Abstract:
This disclosure relates to methods and devices for transmitting acknowledgment messages on a preferred cell in a carrier aggregation scenario. A user equipment device (UE) establishes a connection with a primary cell and one or more secondary cells, and determines a preferred cell from among the primary cell and the one or more secondary cells based at least in part on one or more quality metrics. The UE may determine the preferred cell at least in part in response to determining that transmission power of the UE has been limited due to a specific absorption rate (SAR) backoff feature of the UE. The UE transmits a notification to a network indicating that the UE intends to transmit an acknowledgement message to the preferred cell, and transmits the acknowledgment message to the preferred cell.
Abstract:
In a method of device-to-device communication, a user device initially sends an emergency message repeatedly at a first repeating frequency. When a specified number acknowledgement (ACK) messages are received, the user device sends the emergency message repeatedly at a reduced repeating frequency. The repeating frequency may be further reduced when more ACK messages are received.
Abstract:
Methods and apparatus to mitigate radio frequency interference generated by hardware circuitry and received by wireless circuitry of a wireless communication device are described. A processor obtains a set of wireless performance metrics for signals received by the wireless circuitry. The processor determines a preferred operating mode for the hardware circuitry based on the set of wireless performance metrics and provides an indication of the preferred operating mode to the hardware circuitry. The hardware circuitry is configured for operation in accordance with the preferred operating mode. The processor and/or a second processor provide an indication to the wireless circuitry when the hardware circuitry initiates and terminates an operation that can cause radio frequency interference into the wireless circuitry. The wireless circuitry is configured during a time period that the hardware circuitry is operational to mitigate effects of radio frequency interference generated by the hardware circuitry.
Abstract:
While a circuit service, CS, call is in progress, a request for a packet service, PS, call is received from a background task that is running in the mobile communications user equipment. In response to receiving the request, several air interface parameters that relate to the in-progress CS call are evaluated, in order to decide whether or not to block the PS call based on the evaluation. Other embodiments are also described and claimed.
Abstract:
This disclosure is directed to systems and methods for interference mitigation in satellite communication. For satellite communication, an electronic device may perform a GNSS position fix prior to establishing satellite communication. In some cases, a GNSS downlink frequency band may be close to a satellite uplink frequency band, and as a result a first device communicatively connecting to a satellite downlink frequency band may interfere with one or more other devices in close proximity attempting to connect to the GNSS uplink frequency band, and consequently the first device may prevent the one or more other devices from performing the GNSS position fix. Because of this, one electronic device may block satellite communication for multiple other electronic devices. This may be particularly relevant in situations involving large crowds (e.g., festivals, sporting events), during calamity events, and/or in outdoor scenarios (e.g., group hikes).
Abstract:
A cellular communications system may include a user equipment (UE) that executes a target and non-target applications. The UE may convey a first stream of non-quality-of-service (QoS) wireless data with a first external device over a first Transmission Control Protocol (TCP) session and may receive a second stream of non-QoS wireless data from a second external device over a second TCP session. Responsive to a drop in data rate of the first stream, the UE may perform mitigation operations that adjust receipt of the second stream to boost the data rate of the first stream. The mitigation operations may include transmission of a triple duplicate acknowledgement (TDA), delayed transmission of an acknowledgment (ACK) to the second stream, and/or terminating the second TCP session. This may prevent disruptions to user experience with the first software application even when the network has downlink data to transmit to the UE.
Abstract:
Systems, methods, and processors are provided for supporting a distributed computing framework. In one example, a wireless communication device is configured to act as a distributed computing control node (ContN), the wireless communication device including a memory and a processor coupled to the memory. The processor is configured to, when executing instructions stored in the memory, cause the device to receive respective registration messages from respective wireless communication devices. The registration messages include registration information indicating whether a respective wireless communication device acts as an offload node (OffN) for distributed computing or a compute node (CompN) for distributed computing. The processor is configured to store the registration information in a resource repository and, based on the registration information of the respective wireless communication devices, transmit a resource availability message indicating available distributed computing resources to wireless communication devices acting as OffNs.
Abstract:
This disclosure provides various techniques for decreasing the time it takes user equipment to tune away from a compromised network connection. By more quickly detecting a signal characteristic issue (e.g., signal quality issue) in the compromised signal and performing mitigation actions, the user equipment may decrease power consumption and increase data throughput. The signal quality issue may be detected by monitoring the location of the user equipment, a channel impulse response of the user equipment, and/or a block error rate (BLER) of a signal, among other methods. The data obtained may be fed into confidence validation logic, which may determine a level of confidence that the signal quality issue may cause a weak or broken connection between the user equipment and a network. The confidence validation logic may, based on the determination, operate the user equipment in an active state, a suspend state, or a release state.
Abstract:
Embodiments herein provide various apparatuses and techniques to for enhanced handling of receiver desensitization, “desense,” in electronic devices that is caused by an operation of the device. In an embodiment, sensitivity of a receiver affected by desense may be determined based on receiver sensitivity without desense and a desense offset value. Desense mitigation measures may be applied based on the strength of the signal received by the receiver being less than the receiver sensitivity affected by desense. The desense mitigation measures may include deactivating the device operation that causes desense, enabling the device operation that causes desense only during certain times, and enabling antenna diversity. In some embodiments, various power and signal-to-noise ratio thresholds may be used for conditional application of different desense mitigation measures. For example, to enable receiver diversity on the device, strength of the signal needs to be below one power threshold and above another power threshold.
Abstract:
Methods and devices for a user equipment (UE) device to utilize an electronic subscriber identity module (eSIM) to provide backup cellular connectivity for essential services and security enhancements. A UE device receives user input to alter an operational state of the UE. The user input may include removing a physical subscriber identity module (SIM) card installed in the UE or attempting to power off the UE. In response to receiving the user input, an authorization process is initiated. In response to determining that the authorization process has failed, a security enhancement is implemented for the UE.