Abstract:
A device may communicate with a peer-to-peer (P2P) network prior to associating with that network. The communications prior to association may include information about whether the P2P network is persistent or non-persistent. The information may include a persistent group intent field that identifies whether a device would prefer to join a persistent P2P network and allows a P2P network to advertise whether it is persistent.
Abstract:
Network information may be discoverable without requiring a connection to that network. For example, Access Network Query Protocol (“ANQP”) may allow a device to discover information about a network prior to the device associating with that network. In other words, ANQP allows a network terminal to request additional network information prior to establishing network capability. The additional network information that may be discoverable includes network latency, cellular capabilities, hotspot capabilities, mobility capabilities, neighbor reports, station identification, and multiple hotspot session identification.
Abstract:
In an access device associated with a first network cell, a method for enabling user equipment (UE) to obtain a service unavailable through the first network cell includes receiving a request for the UE to access the service, and identifying, in a message to the UE, a plurality of second network cells providing the service.
Abstract:
In an access device associated with a first network cell, a method for enabling user equipment (UE) to obtain a service unavailable through the first network cell includes receiving a request for the UE to access the service, and identifying, in a message to the UE, a plurality of second network cells providing the service.
Abstract:
A method performed by user equipment (UE) includes receiving a request to access a service unavailable through a first network cell associated with the UE, and receiving a message from an access device associated with the first network cell, wherein the message identifies a plurality of second network cells providing the service.
Abstract:
A method performed by user equipment (UE) includes receiving a request to access a service unavailable through a first network cell associated with the UE, and receiving a message from an access device associated with the first network cell, wherein the message identifies a plurality of second network cells providing the service.
Abstract:
A bridge communicates a link layer frame between a device and a cellular access network node, the link layer frame comprising a portion including a header and data of an upper layer protocol layer instance in the device or the cellular access network node. The header includes identification information to identify which of a plurality of upper layer protocol layer instances the data is associated with.
Abstract:
In an access device associated with a first network cell, a method for enabling user equipment (UE) to obtain a service unavailable through the first network cell includes receiving a request for the UE to access the service, and identifying, in a message to the UE, a plurality of second network cells providing the service.
Abstract:
A mobile device may retrieve information about a network prior to associating with the network. For example, the information may be related to a public land mobile network (“PLMN”) and compatibility with Extensible Authentication Protocols (“EAPs”).
Abstract:
A mobile device may transition between Extended Service Set (“ESS”) networks seamlessly, such that a consumer never loses the network connection despite the transition. The communication for enabling a transition may be prior to association with that network. The seamless transition may be enabled through the creation and utilization of a central key holder authority that advertises its identity to mobile devices in a pre-associated state. The mobile device can use the key discovery communication along with a key generation method to authenticate and/or associate with a network and transition from one ESS to another. There may be a common root key across ESSs. At each new access point (“AP”) that the mobile device encounters, ESS and key holder identities may be discovered through discovery communications.