摘要:
A mobile device sends information during a charging event to mitigate potential adverse effects that may occur if the information is sent at other times. For example, after obtaining information, the mobile device may determine whether the information is time-critical. If the information is not time-critical, the mobile device may store the information. Then, once the mobile device determines that a charging event is occurring, the mobile device sends the stored information.
摘要:
Systems and methods are disclosed that facilitate wireless communication using resource utilization messages (RUMs), in accordance with various aspects. A RUM may be generated for a first node, such as an access point or an access terminal, to indicate that a first predetermined threshold has been met or exceeded. The RUM may be weighted to indicate a degree to which a second predetermined threshold has been exceeded. The first and/or second predetermined thresholds may be associated with various parameters associated with the node, such as latency, throughput, data rate, spectral efficiency, carrier-to-interference ratio, interference-over-thermal level, etc. The RUM may then be transmitted to one or more other nodes to indicate a level of disadvantage experienced by the first node.
摘要:
An access point acquires information about another access point from at least one other access point. For example, the access point may send a query to one or more neighbor access points to obtain information about the other access point. In some aspects these operations may be employed in conjunction with establishing neighbor relations in a network. For example, in the event a neighbor list of a given access point does not have certain information about another access point (e.g., an IP address), the given access point may query its neighbor access points to see whether those access points have information about the other access point in their neighbor lists. Upon receipt of this information, the given access point may use the information to establish neighbor relations with the other access point.
摘要:
Systems and methodologies are described that facilitate providing physical cell identifier (PCI) assignment. Neighboring access point parameters can be collected and transmitted to a PCI assigning component, which can generate a PCI based on the parameters as well as other local parameters. The neighboring access point parameters can be received by evaluating signals transmitted by the neighboring access points, from a UE communicating with the neighboring access points, over a backhaul link, etc. The parameters can include signal strength, identification, and/or the like. In addition, prioritized lists of PCIs can be provided to an access point, which can utilize the neighborhood parameters to select an optimal PCI from the list.
摘要:
Systems and methodologies are described that facilitate multiplexing communications from multiple downstream access points to one or more mobility management entities (MME). In particular, a concentrator component is provided that can establish a single transport layer connection with an MME along with multiple application layer connections over the single transport layer connection for each of multiple downstream access points and/or related mobile devices. The downstream access points and/or mobile devices can provide identifiers, such as tracking identifiers, to the concentrator component, which can utilize the identifiers to track communications with the MME. In this regard, the MME can send paging messages, and the concentrator component can determine downstream access points related to the paging messages based on a stored association with a tracking identifier in the paging message.
摘要:
Systems and methods are described that facilitate the determination and request of resources a node may wish to reserve. The resources include a plurality of carriers that are shared with other nodes. In an approach, the node determines a condition related to the plurality of carriers; creates an ordering of the plurality of resources; and transmits a resource utilization message (RUM) for one or more of the plurality of resources based on the ordering and the condition.
摘要:
Methods and systems for fine grain bandwidth allocation are disclosed. According to one method, input is received from a user in a standard bandwidth denomination indicating bandwidth to be provided by a switched network element. The bandwidth is automatically converted into a base bandwidth value and a residual bandwidth value. The base bandwidth value is converted to a number of tokens to be placed in a token bucket every predetermined token bucket refresh interval. The residual bandwidth value is converted into a second number of tokens and a number of predetermined token bucket refresh intervals over which the second number of tokens is to be placed in the token buckets. The token buckets are then refreshed in accordance with the base and residual bandwidth values and the token bucket refresh intervals. The queue is serviced in accordance with available tokens in the token buckets.
摘要:
Contention for a resource in a multi-resource system is resolved by separately resolving contention for each resource. In some cases where two or more entities contending for a resource are associated with equal priorities, lexicographic ordering is used to resolve contention between these entities. In some cases where two or more entities contending for a resource are associated with equal priorities, a random probability-based scheme is used to resolve contention between these entities. Also, different types of schemes may be used to resolve contention for different resources.
摘要:
Signaling-only access may be established with an access node under certain circumstances such as, for example, upon determining that a node is not authorized for data access at the access node. A node that is not authorized for data access at an access node may still be paged by the access node through the use of signaling-only access. In this way, transmissions by the access node may not interfere with the reception of pages at the node. A first node may be selected for providing paging while a second node is selected for access under certain circumstances such as, for example, upon determining that the second node provides more desirable service than the first node.
摘要:
Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service.