摘要:
A route protocol is established whereby a mobile device can communicate to a multitude of (receiving) base stations though a tunnel created through a serving base station. A message that includes a Route Creation Header can be transmitted by the mobile device to create the tunnel. The Route Creation Header is reviewed by the receiving base station while the mobile device is in a Waiting-To-Open State. Various errors might occur with respect to the Route Creation Header. These errors can be conveyed to the mobile device by base station by setting one or more error code fields. Once the errors are resolved, another attempt to create a tunnel with base station can be made, if desired.
摘要:
Systems and methodologies are described that that facilitate resource reclamation in a wireless communications system having a disjoint serving sector configuration. A mobile device can report activity on a communication link (e.g., forward link or reverse link) to a serving sector that provides a corresponding communication link. For instance, forward link activity can be reported to a reverse link serving sector and/or reverse link activity can be reported to a forward link serving sector. The activity can be analyzed to ascertain overall activity of a mobile device. Based upon the analysis, a serving sector can de-allocate resources to the mobile device.
摘要:
Methods, apparatus, systems and computer program products are defined that provide for in-order deliver of data packets during hand-off. The aspects provide for in-order delivery at Forward Link Serving eBS/Data Attachment Point (FLSE/DAP) switch and Reverse Link Serving eBS/Data Attachment Point (RLSE/DAP) switch. As such, present aspects provide for significant improvement in the throughput of applications, such as applications relying on Transmission Control Protocol (TCP), during handoff, in such networks as Ultra Mobile Broadband (UMB) and the like.
摘要:
A method and apparatus for generating a cryptosync is disclosed that generates a cryptosync with the desired variability without the overhead in complexity and size of prior cryptosyncs. The cryptosync is generated from a combination of fields including fields relating to the segmentation and reassembly of the data packets at a transmitting terminal and a receiving terminal. The resultant cryptosync does not repeat during the use of a particular security key.
摘要:
Automated PilotPN code conflict resolution using an access point with the assistance of one or more access terminals is disclosed. An exemplary method includes determining a set of access points, as well as determining a set of PilotPN codes used by the set of access points. Detection is then made concerning whether at least two access points of the set of access points have conflicting PilotPN codes. A first PilotPN code is allocated to one of the at least two access points having conflicting PilotPN codes. Additionally, one or more other PilotPN codes, which are distinct from the first PilotPN code, are allocating to remaining access points of the at least two access points having conflicting PilotPN codes. Corresponding apparatus and other exemplary methods are also disclosed.
摘要:
A route protocol is established whereby a mobile device can communicate to a multitude of (receiving) base stations though a tunnel created through a serving base station. A message that includes a Route Creation Header can be transmitted by the mobile device to create the tunnel. The Route Creation Header is reviewed by the receiving base station while the mobile device is in a Waiting-To-Open State. Various errors might occur with respect to the Route Creation Header. These errors can be conveyed to the mobile device by base station by setting one or more error code fields. Once the errors are resolved, another attempt to create a tunnel with base station can be made, if desired.
摘要:
Methods and apparatuses are provided that include handing over relays in wireless networks. Handover request messages for a relay and related user equipment (UE) can be grouped to lessen signaling requirements for handover. Moreover, identifiers can be communicated in the messages to optimize bearer establishment at a target base station to which the relay and related devices are handed over. Also, handover exception cases can occur, which can be handled by the relay and source and target base stations, such as bearer rejection at the target base station, handover failure for one or more devices or the relay, and/or the like. Further, handover of a relay can occur between base stations that house one or more network gateways for the relay, or where the gateways are centralized and accessible by the source and target base stations, where each scenario can include different exception handling.
摘要:
Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service.
摘要:
Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service.
摘要:
Local breakout is provided by one or more nodes (e.g., a local access point and/or a local gateway) in a wireless network to facilitate access to one or more local services. In conjunction with local breakout, multiple IP points of presence relating to different levels of service may be provided for an access point. For example, one point of presence may relate to a local service while another point of presence may relate to a core network service. IP point of presence may be identified for an over-the-air packet to indicate a termination point for the packet. Also, different mobility management functionality may be provided at different nodes in a system whereby mobility management for a given node may be provided by a different node for different types of traffic. Thus, an access terminal may support multiple NAS instances. In addition, different types of paging may be provided for different types of traffic. Furthermore, messages associated with one protocol may be carried over another protocol to reduce complexity in the system.