Abstract:
PROBLEM TO BE SOLVED: To provide systems and methodologies that facilitate supporting multiple access modes for a base station in a wireless communication environment.SOLUTION: The base station can leverage a hybrid, closed, or open access mode. A whitelist of a mobile device that successfully registers on the base station can be selectively updated to include a CSG ID of the base station (708). For example, the CSG ID of the base station can be added to the whitelist when the base station operates in a closed access mode, while adding the CSG ID can be skipped when the base station operates in a hybrid access mode. Additionally or alternatively, a CSG ID and an access mode indicator can be transmitted from a base station to a network node for implementing access control and/or paging optimization at the network node.
Abstract:
PROBLEM TO BE SOLVED: To enhance uplink (UL) coverage in interference scenarios.SOLUTION: The invention relates to communication in a wireless network in which user equipment (UE) associated with a first evolved Node B (eNB) experiences interference from a second eNB. The first eNB of the wireless network and a second eNB of the wireless network negotiate for partitioning of subband resources on an uplink. A first subset of the subband resources is assigned to the first eNB, and a second subset of the subband resources is assigned to the second eNB. The user equipment (UE) determines an uplink subframe n containing a protected subband for uplink transmission, decodes a downlink control channel received during a protected downlink subframe, and transmits data during the uplink subframe n on the protected subband.
Abstract:
PROBLEM TO BE SOLVED: To provide methods and apparatus for implementing Automatic Neighbor Relation (ANR) functions for relay nodes (RNs), home base stations (e.g., home evolved Node Bs (HeNBs), and related entities (e.g., donor evolved Node Bs (DeNBs) and HeNB gateways).SOLUTION: X2 is designed to be an end-to-end protocol between two evolved Node Bs (eNBs). However, for the case of RNs or HeNBs, this protocol may involve a proxy function (e.g., where the DeNB acts a proxy for the RN). This creates several issues, such as how to manage a potentially very large set of cells under a gateway and how to route S1 messages used for X2 endpoint discovery. Therefore, certain aspects of the present disclosure generally relate to methods and apparatus for maintaining the X2 connections intelligently and hiding the large number of nodes from the X2 endpoints on the basis of various triggers.
Abstract:
PROBLEM TO BE SOLVED: To provide a method for controlling access to restricted access nodes.SOLUTION: Provisioning and access control for communication nodes involve assigning identifiers to sets of nodes, where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. Provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. Provisioning a node involves providing a preferred roaming list for the node. A node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
Abstract:
An indication is used to control how message service information is routed over different domains. For example, an access terminal may be configured with an indication that indicates that a message service is preferred to be invoked over an IP domain or that the message service is not be invoked over the IP domain. The access terminal then delivers message service information based on the value of the indication. In some cases, a network entity generates the indication and sends the indication to the access terminal. In some cases, a domain for delivery of message service information is selected based on a domain that was selected for particular type of traffic.
Abstract:
Problems caused by interaction between paging optimization and synchronizing CSG information are mitigated by setting a network indication indicating, for example, that a subscriber is no longer a member of a CSG, but the network has not yet received confirmation that an access terminal associated with the subscriber has been informed of this. A timer-based scheme may be employed for removing a CSG ID from the subscriber information for a subscriber once it is determined that the subscriber is no longer a member of the CSG. In addition, a temporary member of a CSG may determine whether it is still a member of a CSG upon expiration of a CSG timer. Also, the frequency with which an access terminal registers may be changed based on various criteria. Furthermore, an allowed CSG list may be selectively included in a page message depending on the destination of the page message.
Abstract:
Paging load and/or registration load in a network is reduced by using different types of identifiers to specifying which nodes page an access terminal in the network. In some aspects, the network maintains a list that specifies that certain individual nodes (e.g., cells or sectors) are to page a given access terminal and/or that one or more zones (e.g., tracking areas) are to page the access terminal. In some aspects, an access terminal in a network may be configured to provide a forward-looking paging list to the network. The list provided by an access terminal may specify different types of node identifiers (e.g., individual node identifiers, subscriber groups, etc.). The network may then use the list to determine which nodes are to page a given access terminal such that when the access terminal moves to a different node, that node may already be configured to page the access terminal. In some aspect paging load and registration load are managed in a deployment that includes different types of access points. For example, access points of a first type (e.g., macro nodes) may provide service over relatively large coverage areas and access points of a second type (e.g., femto nodes) may provide service over smaller coverage areas and/or provide restricted service.
Abstract:
An indication is used to control how message service information is routed over different domains. For example, an access terminal (102, 1402) may be configured with an indication that indicates that a message service is preferred to be invoked over an IP domain (112) or that the message service is not be invoked over the IP domain (112). The access terminal (102, 1402) then delivers message service information based on the value of the indication. In some cases, a network entity (106) generates the indication and sends the indication to the access terminal (102, 1402). In some cases, a domain for delivery of message service information is selected based on a domain that was selected for particular type of traffic.