Abstract:
Certain aspects of the present disclosure provide methods and apparatus for implementing Automatic Neighbor Relation (ANR) functions for relay nodes (RNs), home base stations (e.g., home evolved Node Bs (HeNBs), and related entities (e.g., donor evolved Node Bs (DeNBs) and HeNB gateways). X2 is designed to be an end-to-end protocol between two evolved Node Bs (eNBs). However, for the case of RNs or HeNBs, this protocol may involve a proxy function (e.g., where the DeNB acts a proxy for the RN). This creates several issues, such as how to manage a potentially very large set of cells under a gateway and how to route S1 messages used for X2 endpoint discovery. Therefore, certain aspects of the present disclosure generally relate to methods and apparatus for maintaining the X2 connections intelligently and hiding the large number of nodes from the X2 endpoints based on various triggers.
Abstract:
In-band provisioning enables subscribers to manually provision themselves via an access point at which the subscribers would not otherwise be allowed access. For example, a subscriber may be temporarily accepted by a restricted access point (e.g., an access point that belongs to a closed subscriber group). The subscriber is then given limited access to enable the subscriber to be provisioned at the access point. For example, the subscriber may be provisioned for full access at the access point if the subscriber presents a valid authorization credential to a provisioning entity.
Abstract:
Radio access interworking technologies allow a target network to notify a source network that a mobile device has moved from source network to target network, wherein mobile device does not need to perform notification to source network. Further, source network can provide a first subset of overhead information to mobile device and, after moving to target network, mobile device can receive a second subset of overhead information from target network. Further, mobile device can perform prehashing prior to moving to target network based on a channel list received from source network.
Abstract:
Techniques for determining a discontinuous reception (DRX) cycle used to receive paging are described. A user equipment (UE) may have (i) a first DRX cycle used by a first network (e.g., a core network) to page the UE and (ii) a second DRX cycle used by a second network (e.g., a RAN) to page the UE. In an aspect, the UE may use the longer DRX cycle and ignore the shorter DRX cycle, when allowed, to extend battery life. In one design, the UE may receive an indication of whether the second DRX cycle can be ignored or is to be considered by the UE. The UE may use the longer DRX cycle if the second DRX cycle can be ignored and may receive paging from the first network and/or the second network based on the longer DRX cycle. In another aspect, the UE may negotiate a DRX cycle with a network.
Abstract:
Un procedimiento de comunicación, que comprende: usar (506), en un terminal de acceso, una primera instancia de estrato sin acceso, NAS, (802) para comunicarse con un primer nodo, en el que el terminal de acceso admite la primera instancia NAS (802) para comunicarse con una MME local, en el que la MME local está colocalizada con un eNodoB doméstico para facilitar un desvío local, en el que la MME local es una MME de funcionalidad reducida; usar (508), en el terminal de acceso, una segunda instancia de estrato sin acceso, NAS, (804) para comunicarse con un segundo nodo; y acceder (510) a un primer servicio en base a la comunicación con el primer nodo y acceder a un segundo servicio en base a la comunicación con el segundo nodo, en el que la primera instancia NAS (802) y la segunda instancia NAS (802) se encaminan a través de la misma interfaz aérea del terminal de acceso.
Abstract:
Provisioning and access control for communication nodes (110) involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points (102, 104) and access terminals (106, 108) that are authorized to receive service from the restricted access points. Access control (1790, 1792) may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
Abstract:
Bearer context maintained by an access terminal is synchronized with a network so that a change in the status of the bearer context may be reflected at the network. For example, if an access terminal determines that a resource previously requested by the access terminal is no longer needed, the access terminal may deactivate the bearer context locally in a case where the access terminal is unable to communicate with the network. In such a case, the access terminal may synchronize its bearer context with the network once the access terminal reestablishes communication with the network. For example, the access terminal may send a message to the network indicating that the access terminal has deactivated the bearer context.