METHODS AND APPARATUS FOR TRANSFERRING A MOBILE DEVICE FROM A SOURCE eNB TO A TARGET eNB

ABSTRACT

A method used in a wireless communication system including a plurality of cells, the method includes transmitting to a mobile device from a source enhanced node B, and sending a Packet Data Convergence Protocol (PDCP) status report to a target enhanced node B, Another method includes transmitting to &amp; mobile device from a source enhanced node B, and sending a Packet Data Convergence Protocol (PDCP) status report to the source enhanced node B prior to a re-pointing, to a target enhanced node B.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional Patentapplication Ser. No. 60/868,488 entitled “ENHANCED RLC STATUS REPORTINGFOR LTE” which was filed Dec. 4, 2006. The entirety of theaforementioned applications is herein incorporated by reference.

BACKGROUND

I. Field

The following description relates generally to wireless communications,and more particularly to providing a mechanism for transferring a mobiledevice from a source enhanced node B (eNB) to a target eNB.

II. Background

Wireless communication systems are widely deployed to provide varioustypes of communication content such as voice, data, and so on. Thesesystems may be multiple-access systems capable of supportingcommunication with multiple users by sharing the available systemresources (e,g., bandwidth and transmit power). Examples of suchmultiple-access systems include code division multiple access (CDMA)systems, time division multiple access (TDMA) systems, frequencydivision multiple access (FDMA) systems, 3GPP LTE systems, andorthogonal frequency division multiple access (OFDMA) systems.

Generally, a wireless multiple-access communication system can

simultaneously support communication for multiple wireless terminals.Each terminal communicates with one or more base stations viatransmissions on the forward and reverse links. The forward link (ordownlink) refers to the communication link from the base stations to theterminals, and the reverse link (or uplink) refers to the communicationlink from the terminals to the base stations. This communication linkmay be established via a single-in-single-out (SISO),multiple-in-signal-out (MISO), or a multiple-in-multiple-out (MIMO)system.

Wireless communication systems are widely deployed to provide various

types of communication content such as, for example, voice, data, and soon. Typical wireless communication systems may be multiple-accesssystems capable of supporting communication wife multiple users bysharing available system resources (e.g., bandwidth, transmit power, . .. ). Examples of such multiple-access systems may include code divisionmultiple access (CDMA) systems, time division multiple access (TDMA)systems, frequency division multiple access (FDMA) systems, 3GPP LTEsystems, orthogonal frequency division multiplexing (OFDM), localizedfrequency .division, multiplexing (LFDM), orthogonal frequency divisionmultiple access (OFDMA) systems, and the like.

In a wireless communication system, a Node B (or base station) orenhanced Node B (eNB) may transmit data to a user equipment (UE) on thedownlink and/or receive data from the UE on the uplink. The .downlink(or forward link) refers to the communication link from the eNB to theUE, and the uplink (or reverse link) refers to the communication linkfrom the UE to the Node B. The eNB may also send control information(e.g., assignments of system resources) to the UE. Similarly, the UE maysend control information to the eNB to support data transmission on thedownlink and/or for other purposes. As the mobile device is moved it isdesirable to switch eNBs. For example, fee mobile device is incommunication with a source eNB, and then, the device is approachinganother eNB, the target eNB, and it is desirable to handover from thesource to the target. This handover is also termed herein a re-pointing.

In 3GPP LTE (Long Term Evolution) which is the name given to a projectwithin the Third Generation Partnership Project to improve the UniversalMobile Telecommunication System (UMTS) mobile phone standard to copewith future requirements. In LTE, it is currently agreed that during eNBre-pointing the radio link-control (RLC) Protocol Data Units (PDU)s willnot be forwarded from the source eNB to the target eNB. Additionally theRLC can be reset at each eNB re-pointing event. By reset, it is meantthat any RLC Service Data Units (SDU)s that were not completelydelivered by RLC at the source eNB will need to be retransmitted at thetarget eNB.

Since RLC operation is not continuous at eNB re-pointing, special careneed be taken to avoid wasting too much radio capacity and creatingpotential user plane interruption during the re-pointing or transferringprocedure,

SUMMARY

The following presents a simplified summary of one or more embodimentsin order to provide a basic understanding of such embodiments. Thissummary is not an extensive overview of all contemplated embodiments,and is intended to neither identify key or critical elements of allembodiments nor delineate the scope of any or all embodiments. Its solepurpose is to present some concepts of one or more embodiments in asimplified form as a prelude to the more detailed description that ispresented later.

In accordance with one exemplary non-limiting embodiment, a method usedin a wireless communication system including a plurality of cells, themethod includes transmitting to a mobile device-front a source enhancednode B, and sending a Packet Data Convergence Protocol (PDCP) statusreport to a target enhanced, node B from the mobile device. Because thetarget enhanced node B receives the status report, Only the missing RLCSDUs (PDCP packets) need to be sent and this avoids transmittingduplicated RLC SDUs at the target eNB to the mobile device. In anotherexemplary non-limiting embodiment a method includes transmitting to amobile device from a source enhanced node B, and sending a Packet DataConvergence Protocol (PDCP) status report to the source enhanced node Bprior to a re-pointing to s target enhanced node B.

The source-enhanced node B can use a X2 logical network (that connectsthe enhanced node Bs together) to inform the target enhanced node Bwhich PDCP packets to send. Accordingly, a mobile device can be handedoff from a source enhanced node B to a target enhanced node B with someof the RLC SDUs being sent to the mobile device from the source enhancednode B and some of the RLC SDUs being sent to tire mobile device fromthe target enhanced node B. In one exemplary non-limiting embodiment thesource stops sending any RLC SDUs once the handoff begins. If the sourceenhanced node B receives the PDCP status report form the mobile devicebefore re-pointing, the source enhanced node B does not need to forwardthe RLC SDUs that were already received by the mobile devices and thissaves bandwidth of the X2 logical layer.

In accordance with an aspect, apparatus includes a mobile device with a

processor configured to send a Packet Data Convergence Protocol (PDCP)status report to a target enhanced node B after re-pointing to thetarget enhanced node B. The processor is also configured to .send atleast one PDCP sequence number to the target, enhanced node B, Theprocessor is further configured to receive the RLC SDUs from a sourceenhanced node B and ignore the RLC SDUs from the source enhanced node B.The processor can be configured to send a handoff Confirm Message to thetarget enhanced node B.

To the accomplishment of the foregoing and related ends, the one or moreembodiments comprise the features hereinafter fully described andparticularly pointed out in the claims. The following .description andthe annexed drawings set forth, in detail certain illustrative aspectsof the one or more embodiments. These aspects are indicative, however,of but a few of the various ways in which the principles of variousembodiments may be employed and the described embodiments are intendedto include all such aspects and their equivalents.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a wireless communication system in accordance withvarious aspects set forth herein.

FIG. 2 depicts an example communications apparatus for employment with awireless communications environment in accordance with one or moreaspects.

FIG. 3 illustrates an environment with a UE and an eNB in accordancewith one or more aspects.

FIG. 4 illustrates that each PDCP Packet Data Unit PDU includes a headerand a Service Data Unit (SDU) in accordance with one or more aspects.

FIG. 5 illustrates a RLC PDU including a RLC header and a plurality ofRLC SDUs in accordance with one or more aspects.

FIG. 6 illustrates an environment including a plurality of UEs synced toa source eNB and a target eNB in accordance with one or more aspects.

FIG. 7 illustrates a wireless communication system with multiple basestations and multiple terminals, such as may be utilized in conjunctionwith one or more aspects.

FIG. 8 is an illustration of an ad hoc or unplanned/semi-plannedwireless communication environment in accordance with various aspects.

FIG. 9 illustrates a methodology including transmitting to a mobiledevice from a source enhanced node B in accordance with one or moreaspects.

FIG. 10 illustrates a methodology including transmitting to a mobiledevice from a source enhanced node B in accordance with one or moreaspects.

FIG. 11 illustrates a methodology wherein a source enhanced node B and atarget enhanced node are in communication with a mobile device inaccordance with one or more aspects.

FIG. 12 illustrates an environment 1200 wherein a source enhanced, nodeB and a target enhanced node B are in communication with a mobile devicein accordance with one or more aspects.

FIG. 13 provides a schematic diagram of an exemplary networked ordistributed computing environment in accordance with one or moreaspects.

FIG. 14 illustrates an example of a suitable computing systemenvironment in accordance with one or more aspects.

FIG. 15 depicts an exemplary access terminal that can provide feedbackto communications networks, in accordance with one or more aspects.

FIG. 16 illustrates an apparatus operable in a wireless communicationsystem.

DETAILED DESCRIPTION

Various aspects are now described with reference to the drawings,wherein like reference numerals are used to refer to like elementsthroughout. In the following description, for purposes of explanation,numerous specific details are set forth in order to provide a thoroughunderstanding of one or more aspects. It may be evident, however, thatsuch aspect(s) may be practiced without these specific details. In otherinstances, well-known structures and devices are shown in block diagramform in order to facilitate describing one or more aspects.

