摘要:
Inter-carrier scanning is triggered in a mobile device based at least in part on location thereof. Femto access point (AP) that can serve the mobile device can determine location through cell or sector identifier that is extracted via scan(s) of macro wireless environment of the femto AP. Femto AP can rank extracted sector identifier(s) and establish home macro sector (HMS) identifier(s), and also can generate scanning requirements for idle-mode scan(s) by a mobile device that operates in a HMS and is authorized to access wireless coverage through the femto AP. Scanning requirement(s) can force periodic inter-carrier measurements of a HMS wireless environment, and establish HMS-specific radio link quality threshold(s). Wireless network can receive at least one of HMS identifier(s) and scanning requirement(s) and deliver same to mobile device(s) authorized to exploit wireless coverage through femto AP associated with the HMS ID(s) and the scanning requirement(s).
摘要:
Inter-carrier scanning is triggered in a mobile device based at least in part on location thereof. Femto access point (AP) that can serve the mobile device can determine location through cell or sector identifier that is extracted via scan(s) of macro wireless environment of the femto AP. Femto AP can rank extracted sector identifier(s) and establish home macro sector (HMS) identifier(s), and also can generate scanning requirements for idle-mode scan(s) by a mobile device that operates in a HMS and is authorized to access wireless coverage through the femto AP. Scanning requirement(s) can force periodic inter-carrier measurements of a HMS wireless environment, and establish HMS-specific radio link quality threshold(s). Wireless network can receive at least one of HMS identifier(s) and scanning requirement(s) and deliver same to mobile device(s) authorized to exploit wireless coverage through femto AP associated with the HMS ID(s) and the scanning requirement(s).
摘要:
Triggering device scanning and efficient femtocell detection in areas dominated by macro cells can be facilitated. In particular, a jamming component generates a small and measured amount of interference to user equipment or user equipments (UEs) camping on nearby macro carriers. Moreover, the power utilized to introduce the interference can be enough to cause macro signal quality around the femtocell access point (AP) to fall below a scan trigger level. The UE(s) can detect the macro signal quality decline below the scan trigger level and scan other frequency bands, including the femtocell, on which to camp. Additionally, femto pilot gating can be performed, such that the jamming component can scan the radio environment surrounding the femto AP during an off state, to determine information that facilitates jamming of a macro pilot.
摘要:
A primary user of a spectrum, such as a licensed user, has primary access authority to use of a spectrum. A plurality of secondary users of the spectrum, which may be unlicensed users, have secondary access authority to use of the spectrum. When the primary user wants to use the spectrum, the primary user sends a message that is propagated to all the secondary users in a geographic region that the primary user wants to use the spectrum. The message specifies the duration of time and the geographic region (location of use) where the primary user wants to use the spectrum. The secondary users in the location of use immediately stop using the spectrum for the duration of time specified in the message and then may resume use of the spectrum.
摘要:
Inter-carrier scanning is triggered in a mobile device based at least in part on location thereof. Femto access point (AP) that can serve the mobile device can determine location through cell or sector identifier that is extracted via scan(s) of macro wireless environment of the femto AP. Femto AP can rank extracted sector identifier(s) and establish home macro sector (HMS) identifier(s), and also can generate scanning requirements for idle-mode scan(s) by a mobile device that operates in a HMS and is authorized to access wireless coverage through the femto AP. Scanning requirement(s) can force periodic inter-carrier measurements of a HMS wireless environment, and establish HMS-specific radio link quality threshold(s). Wireless network can receive at least one of HMS identifier(s) and scanning requirement(s) and deliver same to mobile device(s) authorized to exploit wireless coverage through femto AP associated with the HMS ID(s) and the scanning requirement(s).
摘要:
An access node for a telecommunications network is partitioned into a front end unit and a back end unit coupled by an internet protocol (IP) packet based communication link to provide for data and control packets to be sent between the back end unit and the front end unit. The front end unit performs physical layer and media access layer (MAC) sublayer processing for data for transmission to/from user equipment in the network using baseband processing units that perform highly parallel floating/fixed point operations. The back end unit includes a plurality of general purpose processors to provide data link layer and network layer processing. back end portions may be pooled to provide greater efficiency.
摘要:
An access node for a telecommunications network is partitioned into a front end unit and a back end unit coupled by an internet protocol (IP) packet based communication link to provide for data and control packets to be sent between the back end unit and the front end unit. The front end unit performs physical layer and media access layer (MAC) sublayer processing for data for transmission to/from user equipment in the network using baseband processing units that perform highly parallel floating/fixed point operations. The back end unit includes a plurality of general purpose processors to provide data link layer and network layer processing. back end portions may be pooled to provide greater efficiency.
摘要:
Wireless communication network access is facilitated via multiple logic-capable storage (MLCS) devices. One method comprises: scanning a record of records stored in a MLCS device to determine whether a communication device associated with a request for communication establishment has a defined functionality; and generating information indicative of the communication device failing to have the defined functionality based on identifying a value range inclusive of an identifier of the communication device and based on determining that the MLCS device is a negative logic storage device, wherein the MLCS device is programmable to have a first type of logic at a first time and a second type of logic at a second time. The first type of logic can be the negative logic type and the second type of logic can be a positive logic type.
摘要:
Wireless communication network access is facilitated via multiple logic-capable storage (MLCS) devices. One method comprises: scanning a record of records stored in a MLCS device to determine whether a communication device associated with a request for communication establishment has a defined functionality; and generating information indicative of the communication device failing to have the defined functionality based on identifying a value range inclusive of an identifier of the communication device and based on determining that the MLCS device is a negative logic storage device, wherein the MLCS device is programmable to have a first type of logic at a first time and a second type of logic at a second time. The first type of logic can be the negative logic type and the second type of logic can be a positive logic type.
摘要:
A primary user of a spectrum, such as a licensed user, has primary access authority to use of a spectrum. A plurality of secondary users of the spectrum, which may be unlicensed users, have secondary access authority to use of the spectrum. When the primary user wants to use the spectrum, the primary user sends a message that is propagated to all the secondary users in a geographic region that the primary user wants to use the spectrum. The message specifies the duration of time and the geographic region (location of use) where the primary user wants to use the spectrum. The secondary users in the location of use immediately stop using the spectrum for the duration of time specified in the message and then may resume use of the spectrum.