摘要:
Systems and methodologies are provided that facilitate security activation for wireless communications. In an aspect, a method for wireless communication is provided which includes determining a first security key for communicating with a source access point and receiving, from the source access point, a handover command that includes an indication of whether to apply a second security key upon handover. The method also includes handing over communication from the source access point to a target access point, where the second security key is applied for communicating with the target access point upon the handover when the handover command indicates to apply the second security key.
摘要:
Systems and methodologies are described that facilitate security activation within a specified security activation time. Thus, where handover occurs or is initiated within the activation time, security keys can be activated in such a way as to not be substantially affected by the handover. In one example, a handover time can be set to occur beyond the security activation time to ensure the security activation happens first. Additionally, a handover command can comprise security keys that can be activated upon handover in another example. Moreover, in non-real-time contexts, dummy packets can be transmitted to allow timer operability with packet sequence numbering, or security activation times can be substantially ignored by utilizing a verification process.
摘要:
Systems and methodologies are provided that facilitate security activation for wireless communications. In an aspect, a method for wireless communication is provided which includes determining a first security key for communicating with a source access point and receiving, from the source access point, a handover command that includes an indication of whether to apply a second security key upon handover. The method also includes handing over communication from the source access point to a target access point, where the second security key is applied for communicating with the target access point upon the handover when the handover command indicates to apply the second security key.
摘要:
Systems and methodologies are described that facilitate security activation within a specified security activation time. Thus, where handover occurs or is initiated within the activation time, security keys can be activated in such a way as to not be substantially affected by the handover. In one example, a handover time can be set to occur beyond the security activation time to ensure the security activation happens first. Additionally, a handover command can comprise security keys that can be activated upon handover in another example. Moreover, in non-real-time contexts, dummy packets can be transmitted to allow timer operability with packet sequence numbering, or security activation times can be substantially ignored by utilizing a verification process.
摘要:
An apparatus, method, processor(s), and computer program product avoids user data loss by network-controlled, user equipment assisted handover in a wireless data packet communication system. A wireless receiver receives radio link control (RLC) packet data units (PDUs) from user equipment (UE) being served by a source node. A wireless transmitter commands the UE to handover. A network communication interface transmits RLC Uplink (UL) context from the source node to the target node, and transmits RLC Downlink (DL) initialization message and buffered in-transit DL RLC PDUs from the source node to the target node.
摘要:
Techniques for sending data during handover with Layer 2 tunneling are described. In one design, a user equipment (UE) sends first Layer 2 packets to a source base station prior to handover to a target base station. The UE sends at least one second Layer 2 packet to the target base station, which identifies the second Layer 2 packet(s) as being intended for the source base station and thus forwards the second Layer 2 packet(s) to the source base station via a Layer 2 tunnel. The UE sends third Layer 2 packets to the target base station after the handover. The target base station processes the third Layer 2 packets to obtain IP packets and sends the IP packets to a serving gateway after a trigger condition, which may be defined to achieve in-order delivery of IP packets from the source and target base stations to the serving gateway.
摘要:
Techniques for sending data during handover with Layer 2 tunneling are described. In one design, a user equipment (UE) sends first Layer 2 packets to a source base station prior to handover to a target base station. The UE sends at least one second Layer 2 packet to the target base station, which identifies the second Layer 2 packet(s) as being intended for the source base station and thus forwards the second Layer 2 packet(s) to the source base station via a Layer 2 tunnel. The UE sends third Layer 2 packets to the target base station after the handover. The target base station processes the third Layer 2 packets to obtain IP packets and sends the IP packets to a serving gateway after a trigger condition, which may be defined to achieve in-order delivery of IP packets from the source and target base stations to the serving gateway.
摘要:
Systems and methodologies are described that facilitate identifying a plurality of keysets utilized in a communications network. The keysets can include ciphering keys that provide data encryption and decryption and integrity keys that provide data integrity protection. A key identifier can be included in a packet data convergence protocol header that indicates a keyset employed in connection with data in a protocol data unit. In addition, a route indicator can be provided in a radio link control header that distinguishes a source cell and a target cell in networks configured without RLC reset.
摘要:
Techniques for performing in-order data delivery during handover in a wireless communication system are described. A user equipment (UE) may perform handover from a source base station to a target base station. The target base station may start a timer after a data path from a gateway to the UE has been switched from the source base station to the target base station. The target base station may receive forwarded packets for the UE from the source base station and may receive new packets for the UE from the gateway. The target base station may send the forwarded packets received prior to expiration of the timer to the UE before any new packets. The target base station may send the forwarded packets to the UE without waiting for the timer to expire and may send the new packets to the UE after the timer expires.
摘要:
Techniques for performing in-order data delivery during handover in a wireless communication system are described. A user equipment (UE) may perform handover from a source base station to a target base station. The target base station may start a timer after a data path from a gateway to the UE has been switched from the source base station to the target base station. The target base station may receive forwarded packets for the UE from the source base station and may receive new packets for the UE from the gateway. The target base station may send the forwarded packets received prior to expiration of the timer to the UE before any new packets. The target base station may send the forwarded packets to the UE without waiting for the timer to expire and may send the new packets to the UE after the timer expires.