In accordance with one exemplary non-limiting embodiment, a method usedin a wireless communication system including a plurality of ceils, themethod includes transmitting to a mobile device from a source enhancednode B, and sending a Packet Data Convergence Protocol (PDCP) statusreport to a target enhanced node B from the mobile device. Because thetarget enhanced node B receives the status report, only the missing PDCPpackets need to be resent C. In another exemplary non-limitingembodiment, a method includes transmitting to a mobile device from asource enhanced node B, and sending a Packet Data Convergence Protocol(PDCP) status report to the source enhanced node B prior to are-pointing to a target, enhanced node B. The source enhanced node B canuse the X2 logical network to inform the target enhanced node B whichPDCP packets to send. Accordingly, a mobile device can be handed offfrom a source enhanced node B to a target enhanced node B with some ofthe RLC SDUs being sent to the mobile device from the source enhancednode B and some of the RLC SDUs being sent to the mobile device from thetarget enhanced node B. In one exemplary non-limiting embodiment thesource stops sending any RLC SDUs once the handoff starts. If the sourceenhanced node B receives the PDCP status report form the mobile devicebefore re-pointing, the source enhanced node B does not need to forwardthe RLC SDUs that were already received by the mobile devices and thissaves bandwidth of the X2 logical layer.

In accordance with an aspect, apparatus includes a mobile device with aprocessor configured to send a Packet Data Convergence Protocol (PDCP)status report to a target enhanced node B after re-pointing to thetarget enhanced node B. The processor is also configured to send atleast one PDCP sequence number to the target enhanced node B. Theprocessor is further configured to receive the RLC SDUs from a sourceenhanced node B and ignore the RLC SDUs from the source enhanced node B.The processor can be configured to send a handoff confirm message to thetarget enhanced node B.

In addition, various aspects of the disclosure are described below. Itshould be apparent that the teaching herein may be embodied in a widevariety of forms and that any specific structure and/or functiondisclosed herein is merely representative. Based on the teachings hereinone skilled in the art should appreciate that an aspect disclosed hereinmay be implemented independently of any other aspects and that, two ormore of these aspects may be combined in various ways. For example, anapparatus may be implemented and/or a method practiced using any numberof the aspects set forth herein. In addition, an apparatus, may beimplemented and/or a method practiced using other structure and/orfunctionality in addition to or other than one or more of the aspectsset forth herein. As an example, many of the methods, devices, systems,and apparatuses described herein, are descried in the context of anad-hoc or unplanned/semi-planned deployed wireless communicationenvironment that provides repeating ACK channel in an orthogonal system.One skilled in the art should, appreciate that similar techniques couldapply to other communication environments.

As used in this application, the terms “component,” “system,” and thelike are intended to refer to a computer-related entity, eitherhardware, software, software in execution, firmware, middle ware,microcode, and/or any combination thereof. For example, a component maybe, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution, a program,and/or a computer. One or more components may reside within a processand/or thread of execution and a component may be localized on onecomputer and/or distributed between two or more computers. Also, thesecomponents can execute from various computer readable media havingvarious data structures stored thereon. The components may communicateby way of local and/or remote processes such as in accordance with asignal having one or more data, packets (e.g., data from one componentinteracting with another component in a local system, distributedsystem, and/or across a network such as the Internet with other systemsby way of the signal). Additionally, components of systems describedherein may be rearranged and/or complemented by additional components inorder to facilitate achieving the various aspects, goals, advantages,etc., described with regard thereto, and are not limited to the preciseconfigurations set form in a given figure, as will be appreciated by oneskilled in the art.

Furthermore, various aspects are described herein in connection with asubscriber station. A subscriber station can also be called a system, asubscriber unit, mobile station, mobile, remote station, remoteterminal, access terminal, -user terminal, user agent, a user device, oruser equipment. A subscriber station may be a cellular telephone, acordless telephone, a Session initiation Protocol (SIP) phone, awireless local loop (WLL) station, a personal digital assistant (PDA), ahandheld device having wireless connection capability, or otherprocessing device connected to a wireless modem or similar mechanismfacilitating wireless communication with a processing device.

Moreover, various aspects or features described herein may beimplemented as a method, apparatus, or article of manufacture usingstandard programming and/or engineering techniques. The term “article ofmanufacture” as used herein is intended to encompass a computer programaccessible from any computer-readable device, carrier, or media, Forexample, computer-readable media can include but are not limited tomagnetic storage devices (e.g., hard disk, floppy disk, magnetic strips. . . ), optical disks (e.g., compact disk (CD), digital versatile disk(DVD) . . . ), smart cards, and flash memory devices (e.g., card, stick,key drive . . . ). Additionally, various storage media described hereincan represent one or more devices and/or other machine-readable mediafor storing information. The term “machine-readable medium” can include,without being limited to, wireless channels, and various other mediacapable of storing, containing, and/or carrying instructions) and/ordata.

Moreover, the word “exemplary” is used herein to mean serving as anexample, instance, or illustration. Any aspect or design describedherein as “exemplary” is not necessarily to be construed as preferred oradvantageous over other aspects or designs. Rather, use of the wordexemplary is intended to present concepts in a concrete fashion. As usedin this application, the term “or” is intended to mean an inclusive “or”rather than an exclusive “or”. That is, unless specified otherwise, orclear from context, “X employs A or B” is intended to mean any of thenatural inclusive permutations. That is, if X employs A; X employs B; orX employs both A and B, then “X employs A or B” is satisfied under anyof the foregoing instances. In addition, the articles “a” and “an” asused in this application and the appended claims should generally beconstrued to mean “one or more” unless specified otherwise or clear fromcontext to be directed to a singular form.

As used herein, the terms to “infer” or “inference” refer generally tothe process of reasoning about or inferring states of the system,environment, and/or user from a set of observations as captured viaevents and/or data. Inference can be employed to identify a specificcontext or action, or can generate a probability distribution overstates, for example. The inference can be probabilistic—that is, thecomputation of a probability distribution over states of interest basedon a consideration of data and events. Inference can also refer totechniques employed for composing higher-level events from a set ofevents and/or data. Such inference results in the construction of newevents or actions from a set of observed events and/or stored eventdata, whether or not the events are correlated in close temporalproximity, and whether the events and data come from one or severalevent and data sources.

The eNB transferring techniques from source to target described hereinmay be used for various wireless communication systems such as CDMA,TDMA, FDMA, OFDMA, and SC-FDMA systems. The terms “system” and “network”are often used interchangeably. A CDMA system may implement a radiotechnology such as Universal Terrestrial Radio Access (UTRA), edma2000,etc. UTRA includes Wideband CDMA (W-CDMA) and Low Chip Rate (LCR).Cdma2000 covers IS-2000, IS-95 and IS-856 standards. A TDMA system mayimplement a radio technology such as Global System for MobileCommunications (GSM). An OFDMA system may implement a radio technologysuch as Evolved UTRA (E-UTRA), IEEE 802.11, IEEE 802.16, IEEE 802.20,Flash-OFDMO, etc. These various radio technologies and standards areknown in the art.

UTRA, E-UTRA, and GSM are part of Universal Mobile TelecommunicationSystem (UMTS). Long Term Evolution (LTE) is an upcoming release of UMTSthat uses E-UTRA, UTRA, E-UTRA, GSM, UMTS, and LTE are described indocuments from an organization named “3rd Generation PartnershipProject” (3GPP), Cdma2000 is described in documents from an organizationnamed “3rd Generation Partnership Project 16” (3GPP2). For clarity,certain aspects of the techniques are described below for uplinktransmission in LTE, and 3GPP terminology is used in much of thedescription below.

LTE utilizes orthogonal frequency division multiplexing (OFDM) on thedownlink and single-carrier frequency division multiplexing (SC-FDM) onthe uplink. OFDM and SC-FDM partition the system, bandwidth intomultiple (N) orthogonal sub-carriers, which are also commonly referredto as tones, bins, etc. Each subcarrier may be modulated with data. Ingeneral, modulation symbols are sent in the frequency domain with OFDMand in the time domain with SC-FDM. For LTE, the spacing betweenadjacent subcarriers may be fixed, and the total number of subcarriers(N) may be dependent on the system bandwidth. In one design, N=512 for asystem bandwidth of 5 MHz, N=1024 for a system bandwidth of 10 MHz, andN=2048 for a system bandwidth of 20 MHz. In general, N may be anyinteger value.

The system may support a frequency division duplex (FDD) mode and/or atime division duplex (TDD) mode. In the FDD mode, separate frequencychannels may be used for the downlink and uplink, and downlinktransmissions and uplink transmissions may be sent concurrently on theirseparate frequency channels. In the TDD mode, a common frequency channelmay be used for both the downlink and uplink, downlink transmissions maybe sent in some time periods, and uplink transmissions may be sent inother time periods. The LTE downlink transmission scheme is partitioned,by radio frames (e.g. 10 ms radio frame). Each frame comprises a patternmade of frequency (e.g. sub-carrier) and time (e.g. OFDM symbols). The10 ms radio frame is divided into plurality of adjacent 0.5 mssub-frames (also referred to as sub-frames or timeslots andinterchangeably used hereinafter). Each sub-frame comprises plurality ofresource blocks, wherein each resource block made up of one or moresub-carrier and one or more OFDM symbol. One or more resource blocks maybe used for transmission of data, control information, pilot or anycombination thereof.

