Abstract:
The present invention relates to a method in a radio network node of a cellular network, for controlling admission of a UE in a cell covering a region. The method comprises obtaining (710) a location of the UE, comparing (720) information related to a geometric boundary of the region and the obtained location of the UE, and determining (730) whether to admit the UE in the cell based on the comparison.
Abstract:
A base station (12) and a method therein for adapting a triggering threshold for cell re-selection measurements performed by a mobile terminal (20) served by a macro cell (14). The macro cell (14) is supported by the base station (12), and the base station (12) and the mobile terminal (20) are comprised in a wireless communications network (10). The base station determines a serving cell signal strength threshold to be used for triggering cell re-selection measurements by the mobile terminal (20) in dependence on the availability of small cells (18a,18b) within or neighboring the macro cell (14). The base station (12) further transmits the determined serving cell signal strength threshold to the mobile terminal (20).
Abstract:
A method in a network node for enabling proximity detection is presented. The network node is comprised in a wireless communications network and serves a wireless device. According to the method, the network node obtains a fingerprint of a CSG cell, or of an inter-frequency cell. The network node then transmits the fingerprint to the wireless device, thereby enabling the wireless device to determine when it is in the proximity of the cell.
Abstract:
Techniques for the secure generation of a set of encryption keys to be used for communication between a wireless terminal and an assisting base station in a dual-connectivity scenario. An example method includes generating (810) an assisting security key for the assisting base station, based on an anchor base station key. The generated assisting security key is sent (820) to the assisting base station, for use by the assisting base station in encrypting data traffic sent to the wireless terminal or in generating one or more additional assisting security keys for encrypting data traffic sent to the wireless terminal while the wireless terminal is dually connected to the anchor base station and the assisting base station. The anchor base station key, or a key derived from the anchor base station key, is used (830) for encrypting data sent to the wireless terminal by the anchor base station.
Abstract:
There are provided measures for load balancing in relay-enhanced access networks with a relay device and multiple access devices, said measures exemplarily including the setting of multiple links between a backbone device of a backbone network and said multiple access devices, and a management of resource allocation of said multiple links between said backbone device and said multiple access devices in accordance with resource information of said multiple access devices indicating resource availability and resource assignment of said multiple access devices for establishing multiple connections between said backbone device and said relay device via said multiple access devices.
Abstract:
A base station (12) and a method therein for adapting a triggering threshold for cell re-selection measurements performed by a mobile terminal (20) served by a macro cell (14). The macro cell (14) is supported by the base station (12), and the base station (12) and the mobile terminal (20) are comprised in a wireless communications network (10). The base station determines a serving cell signal strength threshold to be used for triggering cell re-selection measurements by the mobile terminal (20) in dependence on the availability of small cells (18a,18b) within or neighboring the macro cell (14). The base station (12) further transmits the determined serving cell signal strength threshold to the mobile terminal (20).
Abstract:
There are provided measures for handover control for backhaul connections, said measures exemplarily including evaluation of the suitability of an access node cell in access network as target for a handover of a terminal based on delay information being indicative of an expected packet delay in a cell of the access node, wherein such delay information may be generated and/or exchanged in the access network. Said measures may exemplarily be applied for improving handover control in relay-enhanced access networks or networks that contain access nodes connected via different kinds of backhaul that can result in different end-to-end packet delays.
Abstract:
A method, including receiving, at a donor access node from a relay node associated with the donor access node, an identification of one or more other access nodes detected at the relay node and sending configuration information about said relay node from said donor access node to at least one of said one or more other access nodes in advance of an indication that a user equipment associated with the relay node has detected said at least one other access node, without at the same time sending said configuration information to at least one further access node that is detected by one or more other relay nodes or user equipments associated with the donor access node but not detected by said relay node. Wherein said configuration information includes information for setting up a communication with the relay node other than via a core network associated with the donor access node.
Abstract:
The present invention relates to a method in a radio network node of a cellular network, for controlling admission of a UE in a cell covering a region. The method comprises obtaining (710) a location of the UE, comparing (720) information related to a geometric boundary of the region and the obtained location of the UE, and determining (730) whether to admit the UE in the cell based on the comparison.
Abstract:
There is proposed a mechanism providing functions of a so-called hybrid home node B (HHNB) where subscribers, depending on their belonging to a specific subscriber group, such as a closed subscriber group or an open subscriber group, are admitted for a connection to the communication network via different connection routes and systems. After a request for connecting a subscriber is received, an identification process is performed whether the subscriber belongs to a first subscriber group (CSG) or to a second subscriber group (OSG). On the basis of this identification, the subscriber is assigned to a first connection route or a second connection route. It is then checked whether available resources on the assigned connection route are sufficient, wherein on the basis of this check the request for connecting is allowed or rejected.