摘要:
A network apparatus comprises a controller to determine a first base station for transmitting data and to determine a second different base station for receiving data. In one embodiment, the network apparatus further comprises a transceiver to transmit data to the first base station while associated with the second base station. The transceiver is operable to receive data from the second base station while associated with the first base station.
摘要:
Techniques are described that can be used to assign identifiers to carriers of a multi-carrier mobile station. In some cases, each carrier of the mobile station is assigned the same identifiers. In some cases, each carrier of the mobile station is assigned a unique identifier on each channel.
摘要:
Embodiments for providing network-assisted to direct device discovery switch are generally described herein. In some embodiments, location information is received at an evolved packet core (EPC) from at least a first and a second user equipment (UE). A network-assisted device-to-device (D2D) request is received from the first UE for establishing a D2D wireless connection with the second UE. Proximity of the first UE and the second UE are monitored. Before detecting the second UE being in proximity to the first UE, direct discovery is determined to be more resource efficient than continuing to provide network-assisted D2D discovery. An indication is provided to the first UE and the second UE to perform direct discovery based on information provided in the indication.
摘要:
Embodiments of methods and apparatus to manage MTC device trigger load in a wireless network are described herein. Other embodiments may be described and claimed.
摘要:
An embodiment of the present invention provides an apparatus, comprising a transceiver operable in a wireless network, wherein the transceiver is configured to enable wireless interception by a predetermined third party without the knowledge of a user of said transceiver, wherein the apparatus uses a secure external interface that is beyond the scope of the 802.16 wireless network, and wherein the operation of the wireless interception includes interception by a law enforcement agency by using a law interception server (LIS), Authentication Authorization and Accounting (AAA), Anchor Auth, Target lawful interception agent LIA and Serving lawful interception agent (LIA) and wherein the LIS first identifies a mobile station (MS) based on input from the law enforcement agency and once the MS is identified, the LIA for the MS is then identified by the LIS and once the LIA is identified, the LIA sends the security association for the MS session to the LIS which then sends this to the law enforcement.
摘要:
The techniques introduced here provide for network assisted device-to-device communication for peer-to-peer applications. The techniques include registering a user's peer-to-peer application identifier with a peer-to-peer application server, registering a peer-to-peer application with a device-to-device server, sending a peer-to-peer service request to the peer-to-peer application server, and receiving network assistance in discovering a peer with the desired P2P content/service and establishing a device-to-device communication arrangement for exchange of peer-to-peer services.
摘要:
Various embodiments of the invention may use adaptive polling in a wireless network when one or more consecutive polls show that the polled station has no data to transmit. When triggered to perform adaptive polling, a base station may wait for increasingly long intervals between polls to a particular subscriber station, until some maximum interval has been reached. In some embodiments, the intervals may increase exponentially.
摘要:
Various embodiments include systems, wireless modules, and methods for local IP access packet data network release. Handover data can be received at a target wireless module as part of a user equipment handover operation. The user equipment can include an active packet data network session associated with a source local home network. A determination that the target wireless module is not in the source local home network can be made based on the handover data. The target wireless module can trigger deactivation of the packet data network session in response to the determination that the target wireless module is not in the source local home network.
摘要:
A method and system for establishing a secure device-to-device connection between two mobile devices involves the use of a WiFi Direct (LTE Direct or other similar protocols) link paired with an IP Multimedia Subsystems (IMS) link. A device detects the presence of another device that it wishes to connect to. The devices negotiate a group owner, then authenticate each other using a variety of techniques, such as a centrally issued certificate. Thereafter, the devices derive keys to be used for communication, both over the WiFi Direct link and via the IMS link. A WiFi Direct Link may be paired with a Push to Talk over Cellular (PoC) link in order to couple together more than two devices. In such a connection, devices transmit to a group owner, which then sends multicast versions to the rest of the group devices.