Abstract:
A method and apparatus for wireless communication between stations addressable via an Internet Protocol (IP) network that includes a first station wirelessly communicating with a second station via a multi-path transport protocol (MTP) tunnel. The MTP tunnel manages at least a first IP data sub-flow over a first air interface and at least a second IP data sub-flow over a second air interface and allocates a first IP data flow to the at least two distinct IP data sub-flows over the at least two distinct air interfaces.
Abstract:
Access control techniques enable an access terminal (102) to obtain service through an access point (104). In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point (104) to control whether an access terminal (102) obtains service through the access point. For example, a user may temporarily disable access control at an access point (104) to enable access terminals that register with the access point (104) while access control is disabled to thereafter be allowed to obtain service through the access point (104). As another example, a defined parameter may be provided to an access terminal (102) whereby, upon presenting the defined parameter to an access point (104), the access terminal (102) is allowed to obtain service through the access point.
Abstract:
An access point is identified based on a plurality of pilot signatures (pseudo-random noise, PN, spreading codes or scrambling codes). Here, in addition to transmitting a pilot signal that is encoded (e.g., spread/scrambled) using a particular pilot signature, an access point transmits a message that includes at least one indication of at least one other pilot signature (e.g. PN offset or PN phase). For example, an access point may use one PN offset to generate and transmit a pilot signal and transmit a different message that identifies (includes) at least another PN offset. An access terminal that receives the pilot signal and the message may then generate a pilot report that identifies all of these pilot signatures. Upon receiving a handover message including this pilot- related information, a target network entity with knowledge of the pilot signatures assigned to that access point may then accurately identify the access point as a target for handover of the access terminal. In a certain aspect of the invention, a femto management system maintains a pool of PN offsets that may be allocated to femtocells mapping between PN offsets and cell -IDs may be carried out.
Abstract:
A novel group key distribution and management scheme for broadcast message security is provided that allows an access terminal to send a single copy of a broadcast message encrypted with a group key. Access nodes that are members of an active set of access nodes for the access terminal may decrypt and understand the message. The group key is generated and distributed by the access terminal to the access nodes in its active set using temporary unicast keys to secure the group key during distribution. A new group key is provided every time an access node is removed from the active set of access nodes for the access terminal.
Abstract:
A method for resource management in a communication network may include monitoring whether a Proxy Mobile Internet Protocol (PMIP) tunnel between a network entity and another network entity is still needed. The method may also include detecting an event which indicates that the PMIP tunnel is no longer needed. The method may also include cleaning resources of the network entity that support the PMIP tunnel.
Abstract:
Described herein is methodologies for efficient utilization of backhaul resources of a network for delivering paging data to an access terminal (AT) without sacrificing delay performance. A location that buffers data for an AT can be adaptively changed based on factors such as the location of the AT, applications utilized by the AT, and a recent activity level of the AT. To facilitate this determination, an AT can be configured with one or more registration boundaries. An AT can be configured with a small registration radius such that if the AT does not move outside of the small registration radius, data can be delivered directly to a data attachment point for the AT. If the AT moves outside of the small registration radius, the registration radius can be switched to a large registration radius and the access gateway can instead locally buffer data for the AT.
Abstract:
The disclosure relates to video rate adaptation techniques that may use information from a medium access control (MAC) layer and radio link protocol (RLP) layer. The techniques may greatly reduce video delay by adjusting video encoding rate. For real-time video telephony (VT) applications, these techniques may provide graceful quality degradation and improve user experience, especially when the channel conditions degrade.
Abstract:
With multiple communication channels available and range extenders, a number of paths may be available for communicating traffic in a wireless network. Traffic on paths in the wireless network may be load balanced to improve channel utilization and/or relieve an overloaded communication channel. To load balance the traffic, a first AP may determine candidate paths between a first AP and a client device, wherein at least one of the candidate paths traverses a second AP. The AP may determine available bandwidths of the candidate paths based, at least in part, on availability of communication channels of the candidate paths. The AP may steer a portion of the wireless network traffic of the client device to a first of the candidate paths based, at least in part, on the available bandwidths.
Abstract:
A UE or mobile entity in a wireless communication may assist network optimization by determining a location uncovered by a wireless network, generate a coverage hole detected message if one or more conditions associated with the uncovered location are satisfied, and determining a time to transmit the coverage hole detected message to a covered wireless network. The covered network may act on the message to add covered in a second network so that the second network covers the UE. In other aspects, a UE or mobile entity may detect cell congestion in a first cell and assist the network in offloading congestion from the congested cell. In other aspects, a UE or mobile entity may detect backhaul congestion on a first cell, and assist in offloading backhaul communication for the first cell via a second cell.
Abstract:
System, apparatus, and methods are provided for preventing the collision of physical cell identifiers. A network entity broadcasts via a first radio technology a physical cell identifier of a second radio technology, where the first and second radio technologies are co-located in the network entity. The network entity receives from a neighboring network entity another physical cell identifier of the second radio technology used by the neighboring network entity, where the neighboring network entity broadcasts the another physical cell identifier via the first radio technology, and where the first and second radio technologies are co-located in the neighboring network entity. The network entity changes the physical cell identifier, in response to the physical cell identifier being the same as the another physical cell identifier.