摘要:
Systems, methodologies, and devices are described that facilitate management of user equipment (UE) capability information in a network to facilitate improved connection and communications associated with a mobile device. A core network can include a capability management component that can control UE capability information received during an initial connection of the mobile device to the network, where the UE capability information comprises UE dynamic capability and UE semi-static capability. The UE dynamic capability and semi-static capability can be identified from the received capability information and stored and managed respectively. When the initial connection is released, the dynamic capability information is deleted while the semi-static capability information can be retained in the core network. During a subsequent connection of the mobile device to the network, the stored semi-static capability can be retrieved and utilized to facilitate efficiently selecting a desired dynamic capability for the subsequent connection and communication.
摘要:
A method and apparatus are provided for reducing latency and/or delays in performing a security activation exchange between a communication device and a network entity. The communication device may pre-compute a plurality of possible keys using a base key and a plurality of possible inputs in anticipation of receiving an indicator from the network entity that identifies a selected input to be used in generating a corresponding selected key. An indicator is then received from the network entity, where the indicator identifies the selected input from among the plurality of possible inputs. The communication device then selects a first key among the pre-computed plurality of possible keys as the selected key upon receipt of the indicator, wherein the first key is selected because it was pre-computed using the selected input. Because the first key is pre-computed, delays in responding to the network entity are reduced.
摘要:
Techniques for re-synchronizing Cell Radio Network Temporary Identifiers (C-RNTIs) in a wireless communication system are described. In one design, a user equipment (UE) sends a random access preamble for random access. A base station receives the random access preamble, assigns a Temporary C-RNTI to the UE, and sends a random access response including the Temporary C-RNTI. The UE uses the Temporary C-RNTI as a C-RNTI for itself if a valid C-RNTI is not already available. The UE discards the Temporary C-RNTI and uses the valid C-RNTI if available. The UE sends a transmission after receiving the random access response, and the transmission may include the valid C-RNTI if available. For handover, the base station (a target base station) receives a handover request from a source base station, assigns the valid C-RNTI to the UE, and sends the valid C-RNTI to the source base station for forwarding to the UE.
摘要:
Systems and methodologies are described that facilitate effectuating a random access procedure in a wireless communication environment. A random access preamble can be sent from an access terminal to a base station, and a random access response can be sent from the base station to the access terminal in response. The random access response can allocate resources to be utilized by the access terminal for a scheduled transmission (e.g., message 3, . . . ). Further, a plurality of Transmission Time Intervals (TTIs) can be bundled for the scheduled transmission. Moreover, a payload of the scheduled transmission can be transmitted to the base station from the access terminal within a common Transport Block (TB) using the bundled plurality of TTIs. According to an example, employment of TTI bundling can be controlled on a per network basis, per base station basis, or per access terminal basis.
摘要:
In a wireless communication system, user equipment (UE) has autonomy provided by one or more set of rules to handle processing during a measurement gap. UE can ignore or use only a portion of the whole measurement gap if not needed. Thereby, an urgent need for remaining tuned to source carrier frequency can be supported, such as utilizing Random Access Channel (RACH) procedure. UE can also choose to tune to a target carrier frequency supporting timely handovers. Depending on the type of processing required (download shared channel (DL-SCH, UL-SCH, TTI bundling, RACH or SR), the UE may store requests and process the measurements during the gap or ignore the gap measurement as if there were no gaps.
摘要:
Certain aspects of the present disclosure provide a method for transmitting emergency warning messages over cellular networks. In the proposed method, the access point transmits scheduling information of the emergency information in addition to the non-emergency information in a first system information block (SIB1) to a plurality of user equipments. In case of an emergency, the access point notifies the user equipments of the emergency situation and transmits emergency information to the user equipments to provide more information about the emergency situation. Since the user equipments already have scheduling information of the emergency information, they can start receiving the emergency information immediately after the emergency notification.
摘要:
Aspects relate to allowing a mobile device to discover missing neighbor cell relations when there is a radio link failure. At substantially the same time as connecting to a new cell that utilizes the same radio link technology, the failure is reported. If a connection is reestablished with a cell that utilizes a different radio link technology, the radio link failure information (and related missing neighbor information) is retained and reported later when a connection with a cell that utilizes the same radio link technology is established.
摘要:
A delta configuration is transmitted to a UE requesting a handover wherein the delta configuration details changes that are required for the current UE configuration in order to execute the handover. The handover is initiated via a measurement report transmitted to a currently serving source eNode B from the UE. The measurement report can comprise one or more of current radio conditions, current UE configuration or a preferred target eNode B if the handover is a inter eNode B handover. In a inter eNB handover, the current UE configuration is forwarded to the preferred target eNode B by the source eNode B. The target eNode B generates the delta configuration and transmits it to the source eNode B in a transparent container which is subsequently forwarded to the UE.
摘要:
Methods and systems for re-establishing radio contact include, for example, a method for performing a wireless handoff for user equipment (UE) as the UE performs a handoff from a source extended Node-B (e-NB) to a target e-NB is disclosed. The method includes detecting a radio link failure (RLF) between the UE and the source e-NB by the UE, and maintaining an active communication service at a service layer of the UE after detecting the RLF and as the UE performs the handoff from the source e-NB to the target e-NB such that the communication service remains continuously active during the handoff, the communication service supporting a first communication between the UE and a third party.
摘要:
A scheme is provided for indexing and storing radio bearer configurations for a UMTS wireless communication network, such as a UTRAN. A radio network controller maintains a list of radio bearer configurations and an identifier for each configuration. One or more of these configurations and their identifiers are sent to a mobile terminal in the network. The mobile terminal stores these configurations and identifiers for future reference. This enables an on-the-fly configuration scheme in which the network controller can reference a particular stored configuration by its identifier to cause the mobile terminal to use that configuration to setup wireless transmitter and/or receiver. The identifiers may have contiguous values so that the network controller can transmit a range (e.g., starting identifier and ending identifier) to the mobile terminal rather than each identifier. When a configuration is modified or removed, the network controller may reassign identifiers to maintain contiguous values.