摘要:
Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects an access point and/or an access terminal may perform operations relating to detecting confusion and/or providing a unique identifier to resolve confusion.
摘要:
An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server.
摘要:
Handover parameter settings are automatically adapted in access points in a system to improve handover performance. Reactive detection techniques are employed for identifying different types of handover-related failures and adapting handover parameters based on this detection. Messaging schemes are also employed for providing handover-related information to access points. Proactive detection techniques also may be used for identifying conditions that may lead to handover-related failures and then adapting handover parameters in an attempt to prevent such handover-related failures. Ping-ponging may be mitigated by adapting handover parameters based on analysis of access terminal visited cell history acquired by access points in the system. In addition, configurable parameters (e.g., timer values) may be used to detect handover-related failures.
摘要:
Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects a network may provide a time gap (e.g., an asynchronous time gap) during which an access terminal may temporarily cease monitoring transmissions from a source node so that the access terminal may acquire a unique identifier from a target node. In some aspects an access terminal may commence handover operations at a target node after determining whether the access terminal is allowed to access the target node. In some aspects a source node may prepare several target nodes for potential handover in the event confusion is detected or likely. Here, the source node may send information relating to the preparation of the potential target nodes to the access terminal whereby the access terminal uses the handover preparation information to initiate a handover at that target node.
摘要:
Access control for an access point (e.g., a cell of the access point) may be based on an access mode associated with the access point. For example, depending on the access mode, access control may involve performing a membership check for the access point. Such a membership check may be performed at a network entity, a source access point, or some other suitable location in a network. In some aspects, access control may involve performing a membership check for an access point in conjunction with a context fetch procedure. Such a procedure may be performed, for example, when an access terminal arrives at the access point after experiencing RLF at another access point.
摘要:
Access control for an access point (e.g., a cell of the access point) may be based on an access mode associated with the access point. For example, depending on the access mode, access control may involve performing a membership check for the access point. Such a membership check may be performed at a network entity, a source access point, or some other suitable location in a network. In some aspects, access control may involve performing a membership check for an access point in conjunction with a context fetch procedure. Such a procedure may be performed, for example, when an access terminal arrives at the access point after experiencing RLF at another access point.
摘要:
Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service.
摘要:
Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects a network may provide a time gap (e.g., an asynchronous time gap) during which an access terminal may temporarily cease monitoring transmissions from a source node so that the access terminal may acquire a unique identifier from a target node. In some aspects an access terminal may commence handover operations at a target node after determining whether the access terminal is allowed to access the target node. In some aspects a source node may prepare several target nodes for potential handover in the event confusion is detected or likely. Here, the source node may send information relating to the preparation of the potential target nodes to the access terminal whereby the access terminal uses the handover preparation information to initiate a handover at that target node.
摘要:
Local breakout is provided by one or more nodes (e.g., a local access point and/or a local gateway) in a wireless network to facilitate access to one or more local services. In conjunction with local breakout, multiple IP points of presence relating to different levels of service may be provided for an access point. For example, one point of presence may relate to a local service while another point of presence may relate to a core network service. IP point of presence may be identified for an over-the-air packet to indicate a termination point for the packet. Also, different mobility management functionality may be provided at different nodes in a system whereby mobility management for a given node may be provided by a different node for different types of traffic. Thus, an access terminal may support multiple NAS instances. In addition, different types of paging may be provided for different types of traffic. Furthermore, messages associated with one protocol may be carried over another protocol to reduce complexity in the system.
摘要:
A backup page is provided for a node that misses a page. In some aspects, a first type of access point in a system provides a backup page for an access terminal that is idling on a second of access point in the system in the event the access terminal misses a page by the second of access point in the system. An access point of the first type may page the access terminal according to a first paging schedule while an access point of the second type may page the access terminal according to a second paging schedule. In some aspects an access point of the first type (e.g., a macro node) provides service over a macro coverage area and an access point of the second type (e.g., a femto node) provides service over a smaller coverage area and/or provides restricted service.