Abstract:
PROBLEM TO BE SOLVED: To provide systems and methods for identifying an address of a femto node during handoff of an access terminal from a femto node to a macro node.SOLUTION: The femto node assigns a unique identifier to the access terminal. The access terminal passes the unique identifier to the macro node. The macro node partitions the unique identifier to determine the address of the femto node. In another embodiment, the femto node registers its address with a domain name system. The macro node queries the domain name system to obtain the address of the femto node. In another embodiment, the macro node sends the unique identifier to a proxy. The proxy partitions the unique identifier to determine the address of the femto node (2370).
Abstract:
PROBLEM TO BE SOLVED: To provide efficient frequency assignment for mobile terminals in coexisting wireless communication systems.SOLUTION: The coexisting wireless communication systems comprise a macro communication system and a localized communication system. Two priority lists are defined, a first list comprising a first entry relating to the macro communication system and a second entry relating to the localized communication system, the first and second entries each listing at least one common frequency. Based on the first list, a mobile terminal uses communication protocols associated with the localized communication system.
Abstract:
PROBLEM TO BE SOLVED: To provide a service for Public Safety (PS) and Law Enforcement (LE) users on commercial wireless networks which assure them access to packet data services.SOLUTION: A service request is application based. The applications that are for official use, by the PS/LE users, may have a reserved priority level associated with them. The reserved priority level may be higher than a normal commercial user. The network can use the priority to distinguish users, and dynamically allocate and optimize network resources. The network can use priority level information to perform access, admission, and congestion control. The PS/LE users can use the official applications while on duty and un-official ones while off duty, thus, additionally freeing up network resources.
Abstract:
PROBLEM TO BE SOLVED: To facilitate applying offsets and/or selectable hysteresis values to favor access points in cell reselection.SOLUTION: In measuring and ranking surrounding access points in reselection, offsets are applied to favorable access points to facilitate cell reselection thereto. The offset can positively affect measurements, and thus ranking as well, in some cases. Negative offsets can also be applied to lower measurements of some access points. Hysteresis values can be applied in measuring current cells to prevent frequent reselection. The hysteresis values can be selected on the basis of a type of the current cell or related access point to expand the coverage area where desired.
Abstract:
PROBLEM TO BE SOLVED: To provide systems and methods for identifying an address of a femto node during handoff of an access terminal from a femto node to a macro node.SOLUTION: The femto node assigns a unique identifier to the access terminal. The access terminal passes the unique identifier to the macro node 1705. The macro node partitions the unique identifier to determine the address of the femto node 1710, 1712. In another embodiment, the femto node registers its address with a domain name system 1760. The macro node queries the domain name system to obtain the address of the femto node.
Abstract:
PROBLEM TO BE SOLVED: To provide a method for controlling access to restricted access nodes.SOLUTION: Provisioning and access control for communication nodes involve assigning identifiers to sets of nodes, where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. Provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. Provisioning a node involves providing a preferred roaming list for the node. A node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
Abstract:
PROBLEM TO BE SOLVED: To provide a system and a method that facilitate cell search, selection, and reselection within a wireless communication network that includes a home node base station (home node B).SOLUTION: User equipment (UE) can detect a home node B and communicate the identification to a macro network that includes at least one node base station (node B). The detected home node B and the node B can be hierarchically structured in order to prioritize connectivity with the home node B over the node B. The prioritization can be implemented by broadcasting home node B parameters and macro node B parameters having identification information using a system information block (SIB).
Abstract:
Systems and methods for identifying an address of a femto node (810) during handoff of an access terminal from a femto node (810) to a macro node (805). In one embodiment, the femto node assigns a unique identifier to the access terminal. The access terminal passes the unique identifier to the macro node (1110). The macro node partitions the unique identifier to determine the address of the femto node (1150), (1160), (1170). In another embodiment, the femto node registers its address with a domain name system (1760). The macro node queries the domain name system to obtain the address of the femto node (2040). In another embodiment, the macro node sends the unique identifier to a proxy (2170). The proxy partitions the unique identifier to determine the address of the femto node (2370).
Abstract:
Provisioning and access control for communication nodes (110) involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points (102, 104) and access terminals (106, 108) that are authorized to receive service from the restricted access points. Access control (1790, 1792) may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.