A single-frequency network or SFN is a broadcast network where severaltransmitters simultaneously send the same signal over the same frequencychannel. Analog FM and AM radio broadcast networks as well as digitalbroadcast networks can operate in this manner. Analog televisiontransmission has proven to be more-difficult, since the SFN results inghosting due to echoes of the same signal.

In wideband digital broadcasting, self-interference cancellation isfacilitated by the OFDM or COFDM modulation method. OFDM uses a largenumber of slow low-bandwidth modulators- instead of one fast wide-bandmodulator. Each modulator has its own frequency sub-channel andsub-carrier frequency. Since each modulator is very slow, we can affordto insert a guard interval between the symbols, and thus eliminate theISI. Although the fading is frequency-selective over the whole frequencychannel, it can be considered as flat within the narrowband sub-channel.Thus, advanced equalization filters can be avoided. A forward errorcorrection code (FEC) can counteract that a certain portion of thesub-carriers are exposed to too much fading to be correctly demodulated.

OFDM is utilized in the terrestrial digital TV broadcasting systems suchas DVB-T and ISDB-T. OFDM is also widely used in digital radio systems,including DAB, HD Radio, and T-DMB. Therefore these systems are wellsuited to SFN operation. The 8VSB modulation method, used, in NorthAmerica for digital TV, specified in ATSC standard A/110, may perhapsalso allow the use of SFN transmission.

Through the use of virtual channel numbering, a multi-frequency network(MFN) can appear as an SFN to the viewer in ATSC. Alternatives to usingOFDM modulation in SFN self-interference cancellation would he: CDMARake receivers. MIMO channels (i.e. phased array antenna).Single-carrier modulation in combination by guard intervals andfrequency domain equalization. In a Single Frequency Network, thetransmitters and receivers are usually synchronized with the others,using GPS or a signal from the main station or network as a referenceclock. For example, the use of a special marker can be employed, theMega-frame Initialization Packet (MIP) that is inserted in the hitstream at a central distribution point, and signals the SFN transmittersthe absolute time (as read from a GPS receiver) at which this point inthe data stream is to be broadcast.

Referring to FIG. 1, a multiple access wireless communication systemaccording to one embodiment is illustrated. An access point 100 (AF)includes multiple antenna groups, one including 104 and 106, anotherincluding 108 and 110, and an additional including 112 and 114. In FIG.1, only two antennas are shown for each antenna group, however, snore orfewer antennas may be utilized for each antenna group. Access terminal116 (AT) is in communication with antennas 112 and 114, where antennas112 and 114 transmit information to access terminal 116 over forwardlink 120 and receive information from, access terminal 116 over reverselink US. Access terminal 122 is in communication with antennas 106 and108, where antennas 106 and 108 transmit information to access terminal122 over forward link 126 and receive information from access terminal122 over reverse link 124. Access terminals 116 and 122 can be UEs. In aFDD system, communication links 118, 120, 124, and 126 may use different.frequency for communication. For example, forward link 120 may use adifferent frequency than that used by reverse link 118.

Each group of antennas and/or the area in which they are designed tocommunicate is often referred to as a sector of the access point. In theembodiment, antenna groups each are designed to communicate to accessterminals in a sector, of the areas covered by access point 100.

In communication over forward links 120 and 126, the transmittingantennas of access point 100 utilize beam forming in order to improvethe signal-to-noise ratio of forward links for the different accessterminals 116 and 124. Also, an access point using beam forming totransmit to access terminals scattered randomly through its coveragecauses less interference to access terminals in neighboring cells than,an access point transmitting through a single antenna to all its accessterminals.

An access point may be a fixed station used for communicating with theterminals and may also be referred to as an access point, a Node B, anenhanced node B (eNB) or some other terminology. An access terminal mayalso be called an access terminal, user equipment (UE), a wirelesscommunication device, terminal, access terminal, or some otherterminology.

FIG. 2 is a block diagram of an embodiment of a transmitter system 210(also known as the access point) and a receiver system 250 (also knownas access terminal) in a MIMO system 200. At the transmitter system 210,traffic data for a number of data streams is provided from a data source21.2 to a transmit (TX) data processor 214.

In an embodiment, each data stream is transmitted over a respectivetransmit antenna. TX data, processor 214 formats, codes, and interleavesthe traffic data for each data stream based on a particular codingscheme selected for that data stream to provide coded data.

The coded data for each data stream may be multiplexed with pilot datausing FORM techniques. The pilot data is typically a known data patternthat is processed in a known manner and may be used at the receiversystem to estimate the channel response. The multiplexed pilot and codeddata for each data stream is then modulated (i.e., symbol mapped) basedon a particular modulation scheme (e.g., BASK, ASK, M-PSF, or M-QAM)selected for that data stream to provide modulation symbols. The datarate, coding, and modulation for each data stream may be determined byinstructions performed by processor 230.

The modulation symbols for all data stream's are then provided to a TX

MIMO processor 220, which may further process the modulation symbols(e.g., for OFDM). TX MIMO processor 220 then provides N_(T) modulationsymbol streams to N_(T) transmitters (TMTR) 222 a through 2221. Incertain embodiments, TX MIMO processor 220 applies beam-forming weightsto the symbols of the data streams and to the antenna from which thesymbol is being transmitted.

Each transmitter 222 receives and processes a respective symbol streamto provide one or more analog signals, and further conditions (e.g.,amplifies, filters, and up converts) the analog signals to provide amodulated signal suitable for transmission over the MIMO channel. N_(T)modulated signals, from transmitters 222 a through 222 t are thentransmitted from N_(T) antennas 224 a through 224 t respectively.

At receiver system 250, the transmitted modulated signals are received,by N_(R) antennas 252 a through 252 r and the received signal .from eachantenna 252 is provided to a respective receiver (RCVR) 254 a through254 r. Each receiver 254 conditions (e.g., filters, amplifies, and downconverts) a respective received, signal, digitizes the conditionedsignal to provide samples, and further processes the samples to providea corresponding “received” symbol stream.

An RX data processor 260 then receives and processes the N_(R) received,

symbol streams from N_(R) receivers 25.4 based on a particular receiverprocessing technique to provide N_(T) “detected” symbol, streams. The RXdata processor 260 then demodulates, deinterleaves, and decodes eachdetected symbol stream to recover the traffic data for the data stream.The processing by RX data processor 260 is complementary to thatperformed by TX MIMO processor 220 and TX data processor 214 attransmitter system 210. A processor 270 periodically determines whichpreceding matrix to use. Processor 270 formulates a reverse link messagecomprising a matrix index portion and a rank value portion.

The reverse link message may comprise various types of informationregarding the communication link and/or the received data stream. Thereverse link message is then processed by a TX data processor 238, whichalso receives traffic data for a number of data steams from a datasource 236, modulated by a modulator 280, conditioned by transmitters254 a through 254 r, and transmitted, back to transmitter system 210.

At transmitter system 210, the modulated signals from receiver system250 are received by antennas 224, conditioned by receivers 222,demodulated by a demodulator 240, and processed by a RX data processor242 to extract the reserve link message transmitted by the receiversystem 250. Processor 230 then determines which pre-coding matrix to usefor determining the beam forming weights then processes the extractedmessage.

In an aspect, logical, channels are classified into Control Channels andTraffic Channels. Logical Control Channels comprises Broadcast ControlChannel (BCCH) thai is DL channel for broadcasting system controlinformation, Paging Control Channel (PCCH) which is DL channel thattransfers paging information. Multicast Control Channel (MCCH) which isPoint-to-multipoint DL channel used for transmitting MultimediaBroadcast and Multicast Service (MBMS) scheduling and controlinformation for one or several MTCHs. Generally, after establishing aRadio Resource Control (RRC) connection this channel is only used by UEsthat receive MBMS (Note: old MCCH+MSCH). Dedicated Control Channel(BCCH) is Point-to-point bi-directional channel that transmits dedicatedcontrol information and used by UEs having an RRC connection. In aspect,Logical Traffic Channels comprise a Dedicated Traffic Channel (DTCH)that is Point-to-point bi-directional channel, dedicated to one UE, forthe transfer of user information. Also, a Multicast Traffic Channel(MTCR) for Point-to-multipoint DL channel for transmitting traffic data.

In an aspect, Transport Channels are classified into DL and UL. DL

Transport Channels comprises a Broadcast Channel (BCH), Downlink SharedData Channel (DL-SDCH) and a Paging Channel (PCB), the PCH for supportof UE power saving (DRX cycle is indicated by the network to the LIE),broadcasted over entire cell and mapped to PHY resources which can beused for other control/traffic channels. The UL Transport Channelscomprises a Random Access Channel (RACH), a Request Channel (REQCH), anUplink Shared Data Channel (UL-SDCH), and plurality of PHY channels. ThePHY channels comprise a set of DL channels and UL channels.

