Abstract:
Disclosed herein are methods and systems for identifying and reducing LTE-system coverage holes due to external interference. One embodiment takes the form of a process that includes receiving a signal in a first wireless band. The received signal comprises a signal of interest. The process also includes determining that a received signal quality of the signal of interest is less than a signal-quality threshold. The process also includes determining that the received signal quality of the signal of interest is less than the signal-quality threshold due to interference external to the first wireless band, and responsively attenuating the received signal. The process also includes demodulating the attenuated received signal to obtain the signal of interest.
Abstract:
A method and apparatus to mitigate radio frequency interference by a broadband mobile device by detecting, at the broadband mobile device, a geographically or physically proximate narrowband uplink transmission, wherein the narrowband uplink transmission is in close enough spectral proximity to at least one bearer channel of the broadband mobile device to result in interference on the narrowband reception when the broadband mobile device is transmitting and a narrowband mobile device is receiving, determining, based on the detected narrowband uplink transmission, a corresponding narrowband downlink frequency, monitoring the determined narrowband downlink frequency, detecting a narrowband downlink transmission at the monitored narrowband downlink frequency, and in response to detecting the narrowband downlink transmission at the monitored narrowband downlink frequency, modifying a broadband uplink transmission to ensure the broadband uplink transmission does not interfere with narrowband downlink reception.
Abstract:
A method and apparatus is provided for connecting a communication device to a deployable system. The deployable system obtains at least one deployable key derived on a fixed system for the deployable system based on an existing key stored on a database of the fixed system, wherein the existing key is used to authenticate a communication device. The deployable system stores the derived key. Subsequent to the storing, the deployable system is activated to provide communication resources to communication devices disconnected from the fixed system. The activated deployable system is not connected to the fixed system. The activated deployable system receives an authentication request from the communication device requesting connection to the deployable system; generates authentication vectors using the at least one derived deployable key; and authenticates an authentication response received from the communication device using the authentication vectors.
Abstract:
Disclosed herein are methods and systems for emulating testing-plan channel conditions in wireless networks. One embodiment takes the form of a process that includes identifying a data-rate threshold and one or more testing-plan channel conditions. The process also includes identifying testing-scenario channel conditions corresponding to the testing-plan channel conditions. The process also includes selecting an attenuation offset based on a comparison of the one or more identified testing-scenario channel conditions to the one or more identified testing-plan channel conditions. The process also includes measuring a data rate with a testing-scenario attenuation level set equal to the selected attenuation offset. The process also includes storing testing-plan-compliance data associated with the measured data rate and the data-rate threshold.
Abstract:
A method and apparatus is provided for connecting a communication device to a deployable system. The deployable system obtains at least one deployable key derived on a fixed system for the deployable system based on an existing key stored on a database of the fixed system, wherein the existing key is used to authenticate a communication device. The deployable system stores the derived key. Subsequent to the storing, the deployable system is activated to provide communication resources to communication devices disconnected from the fixed system. The activated deployable system is not connected to the fixed system. The activated deployable system receives an authentication request from the communication device requesting connection to the deployable system; generates authentication vectors using the at least one derived deployable key; and authenticates an authentication response received from the communication device using the authentication vectors.
Abstract:
A method and apparatus for User Equipment (UE) power class adaptation for coverage extension in Long Term Evolution (LTE) includes setting a maximum transmit power to a predefined level that is below a maximum capability of a high power UE (HPUE); responsive to determining, based on detected operating conditions local to the HPUE, that an increase in transmit range is required, raising the maximum transmit power towards or to the maximum capability of the HPUE; and subsequently transmitting at an operating transmit power at or below the maximum transmit power as a function of the detected operating conditions local to the HPUE. The method and apparatus allow the HPUE to infer how to configure its maximum power to mitigate interference to the same class of cells, without assistance from an Evolved Node B (eNB) and within the existing 3GPP LTE framework.
Abstract:
A portable communication device operating of a first WWAN can receive an identifier from a WLAN access point indicating that one or more devices operating on a second WWAN are in the vicinity of the WLAN access point. In response, the portable communication device invokes an interference mitigation process while the identifier indicates that devices operating on the second WWAN are present.