request, the second TAU request including the first set of information, the second TAU request being integrity protected using a second uplink count. The example method also includes communicating based on a mapped security context based on the first security context and at least one of the first uplink count or the second uplink count.
Abstract:
Techniques and apparatus for optimizing an initial access stratum security mode command procedure are described. One example technique includes sending a first service request to establish a connection with a network. A second service request is sent to the network, upon determining that one or more criteria is satisfied. Another example technique includes sending a first service request to establish a connection with a network and sending a second service request after sending the first service request. The first service request is associated with a first security parameter and the second service request is associated with a second security parameter. A security mode command procedure is participated in with a base station, based on the first security parameter and the second security parameter.
Abstract:
Certain aspects of the present disclosure propose techniques for independently signaling features supported by a user equipment (UE) in different duplexing modes. The UE may be capable of communicating in frequency division duplexing (FDD) and time division duplexing (TDD) modes. The UE may obtain a FDD-specific feature group indicators (FGIs) set and a TDD-specific FGIs set, and signal at least one of the FDD-specific FGIs set or TDD-specific FGIs set. In addition, the UE may take one or more actions to reduce the likelihood of transitioning to a mode of operation that is different from its current mode of operation.
Abstract:
Methods, systems, apparatuses and devices are described for managing a call during radio link failure. In one embodiment, radio link failure over a radio access technology may be detected during or after a call setup procedure. A public land mobile network and an equivalent public land mobile network may be selected. An initial search for cells of the radio access technology may be performed over the selected public land mobile network and the equivalent public land mobile network. The initial search may be performed once or twice based on a configurable parameter.
Abstract:
Various aspects described herein relate to establishing services in wireless communications. A service request related to establishing a service over an established radio bearer can be transmitted. An authentication failure for the service request can be detected. It can be determined whether a procedure related to the service request is successfully completed. In can also be determined whether to terminate the established radio bearer based at least in part on the determination of whether the procedure related to the service request is successfully completed.
Abstract:
Apparatus and methods of maintaining a cell database for wireless communications include discovering a second cell to which a user equipment may reselect. In an aspect, the user equipment may be currently served by a first cell and the second cell is a closed subscriber group cell. Further, aspects include querying a fingerprinting database to determine whether the second cell was previously recorded in the fingerprinting database. Upon determining that the second cell was not previously recorded, further aspects include adding the second cell to the fingerprinting database. Adding the second cell may comprise indicating an association between the first cell and the second cell in the fingerprinting database.