The DL PHY Channels Comprises:

Common Pilot Channel (CPICH)

Synchronization Channel (SCH)

Common Control Channel (CCCH)

Shared DL Control Channel (SDCCH)

Multicast Control Channel (MCCH)

Shared UL Assignment Channel (SUACH)

Acknowledgement Channel (ACKCH)

DL Physical Shared Data Channel (DL-PSDCH)

UL Power Control Channel (UPCCH)

Paging Indicator Channel (PICH)

Load Indicator Channel (LICH)

The UL PHY Channels Comprises:

Physical Random Access Channel (PRACH)

Channel Quality Indicator Channel (CQICH)

Acknowledgement Channel (ACKCH)

Antenna Subset Indicator Channel (ASICH)

Shared Request Channel (SREQCH).

UL Physical Shared Data Channel (UL-PSDCH)

Broadband Pilot Channel (BPICH).

In an aspect, a channel structure is provided that preserves low signalpeak to average (PAR) values, and at any given time, the channel iscontiguous or uniformly spaced In frequency that is a desired propertyof a single carrier waveform.

FIG. 3 illustrates an environment 300 with a UE 302 and an eNB 304. TheUE 302 and the eNB 304 communicate with each other on a plurality oflevels or layers. For example, on a physical layer 306, a Medium AccessControl (MAC) layer 308, on a Radio Link Control (RLC) layer 310, and ata Packet Data Convergence Protocol (PDCP) layer 312. Each layer is abovethe layer below it. For example, Radio Link Control (RLC) layer 310 isbelow Packet Data Convergence Protocol (PDCP) layer 312 and that meansthe PDCP layer encapsulates the RLC layer. More specifically, the PDCPlayer can take a single RLC object and break the object into severalpackets. As illustrated in FIG. 4, each PDCP Packet Data Unit PDU 400includes a header 402 and a Service Data Unit (SDU) 404. Typically thePDCP PDU 400 and the PDCP header 402 are octet-aligned, and the PDCPheader 402 can be either 1 or 2 bytes long. The main services andfunctions, of the PDCP sub-layer include Header compression anddecompression (typically Robust Header Compression only). The PDCPsub-layer handles the transfer of user data. For example, thetransmission of user data means that PDCP receives PDCP SDU from theNon-Access Stratum (NAS) and forwards it to the RLC layer and viceversa. In-sequence delivery of upper layer PDUs at hand off (HO) isfacilitated by the PDCP sub-layer. The PDCP sub-layer also provides forduplicate detection of lower layer SDUs and the ciphering of user planedata and control plane data.

FIG. 5 illustrates a RLC PDU 500 including a RLC header 502 and aplurality of RLC SDUs 504. In particular FIG. 5 illustrates the RLC PDU500 including a RLC header 502 and four RLC SDUs 504. The RLC is also asub-layer. An overview on services, functions, and PDU structureprovided by the RLC sub-layer follows. Note that: the reliability of RLCis configurable: some radio bearers may tolerate rare losses (e.g., TCPtraffic); Radio Bearers are not characterized by a fixed sized data unit(e.g., a fixed sized RLC PDU). The main services and functions of theRLC sub-layer include the transfer of upper layer PDUs supportingAcknowledge Mode (AM) or Un-acknowledge Mode UM, and the TransparentMode (TM) data transfer. Other services and functions of the RLCsub-layer include Error Correction through Automatic Repeat Request ARQ(CR.C check provided by the physical layer, in other words no CRC neededat RLC level) and segmentation according to the size of the TransportBlock (TB): only if an RLC SDU does not fit entirely into the TB thenthe RLC SDU is segmented into variable sized RLC PDUs, which do notinclude any padding. Other services and functions of the RLC sub-layerinclude re-segmentation of PDUs that need to be retransmitted, if aretransmitted PDU does not fit entirely into the new TB used forretransmission then the RLC PDU is re-segmented. The number ofre-segmentation is not limited. Concatenation of SDUs for the same radiobearer can be done. An in-sequenee delivery of upper layer PDUs exceptat HO in the uplink can be done. A duplicate, detection can be done.Protocol error detection and recovery is available. Flow control betweenan eNB and a UE (such as for example, in a fee for service (FFS)environment) can be provided. The SDU can be discarded and reset.

The RLC PDU structure where the PDU sequence number carried by the RLCheader is independent of the SDH sequence number (i.e., PDCP sequencenumber) is shown in FIG. 5 where a dotted line 506 indicates theoccurrence of a segmentation. The segmentation end at a dotted line 508.Because the segmentation only occurs when needed and concatenation isdone in sequence, the content of an RLC PDU can generally be describedby the following relations:

(0; 1) last segment of SDU₁+(0; n) complete SDUs+(0; 1) first segment ofSDU_(i+n+1); or

1 segment of SDU₁.

Referring now to FIG. 6, an environment 600 includes UEs 602 synced

at 603 to a source eNB 604 and a target eNB 606. In (1), the PDCP statusreport is sent right after the handover command (HO), before the UE hasre-pointed to the target eNB. This method is natural to perform in PDCPas the illustrations of FIG. 6 allow all radio hearers to synchronizebefore the SDUs are forwarded from the source eNB to the target eNB, Forthis operation, a regular PDCP status report containing RLC SDUinformation can be used.

One disadvantage of this method is that a UE re-points to a new eNB whenthe existing radio link with the source eNB is fading away. Under theseconditions, it is sensible to trigger the re-pointing procedure as soonas possible and avoid sending important signaling information over afading link as it will waste radio resources and delay the procedure.One advantage of this method is that since the source eNB receives thestatus report before, the re-pointing, it can avoid forwarding uselessRLC SDUs to the target eNB and thus save X2 bandwidth.

In (2), the PDCP status report is sent to the target eNB after the UEhas completed the re-pointing procedure. The RLC PDU information carriedin regular RLC status reports from tie UE-source eNB link is notrelevant to the UE-target eNB link and thus it cannot be reuseddirectly. Instead the present disclosure proposes the PDCP status reportto contain RLC SDU information that is relevant to both the source andtarget eNBs, An example of such information is the PDCP sequence numberthat is appended to RLC SDUs by PDCP and .constant across eNBs.

One disadvantage of this method is since the source eNB is not aware ofthe latest status of the UE receiver, it may forward useless RLC SDUsover the X2 interface to the target eNB. These useless SDUs will howevernot be forwarded over the air because the target eNB will receive thePDCP status report and synchronize it transmitter to the UE receiver.

One advantage of this method is the re-pointing procedure is not delayedby the transmission of the PDCP status report on a fading link. The newstatus report is instead transmitted to the target eNB that is the newbest current radio link.

While, for purposes of simplicity of explanation, the methodologies areshown and described as a series of acts, it is to be understood andappreciated that the methodologies are not limited by the order of acts,as some acts may, in accordance with the claimed subject matter, occurin different orders and/or concurrently with other acts from that shownand described herein. For example, those skilled in the art willunderstand and appreciate that a methodology could alternatively berepresented as a series of interrelated states or events, such as in astate diagram. Moreover, not all illustrated acts may be required toimplement a methodology in accordance with the claimed subject matter.

For a multiple-access system (e.g., FDMA, OFDMA, CDMA, TDMA, etc.),multiple terminals can. transmit concurrently on the uplink. For such asystem, the pilot subbands may be shared among different terminals. Thechannel estimation techniques may be used in cases where the pilotsubbands for each terminal span the entire operating band (possiblyexcept for the band edges). Such a pilot subband structure would bedesirable to obtain frequency diversity for each terminal. Thetechniques described herein may be implemented by various means. Forexample, these techniques may be implemented in hardware, software, or acombination thereof. For a hardware implementation, which may bedigital, analog, or both digital and analog, the processing units usedfor channel estimation may be implemented within one or more applicationspecific integrated circuits (ASICs), digital signal processors (DSPs),digital signal, processing devices (DSPDs), programmable logic devices(PLDs), field programmable gate arrays (FPGAs), processors, controllers,micro-controllers, microprocessors, other electronic units designed toperform the functions described herein, or a combination thereof. Withsoftware, implementation can be through modules (e.g., procedures,functions, and so on) that perform the functions described herein. Thesoftware codes may be stored in memory unit and executed by theprocessors.

It is to be understood that the embodiments described herein may beimplemented in hardware, software, firmware, middleware, microcode, orany combination thereof. For a hardware implementation, the processingunits may be implemented within one or more application specificintegrated circuits (ASICs), digital signal processors (DSPs), digitalsignal processing devices (DSPDs), programmable logic devices (PLDs),field programmable gate arrays (FPGAs), processors, controllers,micro-controllers, microprocessors, other electronic units designed toperform the functions described herein, or a combination thereof.

