Abstract:
A user equipment (UE) has both cellular and non-cellular links. The network sends it a first indication to maintain using a first set of security keys generated from a parameter specific to a source access node after the UE hands over the cellular link to a target access node without changing a wireless termination (WT) that is connected with the UE via the non-cellular link. The network uses that key to maintain the non-cellular link with the UE after the cellular link handover. From the UE's perspective it uses that key to authenticate its non-cellular link prior to the cellular link handover, but this handover does not change the WT which communicates with the UE via the non-cellular link so the UE can, only in response to receiving a first indication associated with the handover, use that same key to maintain that non-cellular link after the handover.
Abstract:
Certain embodiments may relate to wireless communication systems. For example, some embodiments may relate to non-terrestrial networks (NTN). A method, in certain embodiments, may include receiving, by a user equipment (UE), at least one resynchronization message from at least one first network entity (NE). The method may also include resynchronizing, by the UE, with at least one second NE after at least one time period with at least one parameter based upon the at least one resynchronization message.
Abstract:
A method for identifying an interfering aerial vehicle user equipment within a communications system, the method including determining for the interfering aerial vehicle user equipment a first signal measurement value is less than a first threshold value; and determining for the interfering aerial vehicle user equipment a second signal measurement value related to the radio interface between the interfering aerial vehicle user equipment and a serving cell access point is greater than a second threshold value, and the first signal measurement value is determined based on a comparison between the second signal measurement value and further signal measurement values related to the radio interface between the interfering aerial vehicle user equipment and at least one further cell access point.
Abstract:
A method, apparatus and computer program are disclosed that perform in a wireless network: monitoring radio network connectivity release requests received from a wireless device of a given subscriber of the wireless network; determining a radio network connectivity release request frequency based on the radio network connectivity release requests received from the wireless device; receiving a current radio network connectivity release request from the wireless device; determining whether the radio network connectivity release request frequency meets a first threshold and: if yes, taking first corrective action to mitigate network load by excessive radio network connectivity release requests.
Abstract:
A mobile radio device uses its own location/position information to itself select a radio access resource from a plurality of radio access resources shared among a plurality of mobile radio devices; and sends a transmission on a wireless shared radio access channel using the selected radio access resource. In non-limiting embodiments: the location/position information represents global/absolute physical position, or a position relative to a local reference location within an access region which may be a cell, building, roadway, etc.; and the radio access resources are time slots; frequency blocks; and/or preambles. The examples have a map or algorithm stored in the device's local memory that associates different access resources to different discrete location areas within the access region; the algorithm identifies the location area that corresponds to the location/position information and outputs the selected access resource (or an index/identifier of it) associated with the identified location area.
Abstract:
A user equipment (UE) has both cellular and non-cellular links. The network sends it a first indication to maintain using a first set of security keys generated from a parameter specific to a source access node after the UE hands over the cellular link to a target access node without changing a wireless termination (WT) that is connected with the UE via the non-cellular link. The network uses that key to maintain the non-cellular link with the UE after the cellular link handover. From the UE's perspective it uses that key to authenticate its non-cellular link prior to the cellular link handover, but this handover does not change the WT which communicates with the UE via the non-cellular link so the UE can, only in response to receiving a first indication associated with the handover, use that same key to maintain that non-cellular link after the handover.
Abstract:
A user equipment (UE) has both cellular and non-cellular links. The network sends it a first indication to maintain using a first set of security keys generated from a parameter specific to a source access node after the UE hands over the cellular link to a target access node without changing a wireless termination (WT) that is connected with the UE via the non-cellular link. The network uses that key to maintain the non-cellular link with the UE after the cellular link handover. From the UE's perspective it uses that key to authenticate its non-cellular link prior to the cellular link handover, but this handover does not change the WT which communicates with the UE via the non-cellular link so the UE can, only in response to receiving a first indication associated with the handover, use that same key to maintain that non-cellular link after the handover.
Abstract:
A user equipment (UE) has both cellular and non-cellular links. The network sends it a first indication to maintain using a first set of security keys generated from a parameter specific to a source access node after the UE hands over the cellular link to a target access node without changing a wireless termination (WT) that is connected with the UE via the non-cellular link. The network uses that key to maintain the non-cellular link with the UE after the cellular link handover. From the UE's perspective it uses that key to authenticate its non-cellular link prior to the cellular link handover, but this handover does not change the WT which communicates with the UE via the non-cellular link so the UE can, only in response to receiving a first indication associated with the handover, use that same key to maintain that non-cellular link after the handover.
Abstract:
A mobile radio device uses its own location/position information to itself select a radio access resource from a plurality of radio access resources shared among a plurality of mobile radio devices; and sends a transmission on a wireless shared radio access channel using the selected radio access resource. In non-limiting embodiments: the location/position information represents global/absolute physical position, or a position relative to a local reference location within an access region which may be a cell, building, roadway, etc.; and the radio access resources are time slots; frequency blocks; and/or preambles. The examples have a map or algorithm stored in the device's local memory that associates different access resources to different discrete location areas within the access region; the algorithm identifies the location area that corresponds to the location/position information and outputs the selected access resource (or an index/identifier of it) associated with the identified location area.