摘要:
Systems and methodologies are described that facilitate grouping pilot identifies to indicate type and/or classification information regarding one or more access points. The access points can select or be assigned pilot identifiers from the group indicating a type or classification related to the access points. Thus, identifiers can be grouped into macrocell and/or femtocell groups or ranges such that an access point can indicate, and mobile devices can efficiently determine, whether the access point provides macrocell or femtocell coverage based on a range from which its pilot identifier is selected or assigned. In addition, the pilot identifiers can be utilized to indicate restricted association information regarding the access points.
摘要:
Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service.
摘要:
Systems and methodologies are described that facilitate multiplexing communications from multiple downstream access points to one or more upstream access points. In particular, a concentrator component is provided that can establish a single transport layer connection with an upstream access point along with multiple application layer connections over the single transport layer connection for each of multiple downstream access points and/or related mobile devices. The downstream access points and/or mobile devices can provide identifiers to the concentrator component, which can utilize the identifiers to track communications with the upstream access points. In this regard, the upstream access points can additionally include identifiers received from the concentrator component in subsequent communications to facilitate identifying the appropriate downstream access point and/or mobile device.
摘要:
Systems and methodologies are described that facilitate packet routing among relay eNBs in a wireless network. A donor eNB can create at least a portion of a tunnel endpoint identifier (TEID) for a relay eNB communicating with a UE or other device. In addition, the relay eNB communicating with the UE can create a portion of the TEID. Upon receiving packets with a TEID, the donor eNB can route the packets to downstream eNBs based on the portion of the TEID that it created. Other downstream eNBs can continue to route packets to next hop eNBs based on the portion of the TEID created by the donor eNB or the downstream eNBs themselves. The relay eNB communicating with the UE can route packets to the UE based on the portion of the TEID it created and/or the portion created by the donor eNB.
摘要:
Systems and methodologies are described that facilitate identifying sectors using sector parameters signatures. The signatures can be generated as a known function of a previous sector parameters signature (or message parameters), system time, and an identifier. In this regard, mobile devices can determine an expected identifier from comparing the sector parameters signature to a sector parameters signature computed based at least in part on the system time known to the mobile device. In addition, the mobile device can utilize a known or an inferred previous parameters signature to determine the expected identifier. Multiple signatures can be evaluated to determine expected identifiers to increase the likelihood of correct identification since the signatures are generated using the known variables along with the identifier.
摘要:
Systems and methodologies are described that facilitate synchronizing timing among wireless nodes in a wireless communication network. A tracking wireless node can synchronize to a global positioning system (GPS) signal if available. Alternatively, the tracking wireless node can receive quality metrics related to one or more target nodes. The quality metrics can relate to parameters that can be utilized to evaluate the target node for timing synchronization. Based on the quality metrics, the tracking wireless node can select a target wireless node for timing synchronization. The tracking wireless node can subsequently synchronize timing with the target wireless node. In addition, the tracking wireless node can continually evaluate surrounding wireless nodes to detect whether other wireless nodes have higher quality metrics than the current target wireless nodes and can accordingly resynchronize with nodes having higher metrics.
摘要:
Local breakout is provided by one or more nodes (e.g., a local access point and/or a local gateway) in a wireless network to facilitate access to one or more local services. In conjunction with local breakout, multiple IP points of presence relating to different levels of service may be provided for an access point. For example, one point of presence may relate to a local service while another point of presence may relate to a core network service. IP point of presence may be identified for an over-the-air packet to indicate a termination point for the packet. Also, different mobility management functionality may be provided at different nodes in a system whereby mobility management for a given node may be provided by a different node for different types of traffic. Thus, an access terminal may support multiple NAS instances. In addition, different types of paging may be provided for different types of traffic. Furthermore, messages associated with one protocol may be carried over another protocol to reduce complexity in the system.
摘要:
Systems and methodologies are described that facilitate managing access control to Closed Subscriber Groups (CSGs) in a wireless communication environment. A user equipment (UE) can store an operator CSG list, which can be read only and controlled by an operator. Further, the operator CSG list can lack synchronization to a CSG subscription for the UE retained in the network. Thus, upon selecting to access a CSG cell associated with a CSG with a corresponding CSG Identifier (ID) included in the operator CSG list of the UE, a reject message that indicates that the UE lacks authorization for the CSG can be received. Moreover, the CSG ID can be stored as a forbidden CSG ID of the UE in a set of forbidden CSG IDs in response to receipt of the reject message when the CSG ID is included in the operator CSG list.
摘要:
Handover parameter settings are automatically adapted in access points in a system to improve handover performance. Reactive detection techniques are employed for identifying different types of handover-related failures and adapting handover parameters based on this detection. Messaging schemes are also employed for providing handover-related information to access points. Proactive detection techniques also may be used for identifying conditions that may lead to handover-related failures and then adapting handover parameters in an attempt to prevent such handover-related failures. Ping-ponging may be mitigated by adapting handover parameters based on analysis of access terminal visited cell history acquired by access points in the system. In addition, configurable parameters (e.g., timer values) may be used to detect handover-related failures.
摘要:
Handover parameter settings are automatically adapted in access points in a system to improve handover performance. Reactive detection techniques are employed for identifying different types of handover-related failures and adapting handover parameters based on this detection. Messaging schemes are also employed for providing handover-related information to access points. Proactive detection techniques also may be used for identifying conditions that may lead to handover-related failures and then adapting handover parameters in an attempt to prevent such handover-related failures. Ping-ponging may be mitigated by adapting handover parameters based on analysis of access terminal visited cell history acquired by access points in the system. In addition, configurable parameters (e.g., timer values) may be used to detect handover-related failures.