FIG. 7 illustrates a wireless communication system 700 with multiplebase stations 710 and multiple terminals 720, such as may be utilized inconjunction with one or more aspects. A base station is generally afixed station that communicates with the terminals and may also becalled an access point, an enhanced Node B, or some other terminology.Each base station 710 provides communication coverage for a particulargeographic area, illustrated as three geographic areas, labeled 702 a,702 b, and 702 c. The term “cell” can refer to a base station and/or itscoverage area depending on the context in which the term is used. Toimprove system capacity, a base station coverage area may be partitionedinto multiple smaller areas (e.g., three smaller areas, according tocell 702 a m FIG. 7). 704 a, 704 b, and 704 c. Each smaller area can beserved by a respective base transceiver subsystem (BTS). The term“sector” can refer to a BTS and/or its coverage area depending on thecontext in which the term is used. For a sectorized cell, the BTSs forall sectors of that cell are typically co-located within the basestation for the cell. The transmission techniques described herein maybe used for a system with sectorized ceils as well as a system with,un-sectorized cells. For simplicity, in the following description, theterm “base station” is used generically for a fixed station that servesa sector as well as a fixed station that serves a cell.

Terminals 720 are typically dispersed throughout the system, and eachterminal may be fixed or mobile. A terminal may also be called a mobilestation, user equipment, a user device, or some other terminology. Aterminal may be a wireless device, a cellular phone, a personal digitalassistant (PDA), a wireless modem card, and so on. Each terminal 720 maycommunicate with zero, one, or multiple base stations on the downlinkand uplink at any given moment. The downlink (or forward link) refers tothe communication link from the base stations to the terminals, and theuplink (or reverse link) refers to the communication link from theterminals to the base stations,

For a centralized architecture, a system controller 730 couples to basestations 710 and provides coordination and control for base stations710. For a distributed architecture, base stations 710 may communicatewith one another as needed. Data transmission on the forward link occursfrom one access point to one access terminal at or near the .maximumdata rate that can he supported by the forward link and/or thecommunication system. Additional channels of the forward, link (e.g.,control channel) may be transmitted from multiple access points to oneaccess terminal. Reverse link data communication may occur from oneaccess terminal to one or more access points. One mobile device 750 isleaving 702 c and approaching 702 b. So 702 c eNB is the source eNB and702 b is the target eNB. The PDCP status report is sent to the targeteNB after the UE has completed the re-pointing procedure. Or the PDCPstatus report can be sent to the target eNB before the UE has completedthe re-pointing procedure. The RLC PDU information carried in regularstatus reports from the UE-source eNB link is not relevant to theUE-target eNB link, and thus it cannot be reused directly. Instead thepresent disclosure proposes the PDCP status report to contain SDUinformation that is relevant to both the source and target eNBs. Anexample of such information is the PDCP sequence number that is appendedto RLC SDUs by PDCP and constant across eNBs.

FIG. 8 is an illustration of an ad hoc or unplanned/semi-plannedwireless communication environment 800, in accordance wife variousaspects. System 800 can comprise one or more base stations 802 in one ormore sectors that receive, transmit, repeat, etc., wirelesscommunication signals to each other and/or to one or more mobile devices804, As illustrated, each base station 802 can provide communicationcoverage for a particular geographic area, illustrated as threegeographic areas, labeled 806 a, 806 b. 806 c, and 806 d. Each basestation 802 can comprise a transmitter chain and a receiver chain, eachof which can in turn comprise a plurality of components associated withsignal transmission and reception (e.g., processors, modulators,multiplexers, demodulators, demultiplexers, antennas, and so forth.), aswill be appreciated by one skilled in the art. Mobile devices 804 maybe, for example, cellular phones, smart phones, laptops, handheldcommunication devices, handheld computing devices, satellite radios,global positioning systems, PDAs, and/or any other suitable device forcommunicating over wireless network 800. System 800 can be employed inconjunction with various, aspects described herein in order for the PDCPstatus report to be sent to the target eNB and/or the source eNB beforeand/or after the UE has completed the re-pointing procedure.

FIG. 9 illustrates a methodology 900 including transmitting to a mobiledevice from a source enhanced, node B at 902. At 904 is sending a PacketData Convergence Protocol (PDCP) status report to a target enhanced nodeB. At 906 is sending information relevant to both to the target enhancednode B and the source enhanced node B. At 908 is receiving an RLC SDUsfrom the source enhanced node B and ignoring the RLC SDUs from thesource enhanced node B. At 910 is sending at least one PDCP sequencenumber to the target enhanced node B. For example, at least one PDCPsequence number can be sent to the target eNB and/or the source eNBbefore and/or after the UE has completed the re-pointing procedure.

When the embodiments are implemented in software, firmware, middleware,or microcode, program code or code segments, they may be stored in amachine-readable medium, such as a storage component. A code segment mayrepresent a procedure, a function, a subprogram, a program, a routine, asubroutine, a module, a software package, a class, or any combination ofinstructions, data structures, or program statements. A code segment maybe coupled, to another code segment or a hardware circuit by passingand/or receiving, information, data, arguments, parameters, or memorycontents, information, arguments, parameters, data, etc. may be passed,forwarded, or transmitted using any suitable means including memorysharing, message passing, token passing, network transmission, etc.

For a software implementation, the techniques described herein may beimplemented with modules (e.g., procedures, functions, and so on) thatperform the functions described herein. The software codes, may bestored in memory units and executed by processors. The memory unit maybe implemented within the processor or external to the processor, inwhich case it can be communicatively coupled to the processor viavarious means as is known in the art.

FIG. 10 illustrates a methodology 1000 including transmitting to a

mobile device from a source enhanced node B at 1002. In one exemplarygeneralized non-limiting embodiment, the methodology 1000 includessending a handoff confirm message to the target enhanced node B at 1006.The methodology 1000 can include sending Packet Data. ConvergenceProtocol (PDCP) information to a target enhanced node B. In anotherexemplary generalized non-limiting embodiment, the methodology 1000includes sending a Packet Data Convergence Protocol (PDCP) status reportto the source enhanced node B prior to are-pointing to a target enhancednode B is at 1008,

FIG. 11 illustrates a methodology 1100 wherein a source enhanced node Bis at 1102 and a target enhanced node B is at 1003. The source enhancednode B can be broadcasting a service such as a CNN feed or a MSNBC feedto a mobile device at 1104. Alternatively of in addition to a broadcastservice, the mobile device 1104 can be otherwise connected to the sourceenhanced node B 1102 such as for making a phone call. The mobile device1104 is in motion and is approaching an area where the target enhancednode B is closer. In one exemplary generalized non-limiting embodiment,the methodology 1000 includes employing a security layer at 1006. Thesecurity layer can determine if the target enhanced node B requiresdifferent security than the source eNB, and whether the PDCP informationshould be sent to the target eNB and/or the source eNB before and/orafter the UE has completed the re-pointing procedure, The decision canbe made through the employ of an AI layer. In addition, in otherembodiments with or without the security layer, cells can dynamicallydetermine if PDCP information should be sent to the target eNB and/orthe source eNB before and/or after the UE has completed the re-pointingprocedure based at least partially on an AI decision. A sensor canprovide feedback at to assist in that decision. For example, the sensorcan determine network conditions at a specific time and alter the numberand/or locations of mobile devices.

Because at least a portion of the communication between the device 1104and the SFNs are wireless, the security layer 1106 is provided in oneexemplary generalized non-limiting embodiment. The security layer 1106can be used to cryptographically protect (e.g., encrypt) data as well asto digitally sign data, to enhance security and unwanted, unintentional,or malicious disclosure. In operation, the security component or layer1106 can communicate data to/from both the enhanced node Bs 1102 and1103 and the mobile device 1104.

An encryption component can be used to cryptographically protect dataduring transmission as well as while stored. The encryption componentemploys an encryption algorithm to encode data for security purposes.The algorithm is essentially a formula that is used to turn data Into asecret code. Each algorithm uses a string of bits known as a ‘key’ toperform the calculations. The larger the key (e.g., the more bits in thekey), the greater the number of potential patterns can be created, thusmaking it harder to break the code and descramble the contents of thedata.

Most encryption algorithms use the block cipher method, which code fixedblocks of input that are typically from 64 to 128 bits in length. Adecryption component can be used to convert encrypted data hack to itsoriginal form. In one aspect, a public key can be used to encrypt dataupon transmission to a storage device. Upon retrieval, the data can bedecrypted using a private key that corresponds to the public key used toencrypt.

A signature component can be used to digitally sign data and documentswhen transmitting and/or retrieving from the device 1104. It is to beunderstood that a digital signature or certificate guarantees that afile has not been altered, similar to if It were carried in anelectronically sealed envelope. The ‘signature’ is an encrypted digest(e.g., one-way hash function) used to confirm authenticity of data. Uponaccessing the data, the recipient can decrypt the digest and alsore-compute the digest from the received file or data. If the digestsmatch, the file is proven to be intact and tamper free. In operation,digital certificates issued by a certification authority are most oftenused to ensure authenticity of a digital signature.

