Abstract:
Systems and methodologies are described that facilitate applying offsets and/or selectable hysteresis values to favor access points in cell reselection. In measuring and ranking surrounding access points in reselection, offsets can be applied to favorable access points to facilitate cell reselection thereto. The offset can positively affect measurements, and thus ranking as well, in some cases. Negative offsets can also be applied to lower measurements (and thus ranking) of some access points. Moreover, hysteresis values can be applied in measuring current cells to prevent frequent reselection. The hysteresis values can be selected based on a type of the current cell or related access point to expand the coverage area where desired. Thus, where the current access point is favorable, a larger hysteresis can be added to measurements related to the current access point.
Abstract:
Systems and methodologies are described that facilitate identifying sectors using sector parameters signatures. The signatures can be generated as a known function of a previous sector parameters signature (or message parameters), system time, and an identifier. In this regard, mobile devices can determine an expected identifier from comparing the sector parameters signature to a sector parameters signature computed based at least in part on the system time known to the mobile device. In addition, the mobile device can utilize a known or an inferred previous parameters signature to determine the expected identifier. Multiple signatures can be evaluated to determine expected identifiers to increase the likelihood of correct identification since the signatures are generated using the known variables along with the identifier.
Abstract:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.