Abstract:
Local breakout is provided by one or more nodes (e.g., a local access point and/or a local gateway) in a wireless network to facilitate access to one or more local services. In conjunction with local breakout, multiple IP points of presence relating to different levels of service may be provided for an access point. For example, one point of presence may relate to a local service while another point of presence may relate to a core network service. IP point of presence may be identified for an over-the-air packet to indicate a termination point for the packet. Also, different mobility management functionality may be provided at different nodes in a system whereby mobility management for a given node may be provided by a different node for different types of traffic. Thus, an access terminal may support multiple NAS instances. In addition, different types of paging may be provided for different types of traffic. Furthermore, messages associated with one protocol may be carried over another protocol to reduce complexity in the system.
Abstract:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
Abstract:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
Abstract:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
Abstract:
Certain aspects of the present disclosure propose methods and apparatus to transmit information about number of active UEs in a cell (e.g., pico cell) that need protection to an interfering cell (e.g., a macro cell). The information may be transmitted in a resource status update message. The active users may be defined as users whose downlink performance and/or quality of service are limited by the available number of protected resources.
Abstract:
Techniques are provided to facilitate offloading of mobile entities from a serving network entity. For example, there is provided a location-based method that involves, in response to a load of the requesting entity exceeding a load threshold, identifying candidate network entities to which to offload a user equipment (UE), each of the candidate network entities being in sleep mode. The method may involve determining coverage and location information for the candidate network entities, and determining location information for the UE. The method may involve selecting a given network entity to turn ON based at least in part on the coverage information and the location information. The method may involve sending an ON-request message to the at least one selected network entity, the ON-request message including a timer that can be used to deactivate the selected network entity in case it is not useful in offloading the serving network entity.
Abstract:
Methods and apparatus for performing radio resource management (RRM) measurements in a heterogeneous network (HetNet) are provided in an effort to prevent failure of RRM measurement procedures in a dominant interference scenario. Several alternatives are provided for determining particular resources (e.g., subframes) to use for performing the RRM measurements, wherein the particular resources are based on cooperative resource partitioning between cells of the HetNet, wherein the cells may be of different types (e.g., macro, pico, or femto cells). These alternatives include, for example: (1) intra-frequency or intra-RAT (radio access technology) alternatives, which may involve transmitting resource partitioning information (RPI) in or deriving non-serving cell RPI based on the serving cell's RPI, as well as (2) inter-frequency or inter-RAT alternatives, where the RRM measurements may be performed during a measurement gap.
Abstract:
In -band provisioning enables subscribers (user equipments, UEs) to manually provision themselves via an access point, AP, at which the subscribers would not otherwise be allowed access. A subscriber may be temporarily accepted (Guest subscriber) by a restricted access point (e.g., an access point that belongs to a closed subscriber group). The subscriber may be provisioned for full access at the access point if the subscriber presents a valid authorization credential to a provisioning entity. For example, a user manually selects the HeNB (or home NodeB) and sends a connection request (TAU request) including acquiring IP address at a PDN Gateway, PGW. The user selects a link in the web browser which sends a HTTP request message (Request-URL) to the PGW through the HeNB, which is redirected to a web-server behind the PGW which is hosting the in-band provisioning at the CSG. The web server hosting the in-band provisioning returns an HTTP response prompting the user to enter password information, a confirmation, billing information, etc.
Abstract:
Systems and methodologies are described that facilitate fetching a native security context between network nodes in a core network after an inter-system handover of a mobile device. For instance, a mobility message that is integrity protected by a security context (e.g., the native security context, a mapped security context,..) can be obtained at a network node from the mobile device. Further, the network node can send a request to a disparate network node within a core network. The request can include information that can be used by the disparate network node to establish that the mobile device is authenticated. Moreover, the native security context can be received from the disparate network node in response to the request. Accordingly, the native security context need not be recreated between the network node and the mobile device.