Still further, the security layer 1106 can employ contextual awareness(e.g., context awareness component) to enhance security. For example,the contextual awareness component can be employed to monitor and detectcriteria associated with data transmitted to and requested from thedevice 1104. In operation, these contextual factors can be used tofilter spam, control retrieval (e.g., access to highly sensitive datafrom a public network), or the like. It will be understood that, inaspects, the contextual awareness component can employ logic thatregulates transmission and/or retrieval of data in accordance withexternal criteria and factors. The contextual awareness employment canbe used in connection with an artificial intelligence (AI) layer 1108.

The AI layer or component can be employed to facilitate inferring and/ordetermining when, where, how to dynamically vary the level of securityand/or vary how PDCP information should be sent to the target eNB andfor the source eNB and whether the PDCP information is to be sent beforeor after the UE has completed, the re-pointing procedure. Because thereare tradeoffs regarding duplicate or wasted RLC SDUs being sent from thesource eNB 1102 to the mobile device 1104 that will ignore them becausethe mobile device will receive the RLC SDUs from the new target eNB 113,dependent on network resource factors, it may be desirable to determineon the fly as to what information is sent to which eNB. Such inferenceresults in the construction of new events or actions from a set ofobserved events and/or stored event data, whether or not the events arecorrelated in close temporal proximity, and whether the events and datacome from, one or several event(s) and data source(s).

The AI component can also employ any of a variety of suitable AI-basedschemes in connection with facilitating various aspects of the hereindescribed innovation. Classification can employ a probabilistic and/orstatistical-based analysis (e.g., factoring into the analysis utilitiesand costs) to prognose or infer an action that a user desires to heautomatically performed. The AI layer can be used in conjunction withthe security layer to infer changes in the data being transferred andmake recommendations to the security layer as to what level of securityto apply.

For example, a support vector machine (SVM) classifier can be employed.Other classification approaches include Bayesian networks, decisiontrees, and probabilistic classification models providing differentpatterns of independence can be employed. Classification as used hereinalso is inclusive of statistical regression that is utilized to developmodels of priority.

Additionally the sensor 1110 can be employed in conjunction with the

security layer 1106. Still farther, human authentication factors can beused to enhance security employing sensor 1110, For instance, biometrics(e.g., fingerprints, retinal patterns, facial recognition, DNAsequences, handwriting analysis, voice recognition) can be employed toenhance authentication to control access of a storage vault. It will beunderstood that embodiments can employ multiple factor tests inauthenticating identity of a user.

The sensor 1110 can also be used to provide the security layer 1106 withgeneralized non-human metric data, such as electromagnetic fieldcondition data or predicted weather data etc. For example, anyconceivable condition can be sensed for and security levels can beadjusted or determined in response to the-sensed condition.

FIG. 12 illustrates an environment 1200 wherein a source enhanced node Bis at 1202 and a target enhanced node B is at 1203. The source enhancednode B 1202 can be broadcasting a service such as a CNN feed or a MSNBCfeed to a mobile device at 1204. Alternatively or in addition to abroadcast service, the mobile device 1204 can be otherwise connected tothe source enhanced node B 1202 such as for making a phone call. Themobile device 1204 is in motion and is approaching an area where thetarget enhanced node B 1203 is closer. In one exemplary generalizednon-limiting embodiment, the methodology 1200 includes employing anoptimizer at 1206. The optimizer 1206 is provided to optimizecommunication between, the enhanced node Bs and device 1204. Optimizer1206 optimizes or increases communication between the SFNs and device1204 by receiving security information from a security layer 1208. Forexample, when security layer 1208 informs optimizer 1206 that they areboth in a secured environment, the optimizer 1206 balances thisinformation, with other information and may instruct the security layer1208 to make all transmissions security free to achieve top speed.Additionally, a feedback layer or component 1210 can provide feedback asto missed data packets or other information to provide feedback to theoptimizer 1206. This feedback of missed packets can be balanced againstdesired security level to enable less secure but higher throughput datatransfer if desired. Additionally optimizer 1206 may include a memorystoring historical statistical data and because there are tradeoffsregarding duplicate or wasted RLC SDUs being sent from the source eNB1202 to the mobile device 1204 that may ignore them because the mobiledevice will receive the RLC SDUs from the new target eNB 113, dependenton network resource factors, it maybe desirable for optimizer 1206 todetermine on the fly as to what information is sent to which eNB.

FIG. 13 provides a schematic diagram of an exemplary networked ordistributed computing environment. The distributed computing environmentcomprises computing objects 1310 a, 1310 b, etc. and computing objectsor devices 1320 a, 1320 b, 1320 c, 1320 d, 1320 e. etc. These objectscan comprise programs, methods, data stores, programmable logic, etc.The objects can comprise portions of the same or different devices suchas PDAs, audio/video devices, MP3 players, personal computers, etc. Eachobject can communicate with another object by way of the communicationsnetwork 1340. This network can itself comprise other computing objectsand computing devices that provide services to the system of FIG. 13,and can itself represent multiple interconnected networks. In accordancewith an aspect of at least one generalized non-limiting embodiment, eachobject 1310 a, 1310 b, etc. or 1320 a, 1320 b, 1320 c, I320 d, 1320 e,etc. can contain an application that might make use of an applicationprogramming interface (API), or other object, software, firmware and/orhardware, suitable for use with the design framework in accordance withat least one generalized non-limiting embodiment.

If can also be appreciated that an object, such as 1320 c, can be hostedon another computing device 1310 a. 1310 b, etc. or 1320 a, 1320 b, 1320c, 1320 d, 1320 e, etc. Thus, although the physical environment depictedcan show the connected devices as computers, such illustration is merelyexemplary and the physical environment can alternatively he depicted ordescribed comprising various digital devices such as PDAs, televisions,MP3 players, etc., any of which can employ a variety of wired andwireless services, software objects such, as interfaces, COM objects,and the like.

There are a variety of systems, components, and network configurationsthat support distributed computing environments. For example, computingsystems can be connected together by wired or wireless systems, by localnetworks or widely distributed networks. Currently, many of the networksare coupled to the Internet, which provides an infrastructure for widelydistributed computing and encompasses many different networks. Any ofthe infrastructures can be used for exemplary communications madeincident to optimization algorithms and processes according to thepresent innovation.

In home networking environments, there are at least four disparatenetwork transport media that can each support a unique protocol, such asPower line, data(both wireless and wired), voice (e.g., telephone) andentertainment media. Most home control devices such as light switchesand appliances can use power lines for connectivity. Data Services canenter the home as broadband (e.g., either DSL or Cable modem) and areaccessible within the home using either wireless (e.g., HomeRF or802.11A/B/G) or wired (e.g., Home PNA, Cat 5, Ethernet, even power line)connectivity. Voice traffic can enter the home-either as -wired (e.g.,Cat 3) or wireless (e.g., cell phones) and can be distributed within thehome using Cat 3 wiring. Entertainment media, or other graphical data,can enter the home either through satellite or cable and is typicallydistributed in the home using coaxial cable. IEEE 1394 and DVI are alsodigital interconnects for clusters of media devices. All of thesenetwork environments and others that can emerge, or already haveemerged, as protocol standards can be interconnected to form a network,such as an Intranet, that can be connected to the outside world by wayof a wide area network, such as the Internet. In short a variety ofdisparate sources exist for the storage and transmission of data, andconsequently, any of the computing devices of the present innovation canshare and communicate data in any existing manner, and no one waydescribed in the embodiments herein is intended to be limiting.

The Internet commonly refers to the collection of networks and gatewaysthat utilize the Transmission Control Protocol/Internet Protocol(TCP/IP) suite of protocols, which are well-known in the art of computernetworking. The Internet can be described as a system of geographicallydistributed remote computer networks interconnected by computersexecuting networking protocols that allow users to interact and shareinformation over network(s). Because of such wide-spread informationsharing, remote networks such as the Internet have thus far generallyevolved into an open system with, which developers can design softwareapplications for performing specialized operations or services,essentially without restriction.

Thus, the network, infrastructure enables a host of network topologiessuch as client/server, peer-to-peer, or hybrid architectures. The“client” is a member of a class or group that uses the services ofanother class or group to which it is not related. Thus, in computing, aclient is a process, i.e., roughly a set of instructions or tasks, thatrequests a service provided by another program. The client processutilizes the requested service without having to “know” any workingdetails about the other program or the service itself. In aclient/server architecture, particularly a networked system, a client isusually a computer that accesses shared network resources provided byanother computer, e.g., a server. In the illustration of FIG. 13, as anexample, computers 1320 a, 1320 b, 1320 c, 1320 d, 1320 e, etc. can bethought of as clients and computers 1310 a, 1310 b, etc. can be thoughtof as servers where servers 1310 a, 1310 b, etc. maintain the data thatis then replicated to client computers 1320 a, 1.320 b, 1320 c, 1320 d,1320 e, etc, although any computer can be considered a client, a server,or both, depending on the circumstances. Any of these computing devicescan be processing data or requesting services or tasks that canimplicate the optimization algorithms and processes in accordance withat least one generalized non-limiting embodiment.

