摘要:
Systems and methodologies are described that facilitate notifying and detecting modification of system information in a wireless communication system. A mobile device may receive a first system information block (SIB) in a first time period, obtain from the first SIB at least one parameter related to modification of at least one SIB, and determine whether to receive the at least one SIB based on the at least one parameter obtained from the first SIB. The mobile device may receive a paging message in a second time period and may determine whether to receive one or more SIBs based on information obtained from the paging message. The mobile device may receive the first SIB in the first time period after entering a cell in an idle mode. The mobile device may receive the paging message in the second time period after accessing the cell.
摘要:
A scheme is provided for indexing and storing radio bearer configurations for a UMTS wireless communication network, such as a UTRAN. A radio network controller maintains a list of radio bearer configurations and an identifier for each configuration. One or more of these configurations and their identifiers are sent to a mobile terminal in the network. The mobile terminal stores these configurations and identifiers for future reference. This enables an on-the-fly configuration scheme in which the network controller can reference a particular stored configuration by its identifier to cause the mobile terminal to use that configuration to setup wireless transmitter and/or receiver. The identifiers may have contiguous values so that the network controller can transmit a range (e.g., starting identifier and ending identifier) to the mobile terminal rather than each identifier. When a configuration is modified or removed, the network controller may reassign identifiers to maintain contiguous values.
摘要:
Techniques for performing cell reselection in a wireless communication system are described. A user equipment (UE) may initially camp on a first cell. While camped on the first cell, the UE may identify second and third cells deemed to be better than the first cell. The UE may move from the first cell to the second cell without performing cell reselection to camp on the second cell. After moving to the second cell, the UE may obtain at least one cell reselection parameter for the second and/or third cell and may update the rankings of the second and third cells based on the cell reselection parameter(s). The UE may then perform cell reselection from the first cell to the second or third cell based on the updated rankings, e.g., perform inter-frequency cell reselection from the first cell to the third cell without actually camping on the second cell.
摘要:
Systems and methodologies are described that facilitate notifying and detecting system information block (SIB) modification in subsequent modification periods. Access points can advertise information in a current SIB indicating a subsequent modification period in which the SIB will be modified. Devices can receive the SIB and process the information to determine whether the SIB will be modified and in which modification period. This mitigates undesirable affects of utilizing paging to indicate SIB modification since devices read the SIB upon entering a cell, switching from active to idle mode, etc.
摘要:
Systems and methodologies are described that facilitate notifying and detecting system information block (SIB) modification in subsequent modification periods. Access points can advertise information in a current SIB indicating a subsequent modification period in which the SIB will be modified. Devices can receive the SIB and process the information to determine whether the SIB will be modified and in which modification period. This mitigates undesirable affects of utilizing paging to indicate SIB modification since devices read the SIB upon entering a cell, switching from active to idle mode, etc.
摘要:
Systems and methodologies are provided that facilitate security activation for wireless communications. In an aspect, a method for wireless communication is provided which includes determining a first security key for communicating with a source access point and receiving, from the source access point, a handover command that includes an indication of whether to apply a second security key upon handover. The method also includes handing over communication from the source access point to a target access point, where the second security key is applied for communicating with the target access point upon the handover when the handover command indicates to apply the second security key.
摘要:
Techniques for performing cell reselection in a wireless communication system are described. A user equipment (UE) may initially camp on a first cell. While camped on the first cell, the UE may identify second and third cells deemed to be better than the first cell. The UE may move from the first cell to the second cell without performing cell reselection to camp on the second cell. After moving to the second cell, the UE may obtain at least one cell reselection parameter for the second and/or third cell and may update the rankings of the second and third cells based on the cell reselection parameter(s). The UE may then perform cell reselection from the first cell to the second or third cell based on the updated rankings, e.g., perform inter-frequency cell reselection from the first cell to the third cell without actually camping on the second cell.
摘要:
Systems and methodologies are described that facilitate security activation within a specified security activation time. Thus, where handover occurs or is initiated within the activation time, security keys can be activated in such a way as to not be substantially affected by the handover. In one example, a handover time can be set to occur beyond the security activation time to ensure the security activation happens first. Additionally, a handover command can comprise security keys that can be activated upon handover in another example. Moreover, in non-real-time contexts, dummy packets can be transmitted to allow timer operability with packet sequence numbering, or security activation times can be substantially ignored by utilizing a verification process.
摘要:
Methods, systems and apparatus for dispersing a group of user equipment (UEs) concentrated on a single channel is disclosed. After receiving a disperse command the UEs select a channel, and then select a cell. The channel selection may be performed using a random or pseudorandom function. The cell selection may be performed prior to camping on the cell. Prior to camping the UEs may test the acceptability of a candidate cell and/or may perform a cell reselection. The result of the dispersion is that the UEs are distributed amongst many channels (a, b, c, and d), where reference are found in FIGS. 1A and 1B.
摘要:
Systems and methodologies are provided that facilitate security activation for wireless communications. In an aspect, a method for wireless communication is provided which includes determining a first security key for communicating with a source access point and receiving, from the source access point, a handover command that includes an indication of whether to apply a second security key upon handover. The method also includes handing over communication from the source access point to a target access point, where the second security key is applied for communicating with the target access point upon the handover when the handover command indicates to apply the second security key.