Abstract:
A method and system for operator-assisted device-to-device (D2D) discovery is disclosed, which method may be executed as instructions on a machine, where the instructions are included on at least one computer readable medium. The method can include a transmission station in an operator network receiving a request for data service from a requesting wireless device. The transmission station can identify a serving wireless device to provide the data service for the requesting wireless device. The transmission station can transmit a device discovery message to the requesting wireless device and the serving wireless device. The device discovery message provides a device discovery period for communication via an ad-hoc, D2D network between the requesting wireless device and the serving wireless device. The ad-hoc, D2D network provides for device-to-device communication.
Abstract:
Embodiments of computer-implemented methods, systems, computing devices, and computer-readable media are described herein for opportunistically transitioning service flows of mobile devices between being direct and indirect. In various embodiments, a proximity between first and second mobile devices that are in wireless communication with each other may be monitored. In various embodiments, a selective transition of a service flow between the first and second mobile devices from being indirect through the radio network access node using a first radio access technology (“RAT”) to being direct using a second RAT may be facilitated, e.g., responsive to a determination that a first criterion has been met. In various embodiments, a selective transition of the service flow from being direct using the second RAT to being indirect using the first RAT may be facilitated, e.g., responsive to a determination that a second criterion has been met.
Abstract:
Described are techniques for managing the interference produced by D2D (device-to-device) transmissions that may be used in conjunction with transmit power control but operate independently. In one technique, interference between D2D transmissions and cellular uplink transmissions using common resources as received at a base station is managed by opportunistic interference alignment and clustering of D2D devices. In another technique, interference between different D2D devices using the same resources is mitigated by base-station aided space-time interference alignment.
Abstract:
Systems and methods for configuring device-to-device (D2D) wireless communications are generally disclosed herein. One example embodiment includes a method of transmitting mobile station information, security context information, and radio resource management information to mobile stations over a primary wireless network in order to establish and operate D2D connections among the mobile stations using a secondary wireless network. Another example embodiment includes a wireless network base station having a D2D connection facilitator configured to determine configuration information for the D2D connections among the mobile stations, and a transmitter configured to transmit the configuration information to the mobile station.
Abstract:
In various embodiments, two wireless communication devices may communicate with each other using multiple protocols, by dividing the data to be communicated into multiple portions, and using each protocol to communicate different portions. The different protocols may be used simultaneously or concurrently. This multi-protocol technique may be used in several different ways to provide different types of advantages in wireless communications.
Abstract:
Techniques described herein may provide for device discovery of direct communication paths, to enable direct mode communication, between communication devices. The discovery of the communication paths may be based on identifiers that may be defined at the application level and included in device discovery requests. In one implementation, the identifiers may be SIP-URIs (session initiation protocol (SIP)-uniform resource identifiers (URIs)).
Abstract:
A technology for a user equipment (UE) that is operable to establish direct transport layer connectivity with a selected UE. An internet protocol (IP) address of the UE can be sent to a Proximity Services (ProSe) server. A user application identification (ID) and ProSe server ID of the selected UE can be requested from an application server. A user application ID and ProSe server ID can be received from the application server. A facilitation message can be sent to the ProSe server in communication with the UE, wherein the facilitation message includes a request to facilitate direct transport layer connectivity between the UE and the selected UE for a selected application.
Abstract:
In various embodiments, two wireless communication devices may communicate with each other using multiple protocols, by dividing the data to be communicated into multiple portions, and using each protocol to communicate different portions. The different protocols may be used simultaneously or concurrently. This multi-protocol technique may be used in several different ways to provide different types of advantages in wireless communications.
Abstract:
A sensing architecture and method of determining that a specific movement occurred near the STA are disclosed. WLAN signals such as WiFi are transmitted at a predetermined rate from at least one transmit antenna on a mobile device. The WLAN signals are received by a plurality of receive antennas on a mobile device. The receive antennas are line-of-sight shielded from the transmit antenna. A determination of whether an object is proximate to the mobile device is made based on variations in channel state, as measured at receive antennas. The mobile device state is altered in response to a determination that a specific movement occurred near the STA.
Abstract:
Techniques described herein may provide for device discovery of direct communication paths, to enable direct mode communication, between communication devices. The discovery of the communication paths may be based on identifiers that may be defined at the application level and included in device discovery requests. In one implementation, the identifiers may be SIP-URIs (session initiation protocol (SIP)-uniform resource identifiers (URIs)).