摘要:
Systems and methodologies are described that facilitate distributing and/or utilizing a Closed Subscriber Group (CSG) Identifier (ID) that identifies a CSG corresponding to a base station and a CSG indication that distinguishes between the base station permitting access to members of the CSG and permitting access to members and non-members of the CSG. For instance, the CSG ID can uniquely identify the CSG corresponding to the base station. A mobile device can receive the CSG ID and the CSG indication from the base station. Further, the received CSG ID can be compared to CSG IDs included in an allowed CSG list to recognize whether the mobile device is a member or a non-member of the CSG. Moreover, a preference for selecting the base station as compared to a disparate base station can be generated as a function of the received CSG ID and CSG indication.
摘要:
Systems and methodologies are described that facilitate distributing and/or utilizing a Closed Subscriber Group (CSG) Identifier (ID) that identifies a CSG corresponding to a base station and a CSG indication that distinguishes between the base station permitting access to members of the CSG and permitting access to members and non-members of the CSG. For instance, the CSG ID can uniquely identify the CSG corresponding to the base station. A mobile device can receive the CSG ID and the CSG indication from the base station. Further, the received CSG ID can be compared to CSG IDs included in an allowed CSG list to recognize whether the mobile device is a member or a non-member of the CSG. Moreover, a preference for selecting the base station as compared to a disparate base station can be generated as a function of the received CSG ID and CSG indication.
摘要:
Systems and methodologies are described that facilitate applying offsets and/or selectable hysteresis values to favor access points in cell reselection. In measuring and ranking surrounding access points in reselection, offsets can be applied to favorable access points to facilitate cell reselection thereto. The offset can positively affect measurements, and thus ranking as well, in some cases. Negative offsets can also be applied to lower measurements (and thus ranking) of some access points. Moreover, hysteresis values can be applied in measuring current cells to prevent frequent reselection. The hysteresis values can be selected based on a type of the current cell or related access point to expand the coverage area where desired. Thus, where the current access point is favorable, a larger hysteresis can be added to measurements related to the current access point.
摘要:
Systems and methodologies are described herein that facilitate improved cell search and selection in a wireless communication system. For example, a terminal as described herein can utilize one or more Closed Subscriber Group (CSG)-specific offset and/or hysteresis parameters as described herein to increase the amount of time on which the terminal is allowed to camp on a desirable cell. Additionally, specialized reselection timing can be employed as described herein to increase a delay associated with selecting a Home Node B (HNB) or Home Evolved Node B (HeNB) cell, thereby reducing power consumption associated with rapid cell reselection operations in a densely populated network environment. Further, a two-step reselection process can be performed as described herein in the context of selecting a frequency for cell reselection, thereby mitigating the effects of rapid reselection between cells and/or frequencies due to CSG cell prioritization.
摘要:
Systems and methodologies are described herein that facilitate improved cell search and selection in a wireless communication system. For example, a terminal as described herein can utilize one or more Closed Subscriber Group (CSG)-specific offset and/or hysteresis parameters as described herein to increase the amount of time on which the terminal is allowed to camp on a desirable cell. Additionally, specialized reselection timing can be employed as described herein to increase a delay associated with selecting a Home Node B (HNB) or Home Evolved Node B (HeNB) cell, thereby reducing power consumption associated with rapid cell reselection operations in a densely populated network environment. Further, a two-step reselection process can be performed as described herein in the context of selecting a frequency for cell reselection, thereby mitigating the effects of rapid reselection between cells and/or frequencies due to CSG cell prioritization.
摘要:
Systems and methodologies are described that facilitate applying offsets and/or selectable hysteresis values to favor access points in cell reselection. In measuring and ranking surrounding access points in reselection, offsets can be applied to favorable access points to facilitate cell reselection thereto. The offset can positively affect measurements, and thus ranking as well, in some cases. Negative offsets can also be applied to lower measurements (and thus ranking) of some access points. Moreover, hysteresis values can be applied in measuring current cells to prevent frequent reselection. The hysteresis values can be selected based on a type of the current cell or related access point to expand the coverage area where desired. Thus, where the current access point is favorable, a larger hysteresis can be added to measurements related to the current access point.
摘要:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
摘要:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
摘要:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
摘要:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.