Abstract:
Techniques for performing WLAN system scanning and selection are described. A terminal performs multiple iterations of scan to detect for WLAN systems. A scan list containing at least one WLAN system to detect for is initially determined. For each scan iteration, a scan type may be selected from among the supported scan types. The selected scan type may indicate passive scan or active scan, frequency channels to scan, etc. A scan may be performed based on the selected scan type. Signal strength measurements are obtained for access points received during the scan and used to identify detected access points. After all scan iterations are completed, candidates access points are identified based on the scan results, e.g., based on the signal strength measurements for the detected access points and a detection threshold. The best candidate access point may be selected for association by the terminal.
Abstract:
Systems, methods, and devices for accessing a service of a wireless carrier network through a wireless local area network (WLAN) are described. A method includes selecting one or more traffic management parameters associated with the WLAN based at least in part on one or more quality of service (QoS) parameters associated with the service of the wireless carrier network being accessed. The method further includes transmitting packets over the WLAN using the selected one or more traffic management parameters associated with the WLAN when a user equipment accesses the service of the wireless carrier network through the WLAN. The user equipment enforces the selected one or more traffic management parameters for communications to the wireless carrier network. An access point enforces the selected one or more traffic management parameters for communications to the user equipment.
Abstract:
Methods, systems, and devices are described for wireless communication. A user equipment (UE), for example, may determine a content size of an uncompressed buffer and a content size of a compressed buffer. The UE may then generate a buffer status report (BSR) based on the content sizes of the uncompressed buffer and the compressed buffer. Alternatively, a base station may receive a BSR based on a size of an uncompressed buffer of the UE. The base station may then receive a compressed packet from the UE and may determine a compression gain based on a size of the compressed packet and a size of a corresponding uncompressed packet. The base station may then adjust the received BSR based on the compression gain.
Abstract:
Methods, systems, and devices are described for wireless communication at a device. A transmitting device such as a base station may select some packets for direct transmission to a receiving device using data compression based on the reliability of the direct connection. The transmitting device may select other packets for indirect transmission via an unreliable connection using uncompressed packets or compressed packets that will not be used to update a compression buffer. In some cases, uncompressed packets may also be sent via the reliable connection. If a packet sent over the unreliable connection is lost, it may be transmitted over the reliable connection.
Abstract:
Methods, systems, and devices are described for early radio link failure (RLF) declaration. A UE may identify a measurement report message (MRM) trigger and initiate an RLF procedure. In the RLF procedure the UE may determine whether a radio link condition indicative of an RLF has been satisfied before an expiration of a timer that is initiated by the MRM trigger. As an example, the UE may determine that a threshold number of uplink radio link signaling messages, such as MRMs, have been transmitted without a radio link control (RLC) acknowledgement (ACK). The UE may declare RLF based on the determination that the radio link condition has been satisfied. In some examples the UE may verify that channel conditions are better for a target cell than for the serving cell, and may declare RLF based further on the channel comparison.
Abstract:
Systems and methodologies are described that effectuate establishment of an IPSec tunnel for utilization in a wireless communication environment. IPSec establishment procedures on home base stations can be used to establish IPSec tunnels between home base stations situated on open access sectors of wireless communication environments and packet data interworking function components positioned at the contiguity of secured segments of the wireless communication environments. Moreover, high rate packet data point-to-point protocol challenge-handshake authentication protocols can be directed through the IPSec tunnels to facilitate authentication of access terminals associated with the home base stations in order to facilitate further communications with components dispersed within secure areas of wireless communication environments. Further, international mobile subscriber identities (IMSI) affiliated with access terminals associated with home base stations can be used to identify packet data serving nodes with which to establish communications between home base stations and packet data serving nodes.
Abstract:
Systems, apparatus and methods for facilitating identification and/or acquisition of an access point are provided. Methods can include transmitting or receiving access point information (“API”) indicative of an identification of the access point (“AP”). The API can be provided at the AP through hardwiring or receipt of configuration information input by a user or transmitted to the AP by a network operator through Over-The-Air (“OTA”) signaling. The API can be computer-readable and, in some embodiments, the API can also be human-readable. The API can be transmitted on a paging channel from which user equipment (“UE”) can receive information. The frequency at which the API is transmitted can be fixed, dynamic and/or configurable. Upon receipt of the API, acquisition of the AP is attempted if the AP is determined to be a permitted AP.
Abstract:
Methods, systems, and devices for improved acquisition of wireless communication systems or networks are described. A wireless communication device may be connected to a first network that uses a first radio access technology (RAT). When a failure occurs (e.g., lost connection), the device may attempt to acquire a cell or channel of another network that uses a second RAT. The time consumed for acquiring the channel of the second RAT may be reduced by providing a suitably prioritized list of channels. In some examples, the device may identify a channel for initial access or following a call failure based on prior successful access on that channel, or based on information provided by a server, or both.
Abstract:
Providing for distributed access point management for access to a mobile network is described herein. By way of example, an interface application maintained at a Femto cell base station (BS) can facilitate initial power up and/or acquisition for a Femto user terminal (UT). Upon start-up, a bootstrap process is utilized by the Femto cell to provision the UT with an SDL establishing at least one BS as high priority within a particular geographic area (GEO). Thus, when the Femto UT is within the GEO, the UT is more likely to acquire, camp on and/or handoff to the preferred BS. When outside the GEO, a serving access point can provision the Femto UT OTA with a custom SDL suited to another GEO having a different high priority access point. By implementing access point management at distributed access points, expensive network equipment can be mitigated or avoided.
Abstract translation:这里描述了用于访问移动网络的分布式接入点管理。 作为示例,维持在毫微微小区基站(BS)的接口应用可以有助于对于毫微微用户终端(UT)的初始加电和/或获取。 在启动时,毫微微小区利用自举进程来向UT提供在特定地理区域(GEO)内建立至少一个BS作为高优先级的SDL。 因此,当毫微微UT在GEO内时,UT更有可能获得,驻留和/或切换到首选BS。 在GEO外部,服务接入点可以为Femto UT OTA提供适合具有不同高优先级接入点的另一个GEO的自定义SDL。 通过在分布式接入点实现接入点管理,可以减轻或避免昂贵的网络设备。
Abstract:
Systems and methodologies are described herein that facilitate efficient transfer of quality of service (QoS) context during inter-radio access technology (RAT) handovers. In particular, techniques are described herein for establishing rules for whether a user equipment unit (UE) or an associated network should establish QoS for a mixed-mode application, identifying flow to bearer mappings when translating QoS across an inter-RAT handover, mapping QoS parameters of respective RATs, mitigating QoS depreciation upon multiple handovers, performing one or more actions if QoS is not acceptable in a new RAT, maintaining QoS during tunnel mode, and handling scenarios in which a UE moves between a RAT using network-initiated QoS and a RAT using UE-initiated QoS.