摘要:
In a mobile cellular radio system, load balancing is achieved by moving dynamically the borders between any two cells such that an overloaded cell becomes smaller and the neighboring cell larger. This is achieved by lowering the entering signal strength threshold for handoff to the neighboring cell and/or increasing the entering signal strength threshold for handoff from the neighboring cell. Thresholds are unique for any two cells.
摘要:
The present invention provides method and arrangements for dynamically and automatically obtaining a macro layer TA footprint for a femtocell, i.e. the femtocell's location in relation to the macro layer TAs, and to use this information to minimize signaling load from Tracking Area Updating in conjunction with femtocells.
摘要:
Method and arrangement in a network control node, for performing access control of a mobile node in a handover from a source cell to a target subscriber group cell. The method comprises obtaining a network based allowed subscriber group list, receiving a target subscriber group identification, checking if the target subscriber group identification is comprised in the obtained network based allowed subscriber group list. If it is, information from a target network control node is obtained, verifying that the received subscriber group identification corresponds to the target subscriber group cell. Still further, the method comprises granting the mobile node access to the target subscriber group cell. Also, a method and arrangement in a target network control node, for assisting a network control node in performing access control for a mobile node in a handover from a source cell to a target subscriber group cell is provided.
摘要:
The present invention provides method and arrangements for dynamically and automatically obtaining a macro layer TA footprint for a femtocell, i.e. the femtocell's location in relation to the macro layer TAs, and to use this information to minimize signaling load from Tracking Area Updating in conjunction with femtocells.
摘要:
The present invention relates to system nodes/entities and methods for enabling determination of the location of an attached User Equipment in a tunneled IP network. The User Equipment location can be determined by means of procedures maintained in a Location Function (LF). An application function can retrieve the User Equipment location by querying the Location Function by using the second source address as a key.
摘要:
A method and arrangement in a data collection network node (130, 140) for gathering information to be used for identification of at least one primary tracking area associated with a user equipment and a method and arrangement in a core network node (101) for selecting at least one tracking area identity identifying at least one tracking area to be used as at least one primary tracking area for a UE are provided. A tracking area identity is retrieved. Information about usage of a tracking area identified by the retrieved tracking area identity is registered. A measure for the user equipment being located in the tracking area is determined. Said at least one tracking area identity identifying at least one tracking area to be used as a primary tracking area is determined, if the measure exceeds a threshold. A method and an arrangement in a second network node (130) for paging a user equipment are provided. When paging the user equipment (140), the second network node first pages the user equipment (140) in the primary tracking area and, if the first page fails, then pages the user equipment (140) in other tracking areas.
摘要:
The embodiments of the present invention relate to an apparatus and a method of controlling access of a UE (30, 40) in a wireless telecommunications system comprising a RAN that is adapted to communicate with the core network (34, 44). According to the method, a temporary identity of the UE (30, 40) attempting to accessing a femto RBS (31, 41) is acquired and it is further determined if the temporary identity of the UE (30, 40) is associated with a permanent identity of the UE and at least the identity of the femto RBS. In case the temporary identity is associated with the permanent identity of the UE (30, 40) and with the identity of the femto RBS, the UE (30, 40) is authorized access, otherwise it is denied access.
摘要:
The invention relates to a method in an Access Network Discovery and Selection Function, ANDSF, node for distributing Closed Subscriber Group information. The CSG information comprises an Allowed CSG List of a first UE and cell information indicating position of a cell with controlled access associated to the Allowed CSG List. The method comprises retrieving an Allowed CSG List of the radio cell from a CSG Database over a first network 10 interface (CSGi) between the ANDSF node and the CSG Database. Furthermore, the ANDSF node triggers the first UE to establish a connection to the ANDSF node over a second network interface (ANDSFi) between the ANDSF node (90) and the first UE. In addition, the ANDSF node receives cell information indicating the position of the cell with controlled access and the Allowed CSG List is sent to the first UE.
摘要:
The present invention relates to an arrangement and a method respectively for providing an end user with access to an IP network (login). It comprises a user station, an access server of an access network, a web server and an authentication server. The end user station comprises first means for communication with the access server and second means for communication over a mobile telecommunication system with the authentication server. The access/login procedure comprises a first and a second phase, the authentication server controls the first phase comprising a one-time-password (OTP) login sequence, and, if the one time password (OTP) is valid, the second login phase is performed in order to login the end user at the access server, by creating a temporary account for which user credentials are defined.
摘要:
The present invention relates to system nodes/entities and methods for enabling determination of the location of an attached User Equipment in a tunneled IP network. The User Equipment location can be determined by means of procedures maintained in a Location Function (LF). An application function can retrieve the User Equipment location by querying the Location Function by using the second source address as a key.