Abstract:
Techniques for sending data during handover with Layer (2) tunneling are described. In one design, a user equipment (UE) sends first Layer (2) packets to a source base station prior to handover to a target base station. The UE sends at least one second Layer (2) packet to the target base station, which identifies the second Layer (2) packet(s) as being intended for the source base station and thus forwards the second Layer (2) packet(s) to the source base station via a Layer (2) tunnel. The UE sends third Layer (2) packets to the target base station after the handover. The target base station processes the third Layer (2) packets to obtain IP packets and sends the IP packets to a serving gateway after a trigger condition, which may be defined to achieve in-order delivery of IP packets from the source and target base stations to the serving gateway.
Abstract:
Systems and methodologies are described that facilitate security activation within a specified security activation time. Thus, where handover occurs or is initiated within the activation time, security keys can be activated in such a way as to not be substantially affected by the handover. In one example, a handover time can be set to occur beyond the security activation time to ensure the security activation happens first. Additionally, a handover command can comprise security keys that can be activated upon handover in another example. Moreover, in non-real-time contexts, dummy packets can be transmitted to allow timer operability with packet sequence numbering, or security activation times can be substantially ignored by utilizing a verification process.
Abstract:
An inter-system handover system for a wireless communication system supports hand-down and hand-up of user equipment (UE) to different radio access technologies, including synchronous and asynchronous systems. Latency and handover connection failures are reduced by an access node (nodeB) broadcasting information about neighboring systems (targets) when the UE reception (RX) capability is both inside or outside the reception range of the target. A single RX chain is sufficient, although transitioning between a wireless wide area network (WWAN) to a wireless local area network may (WLAN) may advantageously benefit from simultaneous operation on two Rx chains. Optimized list of neighboring RAT systems (targets) are broadcast from the network, including measurement parameters and reporting instructions. Thereby, UE-driven reporting minimizes latencies. UE reports other-system searches to network only if needed for a handover. In addition, handover requests can be bundled with other-system measurement information, if necessary, for additional efficiencies.
Abstract:
Techniques for performing ciphering and re-ordering using a single full sequence number are described. A transmitter ciphers input packets to obtain ciphered packets, with each input packet being ciphered with a full sequence number. The transmitter generates output packets for the ciphered packets, with each output packet including a partial sequence number used for re-ordering and derived from the full sequence number. The full sequence number may be incremented for each input packet or each byte of each packet. The partial sequence number may be used as a sequence number for RLC and may be used for re-ordering, duplicate detection, error correction, and/or other functions. A receiver performs the complementary processing, re-orders received packets based on the partial sequence number included in each packet, and deciphers the received packets using the partial sequence number included in each received packet.
Abstract:
Methods, systems and apparatus for dispersing a group of user equipment (UEs) concentrated on a single channel is disclosed. After receiving a disperse command the UEs select a channel, and then select a cell. The channel selection may be performed using a random or pseudorandom function. The cell selection may be performed prior to camping on the cell. Prior to camping the UEs may test the acceptability of a candidate cell and/or may perform a cell reselection. The result of the dispersion is that the UEs are distributed amongst many channels (a, b, c, and d), where reference are found in Figures 1A and 1B.
Abstract:
Transmission techniques are provided that improve service continuity and reduce interruptions in delivery of content that can be caused by transitions that occur when the User Equipment (UE) moves from one cell to the other, or when the delivery of content changes from a Point-to-Point (PTP) connection to a Point-to-Multipoint (PTM) connection in the same serving cell, and vice-versa. Such transmission techniques enable seamless delivery of content across cell borders and/or between different transmission schemes such as Point-to-Multipoint (PTM) and Point-to-Point (PTP). Mechanisms for adjusting different streams and for recovering content from each data block during such transitions are also provided so that data is not lost during a transition. In addition, mechanisms for realigning data during decoding at a receiving terminal are also provided.
Abstract:
Transmission techniques are provided that improve service continuity and reduce interruptions in delivery of content that can be caused by transitions that occur when the User Equipment (UE) moves from one cell to the other, or when the delivery of content changes from a Point-to-Point (PTP) connection to a Point-to-Multipoint (PTM) connection in the same serving cell, and vice-versa. Such transmission techniques enable seamless delivery of content across cell borders and/or between different transmission schemes such as Point-to-Multipoint (PTM) and Point-to-Point (PTP). Mechanisms for adjusting different streams and for recovering content from each data block during such transitions are also provided so that data is not lost during a transition. In addition, mechanisms for realigning data during decoding at a receiving terminal are also provided.
Abstract:
A method and an apparatus for secure registration for a multicast-broadcast-multimedia system (MBMS) are disclosed. A random number is generated by a broadcast-multicast-service center (BM-SC) and broadcast to user equipment in the coverage area of a radio access network (RAN). A memory module or smart card (UICC) in the user equipment generates a radio access network key (RAK) which is a function of the random number and a key selected from the group consisting of a public land mobile network key (PK) and a broadcast access key (BAK), and then generates a temporary registration key (RGK) as a function of the RAK, a service identification number and a user identification number, for example, P-TMSI, which may be extracted by the RAN to authenticate the registration as legitimate.
Abstract:
Method and apparatus for reducing interference in a wireless communication system when the source of interference is a deterministic component of the system. The method comprises the steps of receiving transmissions on a plurality of channels, each associated with a block error rate; selecting a channel for application to outer loop power control based on the error rates; and performing outer loop power control based on the selected channel, which is the dedicated control channel. The method can be applied in W-CDMA systems.
Abstract:
Systems and methodologies are described that facilitate selectively and simultaneously establishing multiple bearers in wireless communication networks. A core network entity in a wireless network can transmit a bearer establishment request to an access point comprising a list of bearers to establish with a related mobile device. The bearer establishment request comprising list of bearers includes separate non-access stratum (NAS) messages corresponding to each bearer in the list. The separate NAS messages can be linked to each bearer entry in the list. The access point can receive the list and attempt to initialize one or more radio bearers in the list. Since the NAS messages individually correspond to a given bearer, the access point can forward NAS messages to the mobile device only for bearers that are successfully initialized allowing selective establishment thereof. In addition, the access point can provide initialization status for the individual bearers to the core network.