Abstract:
The present disclosure presents example methods and apparatuses for improved cell searching in a wireless communications environment. For example, the disclosure presents example methods of wireless communication in a multiflow environment, which may include establishing a first flow between a serving radio network controller (S-RNC) and a first network entity, wherein the S-RNC controls the first network entity. Such example methods may also include establishing a second flow between the S-RNC and a second network entity. Furthermore, such example methods may include transmitting data to a user equipment (UE) via both the first flow and the second flow.
Abstract:
One or more scheduling grants may be received from a Node B related to a plurality of uplink MIMO streams. A determination may be made as to a primary transport power and a primary transport block size for a primary stream. A secondary transmit power and a secondary transport block size for a secondary stream may also be determined.
Abstract:
Methods, systems, and devices for wireless communications are described. The method may include a user equipment (UE) generating a set of multimedia packets including a first multimedia packet and a second multimedia packet that is generated after the first multimedia packet. The UE may add the set of multimedia packets to a queue and apply an uplink packet handling protocol. Using the uplink packet handling protocol, the UE may discard the first multimedia packet and transmit, to a base station, the second multimedia packet. Using the second multimedia packet, a server in communication with the base station may generate a video frame and transmit the video frame to the UE via the base station.
Abstract:
Methods, systems, and devices for wireless communication are described. A network node may determine a first time location associated with a peak in data traffic for multiple devices in communication with a communications network including the network node. The network node may determine a second time location for the peak in the data traffic for a subset of the devices based on a threshold for an overall peak in data traffic for the multiple devices. The network node may transmit a signal that indicates the second time location for the peak in the data traffic for the subset of devices. The network node may communicate the data with the subset of devices based on the signal indicating the second time location.
Abstract:
Methods, systems, and devices for wireless communications are described. A communication device, otherwise known as a user equipment (UE) may transmit capability information including an indication of a discontinuous monitoring delay period. The UE may receive a message including an indication to adjust monitoring of a physical downlink control channel (PDCCH), and monitor for the PDCCH during the discontinuous monitoring delay period. The UE may adjust monitoring for the PDCCH following the discontinuous monitoring delay period during a temporal period based on the received indication to adjust monitoring of the PDCCH. In some examples, at least one of physical downlink shared channel (PDSCH) reception, downlink reference signal monitoring, uplink reference signal transmissions, and channel reporting is enabled during the temporal period while monitoring of the PDCCH is adjusted.
Abstract:
Methods, systems, and devices for wireless communications are described. A communication device, otherwise known as a user equipment (UE) may receive a downlink control information (DCI) message including an indication to enable discontinuous monitoring of a physical downlink control channel (PDCCH). The UE may enable the discontinuous monitoring of the PDCCH based on the received DCI message, and disable monitoring of the PDCCH during a temporal period in which at least one of physical downlink shared channel (PDSCH) reception, downlink reference signal monitoring, uplink reference signal transmissions, and channel reporting is enabled. The UE may thereby experience power saving by disabling monitoring of the PDCCH while still performing other wireless operations during the temporal period. The UE may, as a result, also include features for improvements to wireless communications and, in some examples, may promote high reliability and low latency wireless communications, among other benefits.
Abstract:
Certain aspects of the present disclosure provide techniques wireless communication by a user equipment (UE), comprising receiving an uplink (UL) grant from a network entity, wherein the UL grant schedules the UE to transmit an UL channel transmission associated with a plurality of logical channels (LCs), and the UL grant indicates a modulation and coding scheme (MCS) for transmitting the UL channel transmission associated with the plurality of LCs, receiving a plurality of MCS offsets, and transmitting the UL channel transmission associated with one or more LCs of the plurality of LCs based on the MCS indicated in the UL grant and the plurality of MCS offsets.
Abstract:
In embodiments of systems and methods for managing acknowledgement packets in an uplink data packet stream including secure or encrypted data packets, a computing device may identify uplink acknowledgement (UL ACK) packets within the uplink data packet stream, and may accelerate processing of the identified UL ACK packets. In some embodiments, UL ACK packets may be identified based on whether packet lengths of packets meet a packet length threshold or meet a packet length range. In some embodiments, UL ACK packets may be identified based on information for identifying such packets receiving via a cross-layer application program interface (API). In some embodiments, UL ACK packets based whether packets include a specified differentiated services field codepoint (DSCP) in a packet header portion that is not encrypted.
Abstract:
In a wireless access network, a false base station (FBS) may imitate a legitimate base station by repeating the transmissions of the legitimate base station at a higher power level such that one or more user equipment (UEs) synchronize with the FBS instead of the legitimate base station. The present disclosure provides a UE that detects an FBS. The UE may estimate a time of arrival of different multipath components of a downlink signal corresponding to a physical cell identity. The UE may determine an existence of FBS based on a difference between the times of arrival of two of the different multipath components exceeding a threshold amount of time. The UE may perform a mitigation operation in response to determining the existence of the FBS.
Abstract:
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may obtain a discontinuous reception (DRX) short cadence value that corresponds to a number of Hertz (Hz). The UE may sleep as part of a DRX cycle. The UE may wake up, starting at a subframe, based at least in part on the DRX short cadence value and a subframe identifier of the subframe. Numerous other aspects are described.