摘要:
Aspects are disclosed for facilitating a hand-in to a femto cell. An identifier is assigned to a femto cell in which the identifier is based on a scrambling parameter and a timing parameter. A relationship between the identifier and the femto cell is then communicated. In another embodiment, a user equipment report is received, which includes attributes related to a signal broadcast by a femto cell. An identifier associated with the femto cell is ascertained from an attribute included in the report. The femto cell is then identified based on the identifier. In a further embodiment, a timing parameter is received, and a scrambling parameter is set. A signal including the scrambling parameter is then broadcast according to an offset related to the timing parameter. In yet another embodiment, a femto cell is detected during an active call. An identifier associated with the femto cell is then ascertained and reported.
摘要:
Aspects are disclosed for facilitating a hand-in to a femto cell. An identifier is assigned to a femto cell in which the identifier is based on a scrambling parameter and a timing parameter. A relationship between the identifier and the femto cell is then communicated. In another embodiment, a user equipment report is received, which includes attributes related to a signal broadcast by a femto cell. An identifier associated with the femto cell is ascertained from an attribute included in the report. The femto cell is then identified based on the identifier. In a further embodiment, a timing parameter is received, and a scrambling parameter is set. A signal including the scrambling parameter is then broadcast according to an offset related to the timing parameter. In yet another embodiment, a femto cell is detected during an active call. An identifier associated with the femto cell is then ascertained and reported.
摘要:
Methods and apparatuses are provided that facilitate providing access point measurements to restricted access points. Restricted access points can lessen restrictions to allow devices to register with the restricted access point for providing measurements thereto. Additionally or alternatively, access point measurements can be provided to a minimization of drive tests (MDT) server for providing to the restricted access points. Thus, restricted access points can obtain the access point measurements for performing enhanced interference management or other functionality based at least in part on the measurements.
摘要:
Methods, apparatuses, and computer program products are disclosed for facilitating a beacon-assisted handover from a macro network to a femto cell during an active call. A femto cell management system assigns a unique identifier to a femto cell, which the femto cell utilizes to broadcast a beacon at a frequency different than the operating frequency of the femto cell. A wireless terminal receives a control message from the macro network directing the wireless terminal to scan particular frequencies. The wireless terminal subsequently provides a report to the macro network identifying attributes ascertained from the scan, which includes attributes associated with the beacon. The macro network then performs a handover from the macro network to the femto cell as a function of the attributes.
摘要:
Methods, apparatuses, and computer program products are disclosed for facilitating a beacon-assisted handover from a macro network to a femto cell during an active call. A femto cell management system assigns a unique identifier to a femto cell, which the femto cell utilizes to broadcast a beacon at a frequency different than the operating frequency of the femto cell. A wireless terminal receives a control message from the macro network directing the wireless terminal to scan particular frequencies. The wireless terminal subsequently provides a report to the macro network identifying attributes ascertained from the scan, which includes attributes associated with the beacon. The macro network then performs a handover from the macro network to the femto cell as a function of the attributes.
摘要:
Access terminals are provisioned to conduct intra-frequency, inter-frequency, and inter-RAT measurements and report physical layer identifiers of detected cells. The provisioning may involve cycling through all or a portion of a defined superset of physical layer identifier one subset at a time. In addition, the physical layer identifiers may be prioritized to improve the search procedure. Measurement report messages (including physical layer identifiers of the detected cells) are received at an access point as a result of the provisioning. A neighbor cell list for the femtocell is maintained based on the received measurement report messages and, optionally, other information. This other information may related to, for example, one or more of: physical layer identifier information received from access terminals that register with the access point, physical layer identifier information received via network listen operations, information regarding co-located cells, or physical layer identifier information received from a network entity.
摘要:
Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point.
摘要:
Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point.
摘要:
Methods and apparatuses are provided that include classifying nearby devices as neighboring or non-neighboring devices. Devices can be classified based on detected registration attempts to a femto node, where the femto node can switch paging area identifiers to cause the registration attempts or otherwise, analyzing measurement reports received from the devices in a registration request, and/or the like. The femto node can mitigate interference to the devices based on the classification.
摘要:
Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point.