Downlink interference coordination in a radio communication network

    公开(公告)号:AU2012373339B2

    公开(公告)日:2017-08-31

    申请号:AU2012373339

    申请日:2012-12-07

    Abstract: An aggressor base station (22-1) herein performs downlink interference coordination with one or more victim base stations (22-2, 22-3)in a radio communication network (10). Such coordination is performed for each of one or more iterations. For any given iteration, the aggressor (22-1) sends a message (28-2) to a victim (22-2) that indicates, for each of one or more downlink resources (26), whether the aggressor (22-1) promises to protect that resource (26) from interference by not transmitting on the resource (26) with a transmit power above a threshold (TH

    Security key generation for dual connectivity

    公开(公告)号:NZ709755A

    公开(公告)日:2016-10-28

    申请号:NZ70975514

    申请日:2014-01-30

    Abstract: Techniques for the secure generation of a set of encryption keys to be used for communication between a wireless terminal and an assisting base station in a dual-connectivity scenario. An example method includes generating (810) an assisting security key for the assisting base station, based on an anchor base station key. The generated assisting security key is sent (820) to the assisting base station, for use by the assisting base station in encrypting data traffic sent to the wireless terminal or in generating one or more additional assisting security keys for encrypting data traffic sent to the wireless terminal while the wireless terminal is dually connected to the anchor base station and the assisting base station. The anchor base station key, or a key derived from the anchor base station key, is used (830) for encrypting data sent to the wireless terminal by the anchor base station.

    Classifying failure reports as either current or stale for mobility robustness optimization adjustments

    公开(公告)号:AU2016200694A1

    公开(公告)日:2016-02-18

    申请号:AU2016200694

    申请日:2016-02-03

    Abstract: The present disclosure relates to identifying stale failure reports in a cellular communications network. In one embodiment, a node in a cellular 5 communications network receives a failure report associated with a connection failure for a user equipment and determines when the connection failure occurred with respect to a most recent mobility adjustment made by the node. If the connection failure occurred before the most recent mobility adjustment made by the node, the node classifies the failure report as a stale failure report. In one 10 embodiment, if the failure report is classified as a stale failure report, the node discards the failure. In another embodiment, if the failure report is classified as a stale failure report, the node considers the failure report with reduced relevance for a next iteration of a process to determine whether new mobility adjustments are desired. RECEIVE FAILURE REPORT NO DID FAILURE YES OCCUR BEFORE LAST MRO ADJUSTMENT(S)? ,1006 1004 CLASSIFY FAILURE REPORT CLASSIFY FAILURE REPORT AS CURRENT (TIMELY) AS STALE

    Classifying failure reports as either current or stale for mobility robustness optimization adjustments

    公开(公告)号:AU2013260235B2

    公开(公告)日:2015-11-26

    申请号:AU2013260235

    申请日:2013-05-10

    Abstract: The present disclosure relates to identifying stale failure reports in a cellular communications network. In one embodiment, a node in a cellular communications network receives a failure report associated with a connection failure for a user equipment and determines when the connection failure occurred with respect to a most recent mobility adjustment made by the node. If the connection failure occurred before the most recent mobility adjustment made by the node, the node classifies the failure report as a stale failure report. In one embodiment, if the failure report is classified as a stale failure report, the node discards the failure. In another embodiment, if the failure report is classified as a stale failure report, the node considers the failure report with reduced relevance for a next iteration of a process to determine whether new mobility adjustments are desired.

    Security key generation for dual connectivity

    公开(公告)号:AU2014213034A1

    公开(公告)日:2015-08-06

    申请号:AU2014213034

    申请日:2014-01-30

    Abstract: Techniques for the secure generation of a set of encryption keys to be used for communication between a wireless terminal and an assisting base station in a dual-connectivity scenario. An example method includes generating (810) an assisting security key for the assisting base station, based on an anchor base station key. The generated assisting security key is sent (820) to the assisting base station, for use by the assisting base station in encrypting data traffic sent to the wireless terminal or in generating one or more additional assisting security keys for encrypting data traffic sent to the wireless terminal while the wireless terminal is dually connected to the anchor base station and the assisting base station. The anchor base station key, or a key derived from the anchor base station key, is used (830) for encrypting data sent to the wireless terminal by the anchor base station.

