Abstract:
A wireless network may have a plurality of access points (APs). A network device may select a first AP from the plurality of APs for a wireless client device to access the wireless network. The first AP may be selected based at least in part on network performance between the wireless client device and the network device. The network device may cause the wireless client device to associate with the first AP.
Abstract:
Access point functionality of a network device may be disabled, resulting in a coverage hole in a communication network and affecting performance of a client device. Various techniques can be implemented for detecting and minimizing coverage holes. In some examples, the network device can selectively establish a communication link with the client device depending on whether the client device is in a coverage hole and depending on whether the client device can detect another access point in the communication network. In some examples, the client device can determine that it is in a coverage hole in response to detecting a reserved SSID and can accordingly notify a central coordinator of the communication network. In one example, the central coordinator can identify the network device (with disabled access point functionality) that can eliminate the coverage hole and can cause the network device to enable its access point functionality.
Abstract:
Methods, systems, and devices are described that enable a WLAN access point (AP) to schedule packet transmissions to (or from) a mobile device taking into consideration the schedule of various other coexisting transmission/reception (Tx/Rx) activities on the mobile device. Various approaches may increase throughput at the mobile device. Various approaches also may benefit other stations associated with the same AP.
Abstract:
Systems and methods are provided for reporting high mobility user equipment (IJE) in a wireless network. This may be achieved, for example, by detecting a high mobility UE at a network node and reporting the high mobility UE in a blocking message to one or more other network nodes, wherein the blocking message comprises a minimum blocking duration over which to block access requests from the high mobility UE. The network node comprises (i) one or more small cells or (ii) one or more central controllers managing the one or more small cells. The detection step may consist in identifying the one or more small cells from previous handovers, local signal scanning, or neighboring cell information received from other network nodes.
Abstract:
A UE or mobile entity in a wireless communication may assist network optimization by determining a location uncovered by a wireless network, generate a coverage hole detected message if one or more conditions associated with the uncovered location are satisfied, and determining a time to transmit the coverage hole detected message to a covered wireless network. The covered network may act on the message to add covered in a second network so that the second network covers the UE. In other aspects, a UE or mobile entity may detect cell congestion in a first cell and assist the network in offloading congestion from the congested cell. In other aspects, a UE or mobile entity may detect backhaul congestion on a first cell, and assist in offloading backhaul communication for the first cell via a second cell.
Abstract:
Methods and apparatuses are provided that facilitate providing access point measurements to restricted access points. Restricted access points can lessen restrictions to allow devices to register with the restricted access point for providing measurements thereto. Additionally or alternatively, access point measurements can be provided to a minimization of drive tests (MDT) server for providing to the restricted access points. Thus, restricted access points can obtain the access point measurements for performing enhanced interference management or other functionality based at least in part on the measurements.
Abstract:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.
Abstract:
Access by a mobile station to a femto access point (FAP) of a wireless communication system is controlled by an enforcement point in response to mobile station authorization data provided from a storage point that is remote from the FAP. The authorization data is provided in response to FAP authentication data. The authentication data may include a FAP identifier and a message authenticator that the FAP generates by hashing shared secret information. The storage point may provide the authorization data in response to determining that the message authenticator is a hash of the shared secret information.
Abstract:
Systems and methods for establishing secure communications between two network elements through a trusted intermediary when no direct communication path is available. Separate secure communication links are established between the network elements and the trusted intermediary to facilitate secure end to end communication.
Abstract:
Systems and methodologies are described that facilitate multiplexing communications from multiple downstream access points to one or more mobility management entities (MME). In particular, a concentrator component is provided that can establish a single transport layer connection with an MME along with multiple application layer connections over the single transport layer connection for each of multiple downstream access points and/or related mobile devices. The downstream access points and/or mobile devices can provide identifiers to the concentrator component, which can utilize the identifiers to track communications with the MME. In this regard, the MME can additionally include identifiers received from the concentrator component in subsequent communications to facilitate identifying the appropriate downstream access point and/or mobile device.