摘要:
Techniques, apparatuses, and systems for dynamically changing downlink and uplink allocations can include operating a base station under time division duplexing to communicate with one or more mobile devices using a frame structure, adjusting a downlink-uplink ratio to change an allocation between uplink and downlink data capacities in the frame structure, determining a mute interval based on the adjusted downlink-uplink ratio, generating mute information based on the mute interval to identify the one or more areas of the frame structure effected by the allocation change, and transmitting the mute information to the one or more mobile devices.
摘要:
Techniques, apparatuses, and systems for dynamically changing downlink and uplink allocations can include operating a base station under time division duplexing to communicate with one or more mobile devices using a frame structure, adjusting a downlink-uplink ratio to change an allocation between uplink and downlink data capacities in the frame structure, determining a mute interval based on the adjusted downlink-uplink ratio, generating mute information based on the mute interval to identify the one or more areas of the frame structure effected by the allocation change, and transmitting the mute information to the one or more mobile devices.
摘要:
Techniques for load balancing across different access networks based on procedures initiated by a wireless terminal or mobile station and examples of using load balancing within the same access network to hand off a mobile station from one base station to another based on procedures initiated by the mobile station.
摘要:
Methods and systems for implementing trunking techniques in CDMA systems for handling group calls and push-to-talk services and roaming of group calls.
摘要:
Application mobility is a unique feature of the edge computing to support relocation of application instance across edge computing hosts or between edge computing host and cloud computing over underlying mobile network. With the active-standby mode application instance implementation with support of L2 networks, the application mobility could achieve the service continuity with low latency switching time. An application mobility mechanism can be implemented in the data plane of edge computing host under the control of edge computing platform and management. It can be also implemented in L2 switching function of the User Plane Function in 5G networks.
摘要:
Techniques for wireless communications include operating first and second access networks to provide wireless service to wireless devices. The first and second access networks are associated with respective first and second gateways. The first gateway is operated to (1) receive a request for transferring wireless service of a wireless device from the second access network to the first access network and (2) send a message that includes key information to the second gateway based on the request. The second gateway is operated to (1) send session context information to the first gateway in response to the message and (2) forward a data packet associated with the wireless device to the first gateway. The forwarded data packet includes a packet data network identifier (PDN-ID) to identify a packet data network (PDN) associated with a downlink data packet.
摘要:
Techniques for generating preamble sequences for OFDM and OFDMA communication systems based on CAZAC sequences with desired properties of constant amplitudes (CA) and zero autocorrelation (ZAC). Such preamble sequences may be used for synchronization and identification of individual transmitters. For example, the OFDMA symbol is constructed using a CAZAC sequence in the frequency-domain and the resulting time-domain waveform is a near-CAZAC sequence.
摘要:
Methods and systems for femto-cell identification are disclosed herein. In one embodiment, a femto-cell base station is adapted to transmit with each broadcast a value which maps one-to-one to a different portion of a femto-cell identification. After the mobile station reports each broadcasted value to the serving non-femto-cell, the target femto-cell identification can be determined by combining multiple reports. In this manner, a fairly large identification space can be provided without significant increases in implementation complexity. In some embodiments, the system does not introduce issues with backward compatibility since standard cell identification procedures are preserved. In some embodiments, knowledge of the maximum number of femto-cells within a non-femto-cell is not required, thereby preventing ambiguous hand-in targets.