摘要:
Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal.
摘要:
Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal. A mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal.
摘要:
Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal. In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal.
摘要:
Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal. In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal.
摘要:
Systems and methods for distributed computing between communication devices. A femto node is treated as a trusted extension of a user equipment and performs processing tasks on behalf of the user equipment. The femto node is also treated as a trusted extension of network servers and performs services on behalf of the network servers. Tasks are thus distributed between the network servers, the femto node and one or more user equipments. The tasks include processing data, filtering incoming messages, and caching network service information.
摘要:
Methods and apparatuses are provided that facilitate providing access point measurements to restricted access points. Restricted access points can lessen restrictions to allow devices to register with the restricted access point for providing measurements thereto. Additionally or alternatively, access point measurements can be provided to a minimization of drive tests (MDT) server for providing to the restricted access points. Thus, restricted access points can obtain the access point measurements for performing enhanced interference management or other functionality based at least in part on the measurements.
摘要:
Systems and methods for distributed computing between communication devices. A femto node is treated as a trusted extension of a user equipment and performs processing tasks on behalf of the user equipment. The femto node is also treated as a trusted extension of network servers and performs services on behalf of the network servers. Tasks are thus distributed between the network servers, the femto node and one or more user equipments. The tasks include processing data, filtering incoming messages, and caching network service information.
摘要:
Systems and methods for distributed computing between communication devices. A femto node is treated as a trusted extension of a user equipment and performs processing tasks on behalf of the user equipment. The femto node is also treated as a trusted extension of network servers and performs services on behalf of the network servers. Tasks are thus distributed between the network servers, the femto node and one or more user equipments. The tasks include processing data, filtering incoming messages, and caching network service information.
摘要:
A heterogeneous communication system enables femto Access Points (APs) to advertise handoff related information on a first Radio Access Technology (RAT), such as for receipt by a multi mode mobile device (e.g., a mobile device capable of operation on a plurality of RATs), wherein the handoff related information permits the multi mode mobile device to identify the femto access point on a second RAT. The multi mode mobile device can be connected to a macro node (e.g., a macro base station, an evolved Base Node, etc.) using the first RAT via a Wireless Wide Area Network (WWAN) air-interface (e.g., 1×, HRPD, eHRPD), while independently reading/decoding overhead messages on the second RAT for connection thereto (e.g., connection to the femto access point on the second RAT.) The second RAT can be another WWAN, a Wireless Local Access Network (WLAN) or a Personal Access Network.
摘要:
Methods and apparatuses are provided that facilitate providing access point measurements to restricted access points. Restricted access points can lessen restrictions to allow devices to register with the restricted access point for providing measurements thereto. Additionally or alternatively, access point measurements can be provided to a minimization of drive tests (MDT) server for providing to the restricted access points. Thus, restricted access points can obtain the access point measurements for performing enhanced interference management or other functionality based at least in part on the measurements.