Abstract:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
Abstract:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
Abstract:
Handover parameter settings are automatically adapted in access points in a system to improve handover performance. Reactive detection techniques are employed for identifying different types of handover-related failures and adapting handover parameters based on this detection. Messaging schemes are also employed for providing handover-related information to access points. Proactive detection techniques also may be used for identifying conditions that may lead to handover-related failures and then adapting handover parameters in an attempt to prevent such handover-related failures. Ping-ponging may be mitigated by adapting handover parameters based on analysis of access terminal visited cell history acquired by access points in the system. In addition, configurable parameters (e.g., timer values) may be used to detect handover-related failures.
Abstract:
Problems caused by interaction between paging optimization and synchronizing CSG information are mitigated by setting a network indication indicating, for example, that a subscriber is no longer a member of a CSG, but the network has not yet received confirmation that an access terminal associated with the subscriber has been informed of this. A timer-based scheme may be employed for removing a CSG ID from the subscriber information for a subscriber once it is determined that the subscriber is no longer a member of the CSG. In addition, a temporary member of a CSG may determine whether it is still a member of a CSG upon expiration of a CSG timer. Also, the frequency with which an access terminal registers may be changed based on various criteria. Furthermore, an allowed CSG list may be selectively included in a page message depending on the destination of the page message.
Abstract:
Radio access interworking technologies allow a target network to notify a source network that a mobile device has moved from source network to target network, wherein mobile device does not need to perform notification to source network. Further, source network can provide a first subset of overhead information to mobile device and, after moving to target network, mobile device can receive a second subset of overhead information from target network. Further, mobile device can perform prehashing prior to moving to target network based on a channel list received from source network.
Abstract:
Systems and methodologies are described that facilitate performing intra-cluster and inter-cluster reselection for relay eNBs. In intra-cluster reselection, a relay eNB can reselect a disparate relay eNB and indicate its identifier in a bearer list update message. The disparate relay eNB and upstream eNBs (including the donor eNB) can update routing tables based at least in part on the identifier. In addition, the relay eNB can provide identifiers of downstream relay eNBs to facilitate updating routing tables for those identifiers as well. In an inter-cluster reselection, relay eNBs can release connection to downstream relay eNBs and re-attach to a wireless network to receive an identifier from a new donor eNB in the new cluster. Alternatively, the relay eNB can request an identifier from the donor eNB during reselection, notify downstream relay eNBs of the reselection, and/or request identifiers for one or more downstream relay eNBs.
Abstract:
Systems and methodologies are described that facilitate attaching cell relays to a wireless network. During the attachment procedure, a relay eNB can request assignment of an identifier, or a portion thereof, from a donor eNB for subsequent packet routing to the relay eNB. This can occur through one or more intermediary relay eNBs, where present. Donor eNB can assign an identifier or portion thereof (or confirm/deny an explicit identifier request from the relay eNB) and can forward establishment information downstream to the relay eNB. Donor eNB and intermediary relay eNBs, where present, can store the identifier for subsequent use in routing packets to the relay eNB. The identifier can be a terminal endpoint identifier (TEID) utilized in a tunneling protocol, a relay identifier utilized in a relay protocol, and/or the like.
Abstract:
Systems and methodologies are described that facilitate packet routing among relay eNBs in a wireless network. A donor eNB can create at least a portion of a tunnel endpoint identifier (TEID) for a relay eNB communicating with a UE or other device. In addition, the relay eNB communicating with the UE can create a portion of the TEID. Upon receiving packets with a TEID, the donor eNB can route the packets to downstream eNBs based on the portion of the TEID that it created. Other downstream eNBs can continue to route packets to next hop eNBs based on the portion of the TEID created by the donor eNB or the downstream eNBs themselves. The relay eNB communicating with the UE can route packets to the UE based on the portion of the TEID it created and/or the portion created by the donor eNB.
Abstract:
Facilitate set up of an X2-AP interface (between a HNB and a eNB) for data exchange between an access terminal and a Home access terminal. Based upon a received request from a Home access terminal, the access terminal can activate an X2-AP interface connection on demand over Stream Control Transmission Protocol (SCTP) based upon a maximum number of connections available and/or a timer evaluation that indicates that the request is within an allowed time period. The capacity of the eNB related to the amount of X2-AP connections can be managed based upon at least one of a timer evaluation, or a maximum number of X2-AP connections which can be supported. The systems and methodologies provide an optimal and efficient technique in order to enable data to be exchanged between an access terminal and a Home access terminal utilizing an X2-AP interface.
Abstract:
Systems and methodologies are described that facilitate providing relay nodes in wireless networks. In particular, cluster nodes, which can be regular eNBs, can provide wireless network access to the relay nodes over a backhaul link, and the relay nodes can offer access to devices or other relay nodes to expand network coverage and/or provide increased throughput. User equipment (UE) relays can function as UEs according to a cluster node such that UE relays receive network addressing and can tunnel communications through the cluster node using the backhaul link. Cell relays can function as a cell of the cluster node, such that transport layer communications terminate at the cluster node. In this regard, cell relays can define transport layers to use in communicating with the cluster nodes over the backhaul and with other devices over a provided access link.