Abstract:
Techniques and apparatus for optimizing an initial access stratum security mode command procedure are described. One example technique includes sending a first service request to establish a connection with a network. A second service request is sent to the network, upon determining that one or more criteria is satisfied. Another example technique includes sending a first service request to establish a connection with a network and sending a second service request after sending the first service request. The first service request is associated with a first security parameter and the second service request is associated with a second security parameter. A security mode command procedure is participated in with a base station, based on the first security parameter and the second security parameter.
Abstract:
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may identify a multi-radio access technology (multi-RAT) dual connectivity (DC) (MR-DC) capable cell. The UE may assign a priority to the MR-DC capable cell based at least in part on whether information indicating whether dual connectivity is supported for the UE in a tracking area (TA) is available, the information indicating whether dual connectivity is supported for the UE in the TA, whether system information block (SIB) information indicating frequency bands supported by a network for MR-DC operation cell is available, or MR-DC connectivity information indicating whether at least one frequency band is available to support MR-DC operation. The UE may perform a cell selection procedure or a cell reselection procedure based at least in part on the priority assigned to the MR-DC capable cell. Numerous other aspects are described.
Abstract:
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may determine that a first subscription of the UE and a second subscription of the UE are associated with a same cell and are being used for a same radio access technology (RAT). The UE may activate a proxy subscription mode for the first subscription based at least in part on the determination that the first subscription of the UE and the second subscription of the UE are associated with the same cell and are being used for the same RAT, wherein the proxy subscription mode enables the UE to use the first subscription to perform one or more idle mode operations for the second subscription while the second subscription is in an idle mode. Numerous other aspects are provided.
Abstract:
This disclosure provides systems, methods and apparatuses for measurement of cells and determination of a non-standalone (NSA) coverage status using an NSA coverage database. The NSA coverage database may indicate candidate frequencies of New Radio (NR) cells that provide NSA coverage corresponding to a given Long Term Evolution (LTE) serving cell. The NSA coverage database may also indicate whether a system information block 1 (SIB1) has been previously received on a candidate frequency. The user equipment (UE) may perform measurement of candidate frequencies using the NSA coverage database, and may identify cases where a cell not providing NSA coverage has a same candidate frequency as a cell providing NSA coverage using the indication of whether SIB1 has been previously received on a candidate frequency.
Abstract:
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may establish, in a communication mode, a communication connection with a first radio access technology (RAT) or a second RAT. The UE may receive or identify an indication to deprioritize the first RAT. The UE may perform, based at least in part on the indication to deprioritize the first RAT, an action to deprioritize the first RAT, where the action is based at least in part in the communication mode. Numerous other aspects are described.
Abstract:
A method, an apparatus, and a computer program product for wireless communication are provided. The method comprises: receiving a message at a user equipment (UE) from a source base station connected to a first radio network controller to relocate to a target base station connected to a second network controller different from the first network controller; detecting an unrecoverable Radio Link Control (RLC) error at the UE; and ignoring the RLC unrecoverable error when it occurs after receiving the message to relocate while the UE is still connected to the source base station, before relocation is completed, and proceeding to relocate to the target base station. Various alterations and embodiments are disclosed.
Abstract:
Various embodiments include methods, components and wireless devices configured to identify illegitimate base station. The processor of the wireless device may determine that a device in communication with the wireless device is a suspect base station. The processor may send a fabricated message to the device, and may receive one or more response messages from the device. The processor may determine whether one or more of the response messages received from the device is an appropriate response or an inappropriate response to the fabricated message. In response to determining that a response message is an inappropriate response, the processor may determine that the device is an illegitimate base station. In response to determining that the device is an illegitimate base station, the wireless device may perform a protective action.
Abstract:
A method and apparatus for reducing call drop rate by validating reconfiguration messages based on service data unit (SDU) lifetime are described. A receiving device, such as a user equipment, may determine a receiving delay between receiving a first protocol data unit (PDU) and receiving a last PDU of a reconfiguration message SDU. The receiving delay may be compared with an SDU lifetime. The reconfiguration message SDU may be validated based on the comparison of the receiving delay with the SDU lifetime. A receiving delay that is greater than the SDU lifetime may indicate that the SDU is stale and, therefore, invalid. A receiving delay that is less than the SDU lifetime may indicate that the timing of the SDU is valid and the reconfiguration message SDU is to be processed. An activation time of the reconfiguration message SDU may also be honored or disregarded based on the receiving delay.
Abstract:
Aspects described herein relate to throttling packet-switched (PS) call establishment in wireless communications. A circuit-switched (CS) call can be conducted by using a first radio access technology (RAT). A cell update (CU) procedure for a PS call using a second RAT can be detected as due to one or more conditions. A cause for the one or more conditions can be determined based on one or more parameters related to a transmitter or receiver. PS call establishment attempts can accordingly be throttled based at least in part on determining the cause for the one or more conditions
Abstract:
Got Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may switch between a first radio access technology (RAT) and a second RAT based at least in part on a condition. The UE may modify, based at least in part on the switching, a second RAT threshold value in a system information block (SIB), to obtain a modified second RAT threshold value, wherein the modified second RAT threshold value is a value to switch from the first RAT to the second RAT. Numerous other aspects are described.