Abstract:
Systems and methodologies are described that facilitate supporting multiple access modes for a base station in a wireless communication environment. The base station can leverage hybrid, closed, or open access mode. A whitelist of a mobile device that successfully registers on the base station can be selectively updated to include a CSG ID of the base station (708). For example, the CSG ID of the base station can be added to the whitelist when the base station operates in closed access mode, while adding the CSG ID can be skipped when the base station operates in hybrid access mode. According to another example, the CSG ID can be selectively added based upon a received accept cause value. Additionally or alternatively, a CSG ID and an access mode indicator can be transmitted from a base station to a network node for implementing access control and/or paging optimization at the network node.
Abstract:
An access terminal may switch to a different mode of wireless network selection as a result of manual selection of a wireless cell set (e.g., a closed subscriber group) associated with one or more wireless cells. For example, if the user of an access terminal selects a closed subscriber group in a wireless network that is different than the current wireless network, the access terminal may enter a manual mode of wireless network selection, select the wireless network corresponding to the closed subscriber group, and register on a closed subscriber group cell in the selected wireless network. In addition, an access terminal may automatically switch to a different mode of wireless network selection (e.g., the prior mode) upon losing coverage of a wireless cell set. An access terminal may also automatically select a cell of a wireless cell set if the access terminal returns to a cell of the cell set within a defined period of time after losing coverage of the cell set. Furthermore, an access terminal may return to a prior wireless network upon losing coverage of a wireless cell set.
Abstract:
Systems and methodologies are described that facilitate supporting multiple access modes for a base station in a wireless communication environment. The base station can leverage hybrid, closed, or open access mode. A whitelist of a mobile device that successfully registers on the base station can be selectively updated to include a CSG ID of the base station (708). For example, the CSG ID of the base station can be added to the whitelist when the base station operates in closed access mode, while adding the CSG ID can be skipped when the base station operates in hybrid access mode. According to another example, the CSG ID can be selectively added based upon a received accept cause value. Additionally or alternatively, a CSG ID and an access mode indicator can be transmitted from a base station to a network node for implementing access control and/or paging optimization at the network node.
Abstract:
Methods and apparatus for proxying of devices and services using overlay networks. A method for operating a proxy includes obtaining meta-data associated with at least one of a device and a service, generating a searchable index of the meta-data, and publishing the searchable index on the overlay network as at least one of a distributed index and a centralized index. Another method includes receiving a request from a device or a service using a non overlay protocol to receive at least one of data and services from the overlay network, searching an index of meta-data on the overlay network based on the request, identifying a node associated with the at least one of data and services based on the index, establishing a direct connection with the node, and obtaining the at least one of data and services using the direct connection.
Abstract:
A method and apparatus for interworking between push-to-talk over cellular (PoC) systems and instant messaging (IM) systems is provided. An interworking entity that behaves like a PoC client to a PoC server and as an IM client to the IM server is provided. The interworking entity may be implemented as part of the PoC server or the IM server. The interworking entity listens to talk bursts from the PoC server and when it receives a talk burst the interworking entity sends the message to the IM client via the IM server. In an embodiment, the interworking entity listens to talk bursts or audio clips from the IM server and when it receives them, stores them in a temporary storage memory and converts them to a streaming format. The interworking entity then requests the floor from the PoC server, and, once the floor is granted, streams the stored audio clip or talk burst to the PoC server. The PoC server then distributes the clips to the PoC clients.
Abstract:
A method, an apparatus, and a computer program product for wireless communication at a first user equipment (UE) are provided. The apparatus sends a request to a second UE for establishing a call connection, receives from the second UE an acknowledgment for establishing the call connection, establishes at least one first dedicated bearer between the first UE and a network for communicating media packets with the second UE, sends first dummy data to the second UE via the established at least one first dedicated bearer, receives at least one of second dummy data or a media packet from the second UE via the established at least one first dedicated bearer, and exchanges media packets with the second UE via the established at least one first dedicated bearer after receiving the at least one of the second dummy data or the media packet from the second UE.
Abstract:
Apparatus and methods are disclosed for reducing or eliminating searches by a UE for its home PLMN when the mobile station is roaming in a network not in the vicinity of the home PLMN. That is, the UE may be provisioned with information about its home PLMN. For example, some embodiments can comprise a neighbor database indicating neighbor relationships between PLMNs and the home PLMN. This can enable a UE to determine whether the home PLMN is likely to be nearby when it is visiting a different PLMN. Forgoing a PLMN home search reduces processing and can aid in conserving power resources. Other aspects, embodiments, and features are also claimed and described.
Abstract:
Systems and methodologies are described that facilitate fetching a native security context between network nodes in a core network after an inter-system handover of a mobile device. For instance, a mobility message that is integrity protected by a security context (e.g., the native security context, a mapped security context,..) can be obtained at a network node from the mobile device. Further, the network node can send a request to a disparate network node within a core network. The request can include information that can be used by the disparate network node to establish that the mobile device is authenticated. Moreover, the native security context can be received from the disparate network node in response to the request. Accordingly, the native security context need not be recreated between the network node and the mobile device.