Abstract:
A technology for a user equipment (UE) that is operable to establish direct transport layer connectivity with a selected UE. An internet protocol (IP) address of the UE can be sent to a Proximity Services (ProSe) server. A user application identification (ID) and ProSe server ID of the selected UE can be requested from an application server. A user application ID and ProSe server ID can be received from the application server. A facilitation message can be sent to the ProSe server in communication with the UE, wherein the facilitation message includes a request to facilitate direct transport layer connectivity between the UE and the selected UE for a selected application.
Abstract:
A sensing architecture and method of determining that a specific movement occurred near the STA are disclosed. WLAN signals such as WiFi are transmitted at a predetermined rate from at least one transmit antenna on a mobile device. The WLAN signals are received by a plurality of receive antennas on a mobile device. The receive antennas are line-of-sight shielded from the transmit antenna. A determination of whether an object is proximate to the mobile device is made based on variations in channel state, as measured at receive antennas. The mobile device state is altered in response to a determination that a specific movement occurred near the STA.
Abstract:
Device-to-device (D2D) contention management systems and methods provide managed offloading of cellular network traffic through a contention-based network. For each link in a group of links between nodes in the contention-based network, a link cost is calculated to determine a number of potential links that may interfere with the link, if activated. Each link is evaluated in the order of ascending link cost to determine whether it complies with predefined conditions and whether activating the link increases or decreases D2D network throughput. If the link increases throughput, the link is activated.
Abstract:
Embodiments described herein relate generally to efficient network-assisted communication between user equipment (“UE”). A first UE may be adapted to determine a plurality of hash values associated with provision of a resource by the first UE. The first UE may further determine a port at which the resource is available to be provided. The first UE may communicate this information to a server. Where a second UE wishes to consume the resource, the second UE may determine a plurality of hash values that correspond to those determined by the first UE. The second UE may transmit these determined hash values to the server. In response, the server may transmit the port and an IP address associated with the first UE to the second UE. The server may further facilitate D2D communication between the UEs for provision of the resource. Other embodiments may be described and/or claimed.
Abstract:
A method and system for operator-assisted device-to-device (D2D) discovery is disclosed, which method may be executed as instructions on a machine, where the instructions are included on at least one computer readable medium. The method can include a transmission station in an operator network receiving a request for data service from a requesting wireless device. The transmission station can identify a serving wireless device to provide the data service for the requesting wireless device. The transmission station can transmit a device discovery message to the requesting wireless device and the serving wireless device. The device discovery message provides a device discovery period for communication via an ad-hoc, D2D network between the requesting wireless device and the serving wireless device. The ad-hoc, D2D network provides for device-to-device communication.
Abstract:
Embodiments of computer-implemented methods, systems, computing devices, and computer-readable media are described herein for opportunistically transitioning service flows of mobile devices between being direct and indirect. In various embodiments, a proximity between first and second mobile devices that are in wireless communication with each other may be monitored. In various embodiments, a selective transition of a service flow between the first and second mobile devices from being indirect through the radio network access node using a first radio access technology (“RAT”) to being direct using a second RAT may be facilitated, e.g., responsive to a determination that a first criterion has been met. In various embodiments, a selective transition of the service flow from being direct using the second RAT to being indirect using the first RAT may be facilitated, e.g., responsive to a determination that a second criterion has been met.
Abstract:
Described are techniques for managing the interference produced by D2D (device-to-device) transmissions that may be used in conjunction with transmit power control but operate independently. In one technique, interference between D2D transmissions and cellular uplink transmissions using common resources as received at a base station is managed by opportunistic interference alignment and clustering of D2D devices. In another technique, interference between different D2D devices using the same resources is mitigated by base-station aided space-time interference alignment.
Abstract:
Systems and methods for configuring device-to-device (D2D) wireless communications are generally disclosed herein. One example embodiment includes a method of transmitting mobile station information, security context information, and radio resource management information to mobile stations over a primary wireless network in order to establish and operate D2D connections among the mobile stations using a secondary wireless network. Another example embodiment includes a wireless network base station having a D2D connection facilitator configured to determine configuration information for the D2D connections among the mobile stations, and a transmitter configured to transmit the configuration information to the mobile station.
Abstract:
In various embodiments, two wireless communication devices may communicate with each other using multiple protocols, by dividing the data to be communicated into multiple portions, and using each protocol to communicate different portions. The different protocols may be used simultaneously or concurrently. This multi-protocol technique may be used in several different ways to provide different types of advantages in wireless communications.
Abstract:
Techniques described herein may provide for device discovery of direct communication paths, to enable direct mode communication, between communication devices. The discovery of the communication paths may be based on identifiers that may be defined at the application level and included in device discovery requests. In one implementation, the identifiers may be SIP-URIs (session initiation protocol (SIP)-uniform resource identifiers (URIs)).