Abstract:
Techniques for sending data during handover with Layer (2) tunneling are described. In one design, a user equipment (UE) sends first Layer (2) packets to a source base station prior to handover to a target base station. The UE sends at least one second Layer (2) packet to the target base station, which identifies the second Layer (2) packet(s) as being intended for the source base station and thus forwards the second Layer (2) packet(s) to the source base station via a Layer (2) tunnel. The UE sends third Layer (2) packets to the target base station after the handover. The target base station processes the third Layer (2) packets to obtain IP packets and sends the IP packets to a serving gateway after a trigger condition, which may be defined to achieve in-order delivery of IP packets from the source and target base stations to the serving gateway.
Abstract:
The disclosure provides a method, apparatus, and computer program product directed to a client estimation of round trip time via transport control protocol (TCP) signals over multiple radio access technologies. A TCP probe signal is transmitted to a server via a TCP connection, and an acknowledgment signal is received from the server via the TCP connection in response to the TCP probe signal. A round trip time is then estimated based on the acknowledgment signal.
Abstract:
Systems and methodologies are described that facilitate enforcing quality of service requirements. A first timer is employed for each data packet arriving at a packet data convergence protocol layer of a wireless communications apparatus. The first timer can be configured based upon delay tolerance specified according to quality of service requirements imposed on the data packet. The data packet can be discarded if the timer expires before the data packet leaves the protocol data convergence protocol layer. In addition, a second time is utilized for the data packet as it arrives at a radio link control layer. The data packet can be discarded if the second timer expires before the data packet is successfully transmitted to a receiver.
Abstract:
Systems and methodologies are described that facilitate identifying a plurality of keysets utilized in a communications network. The keysets can include ciphering keys that provide data encryption and decryption and integrity keys that provide data integrity protection. A key identifier can be included in a packet data convergence protocol header that indicates a keyset employed in connection with data in a protocol data unit. In addition, a route indicator can be provided in a radio link control header that distinguishes a source cell and a target cell in networks configured without RLC reset.
Abstract:
Embodiments disclosed herein relate to providing dynamic assignment of home agent and home address in wireless communications, such that a mobile node away from home may receive local access services from a visited network. In an embodiment, a mobile node accesses a visited network. The visited network authenticates the mobile node with its home network. The visited network then assigns a visited home agent and a home address for the mobile node. The mobile node subsequently performs secure binding with the visitor home agent. The mobile node proceeds with communications using the visitor home agent and home address.
Abstract:
Apparatus and methods are described for selecting or identifying a first band number from one or more additional band numbers mapped to a frequency division duplexing (FDD) band used in universal mobile telecommunications (UMTS). The one or more additional band numbers may be different from a second band number assigned to the FDD band. Each of the one or more additional band numbers may correspond to a different factor N (e.g., N = 2, N = 4) for use in UMTS scaling. A signal indicative of the first band number may be transmitted to, for example, a network entity, where the signal indicates support of UMTS scaling operations in the FDD band using the factor N corresponding to the first band number.
Abstract:
Methods, systems, and devices are disclosed for configuring maximum allowed transmit power for wireless communications systems. Some embodiments treat multiple traffic types, such as voice traffic and data traffic, separately with respect to one or more maximum allowed transmit power limits. In some cases, at least first transmit power limit for at least a first traffic type and/or at least a second transmit power limit for at least a second traffic type may be determined. At least the first transmit power limit with respect to the first traffic type or the second transmit power limit with respect to the second traffic type may be utilized. Some embodiments are configured to utilize flexible bandwidth carriers.
Abstract:
An apparatus, method, processor(s), and computer program product avoids user data loss by network-controlled, user equipment assisted handover in a wireless data packet communication system. A wireless receiver receives radio link control (RLC) packet data units (PDUs) from user equipment (UE) being served by a source node. A wireless transmitter commands the UE to handover. A network communication interface transmits RLC Uplink (UL) context from the source node to the target node, and transmits RLC Downlink (DL) initialization message and buffered in-transit DL RLC PDUs from the source node to the target node.