Abstract:
Aspects of the present disclosure provide methods, apparatus and computer program products for throttling unattended applications at user devices (e.g., in an effort to limit transmission resource consumption by a user equipment (UE)). According to an aspect, the UE may receive an indication to restrict (throttle down) flow for traffic that appears to be unattended by a user. The UE may determine if a particular application is subject to flow restriction; and restrict flow of uplink traffic generated by the application, if the application is subject to flow restriction. Numerous other aspects are provided.
Abstract:
Methods, systems, and apparatuses for wireless communication are described. A user equipment (UE) may establish a dynamic coverage enhancement (CE) configuration and then autonomously transition from one CE level to another while in idle mode. The network may blindly detect the CE change during a paging procedure. For example, a mobility management entity (MME) may store dynamic CE information, and it may provide the dynamic CE information to base stations when the UE is paged. In some cases, the base stations may autonomously retransmit paging messages at different CE levels based on the dynamic CE information. In other examples, the MME may direct the base station to retransmit at different CE levels.
Abstract:
Methods, systems, and devices are described for decreasing user plane latency in a wireless communication system. This may include routing a portion of bearer traffic to or from a UE through a local or serving gateway, or within or between base stations, rather than via the core network. In some examples, techniques for selected internet protocol flow ultra-low latency (SIPFULL) for systems in which users may have subscribed to enhanced services may be employed. The network may, for instance, authorize SIPFULL functionalities for UEs per access point name (APN) based on individual services subscribed by the UE to improve overall quality of service (QoS). In some examples, a UEs latency requirements or SIPFULL authorizations may affect mobility operations.
Abstract:
Aspects described herein relate to detecting wireless network services. A network identifier can be determined in a broadcast message received from a network entity, and a connection with a network related to the network entity can be established based at least in part on the network identifier. Using the connection, the network entity can be queried for information related to services available at the network, where the information may indicate one or more subscription providers related to the services.
Abstract:
Techniques are described for traffic volume determination and reporting by an access node and/or a node of a core network in a wireless communications system. One or more wireless connections may be established with a user equipment (UE) to serve one or more streams of traffic using a first cell and a second cell, which may have different cell characteristics. A first traffic volume for the UE may be determined based on traffic volume served over the first cell, and a second traffic volume for the UE may be determined based on traffic volume served over the second cell. A charging data record may be generated based on the first traffic volume and the second traffic volume. Traffic volume served over the first cell then may be charged at a different rate that traffic served over the second cell.
Abstract:
Methods, systems, and devices for wireless communications are described. Generally, a user equipment (UE) may directly send small data to a disaggregated base station without performing a random access procedure. The CU-CP may provide a list of routing identifiers and corresponding data resource bearers (DRBs) to a distributed unit (DU) and the DU may transmit a connection release message to the UE. The connection release message may include the list of routing identifiers and the list of DRB identifiers. The connection release message may also include a downlink monitoring timer. The UE may identify data for an uplink transmission and a DRB associated with that data. The UE may transmit a packet with the data and the routing identifiers to a DU, which may derive downlink address information from the routing identifiers and forward the data to a CU-UP of the aggregated base station.
Abstract:
Methods, systems, and devices for wireless communications are described. A multicast architecture may support flexible change between unicast and multicast operations and may support additional traffic types (e.g., Internet Protocol and Ethernet traffic). For example, the multicast architecture may include transmitting data over a shared multicast radio bearer (MRB) and/or specific data radio bearers (DRBs), a multicast user plane function (UPF) for supplying the multicast data to a base station, multicast data from different radio access networks (RANs), protecting the multicast data through creating a group key, ciphering the multicast data sent on the MRB using the group key, and transitioning the multicast data from a source RAN to a target RAN.
Abstract:
Methods, systems, and devices for wireless communications are described. A first base station may identify that the first base station is a secondary node for a user equipment (UE) operating in a dual connectivity deployment, where the UE is in a radio resource control (RRC) inactive state. The first base station may receive, from the UE, a request to resume communications with the first base station and a second base station that is a master node in the dual connectivity deployment. The first base station may verify the UE using an access stratum context associated with the UE, and resume communications with the UE based at least in part on the request and the access stratum context. The first base station may resume communications as a secondary node or as a master node. In some cases, the UE may resume communications without entering an RRC idle state.
Abstract:
Certain aspects of the present disclosure relate to methods and apparatus for optimizing delivery of a data to and/or from a UE in a connected but inactive state.
Abstract:
Systems, apparatuses, and methods for configurations for small data transmission by which a user equipment transmits, to a base station, user data within a random access message in a radio resource control inactive state. The user equipment may receive, via broadcast system information and/or unicast messages from the base station, a configuration on support capability or parameters for small data transmission. Based on the received configuration, the user equipment may transmit user data to the base station. The user equipment may transmit a random access preamble on a resource separately reserved for small data transmission.