摘要:
Techniques for quickly and efficiently performing handover are described. A user equipment (UE) may maintain a link with a serving cell and may communicate with this cell via the established link. The UE may have a candidate set of non-serving cells that are candidates for handover. The UE may maintain uplink synchronization with one or more non-serving cells in the candidate set, without having to maintain links with any of the non-serving cells. The UE may update uplink synchronization with the non-serving cells via an access procedure, e.g., send access probes to the non-serving cells and receive timing adjustments from these cells. One non-serving cell with which the UE has maintained uplink synchronization may be selected as a target cell for handover. The UE may then perform handover from the serving cell to the target cell, without performing uplink synchronization during the handover, which may improve handover latency and success rate.
摘要:
Systems and methodologies are described that facilitate notifying and detecting modification of system information in a wireless communication system. A mobile device may receive a first system information block (SIB) in a first time period, obtain from the first SIB at least one parameter related to modification of at least one SIB, and determine whether to receive the at least one SIB based on the at least one parameter obtained from the first SIB. The mobile device may receive a paging message in a second time period and may determine whether to receive one or more SIBs based on information obtained from the paging message. The mobile device may receive the first SIB in the first time period after entering a cell in an idle mode. The mobile device may receive the paging message in the second time period after accessing the cell.
摘要:
A scheme is provided for indexing and storing radio bearer configurations for a UMTS wireless communication network, such as a UTRAN. A radio network controller maintains a list of radio bearer configurations and an identifier for each configuration. One or more of these configurations and their identifiers are sent to a mobile terminal in the network. The mobile terminal stores these configurations and identifiers for future reference. This enables an on-the-fly configuration scheme in which the network controller can reference a particular stored configuration by its identifier to cause the mobile terminal to use that configuration to setup wireless transmitter and/or receiver. The identifiers may have contiguous values so that the network controller can transmit a range (e.g., starting identifier and ending identifier) to the mobile terminal rather than each identifier. When a configuration is modified or removed, the network controller may reassign identifiers to maintain contiguous values.
摘要:
Techniques for performing cell reselection in a wireless communication system are described. A user equipment (UE) may initially camp on a first cell. While camped on the first cell, the UE may identify second and third cells deemed to be better than the first cell. The UE may move from the first cell to the second cell without performing cell reselection to camp on the second cell. After moving to the second cell, the UE may obtain at least one cell reselection parameter for the second and/or third cell and may update the rankings of the second and third cells based on the cell reselection parameter(s). The UE may then perform cell reselection from the first cell to the second or third cell based on the updated rankings, e.g., perform inter-frequency cell reselection from the first cell to the third cell without actually camping on the second cell.
摘要:
Systems and methodologies are described that facilitate notifying and detecting system information block (SIB) modification in subsequent modification periods. Access points can advertise information in a current SIB indicating a subsequent modification period in which the SIB will be modified. Devices can receive the SIB and process the information to determine whether the SIB will be modified and in which modification period. This mitigates undesirable affects of utilizing paging to indicate SIB modification since devices read the SIB upon entering a cell, switching from active to idle mode, etc.
摘要:
Systems and methodologies are described that facilitate notifying and detecting system information block (SIB) modification in subsequent modification periods. Access points can advertise information in a current SIB indicating a subsequent modification period in which the SIB will be modified. Devices can receive the SIB and process the information to determine whether the SIB will be modified and in which modification period. This mitigates undesirable affects of utilizing paging to indicate SIB modification since devices read the SIB upon entering a cell, switching from active to idle mode, etc.
摘要:
Systems and methodologies are described that facilitate identifying a plurality of keysets utilized in a communications network. The keysets can include ciphering keys that provide data encryption and decryption and integrity keys that provide data integrity protection. A key identifier can be included in a packet data convergence protocol header that indicates a keyset employed in connection with data in a protocol data unit. In addition, a route indicator can be provided in a radio link control header that distinguishes a source cell and a target cell in networks configured without RLC reset.
摘要:
An apparatus, method, processor(s), and computer program product avoids user data loss by network-controlled, user equipment assisted handover in a wireless data packet communication system. A wireless receiver receives radio link control (RLC) packet data units (PDUs) from user equipment (UE) being served by a source node. A wireless transmitter commands the UE to handover. A network communication interface transmits RLC Uplink (UL) context from the source node to the target node, and transmits RLC Downlink (DL) initialization message and buffered in-transit DL RLC PDUs from the source node to the target node.
摘要:
Techniques for sending data during handover with Layer 2 tunneling are described. In one design, a user equipment (UE) sends first Layer 2 packets to a source base station prior to handover to a target base station. The UE sends at least one second Layer 2 packet to the target base station, which identifies the second Layer 2 packet(s) as being intended for the source base station and thus forwards the second Layer 2 packet(s) to the source base station via a Layer 2 tunnel. The UE sends third Layer 2 packets to the target base station after the handover. The target base station processes the third Layer 2 packets to obtain IP packets and sends the IP packets to a serving gateway after a trigger condition, which may be defined to achieve in-order delivery of IP packets from the source and target base stations to the serving gateway.
摘要:
Systems and methodologies are provided that facilitate security activation for wireless communications. In an aspect, a method for wireless communication is provided which includes determining a first security key for communicating with a source access point and receiving, from the source access point, a handover command that includes an indication of whether to apply a second security key upon handover. The method also includes handing over communication from the source access point to a target access point, where the second security key is applied for communicating with the target access point upon the handover when the handover command indicates to apply the second security key.