Patent classifications
H04W48/14
AMPLITUDE CONTROL CAPABILITY INDICATION
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may transmit, to a base station, control signaling indicating a capability of the UE to apply an amplitude control procedure to one or more antenna elements for beamforming and indicating that the UE is applying the amplitude control procedure. The UE may receive a control message scheduling transmission of an uplink message. The UE may generate a signal including the uplink message using the amplitude control procedure, which may adjust one or more amplitudes of the signal. The UE may transmit the signal via the one or more antenna elements. In some cases, UE may indicate an amount of power loss in the signal based on the amplitude control procedure, and the base station may transmit downlink transmissions using a lower order modulation and coding scheme or an applied power boost to compensate for the power loss.
AMPLITUDE CONTROL CAPABILITY INDICATION
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may transmit, to a base station, control signaling indicating a capability of the UE to apply an amplitude control procedure to one or more antenna elements for beamforming and indicating that the UE is applying the amplitude control procedure. The UE may receive a control message scheduling transmission of an uplink message. The UE may generate a signal including the uplink message using the amplitude control procedure, which may adjust one or more amplitudes of the signal. The UE may transmit the signal via the one or more antenna elements. In some cases, UE may indicate an amount of power loss in the signal based on the amplitude control procedure, and the base station may transmit downlink transmissions using a lower order modulation and coding scheme or an applied power boost to compensate for the power loss.
AUTHENTICATION METHOD AND APPARATUS THEREFOR
Embodiments of this application disclose an authentication method and an apparatus therefor, which may be applied to a relay access scenario. The method includes: A first device receives a first request from a second device, where when the second device is a terminal device, the first request is used by the target remote device to request to access a network; or when the second device is a network element, the first request is for requesting to determine whether the target remote device has permission to access the network; and the first device sends first information to the second device, where the first information indicates whether the target remote device has permission to access the network. According to embodiments of this application, it can be determined whether the target remote device has permission to access the network, and this helps improve network security.
AUTHENTICATION METHOD AND APPARATUS THEREFOR
Embodiments of this application disclose an authentication method and an apparatus therefor, which may be applied to a relay access scenario. The method includes: A first device receives a first request from a second device, where when the second device is a terminal device, the first request is used by the target remote device to request to access a network; or when the second device is a network element, the first request is for requesting to determine whether the target remote device has permission to access the network; and the first device sends first information to the second device, where the first information indicates whether the target remote device has permission to access the network. According to embodiments of this application, it can be determined whether the target remote device has permission to access the network, and this helps improve network security.
Network Slice Selection Method, Radio Access Device, and Terminal
A network slice selection method, a radio access device, and a terminal, where the method includes obtaining, by a radio access network (RAN) device, network slice information, sending, by the RAN device, a first message to a terminal, where the first message includes the network slice information, receiving, by the RAN device, a first access request message from the terminal after the terminal selects, based on the network slice information, first attribute information of a first network slice to be accessed by the terminal, and selecting, by the RAN device based on the first attribute information of the first network slice, a second network slice to be accessed by the terminal. The method enables an operator to flexibly configure a network slice, and reduces a communication latency and signaling overheads in a process in which a terminal selects a network slice.
Network Slice Selection Method, Radio Access Device, and Terminal
A network slice selection method, a radio access device, and a terminal, where the method includes obtaining, by a radio access network (RAN) device, network slice information, sending, by the RAN device, a first message to a terminal, where the first message includes the network slice information, receiving, by the RAN device, a first access request message from the terminal after the terminal selects, based on the network slice information, first attribute information of a first network slice to be accessed by the terminal, and selecting, by the RAN device based on the first attribute information of the first network slice, a second network slice to be accessed by the terminal. The method enables an operator to flexibly configure a network slice, and reduces a communication latency and signaling overheads in a process in which a terminal selects a network slice.
Access control in new radio
A method for a wireless device to establish an RRC connection with a network for accessing a network slice of the network is provided. The method receives, from the network, an access control parameter configuration of an access category associated with the network slice while the wireless device is in a Radio Resource Control (RRC) inactive state (RRC INACTIVE). The method then initiates a random access procedure for establishing the RRC connection with the network to access the network slice according to an access control indicator of the access control parameter configuration of the access category.
Access control in new radio
A method for a wireless device to establish an RRC connection with a network for accessing a network slice of the network is provided. The method receives, from the network, an access control parameter configuration of an access category associated with the network slice while the wireless device is in a Radio Resource Control (RRC) inactive state (RRC INACTIVE). The method then initiates a random access procedure for establishing the RRC connection with the network to access the network slice according to an access control indicator of the access control parameter configuration of the access category.
Method and apparatus for receiving system information
A method for providing system information (SI) performed by a base station (BS) is provided. The method includes: broadcasting a system information block type 1 (SIB1) associated with a cell; receiving, from a user equipment (UE), a first message including a common control channel (CCCH) service data unit (SDU), the CCCH SDU including a radio resource control (RRC) SI request message; and transmitting, to the UE, a medium access control (MAC) control element (CE) including a UE contention resolution identity that matches a portion of the CCCH SDU. The MAC CE enables a MAC entity of the UE to indicate reception of an acknowledgment for the RRC SI request message to an RRC entity of the UE. The SIB1 does not include information related to a Random Access (RA) resource specific to SI requested by the RRC SI request message.
DISCONTINUOUS RECEPTION (DRX) ENHANCEMENTS IN LTE SYSTEMS
Embodiments of a system and method for providing DRX enhancements in LTE systems are generally described herein. In some embodiments, a system control module is provided for controlling communications via a communications interface. A processor is coupled to the system control module and is arranged to implement an inactivity timer and an on-duration timer for determining an active time for monitoring subframes on the physical downlink control channel for control signals, the processor further monitoring subframes after the active time.