Abstract:
Techniques to detect for end of service using dynamic inactivity timer thresholds are described. An access terminal establishes a radio connection for one or more applications. Data and signaling for the application(s) may be sent on one or more first flows (e.g., RLP flows) that may carry any number of second flows (e.g., IP flows). The access terminal determines a dynamic inactivity timer threshold for each first flow, e.g., based on at least one inactivity timer threshold for at least one second flow mapped to that first flow. The access terminal determines whether each first flow is inactive based on the inactivity timer threshold for that first flow, e.g., declares each first flow to be inactive if no activity is detected on that first flow for a period exceeding the inactivity timer threshold. The access terminal closes the radio connection when all first flow(s) are determined to be inactive.
Abstract:
An apparatus and method for a centrally managed handoff comprising originating a service using a first technology and connecting the service using the first technology; activating a second technology that is different from the first technology; receiving a first request for the handoff from the first technology to the second technology; sending a second request for the handoff from the first technology to the second technology, wherein the second request relates to the first request; receiving an acknowledgement that the second technology is available; implementing the handoff from the first technology to the second technology; and determining that the handoff is successfully implemented before terminating the first technology.
Abstract:
In general, this disclosure is directed to establishment and release of a connection between a communication device and an access network. More specifically, the techniques of this disclosure are directed to determining when a data flow used for exchanging call control requests becomes inactive. For example, a communication device may dynamically adjust an inactivity timer threshold associated with the data flow used by applications to exchange call control messages when a new call control transaction starts or an existing call control transaction ends, e.g., by selecting a single inactivity timer threshold for the data flow to satisfy minimum connection requirements of existing call control transactions, recently ended call control transactions and the new call control transaction. The data flow is considered inactive when no applications send or receive messages via the data flow for a period of time that exceeds the adjusted inactivity timer threshold.
Abstract:
The various embodiments include methods for managing how a DSDS mobile communication device that is accessing an arbitrary combination of any two mobile telephony networks processes paging collisions. The embodiment methods promote the control of the paging block rates for two distinct subscriptions, in which a subscription's paging block rate is the long-term percentage of its blocked paging messages over its total number of received paging messages. In the various embodiments, a mobile communication device may use a paging blocking bias to achieve a particular paging blocking rate. The paging blocking bias may be set or adjusted through various means to cause a first subscription to have a paging blocking rate that is less than, equal to, or greater than a paging blocking rate for a second subscription.
Abstract:
A system, a method and an apparatus are described. The apparatus includes a modem that responds to a thermal mitigation request by invoking different levels of thermal mitigation for different concurrently active connections. In some instances, the modem may invoke thermal mitigation with respect to a first active connection and refrain from invoking thermal mitigation with respect to a second active connection maintained by the modem. The apparatus determines the first and second active connections based on subscriptions corresponding to subscriber identification modules, an identification of a power amplifier or group of power amplifiers responsible for a thermal issue in the modem. The selection of mitigation levels for each active connection and decisions to invoke mitigation on one connection while refraining from invoking mitigation on another connection may be based on priorities of the active connections, including quality of service related priorities.
Abstract:
Systems and methods for policing traffic in communications systems are described herein. According to systems and methods herein, tokens are generated for a packet data network based on a peak transmission rate associated with the packet data network. Packets are selected for transmission over the packet data network based on availability of tokens.
Abstract:
A system, a method and an apparatus are described. The apparatus includes a modem that responds to a thermal mitigation request by invoking different levels of thermal mitigation for different concurrently active connections. In some instances, the modem may invoke thermal mitigation with respect to a first active connection and refrain from invoking thermal mitigation with respect to a second active connection maintained by the modem. The apparatus determines the first and second active connections based on subscriptions corresponding to subscriber identification modules, an identification of a power amplifier or group of power amplifiers responsible for a thermal issue in the modem. The selection of mitigation levels for each active connection and decisions to invoke mitigation on one connection while refraining from invoking mitigation on another connection may be based on priorities of the active connections, including quality of service related priorities.
Abstract:
Systems and methodologies are described that effectuate establishment of an IPSec tunnel for utilization in a wireless communication environment. IPSec establishment procedures on home base stations can be used to establish IPSec tunnels between home base stations situated on open access sectors of wireless communication environments and packet data interworking function components positioned at the contiguity of secured segments of the wireless communication environments. Moreover, high rate packet data point-to-point protocol challenge-handshake authentication protocols can be directed through the IPSec tunnels to facilitate authentication of access terminals associated with the home base stations in order to facilitate further communications with components dispersed within secure areas of wireless communication environments. Further, international mobile subscriber identities (IMSI) affiliated with access terminals associated with home base stations can be used to identify packet data serving nodes with which to establish communications between home base stations and packet data serving nodes.
Abstract:
An operational mode of a terminal is dynamically configured to allow the terminal to receive services of interest to the terminal while potentially conserving battery power. The terminal operates in a first mode (e.g., an HRPD-only mode) and monitors only a first radio network (e.g., an HRPD network) for pages from a first data network (e.g., an IMS network) if all services from a second data network (e.g., an ANSI-41 network) of interest to the terminal is obtainable via the first radio network. The terminal operates in a second mode (e.g., a 1X-HRPD mode) and monitors the first radio network and a second radio network (e.g., a 1X network) for pages from the first and second data networks, respectively, if at least one service from the second data network of interest to the terminal is not obtainable via the first radio network. The terminal may dynamically select the first or second mode.
Abstract:
Certain aspects of the present disclosure relate to methods and apparatus for a user equipment (UE) to transmit an uplink signal, even though the UE may not have received a negative acknowledgement (NACK) corresponding to the uplink signal from a network due to a tune away period. The method may generally include determining that an acknowledgement / negative acknowledgement (ACK/NACK) signal from a first network corresponding to an uplink signal is scheduled within a tune away period to a second network, and transmitting at least a portion of the uplink signal upon completion of the tune away period based on the determination.