Abstract:
Aspects described herein relate to detecting wireless network services. A network that advertises access to a service provider network via a cellular radio access technology (RAT) in an unlicensed frequency can be discovered at a user equipment (UE). The UE can then determine one or more user-defined or operator-defined policies related to selecting the network, and select the network for access based at least in part on the one or more user-defined or operator-defined policies.
Abstract:
Methods and apparatus for routing data bearers of a user equipment (UE) while the UE is handing over or associating to a base station (BS) of a first radio access technology (RAT) while being served by a BS of a second RAT are disclosed. An Xw interface that is used to control offloading and routing of data bearers between base stations of disparate RATs is disclosed. Call flows illustrating the use of the Xw interface and apparatus using the Xw interface are also disclosed.
Abstract:
Certain aspects of the present disclosure provide methods and apparatus for modified power management for UEs in a wireless communication system that utilizes one or more RANs for communication. For example, certain aspects of the present disclosure relate to a technique for controlling when the UE is placed in a low power state in the first RAN based, at least in part, on inactivity of the UE in the first RAN. Certain aspects of the present disclosure also relate to controlling when to modify one or more network bearers between the first RAN or the second RAN and the core network based, at least in part, on at least one of inactivity on the one or more network bearers or inactivity in both the first RAN and the second RAN. According to certain aspects, the first RAN may include a WWAN and the second RAN may include a WLAN.
Abstract:
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a master node (MN) may receive a message indicating that a user equipment (UE) has determined that a condition for a conditional primary secondary cell (PSCell) change has been satisfied for a candidate target PSCell. The candidate target PSCell may be one of a set of candidate target PSCells associated with the UE in a conditional PSCell change configuration provided by a base station. The MN may transmit, to a source secondary node, a confirmation message associated with the conditional PSCell change. Numerous other aspects are provided.
Abstract:
Apparatus, methods, and computer-readable media for facilitating self-managed trust in Internet-of-Things networks are disclosed herein. An example method of trust management at a network manager includes enrolling a network endpoint with a network managed by the network manager. The example method also includes receiving trusted reference information for the network endpoint based on enrolling the network endpoint. Additionally, the example method includes performing verification of the network endpoint based on at least one of the trusted reference information or an attestation received from the network endpoint. Further, the example method includes enforcing policies to the network endpoint based on a result of the verification. Such trust management may improve privacy and security at the network, as well as reduce latency in responding to trust incidents.
Abstract:
Various aspects of the present disclosure generally relate to wireless communication. In some aspects. a source node may discover one or more relay nodes. The source node may select a multi-node communication mode. from a relaying multi-node communication mode and a non-relaying multi-node communication mode. for a transmission. The source node may transmit. to the one or more relay nodes. an indication of a relaying configuration associated with the selected groupcast mode. The source node may transmit the transmission to the one or more relay nodes based at least in part on the selected groupcast mode or the relaying configuration. Numerous other aspects are described.
Abstract:
Methods, systems, and devices for wireless communication are described. Generally, the described techniques provide for efficiently collecting and reporting minimization of drive test (MDT) measurements for one or more radio access technology (RAT) types and/or for multiple base stations in a dual connectivity deployment. In one example, a user equipment (UE) may receive an MDT measurement configuration indicating a first RAT type for collecting measurements and a second RAT type for reporting measurements. In this example, the UE may use the measurement configuration to collect MDT measurements for the first RAT type, and the UE may report the MDT measurements to a base station associated with the second RAT. Further techniques for efficiently collecting and reporting MDT measurements in a dual connectivity deployment are also described herein.
Abstract:
Certain aspects of the present disclosure provide techniques for performing cross-node machine learning operations in a radio access network. An example method of wireless communication by a first network entity includes providing, to a second network entity, an indication of cross-node machine learning information used for a cross-node machine learning session between the first network entity and a user equipment (UE); obtaining machine learning information associated with the UE; and controlling the cross-node machine learning session based at least in part on the machine learning information.
Abstract:
An apparatus, method and computer-readable media are disclosed for performing wireless communications. For example, a process can include: transmitting, to a security service of the wireless network, a first service access request for accessing a service of the wireless network, wherein the service is separate from the security service; receiving, from the security service in response to the first service access request, service security information for accessing the service; deriving a service key based on the service security information; transmitting, to the service, a second service access request, the second service access request encoded based on the derived service key; and establishing a first security context with the service based on the derived service key.
Abstract:
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may transmit, to a network node, a request for network assisted information associated with one or more of a machine learning (ML) model or analytics, the ML model or the analytics being associated with an application layer communication that is associated with the UE. The UE may receive, from the network node, one or more of the ML model or the analytics. Numerous other aspects are described.