Abstract:
Aspects described herein relate to throttling packet-switched (PS) call establishment in wireless communications. A circuit-switched (CS) call can be conducted by using a first radio access technology (RAT). A cell update (CU) procedure for a PS call using a second RAT can be detected as due to one or more conditions. A cause for the one or more conditions can be determined based on one or more parameters related to a transmitter or receiver. PS call establishment attempts can accordingly be throttled based at least in part on determining the cause for the one or more conditions
Abstract:
Aspects of resolving conflicting configuration parameters during wireless communication include triggering reselection to a new cell from a current cell and determining that a user equipment (UE) is configured in a forward access channel (FACH) state and is waiting for a Layer 2 Acknowledgement (L2 ACK) message from a network entity when reselection to the new cell is triggered. Further, the aspects include performing a collision resolution procedure in response to the determination that the UE is configured in the FACH state and is waiting for the L2 ACK message. In some aspects, the collision resolution procedure establishes which one of a plurality of information elements (IEs) to choose for a reconfiguration procedure.
Abstract:
The present disclosure presents a method and an apparatus for managing radio resource control (RRC) state transitions at a user equipment (UE). For example, the method may include transmitting a reconfiguration complete message to a network entity, starting a reselection delay timer simultaneously with the transmitting of the reconfiguration complete message, identifying initiation of a cell reselection procedure at the UE, delaying the cell reselection procedure at the UE until the UE receives a layer 2 acknowledgement (L2 ACK) message from the network entity, stopping the reselection delay timer in response to receiving the L2 ACK message, and transitioning the UE to a cell_paging channel (cell_PCH) state from a cell_forward access channel (cell_FACH) state after the stopping of the reselection delay timer. As such, managing RRC state transitions at a UE may be achieved.
Abstract:
Techniques for configuring a window size are described. A user equipment (UE) may identify a first window size for communications between the UE and a source network and determine that the first window size is invalid for a target configuration of communications between the UE and a target network. When the first window size is invalid for the target configuration, the UE may calculate a second window size for the target configuration of communications between the UE and the target network based on one or more parameters of the target configuration. The calculation of the second window size may be based on one or more parameters of the target configuration. Moreover, the one or more parameters may at least include a stored window size from a previous configuration of the communications between the UE and the source network.
Abstract:
A method for authenticating a circuit switched (CS) call on a virtual subscriber identity module (VSIM) includes: authenticating the VSIM for a packet switched (PS) call connection using authentication information obtained from a remote server through a software subscriber identity module (soft-SIM) connection to the remote server; initiating a call connection on a CS radio access technology (RAT) between the VSIM and a first communication network; and authenticating the VSIM CS call connection to the first communication network through the VSIM PS connection in response to an authentication request for the call connection on the CS RAT.
Abstract:
Aspects of the disclosure provide for a method of efficiently implementing security configurations for multiple domains between a network entity and a UE in a wireless system. For instance, this disclosure provides for a network entity sending to a UE a first security mode command for a first domain, receiving a first security mode complete message in response to the first security mode command, and sending a second security mode command for a second domain. In an aspect, the second security mode command is sent in response to receiving the first security mode complete message. In an aspect, the UE does not receive a RLC acknowledgement. In another aspect, the UE saves the second security mode command until it receives the RLC acknowledgement. In an aspect, the network entity sends the second security mode command in response to receiving a message protected with first security procedure parameters.