Abstract:
Fast Associated Control Channel (FACCH) information is combined if a first block of FACCH information and a repeated block of FACCH information each fail a respective integrity check. An algorithm for realizing repeated FACCH diversity combining gains for different codec and discontinuous transmission (DTX) configurations is applicable to Full Rate codecs, Half Rate codecs, and discontinuous transmission scenarios. A pair of buffers may be used in a ping-pong fashion to store decoding soft or hard decisions for failed FACCH blocks.
Abstract:
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may adaptively switch between hybrid automatic repeat request (HARQ) monitoring modes to support power savings. In a first HARQ skipping mode, the UE may transmit an uplink message corresponding to a HARQ identifier and may receive a positive acknowledgment (ACK) message in a HARQ monitoring occasion associated with the HARQ identifier. Upon receiving the ACK message, the UE refrains from monitoring a subsequent HARQ monitoring occasion associated with the HARQ identifier while in the first HARQ skipping mode (e.g., an aggressive HARQ skipping mode). The UE may periodically enter a periodic evaluation mode from the first HARQ skipping mode, in which the UE monitors a subsequent HARQ monitoring occasion after receiving an ACK message to check for false ACK messages. If a false ACK message is detected, the UE enters a first HARQ skipping prohibited mode.
Abstract:
Access terminals are adapted to blacklist one or more neighboring cells from acquisition attempts. For instance, an access terminal may receive a transmission including a list of neighboring cells to be monitored while connected to a particular serving cell. The access terminal may determine that a predefined number of consecutive acquisition attempts with a particular neighboring cell have failed. In response to failure of the predefined number of consecutive acquisition attempts, the access terminal can blacklist the neighboring cell from subsequent acquisition attempts for a predefined blacklisting period. Following the duration of the blacklisting period, the access terminal may conduct a subsequent acquisition attempt with the neighboring cell. Other aspects, embodiments, and features are also claimed and described.
Abstract:
Access terminals are adapted to employ timing information for a Synchronization Channel (SCH) associated with a neighboring base station during a re- acquisition procedure after such timing information has been determined to be inaccurate, or potentially inaccurate. For instance, an access terminal can obtain timing information for a Synchronization Channel (SCH) associated with a neighboring base station, such as by means of a combined acquisition procedure. The access terminal may subsequently determine that the obtained timing information is, or appears to be, no longer synchronized with the base station. In response to such a determination, the access terminal can employ the obtained timing information to time the opening of a receive window for re-acquiring the base station. Other aspects, embodiments, and features are also claimed and described.
Abstract:
Access terminals are adapted to blacklist one or more neighboring cells from acquisition attempts. For instance, an access terminal may receive a transmission including a list of neighboring cells to be monitored while connected to a particular serving cell. The access terminal may determine that a predefined number of consecutive acquisition attempts with a particular neighboring cell have failed. In response to failure of the predefined number of consecutive acquisition attempts, the access terminal can blacklist the neighboring cell from subsequent acquisition attempts for a predefined blacklisting period. Following the duration of the blacklisting period, the access terminal may conduct a subsequent acquisition attempt with the neighboring cell. Other aspects, embodiments, and features are also claimed and described.
Abstract:
Access terminals are adapted to blacklist one or more neighboring cells from acquisition attempts. For instance, an access terminal may receive a transmission including a list of neighboring cells to be monitored while connected to a particular serving cell. The access terminal may determine that a predefined number of consecutive acquisition attempts with a particular neighboring cell have failed. In response to failure of the predefined number of consecutive acquisition attempts, the access terminal can blacklist the neighboring cell from subsequent acquisition attempts for a predefined blacklisting period. Following the duration of the blacklisting period, the access terminal may conduct a subsequent acquisition attempt with the neighboring cell. Other aspects, embodiments, and features are also claimed and described.