Abstract:
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP) addressing. The non-IP D2D PDCP-encapsulated communication can further include two forms of secure data transfer. A first non-IP D2D PDCP-encapsulated communication can be a negotiated non-IP D2D PDCP-encapsulated communication. A second non-IP D2D PDCP-encapsulated communication can be a non-negotiated non-IP D2D communication. The non-negotiated non-IP D2D PDCP-encapsulated communication can include a common key management server (KMS) version and a distributed KMS version. The encapsulated communication can be used with various protocols, including a PC5 protocol (such as the PC5 Signaling Protocol) and wireless access in vehicular environments (WAVE) protocols.
Abstract:
Wireless communication devices may directly communicate within groups of wireless communication devices using Layer-2 communications to implement “push-to-talk” type applications. In one implementation, a method may include generating a floor request signaling message to take control of a communication channel for a group. After transmitting data relating to the communications, a floor release signaling message may be generated and transmitted a number of times.
Abstract:
Briefly, in accordance with one or more embodiments, virtualized network function resources may be managed in a network. Performance measurements may be received for at least one mobility management entity (MME) in an MME pool, or for other network elements. If at least one of the performance measurements exceeds at least one predetermined threshold, instantiation of a new mobility management entity virtual network function (MME VNF) may be requested, and the MME VNF may be instantiated in response to the request. One or more user equipment (UE) devices managed by the MME pool may be connected to the added MME VNF.
Abstract:
Embodiments for providing an architecture for WebRTC to access Internet Protocol (IP) multimedia subsystem (IMS) are generally described herein. In some embodiments, a non-IMS user equipment (UE) is provided along with an Application Signaling Interworking Function (ASIF) co-located with the non-IMS UE. The non-IMS UE is arranged to send a register message to the ASIF for registering the non-IMS UE with an IMS core. The ASIF is arranged to translate the register message from the non-IMS UE to IMS-based signaling and to register the non-IMS UE with the IMS core using the register message translated to IMS-based signaling.
Abstract:
Technology for reporting radio access network (RAN) user plane congestion (UPCON) is disclosed. In an example, a core network (CN) device can include computer circuitry configured to: receive an UPCON event report using an UPCON container that includes a congestion situation indicator to indicate a UPCON situation; and change an UPCON process based on the congestion situation indicator. The core network device can include a mobility management entity (MME), a serving gateway (S-GW), a packet data network (PDN) gateway (P-GW), a policy and charging enforcement function (PCEF), a policy and charging rules function (PCEF), a serving general packet radio service (GPRS) support node (SGSN), a gateway GPRS support node (GGSN), an access network discovery and selection function (ANDSF), an operation and maintenance (O&M) subsystem, an UPCON server, a proxy, or a standalone function entity.
Abstract:
In embodiments, apparatuses, methods, and storage media may be described for establishing a direct connection between two UEs. Each UE may be provisioned with a temporary identifier by a server of a wireless network of the UE. The UEs may then be configured to broadcast the temporary IDs in radio signals over radio resources that are separate from the radio resources of the network. The temporary IDs may not contain identifying information of the broadcasting UE that is interpretable without receiving further information from the network.
Abstract:
Examples may include techniques for securely receiving critical communication content associated with a critical communication service. Examples may include a network providing the critical communication being capable of establishing a secure connection to remote user equipment (UE) through a relay UE in order for the remote UE to securely receive critical communication content from the network. The critical communication service may include a mission critical push to talk (MCPTT) service.
Abstract:
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP) addressing. The non-IP D2D PDCP-encapsulated communication can further include two forms of secure data transfer. A first non-IP D2D PDCP-encapsulated communication can be a negotiated non-IP D2D PDCP-encapsulated communication. A second non-IP D2D PDCP-encapsulated communication can be a non-negotiated non-IP D2D communication. The non-negotiated non-IP D2D PDCP-encapsulated communication can include a common key management server (KMS) version and a distributed KMS version. The encapsulated communication can be used with various protocols, including a PC5 protocol (such as the PC5 Signaling Protocol) and wireless access in vehicular environments (WAVE) protocols.
Abstract:
The present disclosure provides systems for updating firmware of a CIoT device. The CIoT device activates, based on one or more activation commands received by the first receiver and the second receiver. The CIoT device connects by the second receiver and the second transmitter, to a device. The CIoT device receives, by the second receiver, from the device, a firmware upgrade file. A CIoT device deactivates the second receiver.
Abstract:
Embodiments use the principles of self-organizing networks to allocate resources to allow spectrum owners to share spectrum with wireless carriers according to defined license conditions. A spectrum licensee holds the licensing conditions of the spectrum licensed by the spectrum owners. This licensed spectrum is referred to as secondary spectrum. A self-organizing network server requests access to secondary spectrum. The spectrum licensee grants access to the secondary spectrum along with the licensing conditions for access. The self-organizing network server monitors the conditions associated with the license and/or delegates the responsibility for monitoring conditions associated with the license to others. When the license conditions are met, enhanced Node B systems may begin using the secondary spectrum according to the license conditions. When the license conditions are no longer met, enhanced Node B systems discontinue use of the secondary spectrum.