Abstract:
Techniques are described herein to secure a packet data convergence protocol (PDCP) control protocol data unit (PDU). A base station may determine a security configuration for a PDCP control PDU based on various factors including the content of the PDCP control PDU. For example, the security configuration of the PDCP control PDU may be applied because the PDCP control PDU includes a retransmission request. A counter dedicated to PDCP control PDUs may be initialized. The security protocols may be based on the dedicated counter. Some types of security parameters may be shared in some contexts such as in handover procedures or dual connectivity procedures. For example, security configurations associated with a second communication link may be based on security configurations associated with a first communication link. PDCP control PDUs may be secured based on the security configurations, the security parameters, protection keys, or combinations thereof.
Abstract:
Apparatus and methods, in one or more aspects, provide for status report management of received data packets at a wireless device. The wireless device may determine that a first status report, generated in response to identifying a number of missing data packets within a sequence of a plurality of data packets received at the UE, includes information associated with fewer than the number of missing data packets. The wireless device may transmit the first status report. The wireless device may also disable a status prohibition timer in response to the transmitting based on the determination. The wireless device may transmit a second status report including information associated with a remainder of the number of missing data packets not included in the first status report.
Abstract:
Aspects of the present disclosure provide various apparatuses and methods of reordering DRB flow packets using an in-band solution to reduce delay due to data packet buffering in head-of-line blocking scenarios across multiple DRB flows. When a packet of a flow is lost or not received, other flows carried in the same DRB can forward later received packets without waiting for the missing packet to be retransmitted and received.
Abstract:
Techniques are described for wireless communication at a wireless communication device. One method includes receiving wireless wide area network (WWAN) packets at a WWAN processing subsystem of the wireless communication device; transferring wireless local area network (WLAN) packet information from a WLAN processing subsystem of the wireless communication device to the WWAN processing subsystem, the WLAN packet information comprising a subset of data associated with WLAN packets; performing a reordering process in the WWAN processing subsystem, the reordering process based at least in part on the received WWAN packets and the WLAN packets that correspond to the transferred WLAN packet information; and providing an indication of the reordered WWAN packets and the WLAN packets to an application processing subsystem of the wireless communication device.
Abstract:
Embodiments include systems and methods for managing access to receive chains of a multi-subscription multi-standby (MSMS) communication device. A device processor may determining a receive mode of the MSMS communication device. In response to determining that the receive mode is a diversity sharing mode, the device processor may monitor a data loss from the broadcast data stream, and may determine a first subscription schedule and a second subscription schedule. The device processor may determine that the data loss is greater than or equal to a threshold, and the device processor may determine that there is an upcoming overlap between the first subscription schedule and the second subscription schedule. The device processor may prevent the second subscription from using the second receive chain.
Abstract:
Aspects disclosed in the detailed description include power saving techniques in computing devices. In particular, as data is received by a modem processor in a computing device, the data is held until the expiration of a modem timer. The data is then passed to an application processor in the computing device over a peripheral component interconnect express (PCIe) interconnectivity bus. On receipt of the data from the modem processor, the application processor sends data held by the application processor to the modem processor over the PCIe interconnectivity bus. The application processor also has an uplink timer. If no data is received from the modem processor before expiration of the uplink timer, the application processor sends any collected data to the modem processor at expiration of the uplink timer. However, if data is received from the modem processor, the uplink timer is reset.
Abstract:
Embodiments include methods to manage tune-away events on a multi-subscription multi-standby wireless communication device having an RF resource supporting a first subscription and a second subscription by changing an order of Multicast Traffic Channel (MTCH) transmissions across a number of Multicast Channel Scheduling Periods (MSPs). In various embodiments, the order of MTCH transmissions may be changed by rotating the Logical Channel Identifier (LCID) order in a Multicast Channel (MCH) Scheduling Information (MSI) Media Access Control (MAC) message sent from a serving base station or tower (e.g., a serving Evolved Node B (eNB)) to a multi-subscription multi-standby wireless communication device. In various embodiments, a multi-subscription, multi-standby wireless communication device may activate a MTCH for one or more service according to the dynamic MSI MAC message.
Abstract:
Aspects of the present disclosure are directed to a methods and systems operable by a network entity for wireless communication, that includes determining that User Equipment (UE) is in idle mode and receiving eMBMS (evolved Multimedia Broadcast and Multicast Service); and based on the determining, activating a power optimization procedure in order to reduce power consumption of the UE. Examples of a power optimization procedures include a single or multi-level hardware shut down procedure, lowering the clock rate of hardware, and shutting down a communication bus during periods of non-use.
Abstract:
Embodiments include methods implemented by a processor of a mobile communication device for managing tune-aways by a radio frequency resource supporting a first subscription to support a second subscription. The processor may determine a data loss ratio of the data of a media file that is lost in transmission to the mobile communication device. The processor may compare the data loss ratio of the data to a first data loss ratio threshold and a second data loss ratio threshold, and the processor may block a tune-away event of the radio frequency resource from the first subscription to the second subscription in response to determining that the data loss ratio of the data is greater than the first data loss ratio threshold and less than the second data loss ratio threshold.
Abstract:
A transmission entity (e.g., user equipment (UE)) is expected to reduce the segmentation of Radio Link Control (RLC) Service Data Units (SDUs) while also minimizing padding. Signaling or provisioning of a constraint value such as a maximum padding amount or minimum segmentation size is employed in a determinative way in the UE to balance these objectives. A receiving entity (e.g., evolved base node (eNB)) benefits from being able to signal these parameters, whose application to RLC instances can discriminate between data and signaling radio bearers. Compliance can also be voluntary, such as the network entity employing at least a portion of the same approach on the downlink.