Abstract:
Methods, systems, and devices are described for detecting a communications network or assisting in the detection of a communications network. In a method for detecting a communications network, a beacon received from a device over a wireless local area network (WLAN) may be decoded to identify an information element (IE) in the beacon. The IE may indicate an availability of another network. When the IE is empty, a sleep mode may be entered (e.g., by a user equipment (UE)). In a method for assisting a detection of a communications network, a database including information indicating an availability of at least a first network may be accessed, and a beacon may be broadcast over a WLAN. The beacon may include an IE that indicates the availability of at least the first network.
Abstract:
Cell selection procedures performed in a wireless network are disclosed that include determining a uplink/downlink (ULDL) preference of a User Equipment (UE) in communication with a first evolved Node B (eNB) having a first ULDL configuration and a second eNB having a second ULDL configuration. The UE compares the first and second ULDL configurations to the ULDL preference. The UE selects the first eNB based on the first ULDL configuration matching the ULDL preference. In alternative aspects, a first eNB having a first ULDL configuration and in communication with a UE receives the ULDL preference of the UE. The first eNB compares the first ULDL configuration and a second ULDL configuration of a second eNB in communication with the UE to the ULDL preference. The first eNB selects the second eNB based on the second ULDL configuration matching the ULDL preference.
Abstract:
A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus may be a UE which uses a first antenna and a second antenna for communication with a first RAT. The apparatus determines that the second antenna is to be used for a procedure associated with a second RAT at a first time. The apparatus reduces a UE RI from an initial value to a reduced value for the communication with the first RAT at the first time based on the determination.
Abstract:
Embodiments include devices and methods for remotely controlling access to a first computing device. A processor of the first computing device may receive an access request input, and may capture authentication information from the user in response to the access request input. The processor of the first computing device may send an access request comprising the authentication information of the user to a second computing device. The first computing device may unlock one or more functions of the first computing device based on the received authorization message.
Abstract:
Examples include systems and methods for managing multi-active communication on a multi-subscription multi-standby (MSMS) communication device. The device processor may change a first protocol stack of a first subscription and a second protocol stack of a second subscription of the MSMS communication device to a multi-active mode in response to determining that all of one or more packet data network connections of the first subscription are transferred to a Wi-Fi communication link.
Abstract:
Described herein are apparatuses, methods, and computer readable media for diverting a call from a server that receives calls to a wearable device (e.g., a watch) associated with a mobile device. In some embodiments, a mobile device determines whether a condition to activate a call diversion feature for the mobile device is met. In response to determining the condition is met, the mobile device communicates with the server to activate the call diversion feature for the mobile device. Subsequently, a call intended for the mobile device that is received at the server is diverted from the server to the wearable device.
Abstract:
Systems and methods for modem control based on feedback are disclosed. In one embodiment, a modem observer module is associated with software within a computing device. The modem observer receives information from the modem relating to uplink bandwidth availability and/or network conditions that may impact uplink bandwidth. Based on the uplink bandwidth availability at the modem, the modem observer may throttle or limit the number of connections that are active by the applications.
Abstract:
Certain aspects of the present disclosure relate to methods and apparatuses for handling malicious attacks. In one aspect, the methods and apparatuses are configured to identify packets received from a malicious source based at least in part on packets received by a wireless device that change a state of the wireless device from a dormant state to a connected state, selectively disconnect the wireless device from a packet data network (PDN) by releasing a first Internet Protocol (IP) address used to connect the wireless device to the PDN when a number of packets identified as received from the malicious source reaches a threshold number within a monitoring period, and reconnect the wireless device to the PDN using a second IP address that is different from the first IP address. In another aspect, a connection to an IP Multimedia Subsystem (IMS) PDN is maintained after the PDN is disconnected.
Abstract:
A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus may be a UE which uses a first antenna and a second antenna for communication with a first RAT. The apparatus determines that the second antenna is to be used for a procedure associated with a second RAT at a first time. The apparatus reduces a UE RI from an initial value to a reduced value for the communication with the first RAT at the first time based on the determination.
Abstract:
Techniques for controlling internal operation of a user equipment (UE) based on physical layer (PHY) parameters of a wireless network are disclosed. The PHY parameters may include a system bandwidth, an uplink-downlink configuration, a number of antennas, a number of carriers, etc. In one design, the UE may receive system information from the wireless network. The UE may obtain at least one PHY parameter of the wireless network, at a physical layer on the UE, based on the system information and/or other signaling. The UE may provide the at least one physical layer parameter to at least one entity (e.g., a memory and flow controller, a clock controller, a thermal mitigator, an application processor, etc.) within the UE for use to control internal operation of the UE.