摘要:
Techniques are provided for efficient peer-to-peer (P2P) service discovery and group formation, as well as maintenance of P2P session continuity. In one example, there is provided a method, operable by an originating user equipment (UE), that may involve transmitting a request for P2P service discovery and group formation assistance to a discovery server via a serving node over an air-interface channel. The method may involve receiving scoped information from the discovery server for participating in a P2P communication session, and establishing the P2P communication session with at least one terminating UE based at least in part on the received scoped information. The method may involve maintaining P2P communication session continuity by reverting to bearer signaling via a packet core.
摘要:
Techniques are provided for efficient peer-to-peer (P2P) service discovery and group formation, as well as maintenance of P2P session continuity. In one example, there is provided a method, operable by an originating user equipment (UE), that may involve transmitting a request for P2P service discovery and group formation assistance to a discovery server via a serving node over an air-interface channel. The method may involve receiving scoped information from the discovery server for participating in a P2P communication session, and establishing the P2P communication session with at least one terminating UE based at least in part on the received scoped information. The method may involve maintaining P2P communication session continuity by reverting to bearer signaling via a packet core.
摘要:
Techniques for performing registration with a wireless network using integrity protection and/or ciphering are described. A user equipment (UE) may perform a security procedure with the wireless network for a first session and may generate UE security context data at the UE. The UE security context data may include a cipher key used for ciphering, an integrity key used for integrity protection, a temporary UE identity, and/or other information. The UE may use the UE security context data for secure communication with the wireless network during the first session. The UE may store the UE security context data upon termination of the first session. The UE may thereafter use the stored UE security context data for registration with the wireless network for a second session following the first session. The UE may perform integrity protection and/or ciphering for message(s) for registration based on the stored UE security context data.
摘要:
The method and apparatus as described are directed toward techniques and mechanisms to improve efficiency in wireless communication networks through optimization of handover scenarios. Determining whether an intra-base station or inter-node-B handover is to be performed, and determining the protocol layers to reset during the handover based at least in part on the type of handover to be performed increases the overall efficiency of the wireless network.
摘要:
The method and apparatus as described are directed toward techniques and mechanisms to improve efficiency in wireless communication networks through optimization of handover scenarios. Determining whether an intra-base station or inter-node-B handover is too performed, and determining the protocol layers to reset during the handover based at least in part on the type of handover to be performed increases the overall efficiency of the wireless network.
摘要:
Techniques for performing registration with a wireless network using integrity protection and/or ciphering are described. A user equipment (UE) may perform a security procedure with the wireless network for a first session and may generate UE security context data at the UE. The UE security context data may include a cipher key used for ciphering, an integrity key used for integrity protection, a temporary UE identity, and/or other information. The UE may use the UE security context data for secure communication with the wireless network during the first session. The UE may store the UE security context data upon termination of the first session. The UE may thereafter use the stored UE security context data for registration with the wireless network for a second session following the first session. The UE may perform integrity protection and/or ciphering for message(s) for registration based on the stored UE security context data.
摘要:
Systems and methodologies are described that facilitate identifying a plurality of keysets utilized in a communications network. The keysets can include ciphering keys that provide data encryption and decryption and integrity keys that provide data integrity protection. A key identifier can be included in a packet data convergence protocol header that indicates a keyset employed in connection with data in a protocol data unit. In addition, a route indicator can be provided in a radio link control header that distinguishes a source cell and a target cell in networks configured without RLC reset.
摘要:
The method and apparatus as described are directed toward techniques and mechanisms to improve efficiency in wireless communication networks through optimization of handover scenarios. Determining whether an intra-base station or inter-node-B handover is to be performed, and determining the protocol layers to reset during the handover based at least in part on the type of handover to be performed increases the overall efficiency of the wireless network.
摘要:
Systems and methodologies are described that facilitate enforcing quality of service requirements. A first timer is employed for each data packet arriving at a packet data convergence protocol layer of a wireless communications apparatus. The first timer can be configured based upon delay tolerance specified according to quality of service requirements imposed on the data packet. The data packet can be discarded if the timer expires before the data packet leaves the protocol data convergence protocol layer. In addition, a second time is utilized for the data packet as it arrives at a radio link control layer. The data packet can be discarded if the second timer expires before the data packet is successfully transmitted to a receiver.
摘要:
The method and apparatus as described are directed toward techniques and mechanisms to improve efficiency in wireless communication networks through optimization of handover scenarios. Determining whether an intra-base station or inter-node-B handover is too performed, and determining the protocol layers to reset during the handover based at least in part on the type of handover to be performed increases the overall efficiency of the wireless network.