摘要:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
摘要:
Transmission by a first node may be controlled based on a status of a second node. The status of the second node may indicate, for example, whether the second node will be communicating with the first node. Thus, if it is determined based on the status of the second node that the second node may not be communicating with the first node, transmissions by the first node may be temporarily disabled until there is a change in status, and vice versa.
摘要:
An access terminal scans for nearby access points and maintains a candidate list of access point with which the access terminal may associate in the event the access terminal's communication with its current access point deteriorates for some reason. This search procedure may be performed in a proactive manner whereby the access terminal repeatedly performs scans and updates its list of candidate access points when it is powered on. In some aspects, the search procedure used by the access terminal may be based on a state of the wireless device. In addition, different states of the access terminal may be associated with different optimization criteria.
摘要:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
摘要:
Devices and methods are provided for facilitating selection and acquisition of an access point (AP) base station via implementation of a system selection file that may include a preferred roaming list (PRL), a public land mobile network (PLMN) database, or the like. The selection attempts may be limited to specific preferred systems, such as, for example, the AP base station. The system selection file includes identification parameters of the preferred systems. In one embodiment, the identification parameters include at least one of a system identifier (SID) and a network identifier (NID) for a given one of the systems.
摘要:
In a handover operation an access terminal is handed over from a source access point to a target access point. To facilitate efficient identification of a target access point, a handover operation may be initiated by the target access point. A candidate frequency search also may be invoked to confirm that an access terminal identified by a target access point for a handover is in the vicinity of the target access point. A source access point may verify whether an access terminal is in a vicinity of a target access point to determine whether to perform a handover operation. A source access point may handle potential ambiguity between several target access points by sending handover commands to each of these target access points. An access terminal also may assist in the determination of whether to perform a handover operation.
摘要:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
摘要:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
摘要:
Providing for distributed access point management for access to a mobile network is described herein. By way of example, an interface application maintained at a Femto cell base station (BS) can facilitate initial power up and/or acquisition for a Femto user terminal (UT). Upon start-up, a bootstrap process is utilized by the Femto cell to provision the UT with an SDL establishing at least one BS as high priority within a particular geographic area (GEO). Thus, when the Femto UT is within the GEO, the UT is more likely to acquire, camp on and/or handoff to the preferred BS. When outside the GEO, a serving access point can provision the Femto UT OTA with a custom SDL suited to another GEO having a different high priority access point. By implementing access point management at distributed access points, expensive network equipment can be mitigated or avoided.
摘要翻译:这里描述了用于访问移动网络的分布式接入点管理。 作为示例,维持在毫微微小区基站(BS)的接口应用可以有助于对于毫微微用户终端(UT)的初始加电和/或获取。 在启动时,毫微微小区利用自举进程来向UT提供在特定地理区域(GEO)内建立至少一个BS作为高优先级的SDL。 因此,当毫微微UT在GEO内时,UT更有可能获得,驻留和/或切换到首选BS。 在GEO外部,服务接入点可以为Femto UT OTA提供适合具有不同高优先级接入点的另一个GEO的自定义SDL。 通过在分布式接入点实现接入点管理,可以减轻或避免昂贵的网络设备。
摘要:
Systems and methodologies are described herein that facilitate improved cell search and selection in a wireless communication system. For example, a terminal as described herein can utilize one or more Closed Subscriber Group (CSG)-specific offset and/or hysteresis parameters as described herein to increase the amount of time on which the terminal is allowed to camp on a desirable cell. Additionally, specialized reselection timing can be employed as described herein to increase a delay associated with selecting a Home Node B (HNB) or Home Evolved Node B (HeNB) cell, thereby reducing power consumption associated with rapid cell reselection operations in a densely populated network environment. Further, a two-step reselection process can be performed as described herein in the context of selecting a frequency for cell reselection, thereby mitigating the effects of rapid reselection between cells and/or frequencies due to CSG cell prioritization.