摘要:
Providing for improved error control signaling in wireless communications is disclosed herein. By way of example, multiple transmissions can be conducted for a HARQ process prior to a scheduled feedback signal on the HARQ process, causing a receiving device to combine the multiple transmissions, rather than treat them as separate transmissions. In this manner, multiple transmissions can be employed to increase overall receive energy, without violating maximum transmit power constraints in a wireless communication. Further, these multiple transmissions can be configured based on prevailing signal strength at the receiving device, or based on processing capabilities of the receiving device, providing flexible protocols that can accommodate advanced as well as legacy UEs in wide range of wireless conditions.
摘要:
Providing for improved error control signaling in wireless communications is disclosed herein. By way of example, multiple transmissions can be conducted for a HARQ process prior to a scheduled feedback signal on the HARQ process, causing a receiving device to combine the multiple transmissions, rather than treat them as separate transmissions. In this manner, multiple transmissions can be employed to increase overall receive energy, without violating maximum transmit power constraints in a wireless communication. Further, these multiple transmissions can be configured based on prevailing signal strength at the receiving device, or based on processing capabilities of the receiving device, providing flexible protocols that can accommodate advanced as well as legacy UEs in wide range of wireless conditions.
摘要:
Methods, systems, apparatus and computer program products are provided to improve the reliability of data reception. In one provided embodiment, a communication signal is parsed by a communication device to identify repeat request identifiers. The device determines an inter-arrival time of two instances of the same identifier and processes the communication signal based on a comparison between the inter-arrival time and a predetermined time. This Abstract is provided for the sole purpose of complying with the Abstract requirement rules that allow a reader to quickly ascertain the disclosed subject matter. Therefore, it is to be understood that it should not be used to interpret or limit the scope or the meaning of the claims.
摘要:
Methods, systems, apparatus and computer program products are provided to improve the reliability of data reception. In one provided embodiment, a communication signal is parsed by a communication device to identify repeat request identifiers. The device determines an inter-arrival time of two instances of the same identifier and processes the communication signal based on a comparison between the inter-arrival time and a predetermined time. This Abstract is provided for the sole purpose of complying with the Abstract requirement rules that allow a reader to quickly ascertain the disclosed subject matter. Therefore, it is to be understood that it should not be used to interpret or limit the scope or the meaning of the claims.
摘要:
Techniques for transmitting and receiving data in an efficient manner to potentially improve capacity for a wireless network and achieve power savings for a wireless device are described. The techniques utilize a Continuous Packet Connectivity (CPC) mode comprised of multiple (e.g., two) discontinuous transmission (DTX) modes and at least one (e.g., one) discontinuous reception (DRX) mode. Each DTX mode is associated with different enabled uplink subframes usable for transmission from the wireless device to the network. Each DRX mode is associated with different enabled downlink subframes usable by the network for transmission to the wireless device. The wireless device may send signaling and/or data on the enabled uplink subframes and may receive signaling and/or data on the enabled downlink subframes. The wireless device may power down during non-enabled subframes to conserve battery power. Mechanisms to quickly transition between the DTX and DRX modes are described.
摘要:
Techniques for transmitting and receiving data in an efficient manner to potentially improve capacity for a wireless network and achieve power savings for a wireless device are described. The techniques utilize a Continuous Packet Connectivity (CPC) mode comprised of multiple (e.g., two) discontinuous transmission (DTX) modes and at least one (e.g., one) discontinuous reception (DRX) mode. Each DTX mode is associated with different enabled uplink subframes usable for transmission from the wireless device to the network. Each DRX mode is associated with different enabled downlink subframes usable by the network for transmission to the wireless device. The wireless device may send signaling and/or data on the enabled uplink subframes and may receive signaling and/or data on the enabled downlink subframes. The wireless device may power down during non-enabled subframes to conserve battery power. Mechanisms to quickly transition between the DTX and DRX modes are described.
摘要:
Techniques for transmitting and receiving data in an efficient manner to potentially improve capacity for a wireless network and achieve power savings for a wireless device are described. The techniques utilize a Continuous Packet Connectivity (CPC) mode comprised of multiple (e.g., two) discontinuous transmission (DTX) modes and at least one (e.g., one) discontinuous reception (DRX) mode. Each DTX mode is associated with different enabled uplink subframes usable for transmission from the wireless device to the network. Each DRX mode is associated with different enabled downlink subframes usable by the network for transmission to the wireless device. The wireless device may send signaling and/or data on the enabled uplink subframes and may receive signaling and/or data on the enabled downlink subframes. The wireless device may power down during non-enabled subframes to conserve battery power. Mechanisms to quickly transition between the DTX and DRX modes are described.
摘要:
An apparatus, method, processor(s), and computer program product avoids user data loss by network-controlled, user equipment assisted handover in a wireless data packet communication system. A wireless receiver receives radio link control (RLC) packet data units (PDUs) from user equipment (UE) being served by a source node. A wireless transmitter commands the UE to handover. A network communication interface transmits RLC Uplink (UL) context from the source node to the target node, and transmits RLC Downlink (DL) initialization message and buffered in-transit DL RLC PDUs from the source node to the target node.
摘要:
Techniques for sending data during handover with Layer 2 tunneling are described. In one design, a user equipment (UE) sends first Layer 2 packets to a source base station prior to handover to a target base station. The UE sends at least one second Layer 2 packet to the target base station, which identifies the second Layer 2 packet(s) as being intended for the source base station and thus forwards the second Layer 2 packet(s) to the source base station via a Layer 2 tunnel. The UE sends third Layer 2 packets to the target base station after the handover. The target base station processes the third Layer 2 packets to obtain IP packets and sends the IP packets to a serving gateway after a trigger condition, which may be defined to achieve in-order delivery of IP packets from the source and target base stations to the serving gateway.
摘要:
Systems and methodologies are provided that facilitate security activation for wireless communications. In an aspect, a method for wireless communication is provided which includes determining a first security key for communicating with a source access point and receiving, from the source access point, a handover command that includes an indication of whether to apply a second security key upon handover. The method also includes handing over communication from the source access point to a target access point, where the second security key is applied for communicating with the target access point upon the handover when the handover command indicates to apply the second security key.