Patent classifications
H04W80/02
Media access control (MAC) address anonymization based on allocations by network controller elements
A method is provided to anonymize the media access control (MAC) address of a client device. The method involves generating a plurality of media access control (MAC) addresses for use by a client device in a network. Policies are defined that determine which one of the plurality of MAC addresses is to be used by the client device. The plurality of MAC addresses allocated for use by the client device are registered with a management entity in the network.
Media access control (MAC) address anonymization based on allocations by network controller elements
A method is provided to anonymize the media access control (MAC) address of a client device. The method involves generating a plurality of media access control (MAC) addresses for use by a client device in a network. Policies are defined that determine which one of the plurality of MAC addresses is to be used by the client device. The plurality of MAC addresses allocated for use by the client device are registered with a management entity in the network.
ELECTRONIC DEVICE AND METHOD FOR CONTROLLING CONNECTION WITH COMMUNICATION NETWORK IN ELECTRONIC DEVICE
According to various embodiments, an electronic device may comprise a wireless communication circuit, an application processor, and a communication processor. The communication processor may be configured to receive data inactivity timer information through the wireless communication circuit from a base station, drive a data inactivity timer based on a first setting value corresponding to the received data inactivity timer information, in a radio resource control (RRC) connected state for the base station, receive a data inactivity-related event from the application processor, change the first setting value to a second setting value in response to the reception of the data inactivity-related event, and release an RRC connection for the base station in response to identifying that the data inactivity timer expires based on the changed second setting value. Other various embodiments are possible as well.
Techniques for in-band repeater control
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a repeater may receive, in a bandwidth part that carries a control interface of the repeater, an indication of a repeater configuration for the repeater. The repeater may communicate, based at least in part on the repeater configuration, with at least one of a base station or a user equipment. Numerous other aspects are provided.
Techniques for in-band repeater control
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a repeater may receive, in a bandwidth part that carries a control interface of the repeater, an indication of a repeater configuration for the repeater. The repeater may communicate, based at least in part on the repeater configuration, with at least one of a base station or a user equipment. Numerous other aspects are provided.
Physical layer parsing for multiple input multiple output (MIMO) punctured transmission and apparatus
A data unit comprising bits to transmit over one or more frequency segments in a frequency range is obtained. An effective bandwidth in each frequency segment of the frequency range is determined, where the effective bandwidth excludes bandwidth of one or more punctured subchannels in a respective frequency segment. Bits are encoded based on the effective bandwidth of each frequency segment followed by parsing the encoded bits to one or more streams and parsing the encoded bits of a stream to the one or more frequency segments. The parsing of the encoded bits of the stream comprises allocating a first number of consecutive encoded bits to a first frequency segment and allocating a second number of consecutive encoded bits to a second frequency segment, wherein the first number and the second number are based on the effective bandwidth of the first frequency segment and the second frequency segment. The encoded bits are modulated and mapped to subcarriers for transmission.
Bandwidth extension indication and negotiation in wireless communications
A first station (STA) and a second STA perform bandwidth negotiation with a bandwidth extension indication. Then the first STA and the second STA communicate wirelessly according to the bandwidth negotiation.
Bandwidth extension indication and negotiation in wireless communications
A first station (STA) and a second STA perform bandwidth negotiation with a bandwidth extension indication. Then the first STA and the second STA communicate wirelessly according to the bandwidth negotiation.
Enhanced LDACS system having different user classes and associated methods
An enhanced L-band Digital Aeronautical Communications System (LDACS) may include LDACS ground stations; and a LDACS airborne stations, each configured to communicate with the LDACS ground stations at a given class of service from among different classes of service. The enhanced LDACS may also include a network controller configured to operate the LDACS ground stations and LDACS airborne stations at the different user classes of service.
Enhanced LDACS system having different user classes and associated methods
An enhanced L-band Digital Aeronautical Communications System (LDACS) may include LDACS ground stations; and a LDACS airborne stations, each configured to communicate with the LDACS ground stations at a given class of service from among different classes of service. The enhanced LDACS may also include a network controller configured to operate the LDACS ground stations and LDACS airborne stations at the different user classes of service.