A server is typically a remote computer system accessible over a remoteor local network, such as the Internet or wireless networkinfrastructures. The client process can be active in a first computersystem, and the server process can be active in a second, computersystem, communicating with one another over a communications medium,thus providing distributed functionality and allowing multiple clientsto take advantage of the information-gathering capabilities of theserver. Any software objects utilized pursuant to the optimizationalgorithms and processes of at least one generalized non-limitingembodiment can be distributed across multiple computing devices orobjects.

Client(s) and server(s) communicate with one another utilizing thefunctionality provided by protocol layers). For example, HyperTextTransfer Protocol (HTTP) is a common protocol that is used inconjunction with the World Wide Web (WWW), or “the Web.” Typically, acomputer network address such as an Internet Protocol. (IP) address orother reference such as a Universal Resource Locator (URL) can be usedto identify the server or client computers to each other. The networkaddress can be referred to as a URL address. Communication can beprovided over a communications medium, e.g., client(s) and server(s) canbe coupled to one another via TCP/IP connections) for high-capacitycommunication.

Thus, FIG. 13 illustrates an exemplary networked or distributedenvironment, with server(s) in communication with client computer (s)via a network/bus, in which the present innovation can be employed. Inmore detail, a number of servers 1310 a, 1316 b, etc. are interconnectedvia a communications network/bus 1340, which can be a LAN, WAN,intranet, GSM network, the Internet, etc., with a number of client orremote computing devices 1320 a, 1320 b, 1320 c, 1320 d, 1320 e, etc.,such as a portable computer, handheld computer, thin client, networkedappliance, or other device, such as a VCR, TV, oven, light, heater andthe like in accordance with the present innovation. It is thuscontemplated that the present innovation can apply to any computingdevice in connection with which it is desirable to communicate data overa network.

In a network environment in which the communications network/bus 1340 isthe Internet, for example, the servers 1310 a, 1310 b, etc. can be Webservers with which, the clients 1320 a, 1320 b, 1320 c, 1320 d, !320 e,etc. communicate via any of a number of known protocols such as HTTP.Servers 1310 a, 1310 b, etc. can also serve as clients 1320 a, 1320 b,1320 c, 1320 d, 1320 e, etc., as can be characteristic of a distributedcomputing environment.

As mentioned, communications can he wired or wireless, or a combination,where appropriate. Client devices 1320 a, 1320 b, 1320 c, 1320 d, 1320e, etc. can or cannot communicate via communications' network/bus 14,and can have independent communications associated therewith. Forexample, in the case of a TV or VCR, there can or cannot be a networkedaspect to the control thereof. Each client computer 1320 a, 1320 b, 1320c, 1320 d, 1320 c, etc. and server computer 1310 a, 1310 b, etc. can beequipped with various application program modules or objects 1335 a,1335 b, 1335 c, etc. and with connections or access to various types ofstorage elements or objects, across which flies or data streams can bestored or to which portion(s) of files or data streams can bedownloaded, transmitted or migrated. Any one or more of computers 1310a, 1310 b, 1320 a, 1320 b, 1320 c, 1320 d, 1320 e> etc. can beresponsible for the maintenance and updating of a database 1330 or otherstorage element, such as a database or memory 1330 for storing dataprocessed or saved according to at least one generalized non-limitingembodiment. Thus, the present innovation can be utilized in a computernetwork, environment having client computers 1320 a, 1320 b, 1320 c,1320 d, 1320 e, etc. that can access and .interact with a computernetwork/bos 1340 and server computers 1310 a, 1310 b, etc, that canInteract with client computers 1320 a, 1320 b, 1320 c, 1320 d, 1320 e,etc. and other like devices, and databases 1330,

Exemplary Computing Device

As mentioned, the innovation applies to any device wherein It can bedesirable to communicate data, e.g., to a mobile device. It should beunderstood, therefore, that handheld, portable and other computingdevices and computing objects of all kinds are contemplated for use inconnection with the present innovation, i.e., anywhere that a device cancommunicate data or otherwise receive, process or store data.Accordingly, the below general purpose remote computer described belowin FIG. 11 is but one example, and the present innovation can beimplemented with any client having network/bus interoperability andinteraction. Thus, the present innovation can be implemented in anenvironment of networked hosted services in which very little or minimalclient resources are implicated, e.g., a networked environment in whichthe client device serves merely as an interface to the network/bus, suchas an object placed in an appliance.

Although not required, at least one generalized non-limiting embodimentcan partly be implemented via an operating system., for use by adeveloper of services for a device or object, and/or included withinapplication software that operates in connection with the components) ofat least one generalized non-limiting embodiment. Software can bedescribed in the general context of computer executable instructions,such as program modules, being executed by one or more computers, suchas client workstations, servers, or other devices. Those skilled in theart will, appreciate that the innovation can be practiced with othercomputer system configurations and protocols.

FIG. 14 thus illustrates an example of a suitable computing systemenvironment 1400 a in which, the innovation can be implemented, althoughas made clear above, the computing system environment 1400 a is only oneexample of a suitable computing environment for a media device and isnot intended to suggest any limitation as to the scope of use orfunctionality of the innovation. Neither should the computingenvironment 1400 a be interpreted as having any dependency orrequirement relating to any one of combination of components illustratedin the exemplary operating environment 1400 a.

With reference to FIG. 14, an exemplary remote device for implementingat least one generalized non-limiting embodiment includes a generalpurpose computing device in the form of a computer 1410 a. Components ofcomputer 1410 a can include, but are not limited to, a processing unit1420 a, a system memory 1430 a, and a system bus 1425 a that couplesvarious system components including the system memory to the processingunit 1420 a. The system bus 1425 a can be any of several types of busstructures including a memory bus or memory controller, a peripheralbus, and a local bus using any of a variety of bus architectures.

Computer 1410 a typically includes a variety of computer readable media.Computer readable media can be any available media that can be accessedby computer 1410 a. By way of example, and not limitation, computerreadable media can comprise computer storage media and -communicationmedia. Computer storage media includes volatile and non-volatile,removable and non-removable media, implemented in any method ortechnology for storage of information such as computer readableinstructions, data structures, program modules, or other data. Computerstorage media includes, but is not limited to, RAM, ROM, EEPROM, flashmemory or other memory technology, CDROM, digital versatile disks (DVD)or other optical disk storage, magnetic cassettes, magnetic tape,magnetic disk storage or other magnetic storage devices, or any othermedium which can be used to store the desired information and which canbe accessed by computer 1410 a. Communication media typically embodiescomputer readable instructions, data structures, program modules, orother data in a modulated data signal such as a carrier wave or othertransport mechanism and includes any Information delivery media.

The system memory 1430 a can include computer storage media in the formof volatile and/or non-volatile memory such as read only memory (ROM)and/or random access memory (RAM). A basic input/output system (BIOS),containing the basic routines that help to transfer information betweenelements within computer 1410 a, such as during start-up, can be storedin memory 1430 a. Memory 1430 a typically also contains data and/orprogram modules that are immediately accessible to and/or presentlybeing operated on by processing unit 1420 a, By way of example, and notlimitation, memory 1430 a can also Include an operating system,application programs, other program modules, and program data.

The computer 1410 a can also include other removable/non-removable,voiatile/non-volatile computer storage media. For example, computer 1410a could include a hard disk drive that reads from or writes tonon-removable, non-volatile magnetic media, a magnetic disk drive thatreads from or writes to a removable, non-volatile magnetic disk, and/oran optical disk drive that reads from or writes to a removable,non-volatile optical disk, such as a CD-ROM or other optical media.Other removable/non-removable, volatile/non-volatile computer storagemedia that can be used in the exemplary operating environment include,but are not limited to, magnetic tape cassettes, flash memory cards,digital versatile disks, digital video tape, solid state RAM, solidstate ROM and the like. A hard disk drive is typically connected to theSystem bus 1425 a through a non-removable memory interface such as aninterface, and a magnetic disk drive or optical disk drive is typicallyconnected to the system bus 1425 a by a removable memory interface, suchas an interface.

A user can enter commands and information into the computer 1410 athrough input devices such as a keyboard and pointing device, commonlyreferred to as a mouse, trackball or touch, pad. Other input devices caninclude a microphone, joystick, game pad, satellite dish, scanner, orthe like. These and other input devices are often connected to theprocessing unit 1420 a through user input 1440 a and associatedinterface(s) that are coupled to the system bus 1425 a, but can beconnected by other interface and bus structures, such as a parallelport, game port or a universal serial bus (USB). A graphics subsystemcan also be connected to the system bus 1425 a. A monitor or other typeof display device is also connected to the system bus 1425 a via aninterface, such as output interface 1450 a, which can in turncommunicate with video memory. In addition to a monitor, computers canalso include other peripheral output devices such as speakers and aprinter, which can be connected through output interface 1450 a.

