Patent classifications
H04W80/02
Systems and methods for bandwidth part selection initiated by a user equipment
A user equipment transmits user equipment information, associated with a communication of the user equipment, to permit a base station to select a first bandwidth part, a second bandwidth part, or a third bandwidth part. The user equipment is configured to communicate by the first bandwidth part, the second bandwidth part, and the third bandwidth part. The user equipment receives, from the base station, an instruction to monitor the first bandwidth part, the second bandwidth part, or the third bandwidth part. The instruction is selected based on the user equipment information. The user equipment monitors, based on the instruction, the first bandwidth part, the second bandwidth part, or the third bandwidth part.
SYSTEMS, METHODS AND DEVICES FOR DIRECT COMMUNICATION
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP) addressing. The non-IP D2D PDCP-encapsulated communication can further include two forms of secure data transfer. A first non-IP D2D PDCP-encapsulated communication can be a negotiated non-IP D2D PDCP-encapsulated communication. A second non-IP D2D PDCP-encapsulated communication can be a non-negotiated non-IP D2D communication. The non-negotiated non-IP D2D PDCP-encapsulated communication can include a common key management server (KMS) version and a distributed KMS version. The encapsulated communication can be used with various protocols, including a PC5 protocol (such as the PC5 Signaling Protocol) and wireless access in vehicular environments (WAVE) protocols.
SYSTEMS, METHODS AND DEVICES FOR DIRECT COMMUNICATION
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP) addressing. The non-IP D2D PDCP-encapsulated communication can further include two forms of secure data transfer. A first non-IP D2D PDCP-encapsulated communication can be a negotiated non-IP D2D PDCP-encapsulated communication. A second non-IP D2D PDCP-encapsulated communication can be a non-negotiated non-IP D2D communication. The non-negotiated non-IP D2D PDCP-encapsulated communication can include a common key management server (KMS) version and a distributed KMS version. The encapsulated communication can be used with various protocols, including a PC5 protocol (such as the PC5 Signaling Protocol) and wireless access in vehicular environments (WAVE) protocols.
Two-step random access procedure in next generation wireless networks
Some of the present implementations provide a method for a user equipment (UE) for performing a random access (RA) procedure. The method receives, at the UE, an RA configuration and a reference signal received power (RSRP) threshold. The method then determines whether a detected RSRP exceeds the RSRP threshold once the RA procedure is initiated. If the detected RSRP exceeds the RSRP threshold, the method performs a two-step RA procedure.
Two-step random access procedure in next generation wireless networks
Some of the present implementations provide a method for a user equipment (UE) for performing a random access (RA) procedure. The method receives, at the UE, an RA configuration and a reference signal received power (RSRP) threshold. The method then determines whether a detected RSRP exceeds the RSRP threshold once the RA procedure is initiated. If the detected RSRP exceeds the RSRP threshold, the method performs a two-step RA procedure.
Method and apparatus for triggering uplink buffer status report in a wireless communication system
Methods and devices are disclosed from the perspective of a first wireless transmit/receive unit (WTRU). In one method, the method includes triggering a first buffer status report (BSR), wherein the first BSR indicates an estimated amount of data expected to arrive.
Method and apparatus for triggering uplink buffer status report in a wireless communication system
Methods and devices are disclosed from the perspective of a first wireless transmit/receive unit (WTRU). In one method, the method includes triggering a first buffer status report (BSR), wherein the first BSR indicates an estimated amount of data expected to arrive.
Wireless network access to wireless network slices over a common radio channel
A wireless communication network serves wireless user devices over a radio channel that is allocated into subchannels for wireless network slices. A wireless access node schedules resource blocks from the subchannels to the wireless user devices based on their wireless network slices. The wireless access node detects a subchannel has available resource blocks and other subchannels need the available resource blocks. The wireless access node schedules the available resource blocks to the wireless user devices that need the available resource blocks and that use a higher priority wireless network slice. The wireless access node wirelessly exchanges user data with the wireless user devices over the scheduled resource blocks and exchanges the user data with the wireless network slices. The wireless network slices exchanging at least some of the user data with external systems.
Wireless network access to wireless network slices over a common radio channel
A wireless communication network serves wireless user devices over a radio channel that is allocated into subchannels for wireless network slices. A wireless access node schedules resource blocks from the subchannels to the wireless user devices based on their wireless network slices. The wireless access node detects a subchannel has available resource blocks and other subchannels need the available resource blocks. The wireless access node schedules the available resource blocks to the wireless user devices that need the available resource blocks and that use a higher priority wireless network slice. The wireless access node wirelessly exchanges user data with the wireless user devices over the scheduled resource blocks and exchanges the user data with the wireless network slices. The wireless network slices exchanging at least some of the user data with external systems.
System and method for reliable transmission over network resources
A method includes receiving a first assignment for a first transmission with a first hybrid automatic repeat request (HARQ) process identifier (process ID) in a first network resource, receiving a second assignment for a second transmission with a second HARQ process ID in a second network resource, wherein the first network resource and the second network resource differ in a domain other than a time domain, detecting an indication indicating that the first HARQ process ID and the second HARQ process ID map to a same transmission block (TB), and communicating with an access node, a transmission associated with at least one of the first HARQ process ID or the second HARQ process ID.