摘要:
The invention relates to methods and devices for managing a plurality of non-coordinated radio access networks. In an aspect, a method of a mobility management node is provided for managing a plurality of non-coordinated radio access networks (RANs) in a wireless communication network. The method comprises receiving, from a base station of a first of the plurality of RANs, information indicating frequencies available in the first RAN for accessing a network served by the mobility management node, acquiring information identifying a base station of a second of the plurality of RANs, said network being operated by an operator different from those operating the first and second RANs; and transmitting, to the base station of the second RAN, the information indicating the frequencies available in the first RAN for accessing said network.
摘要:
The present disclosure relates to a method, performed in a network node of a first network, for designating one or more cells of a second network as neighbouring cells to the first network. The method comprises selecting a set of carriers employed in the second network and transmitting information for the selected set of carriers to a wireless device served by the first network. Measurement reports are received for respective carriers from the wireless device. The network node determines neighbour cell relations between the first network and one or more cells of the second network based on the received measurement reports.
摘要:
A system and method for frequency redirection in a communication system. In one embodiment, an apparatus accesses a communication system using first system information associated with a first frequency providing a first radio measurement. The apparatus receives an instruction to evaluate at least one frequency, and performs a second radio measurement over a second frequency without reading second system information associated with the second frequency. The apparatus accesses the communication system using the second system information associated with the second frequency when the second radio measurement exceeds a threshold, and performs a third radio measurement over a third frequency when the second radio measurement is less than or equal to the threshold and without reading third system information associated with the third frequency.
摘要:
The present disclosure relates to a method, performed in a network node of a first network, for designating one or more cells of a second network as neighbouring cells to the first network. The method comprises selecting a set of carriers employed in the second network and transmitting information for the selected set of carriers to a wireless device served by the first network. Measurement reports are received for respective carriers from the wireless device. The network node determines neighbour cell relations between the first network and one or more cells of the second network based on the received measurement reports.
摘要:
Example embodiments presented herein are directed towards a wireless device and core network node, as well as corresponding methods therein, for managing a data flow between a network access type 1 and a network access type 2. According to some examples, access type 1 may be a 3GPP access and access type 2 may be a non-3GPP access. The wireless device is connectable to both the networks of access types 1 and 2.
摘要:
Triggering a temporary roaming after an occurrence of an event. In one aspect there is a method for triggering a temporary roaming, which the method includes a first node obtaining information indicating an occurrence of an event. The method further includes after obtaining the information, the first node (i) initiating a broadcast of a warning message providing a notification of the occurrence of the event and (ii) sending toward a second node belonging to a second PLMN a roaming activation request for requesting an activation of a roaming service. The method further includes after sending the roaming activation request, the first node receiving an acknowledgement message authorizing the roaming service and as a result of receiving the acknowledgement message authenticating the roaming service, the first node initiating a broadcast of an alarm message.
摘要:
Systems and methods for throttling-based traffic steering are disclosed, In some embodiments, a method of operation of a network node in a wireless communications network to provide traffic steering of a wireless device being served by the wireless communications network includes selecting the wireless device to be steered away from the wireless communications network and throttling a connection of the wireless device to the wireless communications network to provide traffic steering of the wireless device away from the wireless communications network. In some embodiments, this connection throttling will induce the wireless device to steer away from the wireless communications network to a different wireless communications network such as a wireless local access network.
摘要:
In an aspect, a method of a mobility management node is provided for managing a plurality of non-coordinated radio access networks (RANs) in a wireless communication network. The method comprises receiving, from a base station of a first of the plurality of RANs, information indicating frequencies available in the first RAN for accessing a network served by the mobility management node, acquiring information identifying a base station of a second of the plurality of RANs, said network being operated by an operator different from those operating the first and second RANs; and transmitting, to the base station of the second RAN, the information indicating the frequencies available in the first RAN for accessing said network.
摘要:
A method and apparatus for authenticating a mobile device in a second mobile access network when the mobile device is already authenticated in a first mobile access network. An access device receives an authentication request from the mobile device. The access device obtains secondary authentication information derived from primary authentication information used in an authentication procedure to authenticate the mobile device with the first mobile access network. The access device then uses the secondary authentication information to authenticate the mobile device in the second mobile access network. An advantage of this method is that authentication credentials can be re-used to a certain extent to improve the speed of authentication in the second network and reduce the amount of signalling and processing required to authenticate the mobile device in the second network.
摘要:
Example embodiments presented herein are directed towards a wireless device and core network node, as well as corresponding methods therein, for managing a data flow between a network access type 1 and a network access type 2. According to some examples, access type 1 may be a 3GPP access and access type 2 may be a non-3GPP access. The wireless device is connectable to both the networks of access types 1 and 2.