Abstract:
Techniques for deriving a WLAN security context from an existing WWAN security context are provided. According to certain aspects, a user equipment (UE) establishes a secure connection with a wireless wide area network (WWAN). The UE may receive from the WWAN an indication of a wireless local area network (WLAN) for which to derive a security context. The UE then derives the security context for the WLAN, based on a security context for the WWAN obtained while establishing the secure connection with the WWAN and establishes a secure connection with the WLAN using the derived security context for the WLAN. This permits the UE to establish a Robust Security Network Association (RSNA) with the WLAN while avoiding lengthy authentication procedures with an AAA server, thus speeding up the association process.
Abstract:
Techniques for switching user equipments (UEs) between wireless systems are disclosed. A UE may be located within the coverage of a plurality of wireless systems and may communicate with a first wireless system among the plurality of wireless systems. The plurality of wireless systems may include a WLAN system and a cellular system and/or may be part of a small cell. Metrics of the UE for the plurality of wireless systems may be determined. The metrics may be related to one or more of efficiency, service charge, service subscription, application type, or buffer size. Whether to switch the UE from the first wireless system to another wireless system may be determined based on the metrics. In one design, switching priorities of the UE for the plurality of wireless systems may be determined based on the metrics and may be used to determine whether to switch the UE.
Abstract:
Interactions between radio access network (RAN) -based and legacy wireless local area network (WLAN) mobility is described in which a multi-mode mobile device receives a management indication from a wide area wireless network (WW AN) to manage connectivity with the WLAN, such as in discovery, association, or specific traffic offload for the WLAN. The mobile device obtains a status of its internal WLAN radio and determines whether to process the management indication based on the status. Data offloading is also described in which the mobile device receives an indication from the WW AN to offload data to the WLAN associated with the mobile device. In response, the mobile device suspends application of a current offload policy, which had been received from the core network, based on the indication and transmits its data according to the indication.
Abstract:
Systems, methods, and devices related to estimating backhaul quality, detecting Internet connectivity, and managing server load are described herein. In some aspects, a wireless device is configured to estimate a quality of a communication link. The device includes network interface configured to receive data units. The device further includes a processor configured to monitor the received data units at the network interface. The processor is further configured to determine, for each data unit received via the network interface, whether the data unit originated from a local area network or a non-local network. The processor is further configured to compute a characteristic of the communication link based on data units originating from a non-local network.
Abstract:
Systems, methods, and devices for implementing a communication access policy are described herein. In some aspects, a wireless device is configured to execute a plurality of applications and to communicate with a communication network. The wireless device comprises a receiver configured to receive a plurality of rules specifying how one or more of the plurality of applications should communicate with the communication network. The wireless device comprises a processor configured to delay communication by one or more of the plurality of applications in compliance with the rules. The processor is further configured to allow transmission of the communication by one or more of the plurality of applications after termination of the delay. In one aspect, the processor is configured to separately record communication statistics based on whether the device is in a background or foreground state.
Abstract:
Methods, systems, and devices are described for discovering and associating with WLAN using Request to Send (RTS) and Clear to Send (CTS) frames. A mobile device may identify a WLAN access point associated with a location of the mobile device. The mobile device may transmit a Request to Send (RTS) frame to the access point and receive a CTS frame from the access point. The mobile device may determine that the access point is within range of the mobile device based on the received CTS frame. Some embodiments may provide for transmitting an association request frame to the access point in response to the received CTS frame. The association request frame may be transmitted to the access point in a time period associated with the CTS frame.
Abstract:
Systems and methodologies are described that facilitates managing assignment of available random access resources in order to minimize delay and random access load. A number of available random access resources can be defined by a network or a base station, wherein a user equipment can access the number of available random access resources via an information block. The user equipment can be randomly assigned or uniformly assigned to at least one of the number of available random access resources. Additionally, the network can adjust the defined number of available random access resources based upon reported delay, base station load, or historic load data for a base station
Abstract:
A scheduled data communication system of an access node and terminal supports recurring communications of small data amounts such as Voice over IP (VoIP). In order to make error checking more robust in a random access response (RAR), such as for semi-persistent scheduling (SPS) for VoIP, a portion of a grant or assignment payload has a constraint imposed that can be verified as a condition precedent to determining a valid grant or assignment rather than only relying upon a validity check field, such as a cyclic redundancy check (CRC). Thereby, incorrect validation of a grant or assignment is avoided for dynamic scheduling or for semi-persistent scheduling, the latter causing a persistent error.
Abstract:
Techniques for sending a message for random access by a user equipment (UE) are described. In an aspect, the UE may send the message on a control channel for random access and may send a reserved channel identifier to indicate the message being sent on the control channel. In another aspect, the UE may send the message in a protocol data unit (PDU) and may send additional information (e.g., a buffer status report) in the PDU if it can accommodate the additional information. In yet another aspect, the UE may generate a short message authentication code for integrity protection (MAC-I) for the message. The short MAC-I may have a smaller size and may be used to authenticate the UE. In yet another aspect, the UE may send a UE ID of one of multiple types for random access and may convey the UE ID type via a format field in the message.
Abstract:
Techniques for supporting random access by user equipments (UEs) in a wireless communication system are described. In one design, a UE transmits a random access (RA) preamble for random access. The UE thereafter receives a random access response composed of a first part and a second part. The first part includes a list of N RA preamble IDs for N RA preambles being responded to by the random access response, where N ≥ 1. The second part includes N individual RA responses for the N RA preambles being responded to. The UE processes the first part to detect for an RA preamble ID of the RA preamble transmitted by the UE. If this RA preamble ID is not detected, then the UE skips the second part. Otherwise, the UE processes the second part to obtain an individual RA response for the transmitted RA preamble.