Abstract:
PROBLEM TO BE SOLVED: To achieve the inter-node fairness of wireless communication using resource utilization messages (RUMs), in accordance with various aspects.SOLUTION: A RUM may be generated for a first node, such as an access point or an access terminal, to indicate that a first predetermined threshold has been met or exceeded. The RUM may be weighted to indicate a degree to which a second predetermined threshold has been exceeded. The first and/or second predetermined thresholds may be associated with various parameters associated with the node, such as latency, throughput, data rate, spectral efficiency, carrier-to-interference ratio, interference-over-thermal level, etc. The RUM may then be transmitted to one or more other nodes to indicate a level of disadvantage experienced by the first node.
Abstract:
PROBLEM TO BE SOLVED: To provide a method for access control in a femto cell.SOLUTION: The method comprises: assigning at least one femto cell to correspond to a first identifier that identifies valid access to the femto cell; storing a list comprising at least one second identifier and at least one first identifier (where a second identifier corresponds to an AT and the list indicates valid first identifier and second identifier pairs); receiving, at a femto cell, a request from an AT for access (1030); sending, by the femto cell, the first identifier to at least one access control component (1035); determining, from the list, whether a second identifier for the AT corresponds to a valid first identifier for the femto cell (1040); and granting access to the AT at the femto cell in response to the request if the AT is identified.
Abstract:
PROBLEM TO BE SOLVED: To provide techniques for identifying access points, which may be assigned the same identifier, in order to not cause confusion as to which access point (handover target) is being referenced when an access terminal in the network reports to its serving access point that a signal has been received from an access point having a given identifier.SOLUTION: Messages may be sent to access points that are assigned the same identifier (312) to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point (316). The target access point may then be identified on the basis of any responses that indicate that a signal was received from the access terminal.
Abstract:
PROBLEM TO BE SOLVED: To provide a method for synchronizing a wireless communication system.SOLUTION: Silence duration for a base station is determined based on the time required for a neighbor base station to obtain or maintain synchronization. All transmissions from the base station are ceased for the silence duration. Levels of multiple base stations may cease transmissions at the same time, thus mitigating interference.
Abstract:
PROBLEM TO BE SOLVED: To resolve confusion resulting from assigning the same identifier to multiple nodes.SOLUTION: A network may provide a time gap during which an access terminal may temporarily cease monitoring transmissions from a source node so that the access terminal may acquire a unique identifier from a target node. An access terminal may commence handover operations at a target node after determining whether the access terminal is allowed to access the target node. A source node may prepare several target nodes for potential handover in the event confusion is detected or likely. The source node may send information relating to the preparation of the potential target nodes to the access terminal, and thereby the access terminal initiates handover at that target node.
Abstract:
PROBLEM TO BE SOLVED: To provide a method for synchronizing base stations in a wireless communication system.SOLUTION: A silence duration for a base station is determined based on the time required for a neighbor base station to obtain or maintain synchronization. All transmissions from the base station are ceased for the silence duration. Multiple levels of base stations may cease transmissions at the same time, thus mitigating interference.
Abstract:
PROBLEM TO BE SOLVED: To provide a method for controlling access to restricted access nodes.SOLUTION: Provisioning and access control for communication nodes involve assigning identifiers to sets of nodes, where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. Provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. Provisioning a node involves providing a preferred roaming list for the node. A node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
Abstract:
PROBLEM TO BE SOLVED: To improve network interference management for wireless networks.SOLUTION: Signaling-only access may be established with an access node under certain circumstances such as, for example, upon determining that a node is not authorized for data access at the access node. A node that is not authorized for data access at an access node may still be paged by the access node through the use of signaling-only access. In this way, transmissions by the access node may not interfere with the reception of pages at the node. A first node may be selected for providing paging while a second node is selected for access under certain circumstances such as, for example, upon determining that the second node provides more desirable service than the first node.