The computer 1410 a can operate in a networked or distributedenvironment using logical connections to one or more other remotecomputers, such as remote computer 1470 a, which can in turn have mediacapabilities different from device 1410 a. The remote computer 1470 acan be a personal computer, a server, a router, a network PC, a peerdevice or other common network node, or any other remote mediaconsumption or transmission device, and can include any or all of theelements described above relative to the computer 1410 a, The logicalconnections depicted in FIG. 14 include a network 1480 a, such localarea network (LAN) or a wide area network (WAN), but can also includeother networks/buses. Such networking environments are commonplace inhomes, offices, enterprise-wide computer networks, intranets, and theInternet.

When used in a IAN networking environment, the computer 1410 a is

connected to the LAN 1480 a through a network Interface or adapter. Whenused in a WAN networking environment, the computer 1410 a typicallyincludes a communications component, such as a modem, or other means forestablishing communications over the WAN, such as the Internet. Acommunications component, such as a modem, which can be internal orexternal, can be connected to the system, bus 1425 a via the user inputinterface of input 1440 a, or other appropriate mechanism. In anetworked environment, program modules depicted relative to the computer1410 a, or portions thereof, can be stored in a remote memory storagedevice. It will be appreciated that the network connections shown anddescribed are exemplary and other means of establishing a communicationslink between the computers can be used.

FIG. 15 depicts an exemplary access terminal 1500 that can providefeedback to communications networks, in accordance with one or moreaspects. Access terminal 1500 comprises a receiver 1502 (e.g., anantenna) that receives a signal and performs typical actions on (e.g.,filters, amplifies, down converts, etc.) the received signal.Specifically, receiver 1502 can also receive a service schedule definingservices apportioned to one or more blocks of a transmission allocationperiod, a schedule correlating a block of downlink resources with ablock of uplink resources for providing feedback information asdescribed herein, or the like. Receiver 1502 can comprise a demodulator1504 that can demodulate received symbols and provide them to aprocessor 1506 for evaluation. Processor 1506 can be a processordedicated to analyzing information received by receiver 1502 and/orgenerating information for transmission by a transmitter 1516.Additionally, processor 1506 can be a processor that controls one ormore components of access terminal 1500, and/or a processor thatanalyzes information received by receiver 1502, generates informationfor transmission by transmitter 1516, and controls one or morecomponents of access terminal 1500. Additionally, processor 1506 canexecute instructions for interpreting a correlation of uplink anddownlink resources received by receiver 1562, identifying un-receiveddownlink block, or generating a feedback message, such as a bitmap,appropriate to signal such up-received block or blocks, or for analyzinga hash function to determine an appropriate uplink resource of aplurality of uplink resources, as described herein.

Access terminal 1500 can additionally comprise memory 1508 that isoperatively coupled to processor 1506 and that may store data to hetransmitted, received, and the like. Memory 1508 can store informationrelated to downlink resource scheduling, protocols for evaluating theforegoing, protocols for identifying un-received portions of atransmission, for determining an indecipherable transmission, fortransmitting a feedback message to an access point, and the like.

It will be appreciated that the data store (e.g., memory 1508) describedherein can be either volatile memory or nonvolatile memory, or caninclude both volatile and nonvolatile memory. By way of illustration,and not limitation, nonvolatile memory can include read only memory(ROM), programmable ROM (PROM), electrically programmable ROM (EPROM),electrically erasable PROM (EEPROM), or flash memory. Volatile memorycan include random access memory (RAM), which acts as external cachememory. By way of illustration and not limitation, RAM is available inmany forms such as synchronous .RAM (SRAM), dynamic RAM (DRAM),synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhancedSDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).The memory 1508 of the subject systems and methods is intended tocomprise, without being limited to, these and any other suitable typesof memory.

Receiver 1502 is further operatively coupled to multiplex antenna 1510that can receive a scheduled correlation between one or more additionalblocks of downlink transmission resources and a block of uplinktransmission resources. A multiplex processor 1506 can include amulti-digit. Further, a calculation processor 1512 can receive afeedback probability function, wherein the function limits a probabilitythat a feedback message is provided by access terminal 1500, asdescribed herein, if the block of downlink transmission resources, ordata associated therewith, is not received.

Access terminal 1500 still further comprises a modulator 1514 and atransmitter 1516 that transmits the signal to, for instance, a basestation, an access point, another access terminal, a remote agent, etc.Although depleted as being separate from the processor 1506, it is to beappreciated that signal generator 1510 and indicator evaluator 1512 maybe part of processor 1506 or a number of processors (not shown),

FIG. 16 illustrates an apparatus 1600 operable in a wirelesscommunication system including a plurality of cells, the apparatusincludes modular component means 1602 for transmitting to a mobiledevice from a source enhanced node B and modular component means 1604for sending Packet Data Convergence Protocol (PDCP) status report fromthe mobile device to a target enhanced node B.

What has been described above includes examples of one or more aspects.It is, of course, not possible to describe every conceivable combinationof components or methodologies for purposes of describing theaforementioned aspects, but one of ordinary skill in the art mayrecognize that many further combinations and permutations of variousaspects are possible. Accordingly, the described aspects are intended toembrace all such alterations, modifications, and variations that fallwithin the scope of the appended claims. Furthermore, to the extent thatthe term “includes” is used in either the detailed description or theclaims, such term is intended to be inclusive in a manner similar to theterm “comprising” as “comprising” is interpreted when employed as atransitional word in a claim.

1. A method used in a wireless communication system including aplurality of cells, the method comprising: transmitting to a mobiledevice from a source enhanced node B; and sending a Packet DataConvergence Protocol (PDCP) status report to a target enhanced node Bfrom the mobile device.
 2. A method in accordance with claim 1 whereinthe sending comprises sending information relevant to both to the targetenhanced node B and the source enhanced node B.
 3. A method inaccordance with claim 2 further comprising sending PDCP informationcomprising sending at least one PDCP sequence number to the targetenhanced node B from the mobile device.
 4. A method in accordance withclaim 1 further comprising sending PDCP information comprising sendingat least one PDCP sequence number to the target enhanced node B from themobile device.
 5. A method in accordance with claim 1 further comprisingsending a handoff confirm message.
 6. A method in accordance with claim1 further comprising sending a hand-off confirm message to the targetenhanced node B.
 7. A method comprising: transmitting to a mobile devicefrom a source enhanced node B; and sending a Packet Data ConvergenceProtocol (PDCP) status report to the source enhanced node B from themobile device prior to a re-pointing to a target enhanced node B.
 8. Amethod in accordance with claim 7 wherein the sending comprises sendinginformation relevant to both to the target enhanced node B and thesource enhanced node B.
 9. A method in accordance with claim 7 thesending comprises sending the Packet Data Convergence Protocol (PDCP)status report containing at least one PDCP sequence number to a targetenhanced node B.
 10. A method in accordance with claim 9 furthercomprising sending a handoff confirm message.
 11. A method in accordancewith claim 7 further comprising sending PDCP information to a targetenhanced node B.
 12. A method in accordance with claim 7 farthercomprising sending a handoff confirm message.
 13. A method in accordancewith claim 7 further comprising sending a handoff confirm message to thetarget enhanced node B.
 14. An apparatus operable in a wirelesscommunication system, the apparatus comprising: a mobile deviceprocessor configured to receive transmissions from a source enhancednode B and send Packet Data Convergence Protocol (PDCP) status report toa target enhanced node B; and a memory coupled to the processor forstoring data.
 15. An apparatus in accordance with claim 14 wherein theprocessor is configured to send information relevant to both to thetarget enhanced node B and the source enhanced node B.
 16. An apparatusin accordance with claim 15 wherein the processor is configured to senda handoff confirm message.
 17. An apparatus in accordance with claim 14wherein the processor is configured to send PDCP information to a sourceenhanced node B.
 18. An apparatus in accordance with claim 14 whereinthe processor is configured to send a handoff confirm message.
 19. Anapparatus in accordance with claim 14 wherein the processor isconfigured to send a hand-off confirm message to the source enhancednode B.
 20. An apparatus operable in a wireless communication systemincluding a plurality of cells, the apparatus comprising: means fortransmitting to a mobile device from a source enhanced node B; and meansfor sending Packet Data Convergence Protocol (PDCP) status report fromthe mobile device, to a target enhanced node B.
 21. Apparatuscomprising: a mobile device comprising a processor configured to send aPacket Data Convergence Protocol (PDCP) status report to a sourceenhanced node B from the mobile device prior to a re-pointing to thetarget enhanced node B.
 22. An apparatus in accordance with claim 21wherein the processor is further configured to send at least one PDCPsequence number to the source enhanced node B.
 23. An apparatus inaccordance with, claim 22 wherein the processor is further configured tosend a handoff confirm message to the target enhanced node B.
 24. Anapparatus in accordance with claim 21 wherein the processor is furtherconfigured to send a handoff confirm message to the target enhanced,node B.
 25. A computer program product, comprising: a computer-readablemedium comprising: code for sending a Packet Data Convergence Protocol(PDCP) status report to a source enhanced node B.