Abstract:
A method for dynamically selecting an A-MPR value to apply for an uplink transmission is provided. The method can include a wireless communication device receiving an indication from a network that A-MPR should be applied for uplink transmissions within a frequency band used for communication between the wireless communication device and the network. The method can further include the wireless communication device receiving an RB allocation for a subset of RB's within the frequency band from the network. The method can additionally include the wireless communication device determining an allocation ratio and a distribution characteristic of the allocated subset of RB's within the frequency band. The method can also include the wireless communication device selecting an A-MPR value to apply based at least in part on the allocation ratio and the distribution characteristic. The method can further include the wireless communication device applying the selected A-MPR.
Abstract:
Methods and apparatus for using an unlicensed radio frequency band component carrier for uplink transmission are disclosed. A wireless communication device receives a carrier aggregation configuration, which can include at least one licensed radio frequency band component carrier and at least one unlicensed radio frequency band component carrier. The wireless communication device establishes a set of radio bearers and associates an unlicensed radio frequency band permission level with each of the radio bearers. The wireless communication device multiplexes uplink traffic for the radio bearers on the at least one licensed radio frequency band component carrier and the at least one unlicensed radio frequency band component carrier based at least in part on the unlicensed radio frequency band permission levels associated with the radio bearers.
Abstract:
Apparatus and methods for managing use of radio frequency channels in unlicensed radio frequency bands by a wireless communication device in communication with a cellular wireless network are disclosed. The wireless communication device obtains, from an eNodeB of the wireless network, one or more access network discovery and selection function (ANDSF) policies that include rules for mobility of the wireless communication device and offloading of traffic for the wireless communication device to radio frequency channels in an unlicensed radio frequency band. The wireless communication device determines when at least one radio frequency channel in the unlicensed radio frequency band is available for offloading traffic, for network selection, for network re-selection, or for a supplemental connection via carrier aggregation based on the ANDSF policies, measured interference levels, and/or loading information provided by the eNodeB.
Abstract:
An example technique for security key derivation in a wireless system includes: sending a radio resource control (RRC) suspend message from a first node, to a first user device, the RRC suspend message including a first next hop (NH) chaining counter (NCC) value; releasing access stratum (AS) resources associated with the first user device; deriving a first node key based on the first NCC value; receiving a first uplink message from the first user device without allocating AS resources to the first user device; and unscrambling the first uplink message based on the first NCC value.
Abstract:
Systems and methods provide packet data convergence protocol (PDCP) user plane (UP) integrity protection (IP) for a user equipments (UE) and radio access network (RAN) nodes operating in Evolved Universal Terrestrial Radio Access-New Radio dual connectivity (EN-DC). In an attach procedure, a UE may indicate a UE security capability for support of relay node (RN) PDCP UP IP used in LTE. Based on the LIE security capability, a master e Node B (MeNB) security capability, and a secondary g Node B (SgNB) security capability, the MeNB may determine whether to use UP IP between the UE and the MeNB, the UE and the SgNB, and/or in a split bearer between the MeNB and the SgNB.
Abstract:
An example technique for security key derivation in a wireless system includes: receiving a radio resource control (RRC) suspend message from a first node, the RRC suspend message including a first next hop (NH) chaining counter (NCC) value, entering a RRC inactive state, deriving a first node key based on the first NCC value, generating a first uplink message for transmission in the RRC inactive state based on the first node key, and transmitting the first uplink message to a node while in the RRC inactive state.
Abstract:
Disclosed are embodiments for authentication and authorization in a 5G network between an edge enabler client (EEC) of a UE and an edge configuration server (ECS). The embodiment include performing primary authentication with the 5G network to obtain a KAUSF; generating a Kedge and a Kedge ID using the KAUSF and a subscription permanent identifier (SUPI); providing the Kedge and the Kedge ID to the EEC to cause it to compute a MACEEC using the Kedge and an EEC ID; and sending to the ECS an application registration request, the application registration request including the EEC ID, MACEEC, and Kedge ID.
Abstract:
Systems, apparatuses, methods, and program products to provision a user plane (UP) security policy at a granularity level that is per data radio bearer (DRB) within a protocol data unit (PDU) session or per quality of service (QoS) flow within one or more DRB of the PDU session.
Abstract:
A network component communicating with a user equipment (UE) and a server. The network component receives a first packet from the UE, wherein the first packet indicates to the network component that the network component is to perform operations on behalf of the UE to maintain a persistent connection, receives a second packet from the server and determines whether to transmit a signal to the UE based on the second packet received from the server. A UE having a transceiver and a processor. The UE transmits a first packet to the network component, wherein the first packet indicates to the network component that the network component is to perform operations on behalf of the UE to maintain a persistent connection, identifies an out of service (OOS) event, receives registration information from the network component and registers with the server based on the registration information received from the network component.
Abstract:
Apparatuses, systems, and methods for application awareness interworking between cellular systems. A wireless device may be configured to initiate an application during an ongoing procedure serviced by a first operating according to a first radio access technology (RAT), receive, from a first cellular system, an indication to switch to a second cellular system operating according to a second RAT, and delay the switch to the second cellular system until completion of the ongoing procedure. A network function may be configured to detect initiation of an application during an ongoing procedure serviced by a cellular system operating according to a first RAT, the application having associated application preferences, determine that the associated application preferences indicate a switch to a second cellular system operating according to a second RAT, and delay the switch to the second cellular system until completion of the ongoing procedure.