    DOWNLINK INTERFERENCE COORDINATION IN A RADIO COMMUNICATION NETWORK

    公开(公告)号:IN7981DEN2014A

    公开(公告)日:2015-05-01

    申请号:IN7981DEN2014

    申请日:2014-09-24

    Abstract: An aggressor base station (22-1) herein performs downlink interference coordination with one or more victim base stations (22-2, 22-3)in a radio communication network (10). Such coordination is performed for each of one or more iterations. For any given iteration, the aggressor (22-1) sends a message (28-2) to a victim (22-2) that indicates, for each of one or more downlink resources (26), whether the aggressor (22-1) promises to protect that resource (26) from interference by not transmitting on the resource (26) with a transmit power above a threshold (T¾). The victim (22-2) schedules downlink transmissions to one or more user equipments (16) on resources (26) that, according to the message (28-2), are protected from interference. Based on monitoring for interference to those transmissions, though, the vietim (22-2) generates and sends to the aggressor (22-1) feedback (30-2) that generally requests an increase or decrease of the threshold (TH 2) . From evaluation of this feedback (30-2), the aggressor (22-1) determines a new threshold (TH2) on which promises are to be based in a message (28-2) to the victim (22-2) in a subsequent iteration.

    Manejo del PDCP durante el restablecimiento de la conexión

    公开(公告)号:ES2886860T3

    公开(公告)日:2021-12-21

    申请号:ES18804701

    申请日:2018-10-25

    Abstract: Un método realizado por un equipo (210) de usuario, UE, comprendiendo el método: establecer (102) una conexión a una Red (206) de Acceso por Radio, RAN, a través de un nodo (260) de red, proporcionando la conexión comunicaciones entre el UE y el nodo de red utilizando una Portadora de Radio de Señalización 1, SRB1, configurada con una configuración del Protocolo de Convergencia de Paquetes de Datos, PDCP, de Nueva Radio, NR; recibir (104) un mensaje de restablecimiento de la conexión del Control de Recursos de Radio, RRC, que comprende un elemento de información, IE, radioResourceConfigDedicated; y restablecer (106) la conexión a la RAN, incluyendo el restablecimiento aplicar una configuración PDCP de Evolución a Largo Plazo, LTE, a la SRB1, restablecer el control del enlace de radio, RLC, para la SRB1, realizar un procedimiento de configuración del recurso de radio de acuerdo con el IE radioResourceConfigDedicated, reanudar la SRB 1, generar un mensaje completo RRC y enviar el mensaje completo RRC; y mapear al menos uno de un algoritmo de cifrado NR o de un algoritmo de protección de la integridad NR a un algoritmo LTE predefinido.

    Comunicación inalámbrica multi-RAT

    公开(公告)号:ES2874530T3

    公开(公告)日:2021-11-05

    申请号:ES17761609

    申请日:2017-08-21

    Abstract: Un método realizado por un dispositivo (12) de comunicación inalámbrica configurado para su uso en un sistema (10) de comunicación inalámbrica, comprendiendo el método: realizar (610), mediante un primer módulo (18­1) de tecnología de acceso por radiocomunicaciones, RAT, del dispositivo (12) de comunicación inalámbrica, funciones relacionadas con una primera RAT; realizar (620), mediante un segundo módulo (18­2) de RAT del dispositivo (12) de comunicación inalámbrica, funciones relacionadas con una segunda RAT; y realizar (630), mediante el segundo módulo de RAT, un subconjunto (22­1S) de funciones relacionadas con la primera RAT en nombre del primer módulo (18­1) de RAT cuando se cumplen una o más condiciones definidas, caracterizado por que, la condición o condiciones definidas incluyen que el nivel de batería restante del dispositivo (12) de comunicación inalámbrica esté por debajo de un umbral definido.

Patent Agency Ranking