Abstract:
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP) addressing using a PC5 protocol (such as PC5 Signaling Protocol). The non-IP D2D PDCP-encapsulated communication can further include two forms of secure data transfer. A first non-IP D2D PDCP-encapsulated communication can be a negotiated non-IP D2D PDCP-encapsulated communication. A second non-IP D2D PDCP-encapsulated communication can be a non-negotiated non-IP D2D communication. The non-negotiated non-IP D2D PDCP-encapsulated communication can include a common key management server (KMS) version and a distributed KMS version.
Abstract:
Methods, systems, and devices for offloading traffic flows without service disruption are disclosed herein. User equipment (UE) is configured to receive an indication that a current packet data network (PDN) connection can be optimized. The current PDN connection is established over a first PDN gateway (PGW). The UE requests connection over a new PDN connection to a same type of service as the current PDN connection without releasing the connection over the first PGW. The UE routes new traffic flows over a second PGW corresponding to the new PDN connection and routes old traffic flows over the first PGW.
Abstract:
Embodiments of protocol converters (PCs), and related techniques, are disclosed herein. In some embodiments, a PC may include reception logic to receive Extensible Markup Language (XML) data transmitted by an Application Function (AF), conversion logic to convert the XML data into a Diameter Protocol (DP) message, and provision logic to provide the DP message for transmission to a Policy and Charging Rules Function (PCRF). Other embodiments may be disclosed and/or claimed.
Abstract:
A relay device assists in enabling lawful intercept (LI) by reporting, to a LI entity associated with the cellular network, authenticated identities of remote UEs (such as remote UEs connected via proximity services) and identification information that may allow the LI entity to monitor traffic (and/or control statistics related to the traffic) associated with the remote UEs. The authentication of the remote UEs may be performed using a technique that does not require involvement of the cellular network.
Abstract:
This application discusses, among other things, apparatus and methods for providing device-to-device (D2D) discovery privacy. In an example, a method can include transmitting a first temporary identification and first discovery information from a first user equipment (UE), the discovery information authorizing discovery of the first UE; and receiving a request from a second UE to join a device-to-device network with the first UE using a second temporary identification associated with the second UE.
Abstract:
A relay device assists in enabling lawful intercept (LI) by reporting, to a LI entity associated with the cellular network, authenticated identities of remote UEs (such as remote UEs connected via proximity services) and identification information that may allow the LI entity to monitor traffic (and/or control statistics related to the traffic) associated with the remote UEs. The authentication of the remote UEs may be performed using a technique that does not require involvement of the cellular network.
Abstract:
Some demonstrative embodiments include devices, systems and methods of offloading traffic of a Secondary Cell Group (SCG). For example, some embodiments may include identifying a SCG bearer that is offloadable to the Internet via a Network Address Translation (NAT) gateway, based on offloading information received from a Master Evolved Node B (eNB) (MeNB); and offloading uplink Internet Protocol (IP) packets of the SCG bearer to the Internet via the NAT gateway, if the SCG bearer is indicated to be offloadable.
Abstract:
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP) addressing. The non-IP D2D PDCP-encapsulated communication can further include two forms of secure data transfer. A first non-IP D2D PDCP-encapsulated communication can be a negotiated non-IP D2D PDCP-encapsulated communication. A second non-IP D2D PDCP-encapsulated communication can be a non-negotiated non-IP D2D communication. The non-negotiated non-IP D2D PDCP-encapsulated communication can include a common key management server (KMS) version and a distributed KMS version. The encapsulated communication can be used with various protocols, including a PC5 protocol (such as the PC5 Signaling Protocol) and wireless access in vehicular environments (WAVE) protocols.
Abstract:
Briefly, in accordance with one or more embodiments, user equipment (UE) comprises processing circuitry to connect to a network via an untrusted wireless local area network (WLAN) and determine a location of the UE to provide the location of the UE if a voice call is made by the UE via the untrusted WLAN. The UE provides the location of the UE to a Public-Safety Answering Point (PSAP) via one or more network nodes of the network via the untrusted WLAN.
Abstract:
Embodiments allow one or more eNBs that become isolated from core network entities (e.g., evolved packet core entities such as mobility management entity, serving gate way, packet data network gateway, and so forth) to form a resilient mode network. Such a network can function in a limited fashion and provide for UE to UE communications within the resilient mode network coverage area. One or more of the eNBs function as an autonomous eNB and provide a subset of core network functions that allow UE to UE communications within the resilient mode network coverage area. Embodiments disclosed herein select which eNB functions as the autonomous eNB and then the other eNBs establish an S1-MME and/or S1-U interface with the autonomous eNB.