Abstract:
A method of wireless communication performs a public land mobile network (PLMN) search for a higher priority PLMN. The PLMN search includes a candidate PLMN having a different mobile country code (MCC) than a serving PLMN. The method switches to the higher priority PLMN when the PLMN search locates the higher priority PLMN. A method determines whether a user equipment (UE) has transitioned between an international area and a national area. The method triggers PLMN selection in response to the UE having transitioned between the international area and the national area.
Abstract:
Methods and apparatus supporting multiple concurrent service contexts sharing a single connectivity context are disclosed. A device may initiate a radio link with a network node and establish a connectivity context with the network node over the radio link using a connectivity logical context of the device. The network node may receive, authenticate, and authorize context establishment requests. A first service context with a first service management entity may be established over the radio link using a first logical context of the device, where the first logical context is distinct from the connectivity logical context. Multiple service connections using multiple service contexts based on multiple logical contexts of the device may share the connectivity context and may be established over the radio link.
Abstract:
A method, operational at a radio access network (RAN) node, is provided for establishing a secure interface with a service network node. A service registration request is received from a client device. A service network associated with the connectivity network is determined or ascertained, wherein the service network node operates within the service network. The service registration request is forwarded to a connectivity network node within the connectivity network. A secure connection is then established with a service network node via the connectivity network node. Communications between the radio access network node and the client device may then be secured based on the key.
Abstract:
Various aspects described herein relate to establishing services in wireless communications. A service request related to establishing a service over an established radio bearer can be transmitted. An authentication failure for the service request can be detected. It can be determined whether a procedure related to the service request is successfully completed. In can also be determined whether to terminate the established radio bearer based at least in part on the determination of whether the procedure related to the service request is successfully completed.