Abstract:
Connectionless data transfer is disclosed. Authentication of a device and network node may be performed when data is sent from the device to an application server of an application service provider via a selected network. The transfer of data may take place in an absence of an existing device context between the network node interacting with the device and the core network through which the data travels. State management overhead and signaling overhead may be reduced by use of the exemplary aspects disclosed herein. For example, the device does not need to perform an authentication and key agreement (AKA) procedure to transfer the data and an existing (or pre-existing) device context need not be maintained at the core network.
Abstract:
A method, operational at a network device, for conveying congestion information across different strata of a multi-strata network is provided. An indication is obtained that a congestion level for at least one of a radio access network node and a core network node of a network has changed. Consequently, a one or more service parameters for a plurality of services, operating at a service stratum, are updated or adjusted on a per service basis based on the congestion level indication. The one or more service parameters are provided or sent to, at least one of, a node operating at a service stratum or a user device that obtains services over the network.
Abstract:
Aspects of the disclosure relate to mechanisms for interworking between legacy and next generation radio access technologies (RATs) in a communication network. In some examples, a handover from a legacy access network to a next generation access network may be performed via a next generation core network. A handover request received at a next generation core network serving node may include an identifier of a next generation target cell. The next generation core network serving node may identify another next generation core network serving node to which the handover may be forwarded based on the target cell identifier or may select the next generation access network based on the target cell identifier. The next generation core network serving node may then communicate with the next generation access network to complete the handover.
Abstract:
Aspects of the disclosure relate to mechanisms for interworking between legacy and next generation core networks in a communication network. In some examples, a connectivity request originated by a user equipment towards a legacy core network may be transferred to a next generation core network when the user equipment supports the radio access technology of the next generation core network.
Abstract:
A network entity may be configured for prioritizing radio access types for CSG cells of a wireless communication system by storing priority information defining, for each of one or more types of data traffic (e.g., IP traffic, voice traffic, etc.), a priority ranking of cell types comprising at least one of different wireless technologies and different access control types (e.g., a CSG mode, a hybrid mode and an open mode), and indicating the priority information to a mobile device for connecting to cells of a wireless communications system. A corresponding mobile entity may be configured for receiving the priority information as described, and selecting a cell to connect to or camp on based on the priority information.
Abstract:
In an aspect, a network may support a number of client devices. In such a network, a client device transmits a request to communicate with a network, establishes a security context, and receives one or more encrypted client device contexts from the network. An encrypted client device context enables reconstruction of a context at the network for communication with the client device, where the context includes network state information associated with the client device. The client device transmits a message (e.g., including an uplink data packet) to the network that includes at least one encrypted client device context. Since the network device can reconstruct the context for the client device based on an encrypted client device context, the network device can reduce an amount of the context maintained at the network device in order to support a greater number of client devices.
Abstract:
Methods, systems, and devices are described for wireless communication to enable a UE to establish emergency services (e.g., IMS emergency calls) over WLAN (e.g., Wi-Fi) in 3GPP networks. Such mechanisms may help ensure that an ePDG capable of supporting emergency services is selected. Further, such mechanisms may help ensure that an appropriately located ePDG is selected. For example, the selected ePDG may be located in the visiting public land mobile network (VPLMN) for a roaming UE so that IMS emergency calls are routed appropriately. Selection of the ePDG may be under control of the network with which the UE is establishing connectivity for the emergency call, namely the VPLMN, as opposed to the home PLMN (HPLMN), for example. Such mechanisms may rely on knowledge that the connectivity being established is for emergency services, as well as other information regarding the UE, such as a current location of the UE.
Abstract:
One aspect relates to initiating, by a device, a connection with an application server associated with one or more application services. A gateway derives an uplink network token and/or a downlink network token. The tokens are provisioned to the device and/or an application server over the user-plane. The tokens are included with uplink and/or downlink packets, respectively. Another aspect relates to receiving a data packet at a gateway. The gateway determines a requirement for a network token from the packet. The gateway derives the network token based on a device subscription profile maintained by a network. The network token may be sent with the packet to a destination address associated with the packet. A packet including a network token may be received at a gateway. The gateway may verify the network token and send the data packet to an application server or a device if the verifying is successful.
Abstract:
A method to support two scenarios in trusted wireless local area network (WLAN) access is provided herein. The method may be performed, for example, by a user equipment (UE). The method generally includes requesting a nonseamless wireless offload (NSWO) connection to a network during an extensible authentication protocol (EAP) procedure and receiving, after successful authentication, at least one of an internet protocol (IP) address or a reason code from a network entity indicating NSWO is not allowed.
Abstract:
Mobile devices may receive page transmissions that include information related to a service for which the mobile device is being paged. The mobile device may be provided with a policy that describes a priority of radio access technologies (RATs) based on the type of service for which the mobile device is being paged. The mobile device, based at least in part on the service information, may access one or more of the wireless communications networks based on the identified service and/or based on the policy. A page transmission may include an indication of a RAT that is to be used for the page response and/or an index into the policy. A base station that transmits a page transmission may include an identifier of a particular network that is to be accessed in response to the page.