Abstract:
First and second level discovery messages for device-to-device discovery are determined to be going to be transmitted, resource(s) are requested for transmission of at least the second level discovery message, and allocated resource(s) of a second type are received. The first level discovery message is transmitted on either a selected resource of the first type or a selected one of the allocated resource(s). The second level discovery message is transmitted on a selected one of the more allocated resource(s) of the second type, A first level discovery message is received on a resource of either a first type or a second type. It is determined whether the received message is of interest or not and if the message is of interest, then it is determined whether a second level discovery message is available and if so, the second level discovery message is received on a resource of the second type.
Abstract:
A fast-accessing method may comprise: establishing a first security connection between a first network node and a user equipment; obtaining first information from a second network node, wherein the first information comprises at least one of system information of the second network node and an identifier of a security algorithm selected by the second network node for the user equipment; providing second information to the second network node, in response to an indication of the second network node from the user equipment, wherein the second information comprises security information related to the user equipment; and sending the first information to the user equipment for establishing a second security connection between the user equipment and the second network node.
Abstract:
Systems, methods, apparatuses, and computer program products for D2D synchronization in, for example, partial coverage scenarios are provided. One method includes sending, by a network node, information to at least one user equipment in a network. The information may be used by the at least one user equipment to determine whether the at least one user equipment is a full-coverage idle mode user equipment or a downlink-only idle mode user equipment. When, for instance at least one of a pair of device-to-device (D2D) user equipment is outside of the network coverage area, the method includes indicating via a cellular broadcasting message to the downlink-only idle mode and the full-coverage idle mode user equipment to send at least one synchronization signal. The method may then include configuring a RRC_Connected mode user equipment at cell-edge to monitor whether there are user equipment sending synchronization signals.
Abstract:
A method and related user equipment for radio resource control connection recovery are disclosed. In an exemplary embodiment, the method comprises: detecting a RLF of a radio link between a first user equipment and a radio access node; informing a second user equipment which communicates with the radio access node via the first user equipment to suspend a radio resource control connection state; executing a radio resource control connection reestablishment procedure with the radio access node; and informing the second user equipment to resume the radio resource control connection state if the radio resource control connection reestablishment is successful. In addition, a method and related user equipment used with radio resource control connection recovery are disclosed.
Abstract:
Disclosed are methods and apparatus for controlling state transition of a user equipment UE in proximity wireless communication. A method can comprise: learning about an associated agent's context of a connected UE and said UE's capability; deciding to put the connected UE into virtual associated state; sending to said UE a message with indication of putting said UE into said virtual associated state as well as the UE's context; and maintaining said associated agent's context of the UE.
Abstract:
Various communication systems may benefit from techniques and systems for resource allocation. For example, communication systems of the third generation partnership project may benefit from device to device discovery resource allocation methods and systems. A method can include determining that downlink data transmission may cause conflict between uplink control channel transmission and device to device discovery signal transmissions or that uplink shared channel transmissions may conflict with device to device discovery signal transmissions; and requesting a user equipment to report device to device discovery needs based on the determining.
Abstract:
Methods, corresponding apparatuses, and computer program products for ProSe communication are provided. A method comprises sending, from a first base station, a first configuration message to at least one of two user equipments which are performing ProSe communication over a first locally routed path via the first base station such that the two user equipments perform the ProSe communication over a second locally routed path via a second base station. The method also comprises sending, from the first base station, a second configuration message to the second base station such that the second base station is configured to support the two user equipments to perform the ProSe communication over the second locally routed path via the second base station. In the method, ciphering and deciphering of ProSe communication traffic at a specific protocol layer by the first base station is skipped such that the ciphering and deciphering are performed by the two user equipments or by the second base station and the two user equipments. With the claimed invention, the back-and-forth routing between the first base station and second base station resulting in heavy traffic load can be alleviated.
Abstract:
Systems and techniques for synchronization between in-coverage and out-of coverage user devices. A base station configures in-coverage and out-of coverage synchronization signals and configures user devices to recognize synchronization signals as in-coverage or out-of-coverage. An in-coverage device furnishes an in-coverage synchronization signal upon detection of an out-of coverage signal, and may continue to furnish the signal upon continued detection of an out-of-coverage signal that is not synchronized to the network. An out-of-coverage device may receive and synchronize to an in-coverage signal if available, or an out-of-coverage signal if available, or may generate and transmit its own out-of-coverage signal if no in-coverage or out-of-coverage signal is available. Signals may include rank information to indicate relay sequence information, and user devices may be configured to respond to signals based on the rank information—such as favoring a signal whose rank indicates that the signal represents a lower relay order number.
Abstract:
In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising at least one processing core configured to determine an opportunity for device-to-device, D2D, communication, and at least one transmitter configured to cause transmitting of a D2D communication request, wherein the D2D communication request at least one of comprises a radio resource control signaling message and comprises an indication of a type of D2D communication that is requested. The indicated type may comprise D2D communication with no fallback to cellular connectivity, wherein such a D2D communication can be established without involving a core network, CN.
Abstract:
Various communication systems may benefit from inter-operator device-to-device operation. For example, communication systems of the third generation partnership project (3GPP) long term evolution (LTE) advanced (LTE-A) release12/13 (Rel-12/13) or future releases may use such operation with respect to D2D communications. A method can include preparing, at a network element operated by an operator, radio resource information related to one or more operators other than the operator. The method can also include broadcasting, by the network element, the radio resource information. The radio resource information can be configured to permit a user equipment served by the network element to perform device-to-device discovery and/or communication with another user equipment served by at least one of the one or more operators.