Abstract:
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may receive, via a first carrier associated with a first radio access technology, at least a first uplink grant from a base station. The UE may implement one or more backoff schemes. For example, the UE may transmit, using resources indicated by at least the first uplink grant, an uplink message based on a temperature of one or more components of the UE satisfying a threshold, the uplink message including a transport block (TB) indicating data, a buffer status report (BSR) associated with the data, one or more padding bytes different from the data, or any combination thereof. The UE may monitor for at least a second uplink grant from the base station during a first time period based on transmitting the uplink message.
Abstract:
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may receive, via a first carrier associated with a first radio access technology, at least a first uplink grant from a base station. The UE may implement one or more backoff schemes. For example, the UE may transmit, using resources indicated by at least the first uplink grant, an uplink message based on a temperature of one or more components of the UE satisfying a threshold, the uplink message including a transport block (TB) indicating data, a buffer status report (BSR) associated with the data, one or more padding bytes different from the data, or any combination thereof. The UE may monitor for at least a second uplink grant from the base station during a first time period based on transmitting the uplink message.
Abstract:
Methods, systems, and devices are described for wireless communication. A user equipment (UE), for example, may determine a content size of an uncompressed buffer and a content size of a compressed buffer. The UE may then generate a buffer status report (BSR) based on the content sizes of the uncompressed buffer and the compressed buffer. Alternatively, a base station may receive a BSR based on a size of an uncompressed buffer of the UE. The base station may then receive a compressed packet from the UE and may determine a compression gain based on a size of the compressed packet and a size of a corresponding uncompressed packet. The base station may then adjust the received BSR based on the compression gain.
Abstract:
Methods, systems, and devices are described for wireless communication. A user equipment (UE), for example, may determine a content size of an uncompressed buffer and a content size of a compressed buffer. The UE may then generate a buffer status report (BSR) based on the content sizes of the uncompressed buffer and the compressed buffer. Alternatively, a base station may receive a BSR based on a size of an uncompressed buffer of the UE. The base station may then receive a compressed packet from the UE and may determine a compression gain based on a size of the compressed packet and a size of a corresponding uncompressed packet. The base station may then adjust the received BSR based on the compression gain.
Abstract:
Methods, systems, and devices are described for wireless communication. A user equipment (UE), for example, may determine a content size of an uncompressed buffer and a content size of a compressed buffer. The UE may then generate a buffer status report (BSR) based on the content sizes of the uncompressed buffer and the compressed buffer. Alternatively, a base station may receive a BSR based on a size of an uncompressed buffer of the UE. The base station may then receive a compressed packet from the UE and may determine a compression gain based on a size of the compressed packet and a size of a corresponding uncompressed packet. The base station may then adjust the received BSR based on the compression gain.
Abstract:
The present disclosure relates to pseudo-randomization of unused resources at a medium access control layer (MAC) of a user equipment (UE). For example, the disclosure presents a method and an apparatus for determining that an uplink (UL) resource grant, associated with a first radio access technology (RAT), for the UE results in unused resources where there are a greater number of resources than available data for transmission at the UE, wherein the UE is configured to receive information associated with a second RAT, and wherein the first RAT is different from the second RAT, populating the unused resources, at a medium access control (MAC) layer, with pseudo-randomized bits, and transmitting at least a portion of the available data and the populated unused resources using the UL resource grant associated with the first RAT. As such, pseudo-randomization of unused resources at a medium access control layer (MAC) of a UE may be achieved.
Abstract:
A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus is a UE. The UE transmits data packets. The UE determines to implement a flow control to reduce a transmission rate of the data packets. The UE determines whether the data packets include known or potential real-time data packets. The UE refrains from implementing the flow control to reduce the transmission rate of the known/potential real-time data packets when the data packets include known/potential real-time data packets.
Abstract:
A method for wireless communication is disclosed. A time alignment timer is started. It is determined when the time alignment timer will expire. A time alignment request subframe that is prior to the time alignment timer expiring is identified. Uplink time alignment is requested in the time alignment request subframe.
Abstract:
A method for wireless communication is disclosed. A time alignment timer is started. It is determined when the time alignment timer will expire. A time alignment request subframe that is prior to the time alignment timer expiring is identified. Uplink time alignment is requested in the time alignment request subframe.
Abstract:
Aspects generally relate to wireless communications and, more particularly, to methods, systems and apparatus for timing synchronization during a wireless uplink random access procedure. For example, certain aspects relate to a technique for receiving first timing advance information associated with uplink wireless communications with a base station (BS), transmitting a random access connection request message to the BS, receiving a random access response from the BS while the first timing advance information is within a valid time period, the random access response comprising second timing advance information associated with uplink wireless communications with the base station, determining, after receiving the random access response, that the valid time period for the first timing advance information has expired, and utilizing the second timing advance information for uplink communications with the BS after determining that the valid time period for the first timing advance information has expired. Numerous other aspects are provided.