Abstract:
A mobile device, such as a smartphone or a tablet computer, can execute functionality for configuring a network device in a communication network and for subsequently controlling the operation of the network device with little manual input. The mobile device can detect, from the network device, sensor information that is indicative of configuration information associated with the network device. The mobile device can decode the received sensor information to determine the configuration information and can accordingly enroll the network device in the communication network. In response to determining to control the enrolled network device, the mobile device can capture an image of the network device and can use the captured image to unambiguously identify the network device. The mobile device can establish a communication link with the network device and can transmit one or more commands to vary operating parameters of the network device.
Abstract:
Transmissions of beacons by a set of access points (e.g., femtocells) are synchronized to facilitate discovery of the access points by an access terminal moving through the coverage areas of the access points. In some embodiments, periodic beacon transmissions are synchronized across all of the femtocells of a set of femtocells such that each femtocell transmits a beacon signal according to a similar pattern and at the same time. In some embodiments, an opportunistic beacon control scheme involves commencing beacon transmissions by at least one femtocell of a set of femtocells upon determining that an access terminal has communicated with one or more of the femtocells.
Abstract:
An access point is identified based on a plurality of pilot signatures. Here, in addition to transmitting a pilot signal that is encoded (e.g., spread/scrambled) using a particular pilot signature, an access point transmits a message that includes at least one indication of at least one other pilot signature. For example, an access point may use one PN offset to generate a pilot signal and transmit a message that identifies at least one other PN offset. An access terminal that receives the pilot signal and the message may then generate a pilot report that identifies all of these pilot signatures. Upon receiving a handover message including this pilot-related information, a target network entity with knowledge of the pilot signatures assigned to that access point may then accurately identify the access point as a target for handover of the access terminal.
Abstract:
Systems and methods for identifying an address of a femto node (1710) during handoff of an access terminal from a femto node (1710) to a macro node (1705). In one embodiment, the femto node assigns a unique identifier to the access terminal. The access terminal (1720) passes the unique identifier to the macro node (1110). The macro node partitions the unique identifier to determine the address of the femto node (1150), (1160), (1170). In another embodiment, the femto node registers its address with a domain name system (1760). The macro node queries the domain name system to obtain the address of the femto node. In another embodiment, the macro node sends the unique identifier to a proxy (2170). The proxy partitions the unique identifier to determine the address of the femto node.
Abstract:
Systems and methods for identifying an address of a femto node (810) during handoff of an access terminal from a femto node (810) to a macro node (805). In one embodiment, the femto node assigns a unique identifier to the access terminal. The access terminal passes the unique identifier to the macro node (1110). The macro node partitions the unique identifier to determine the address of the femto node (1150), (1160), (1170). In another embodiment, the femto node registers its address with a domain name system (1760). The macro node queries the domain name system to obtain the address of the femto node. In another embodiment, the macro node sends the unique identifier to a proxy (2170). The proxy partitions the unique identifier to determine the address of the femto node.
Abstract:
Radio access interworking technologies allow a target network to notify a source network that a mobile device has moved from source network to target network, wherein mobile device does not need to perform notification to source network. Further, source network can provide a first subset of overhead information to mobile device and, after moving to target network, mobile device can receive a second subset of overhead information from target network. Further, mobile device can perform prehashing prior to moving to target network based on a channel list received from source network.
Abstract:
Facilitate set up of an X2-AP interface (between a HNB and a eNB) for data exchange between an access terminal and a Home access terminal. Based upon a received request from a Home access terminal, the access terminal can activate an X2-AP interface connection on demand over Stream Control Transmission Protocol (SCTP) based upon a maximum number of connections available and/or a timer evaluation that indicates that the request is within an allowed time period. The capacity of the eNB related to the amount of X2-AP connections can be managed based upon at least one of a timer evaluation, or a maximum number of X2-AP connections which can be supported. The systems and methodologies provide an optimal and efficient technique in order to enable data to be exchanged between an access terminal and a Home access terminal utilizing an X2-AP interface.
Abstract:
Relays can be used to facilitate communication of a packet, such as from a base station to a mobile device. The packet can include a header that designates an intended destination for the packet. The header can transfer such that the intended destination designation can be sent with or without being decompressed at a relay. If there is more than one relay involved in communication, then the header can configure such that the header is accessible without performing decompression. However, if there is one relay stop, then the header can compress the designator in such a way that decompression should occur.
Abstract:
Systems and methods of decoupling session management from connection management of a wireless network by enabling transfer of a session between session controllers. A session transfer component transfers ownership of a session from a source session controller to a target session controller, wherein the session transfer does not necessarily require moving the associated connections therewith. Such transfer employs a Unicast Access Terminal Identifier (UATI) that is updated to inform the related base stations regarding transfer of the session.
Abstract:
Systems and methods are provided that facilitate active queue management of internet-protocol data packets generated in a data packet switched wireless network. Queue management can be effected in a serving base station as well as in an access terminal, and the application that generates the data packets can be executed locally or remotely to either the base station or access terminal. Management of the generated data packets is effected via a marking/dropping of data packets according to an adaptive response function that can be deterministic or stochastic, and can depend of multiple communication generalized indicators, which include packet queue size, queue delay, channel conditions, frequency reuse, operation bandwidth, and bandwidth-delay product. Historical data related to the communication generalized indicators can be employed to determine response functions via thresholds and rates for marking/dropping data packets.