Abstract:
Measurements are conducted on one or more carriers in a case where an access terminal supports reception on multiple carriers. Upon determining that an access terminal is capable of concurrently receiving on a given set of carriers, a measurement is conducted on one or more carriers of the set while receiving on or more other carriers of the set. Conversely, upon determining that an access terminal is not capable of concurrently receiving on a given set of carriers, a measurement is conducted on one or more carriers of the set while not receiving on or more other carriers of the set. In addition, data transfers to or from an access terminal on a carrier may be restricted (e.g., data transfers not scheduled or only low priority data transfers scheduled) during one or more subframes before or after the access terminal conducts a measurement on another carrier.
Abstract:
A method, an apparatus, and a computer program product for wireless communication are provided in which a determination is made of a first power available for transmitting a first signal using a first radio access technology while simultaneously transmitting a second signal using a second radio access technology different from the first radio access technology. An uplink grant is received and a determination is made regarding a second power for transmitting the first signal on uplink using the first radio access technology based on the uplink grant. A determination is made regarding a difference between the first power and the second power and the information related to the difference via the first radio access technology is reported based upon a trigger.
Abstract:
Providing for establishment of local Internet Protocol access (LIPA) for cellular communication is provided herein. According to particular aspects of the subject disclosure, provided are mechanisms to identify a request to establish a packet network connection as a request for a LIPA context. Once identified, a local gateway associated with the UE or with a subscriber-deployed base station is identified, and a packet context is established to support LIPA traffic for the UE. Additional mechanisms support UE mobility from one base station to anther, including identifying and terminating inactive LIPA contexts. Further, a UE is described that can recognize and facilitate the establishment of a LIPA context for applications executing at the UE.
Abstract:
A communication node determines that radio link failure occurred during connected state mobility of an access terminal and reports the radio link failure to another communication node. For example, a target access point may determine that radio link failure occurred during handover of an access terminal and send a radio link failure report message to the access point that was previously serving the access terminal or to some other node (e.g., a network node). In the first case, the serving access point may adjust mobility parameters based on this radio link failure information and, optionally, other reported radio link failure information. In the second case, the other node may send a radio link failure report message to the serving access point, or the other node may adjust mobility parameters based on this radio link failure information (and, optionally, other reported radio link failure information) and send the adjusted mobility parameters to the serving access point.
Abstract:
Providing for automated wireless network signal analysis by mobile devices as a function of their geographic locations is described herein. By way of example, a wireless network can transmit a set of geographic data defining a geographic region to a mobile device. The mobile device can compare its current location to the geographic region, and begin measuring downlink signals, or recording such measurements when within the geographic region, and terminate the recording when the mobile device leaves the geographic region. Recorded measurements can be subsequently uploaded to the wireless network for analysis. In some aspects, the mobile device can refrain from uploading the measurements until within a defined reporting region. By providing mobile device network analysis triggered on device geographic location, analysis data that is well tailored to a particular problem area can be obtained, increasing quality of the analysis data and significantly reducing cost of acquiring such data.
Abstract:
Problems caused by interaction between paging optimization and synchronizing CSG information are mitigated by setting a network indication indicating, for example, that a subscriber is no longer a member of a CSG (304), but the network has not yet received confirmation that an access terminal (102) associated with the subscriber has been informed of this. A timer-based scheme may be employed for removing a CSG ID from the subscriber information for a subscriber once it is determined that the subscriber is no longer a member of the CSG. In addition, a temporary member of a CSG may determine whether it is still a member of a CSG upon expiration of a CSG timer. Also, the frequency with which an access terminal (102) registers may be changed based on various criteria. Furthermore, an allowed CSG list may be selectively included in a page message depending on the destination of the page message.
Abstract:
Systems and methodologies are described that facilitate fetching a native security context between network nodes in a core network after an inter-system handover of a mobile device. For instance, a mobility message that is integrity protected by a security context (e.g., the native security context, a mapped security context,..) can be obtained at a network node from the mobile device. Further, the network node can send a request to a disparate network node within a core network. The request can include information that can be used by the disparate network node to establish that the mobile device is authenticated. Moreover, the native security context can be received from the disparate network node in response to the request. Accordingly, the native security context need not be recreated between the network node and the mobile device.
Abstract:
Handover parameter settings are automatically adapted in access points in a system to improve handover performance. Reactive detection techniques are employed for identifying different types of handover-related failures and adapting handover parameters based on this detection. Messaging schemes are also employed for providing handover-related information to access points. Proactive detection techniques also may be used for identifying conditions that may lead to handover-related failures and then adapting handover parameters in an attempt to prevent such handover-related failures. Ping-ponging may be mitigated by adapting handover parameters based on analysis of access terminal visited cell history acquired by access points in the system. In addition, configurable parameters (e.g., timer values) may be used to detect handover-related failures.
Abstract:
Handover parameter settings are automatically adapted in access points in a system to improve handover performance. Reactive detection techniques are employed for identifying different types of handover-related failures and adapting handover parameters based on this detection. Messaging schemes are also employed for providing handover-related information to access points. Proactive detection techniques also may be used for identifying conditions that may lead to handover-related failures and then adapting handover parameters in an attempt to prevent such handover-related failures. Ping-ponging may be mitigated by adapting handover parameters based on analysis of access terminal visited cell history acquired by access points in the system. In addition, configurable parameters (e.g., timer values) may be used to detect handover-related failures.
Abstract:
Techniques for originating a voice call by a UE after performing reselection with reprioritization are described. The UE may operate in an idle mode and may camp on a first wireless network of a first radio access technology (RAT), which may not support voice service. The first wireless network may have the highest priority among all wireless networks detected by the UE. The UE may receive an indication to originate a voice call. The UE may then perform reselection from the first wireless network to a second wireless network of a second RAT by modifying the priorities of the frequencies of the first wireless network and/or the second wireless network. The UE may then originate the voice call with the second wireless network, instead of the first wireless network, in order to avoid having to perform circuit-switched (CS) fallback from the first wireless network to the second wireless network.