摘要:
In-band provisioning enables subscribers to manually provision themselves via an access point at which the subscribers would not otherwise be allowed access. For example, a subscriber may be temporarily accepted by a restricted access point (e.g., an access point that belongs to a closed subscriber group). The subscriber is then given limited access to enable the subscriber to be provisioned at the access point. For example, the subscriber may be provisioned for full access at the access point if the subscriber presents a valid authorization credential to a provisioning entity.
摘要:
In-band provisioning enables subscribers to manually provision themselves via an access point at which the subscribers would not otherwise be allowed access. For example, a subscriber may be temporarily accepted by a restricted access point (e.g., an access point that belongs to a closed subscriber group). The subscriber is then given limited access to enable the subscriber to be provisioned at the access point. For example, the subscriber may be provisioned for full access at the access point if the subscriber presents a valid authorization credential to a provisioning entity.
摘要:
In-band provisioning enables subscribers to manually provision themselves via an access point at which the subscribers would not otherwise be allowed access. For example, a subscriber may be temporarily accepted by a restricted access point (e.g., an access point that belongs to a closed subscriber group). The subscriber is then given limited access to enable the subscriber to be provisioned at the access point. For example, the subscriber may be provisioned for full access at the access point if the subscriber presents a valid authorization credential to a provisioning entity.
摘要:
Systems and methodologies are described that facilitate resolving resource assignment conflicts between access terminals in a wireless communication environment. A first access terminal may receive a persistent, or “sticky” assignment of a set of resources, such as subcarriers. In the event that a second access terminal requires a brief resource assignment, a time-limited, or “non-sticky” resource assignment may be granted to the second access terminal. If a resource in the non-sticky assignment is already assigned to the first access terminal via the sticky assignment, the first access terminal may receive an indication of the conflict along with information related to a duration of the non-sticky assignment, may surrender the conflicted resource, and may resume control over the conflicted resource after the termination of the non-sticky assignment.
摘要:
Methods and apparatus for communicating packets of information from an access terminal to a remote access node assembly by way of a serving access node assembly are described. An inter-route tunneling protocol module which interfaces with a radio link protocol module is used to tunnel route protocol packets. A first radio link protocol stream is associated with an application resident on the access terminal. A second radio link protocol stream is associated with an inter-route tunneling protocol module. Information to be communicated to a remote access node assembly by way of a serving access node assembly is subjected to two different radio link protocol processing operations. A first one of the RLP processing operations corresponds to the remote access node assembly while the second RLP processing operation corresponds to the serving access node assembly.
摘要:
A method and apparatus for generating a cryptosync is disclosed that generates a cryptosync with the desired variability without the overhead in complexity and size of prior cryptosyncs. The cryptosync is generated from a combination of fields including fields relating to the segmentation and reassembly of the data packets at a transmitting terminal and a receiving terminal. The resultant cryptosync does not repeat during the use of a particular security key.
摘要:
Methods and apparatuses are provided that include handing over relays in wireless networks. Handover request messages for a relay and related user equipment (UE) can be grouped to lessen signaling requirements for handover. Moreover, identifiers can be communicated in the messages to optimize bearer establishment at a target base station to which the relay and related devices are handed over. Also, handover exception cases can occur, which can be handled by the relay and source and target base stations, such as bearer rejection at the target base station, handover failure for one or more devices or the relay, and/or the like. Further, handover of a relay can occur between base stations that house one or more network gateways for the relay, or where the gateways are centralized and accessible by the source and target base stations, where each scenario can include different exception handling.
摘要:
An apparatus and method of transmitting a Redirect message in a wireless communication system is described. A Redirect message is generated comprising an 8 bit MessageID field, a 16 bit StayAwayDuration field wherein the StayAwayDuration field indicates the units of second for which an access terminal will not make an access attempt at the sector sending this message, an 8 bit NumChannel field wherein the NumChannel indicates the number of channel records included in the message, an 8 bit RedirectReason field wherein the RedirectReason reflect the redirect reason and a Channel field wherein the Channel field indicates the channel that the access terminal should reacquire. The Redirect message is transmitted over a communication link.
摘要:
Systems and methods are provided for processing wireless signal components for a mobile wireless access broadband service. This can include processes for defining a protocol that controls whether to invoke a tune away component to determine an alternative wireless communications path. This can include defining one or more tune away parameters for the tune away component. The process can then automatically select the alternative wireless communications path based in part on the tune away procedure and at least one of the tune away parameters.
摘要:
Methods and apparatus for communicating between an access terminal (AT) and an Access Point (AP) are described. For communications over the air link, between an AP and an AT a PN (Pseudo-random Noise) code based address is used as an AP identifier, e.g., address. The PN code based address may be based on Pilot PN code based signals received from an AP. Thus, the PN based AP address may be determined from pilot signals received from an AP. The PN based AP address may be a shortened version of a PN code corresponding to an AP, a full PN code corresponding to an AP, or a value which can be derived in a known manner from a PN code corresponding to an AP.