摘要:
In embodiments, apparatuses, methods, and storage media may be described for establishing a direct connection between two UEs. Each UE may be provisioned with a temporary identifier by a server of a wireless network of the UE. The UEs may then be configured to broadcast the temporary IDs in radio signals over radio resources that are separate from the radio resources of the network. The temporary IDs may not contain identifying information of the broadcasting UE that is interpretable without receiving further information from the network.
摘要:
Technology for a lawful interception of a proximity service (e.g., device-to-device (D2D) communication) provided to user equipments (UEs) is disclosed. In an example, a method can include an evolved Node B (eNB) transmitting a proximity service setup message to a first UE to setup D2D communication with a second UE. The eNB can transmit a lawful interception message to the first UE or the second UE to provide lawful interception of the D2D communication. The eNB can receive packets associated with the D2D communication from the first UE or the second UE. The eNB can communicate the received packets from the first UE and the second UE to the core network (CN) to be copied.
摘要:
Some demonstrative embodiments include devices, systems of steering data radio bearer traffic to a wireless local area network link. For example, a User Equipment (UE) may include a Wireless Local Area Network (WLAN) transceiver; a cellular transceiver to communicate traffic of a plurality of Data Radio Bearers (DRBs) via a cellular link between the UE and an evolved Node B (eNB); and a controller to establish at least one Point-to-Point (P2P) link with the eNB via a WLAN link between the UE and a WLAN Access Point (AP), and to steer traffic of one or more of the DRBs from the cellular link to the P2P link.
摘要:
A technology for network-level device proximity detection is disclosed. In an example, core network (CN) device can include computer circuitry configured to: Store user equipment (UE) information; calculate proximity between two UEs; and assist the two UEs with direct device discovery based on the calculated proximity. The core network device can include a proximity services (ProSe) server, a gateway mobile location center (GMLC), an evolved serving mobile location center (E-SMLC), or a mobility management entity (MME).
摘要:
A wireless local area network (WLAN) point-to-point communications link between an evolved universal terrestrial radio access network node B (eNB) and a user equipment device (or simply UE) is identified by UE/eNB media access control (MAC) identifiers on a per UE or per data radio bearer (DRB) basis for offloading cellular data from a long term evolution (LTE) link to the WLAN point-to-point communications link. A wireless local area network tunneling protocol (WLTP) includes packet formats and network protocol stack arrangements to support functions facilitated by the WLAN point-to-point communications link, such as, for example, identification of control and data traffic messages, DRB identification for WLTP packets, quality of service (QoS) delay and packet loss measurement, support of bearer splitting, and support of a general framework for offloading cellular traffic at different depths of the 3rd Generation Partnership Project (3GPP) network protocol stack.
摘要:
Some demonstrative embodiments include devices, systems and/or methods of Lawful Interception (LI). For example, a device may communicate a message addressed to an Evolved Node B (eNB) over a cellular communication core network, the message including a Lawful Interception (LI) Information Element (IE) indicating that content corresponding to one or more User Equipment (UEs) connected to the eNB is to be subject to LI.
摘要:
Some demonstrative embodiments include devices, systems and/or methods of Lawful Interception (LI). For example, a device may communicate a message addressed to an Evolved Node B (eNB) over a cellular communication core network, the message including a Lawful Interception (LI) Information Element (IE) indicating that content corresponding to one or more User Equipment (UEs) connected to the eNB is to be subject to LI.
摘要:
The techniques introduced here provide for network assisted device-to-device communication for peer-to-peer applications. The techniques include registering a user's peer-to-peer application identifier with a peer-to-peer application server, registering a user's peer-to-peer application ID with a device-to-device server, sending a peer-to-peer service request to the peer-to-peer application server, and receiving network assistance in discovering a peer with the desired P2P content/service and establishing a device-to-device communication arrangement for exchange of peer-to-peer services. The network assistance is provided over the user plane.
摘要:
Connection management techniques for wireless network mobility procedures are described. In one embodiment, for example, an evolved packet core (EPC) node may comprise a processor circuit to receive a notification of a mobility procedure for a user equipment (UE), determine whether to release a local gateway (L-GW)-provided packet data network (PDN) connection of the UE, and in response to a determination that the L-GW-provided PDN connection is to be released, send either a detach request message or a delete session request message to initiate a process for releasing the L-GW-provided PDN connection. Other embodiments are described and claimed.