Abstract:
Systems and methods for distributed computing between communication devices. A femto node is treated as a trusted extension of a user equipment and performs processing tasks on behalf of the user equipment. The femto node is also treated as a trusted extension of network servers and performs services on behalf of the network servers. Tasks are thus distributed between the network servers, the femto node and one or more user equipments. The tasks include processing data, filtering incoming messages, and caching network service information.
Abstract:
Embodiments describe registration in a wireless communication system. A method includes wirelessly transmitting over a WWAN a first registration message from a mobile device, wirelessly transmitting through the WWAN a second registration message to a WLAN access point and receiving at the mobile device access through the WLAN access point. According to another embodiment is a method for constructing a self-configuring ad-hoc network. The method can include receiving a GPS coordinate from a WWAN channel node at a management system and creating an initial topography based at least in part on the GPS coordinate to achieve a network connectivity with diverse routes between a plurality of nodes.
Abstract:
Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point.
Abstract:
Beacons may be grouped to facilitate neighbor discovery in a wireless network. For example, neighboring access devices such as IEEE 802.11 access points may cooperate to transmit beacons in a group. In this way, a wireless device seeking to discover the neighboring access devices may scan for the beacons for a shorter period of time. An indication may be provided to enable a wireless device to more efficiently scan the beacons. For example, the indication may indicate the channel the wireless device should scan to receive the next beacon that is to be transmitted. In addition, the indication may include information relating to the transmission time of the next beacon. Other aspects, embodiments, and features are also claimed and described.
Abstract:
Transmissions by a first access point (e.g., a femto cell) are restricted upon detecting an access terminal in the vicinity of the first access point in the event the access terminal is communicating with a second access point (e.g., a macro cell). Upon detection of such an access terminal, the access terminal restricts transmission (e.g., beacon transmission) on a downlink carrier frequency on which the access terminal is actively receiving information from the second access point. This restriction of transmission by the access point may involve, for example, temporarily reducing transmit power, reducing the periodicity of transmission, or ceasing transmission.
Abstract:
Methods and apparatuses are provided that facilitate providing access point measurements to restricted access points. Restricted access points can lessen restrictions to allow devices to register with the restricted access point for providing measurements thereto. Additionally or alternatively, access point measurements can be provided to a minimization of drive tests (MDT) server for providing to the restricted access points. Thus, restricted access points can obtain the access point measurements for performing enhanced interference management or other functionality based at least in part on the measurements.
Abstract:
Interference that occurs during wireless communication may be managed by hybrid time reuse. A method, apparatus amend medium of communication determines one or more time reuse patterns of respective one or more unplanned access points. A second time reuse pattern that is less interfering with the one or more time reuse patterns is selected. Signals are transmitted according to the second time reuse pattern from a second unplanned access point to an associated access terminal.
Abstract:
The disclosure is directed to a mobile communication device that measures characteristics or attributes of a first communications network that vary according to physical location within that first communications network to create a fingerprint, or signature, of a location within the first communications network. When the fingerprint of the current location of the mobile device is created it can be compared to a known fingerprint associated with a second communication network to determine the mobile device's proximity to the second communications network. For example, the first communications network may be a CDMA wide area wireless communication network and the second communications network may be a 802.11 wireless LAN.
Abstract:
Systems and methods for distributed computing between communication devices. A femto node is treated as a trusted extension of a user equipment and performs processing tasks on behalf of the user equipment. The femto node is also treated as a trusted extension of network servers and performs services on behalf of the network servers. Tasks are thus distributed between the network servers, the femto node and one or more user equipments. The tasks include processing data, filtering incoming messages, and caching network service information.
Abstract:
Techniques are disclosed for using the hardware and/or software of the mobile device to obscure speech in the audio data before a context determination is made by a context awareness application using the audio data. In particular, a subset of a continuous audio stream is captured such that speech (words, phrases and sentences) cannot be reliably reconstructed from the gathered audio. The subset is analyzed for audio characteristics, and a determination can be made regarding the ambient environment.