摘要:
Systems and methodologies are provided that facilitate security activation for wireless communications. In an aspect, a method for wireless communication is provided which includes determining a first security key for communicating with a source access point and receiving, from the source access point, a handover command that includes an indication of whether to apply a second security key upon handover. The method also includes handing over communication from the source access point to a target access point, where the second security key is applied for communicating with the target access point upon the handover when the handover command indicates to apply the second security key.
摘要:
Systems and methodologies are described that facilitate security activation within a specified security activation time. Thus, where handover occurs or is initiated within the activation time, security keys can be activated in such a way as to not be substantially affected by the handover. In one example, a handover time can be set to occur beyond the security activation time to ensure the security activation happens first. Additionally, a handover command can comprise security keys that can be activated upon handover in another example. Moreover, in non-real-time contexts, dummy packets can be transmitted to allow timer operability with packet sequence numbering, or security activation times can be substantially ignored by utilizing a verification process.
摘要:
Systems and methodologies are provided that facilitate security activation for wireless communications. In an aspect, a method for wireless communication is provided which includes determining a first security key for communicating with a source access point and receiving, from the source access point, a handover command that includes an indication of whether to apply a second security key upon handover. The method also includes handing over communication from the source access point to a target access point, where the second security key is applied for communicating with the target access point upon the handover when the handover command indicates to apply the second security key.
摘要:
Systems and methodologies are described that facilitate security activation within a specified security activation time. Thus, where handover occurs or is initiated within the activation time, security keys can be activated in such a way as to not be substantially affected by the handover. In one example, a handover time can be set to occur beyond the security activation time to ensure the security activation happens first. Additionally, a handover command can comprise security keys that can be activated upon handover in another example. Moreover, in non-real-time contexts, dummy packets can be transmitted to allow timer operability with packet sequence numbering, or security activation times can be substantially ignored by utilizing a verification process.
摘要:
An apparatus, method, processor(s), and computer program product avoids user data loss by network-controlled, user equipment assisted handover in a wireless data packet communication system. A wireless receiver receives radio link control (RLC) packet data units (PDUs) from user equipment (UE) being served by a source node. A wireless transmitter commands the UE to handover. A network communication interface transmits RLC Uplink (UL) context from the source node to the target node, and transmits RLC Downlink (DL) initialization message and buffered in-transit DL RLC PDUs from the source node to the target node.
摘要:
Techniques for sending data during handover with Layer 2 tunneling are described. In one design, a user equipment (UE) sends first Layer 2 packets to a source base station prior to handover to a target base station. The UE sends at least one second Layer 2 packet to the target base station, which identifies the second Layer 2 packet(s) as being intended for the source base station and thus forwards the second Layer 2 packet(s) to the source base station via a Layer 2 tunnel. The UE sends third Layer 2 packets to the target base station after the handover. The target base station processes the third Layer 2 packets to obtain IP packets and sends the IP packets to a serving gateway after a trigger condition, which may be defined to achieve in-order delivery of IP packets from the source and target base stations to the serving gateway.
摘要:
Techniques for sending data during handover with Layer 2 tunneling are described. In one design, a user equipment (UE) sends first Layer 2 packets to a source base station prior to handover to a target base station. The UE sends at least one second Layer 2 packet to the target base station, which identifies the second Layer 2 packet(s) as being intended for the source base station and thus forwards the second Layer 2 packet(s) to the source base station via a Layer 2 tunnel. The UE sends third Layer 2 packets to the target base station after the handover. The target base station processes the third Layer 2 packets to obtain IP packets and sends the IP packets to a serving gateway after a trigger condition, which may be defined to achieve in-order delivery of IP packets from the source and target base stations to the serving gateway.
摘要:
Systems and methodologies are described that facilitate identifying a plurality of keysets utilized in a communications network. The keysets can include ciphering keys that provide data encryption and decryption and integrity keys that provide data integrity protection. A key identifier can be included in a packet data convergence protocol header that indicates a keyset employed in connection with data in a protocol data unit. In addition, a route indicator can be provided in a radio link control header that distinguishes a source cell and a target cell in networks configured without RLC reset.
摘要:
Systems and methodologies are described that facilitate notifying and detecting modification of system information in a wireless communication system. A mobile device may receive a first system information block (SIB) in a first time period, obtain from the first SIB at least one parameter related to modification of at least one SIB, and determine whether to receive the at least one SIB based on the at least one parameter obtained from the first SIB. The mobile device may receive a paging message in a second time period and may determine whether to receive one or more SIBs based on information obtained from the paging message. The mobile device may receive the first SIB in the first time period after entering a cell in an idle mode. The mobile device may receive the paging message in the second time period after accessing the cell.
摘要:
A scheme is provided for indexing and storing radio bearer configurations for a UMTS wireless communication network, such as a UTRAN. A radio network controller maintains a list of radio bearer configurations and an identifier for each configuration. One or more of these configurations and their identifiers are sent to a mobile terminal in the network. The mobile terminal stores these configurations and identifiers for future reference. This enables an on-the-fly configuration scheme in which the network controller can reference a particular stored configuration by its identifier to cause the mobile terminal to use that configuration to setup wireless transmitter and/or receiver. The identifiers may have contiguous values so that the network controller can transmit a range (e.g., starting identifier and ending identifier) to the mobile terminal rather than each identifier. When a configuration is modified or removed, the network controller may reassign identifiers to maintain contiguous values.