Abstract:
A method enables a user equipment (UE) intervention to reduce a network-initiated Quality of Service (QoS) interruption time or a disruption of the network-initiated QoS, while avoiding application intervention. The method includes communicating with a source radio access network (RAN) in accordance with a network-initiated quality of service (QoS) profile. The method also includes transferring to a target RAN. The method further includes triggering, by a user equipment (UE), a QoS setup to reestablish the QoS profile.
Abstract:
Aspects of the present disclosure provide techniques to speed up and improve silent redial success rates in wireless communications. A user equipment (UE) may determine how to attempt retrying a mobile originated (MO) call and procedures for selecting a subsequent system for attempting the call based, at least in part, on a restriction status of the call and a detected failure.
Abstract:
Systems and methods for storing information in a user zone list are described herein. According to the systems and methods herein, the user zone list includes multiple user zone files and the user zone files include information regarding a communication interface type.
Abstract:
Devices and methods are provided for optimizing the timing of multi-mode system scans in a wireless communication environment. In one embodiment, the method may involve determining at least one of location and movement of a mobile entity (ME). The method may involve adjusting a timer between preferred system scans based on the at least one of the location and the movement of the ME. For example, determining may involve utilizing a movement sensor (e.g., an accelerometer and/or a voltage-controlled oscillator accumulator) to detect the movement of the ME, and/or receiving signals from a Global Positioning System or the like.
Abstract:
Radio access interworking technologies allow a target network to notify a source network that a mobile device has moved from source network to target network, wherein mobile device does not need to perform notification to source network. Further, source network can provide a first subset of overhead information to mobile device and, after moving to target network, mobile device can receive a second subset of overhead information from target network. Further, mobile device can perform prehashing prior to moving to target network based on a channel list received from source network.
Abstract:
Providing for centralized access management to diverse types of mobile network access points is described herein. By way of example, network components can generate a system determination list (SDL) for a user terminal (UT) that is customized to access capabilities of the UT and/or current position of the UT. The SDL can be employed by the UT to determine which network access points to camp on, handoff to, or the like. The network components can include a network database that maintains UT subscriber and related home Femto cell information, or such information can be maintained at a network operator's home location register. In some aspects, the information can be obtained over the air from the UT or from a base station serving the UT.
Abstract:
Described aspects provide for improving the mobility of wireless communication devices between one network domain and another network domain, specifically, but not limited to, between a Wireless Local Area Network (WLAN) and a cellular network and the like. Present aspects provide for services to be moved seamlessly and in a reliable manner between the cellular and WLAN domains in order to minimize service disruption for the end user and provide the requisite Quality of Service (QoS) for the different applications. The aspects herein presented provide for various mechanisms that serve to improve the decision points related to when and what technology each service is expected to be associated with and provides better techniques to move the wireless communication device between cellular and WLAN domains when in-traffic and when idle.
Abstract:
Systems and methodologies are described that facilitate adjusting allocation of carriers based on inactivity in wireless communications. An inactivity and dormancy timer are provided to allow carrier deallocation in periods of communicative inactivity (after expiration of the inactivity timer) without terminating the connection until expiration of the dormancy timer. Upon expiration of the inactivity timer, carriers can be deallocated from communication to conserve resources and reduce interference while still allowing requests to be made over the connection. If such requests are made, carriers can be reallocated to efficiently transmit a response. The timers are reset when communications are active. In addition, the timers can have expiration times related to aspects of connection, such as a protocol utilized thereover, connection quality, and/or the like.
Abstract:
Techniques for performing WLAN system scanning and selection are described. A terminal performs multiple iterations of scan to detect for WLAN systems. A scan list containing at least one WLAN system to detect for is initially determined. For each scan iteration, a scan type may be selected from among the supported scan types. The selected scan type may indicate passive scan or active scan, frequency channels to scan, etc. A scan may be performed based on the selected scan type. Signal strength measurements are obtained for access points received during the scan and used to identify detected access points. After all scan iterations are completed, candidates access points are identified based on the scan results, e.g., based on the signal strength measurements for the detected access points and a detection threshold. The best candidate access point may be selected for association by the terminal.
Abstract:
A mobile communication network includes a plurality of access nodes that can serve different roles in support of a communication session with a mobile station. An access node can serve as a connecting node that receives access requests the mobile station, as an anchor node to anchor a radio packet connection with a core network for the communication session; or as a primary node to store session information for the communication session. One or more monitoring entities monitor the availability of the access nodes and broadcast notification messages to other access nodes when an access node failure is detected. The broadcast message includes the identity of the failed access node. Other access nodes may take action to restore connections and recover session information maintained by the failed access node.