Abstract:
Example methods and systems for requesting information from the Internet Domain Name System (DNS) based on a destination and one or more codecs of a source specified within a computer-readable invitation to establish a communication session are described. A source gateway or a user agent device can generate the invitation. A DNS record associated with the destination can specify codecs used by the destination or a gateway the destination uses to carry out communication sessions. A proxy server that received the invitation and the DNS record can select a gateway that uses a codec that matches a codec used and preferred by a gateway. The proxy server can forward the codec to selected gateway, in particular, to an IP address and port associated with the selected gateway, for notifying the destinations of the requested communication session. The invitations can comprise SIP INVITE messages.
Abstract:
In a communication system comprising a first base station of a plurality of base stations, a computing system may identify one or more other base stations of the plurality based on whether each of the one or more other base stations sits as a node on the same local area network (LAN) as the first base station, and perhaps based on other considerations, such as whether each of the one or more other base stations is geographically located near the first base station and whether each operates with a whitelist. The computing system may then cause the first base station to wirelessly transmit, to at least one user equipment device (UE) served by the first base station, a specification of the identified one or more base stations to enable the at least one UE to search for coverage of at least one of the specified one or more base stations.
Abstract:
A UE gauges how many UEs are currently served in each of various coverage systems, by evaluating downlink control channel signaling in each coverage system to determine from the control signaling an extent to which the signaling provides for UE scheduling and to establish a corresponding relative measure of an extent to which the coverage system is serving UEs. In an example implementation, this evaluation may involve eliminating from consideration any control channel signaling that is not associated with UE scheduling, so as to determine by exclusion an extent to which the downlink control channel signaling is associated with UE scheduling. The UE then compares such relative measures of the various coverage systems as a basis to select a coverage system in which to operate, such as by favoring operation in the coverage that thereby seems to be serving the fewest number of UEs.
Abstract:
A radio access network (RAN) determines whether transmission time interval (TTI) bundling is warranted for a wireless communication device (WCD) based on information contained in one or more reports from the WCD. The information may include a reference-signal value, such as a reference signal received power (RSRP) or a reference signal received quality (RSRQ), in a measurement report, an amount of data indicated in a buffer status report as being buffered by the WCD for transmission via one or more bearers in a bearer group, and a service class associated with the bearer group. If the RAN determines that TTI bundling is warranted for the WCD, the RAN may further select a TTI bundle size for the WCD. The RAN may select the TTI bundle size from among a plurality of values, which values may include a standard TTI bundle size and a smaller TTI bundle size.
Abstract:
A gateway may respond to a data-connection request, relating to a request to establish a packet data connection for a requesting wireless communication device (WCD), based on a request rate determined from the number of other data-connection requests that the gateway has received during a particular period of time. If the request rate is below a first threshold, the gateway may initiate an authentication process to authenticate the requesting WCD and either accept or reject the data-connection request based on whether the authentication process is successful or unsuccessful. If the request rate is greater than the first threshold and less than a second threshold, the gateway may accept the data-connection request without initiating the authentication process. If the request rate is greater than the second threshold, the gateway may reject the data-connection request without initiating the authentication process.
Abstract:
A network node through which VoIP call setup signaling passes between a user equipment device (UE) and a VoIP call server detects VoIP call setup failure and responsively invokes setup of an alternate call between the UE and the called destination. For instance, a packet-gateway in an LTE network may detect VoIP call setup failure and may responsively invoke setup of a circuit-switched fallback call between the UE and the called destination.
Abstract:
A radio access network (RAN) may receive indications from a wireless communication device (WCD). The RAN may support wireless communication via a plurality of non-overlapping frequency bands, and the plurality of non-overlapping frequency bands may include a low-frequency band and a high-frequency band. The low-frequency band and the high-frequency band may be separated by at least 5 megahertz. The indications may indicate signal strengths at which the WCD received signals from one or more frequencies in the low-frequency band and one or more frequencies the high-frequency band. The RAN may also receive a communication request from the WCD. Based at least in part on receiving the communication request, the RAN may select a frequency from the one or more frequencies in the low-frequency band and the one or more frequencies in the high-frequency band, and may instruct the WCD to communicate using the selected frequency.
Abstract:
Disclosed herein is a method and corresponding system for TTI bundling based on communication type. The method may involve receiving an indication of a wireless communication, where the wireless communication may be of a particular quality of service and a particular type. The method may further involve responsive to receiving the indication, (i) determining the particular type of the wireless communication and (ii) determining, based at least in part on the determined particular type of the wireless communication, TTI bundling with a bundling size, N, should be invoked for transmitting data of the wireless communication, where N>1. And the method may involve responsive to determining that TTI bundling with the bundling size N should be invoked for transmitting data of the wireless communication, invoking TTI bundling with the bundling size N for transmitting the data of the wireless communication.
Abstract:
Disclosed is a method and system to help facilitate transition from broadcast to unicast. A broadcast server provides a copy of session content to a unicast gateway, and a content-synchronizer keeps track of which UEs are broadcast recipients and what the progress of the broadcast is over time. In response to unicast attachment of a UE with the unicast gateway, as when the UE moves from broadcast coverage to unicast coverage, the unicast server determines based on information from the content synchronizer (i) that the UE is a broadcast recipient and (ii) the progress of the broadcast so far. The unicast gateway then begins transmitting to the UE the media content received from the broadcast server, starting at a point in the media content based on the determined progress. This process may thereby help to facilitate a seamless transition from broadcast to unicast, with at most a brief interruption.
Abstract:
One or more random access channel (RACH) instances may be specially designated for use by mobile terminals that are in threshold poor coverage of an intended base station. Further, one or more other base stations that provide coverage overlapping with, within, or near coverage of the intended base station may be arranged to monitor the one or more specially designated RACH instances for mobile terminal access requests and, upon detecting any such access request, to forward the access request via an inter-base station link to the intended base station. The intended base station may then respond to the mobile terminal access request through a direct downlink communication to the mobile terminal.