CN114175714A - Managing communication of wireless devices with base stations to obtain system information from the base stations while reducing congestion - Google Patents

Managing communication of wireless devices with base stations to obtain system information from the base stations while reducing congestion Download PDF

Info

Publication number
CN114175714A
CN114175714A CN202080054090.6A CN202080054090A CN114175714A CN 114175714 A CN114175714 A CN 114175714A CN 202080054090 A CN202080054090 A CN 202080054090A CN 114175714 A CN114175714 A CN 114175714A
Authority
CN
China
Prior art keywords
request
wireless device
determining
access channel
base station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202080054090.6A
Other languages
Chinese (zh)
Inventor
K.文卡特拉姆
A.A.谢克
D.艾默加
S.王
A.V.桑塔纳姆
O.厄兹蒂尔克
北添正人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US16/929,410 external-priority patent/US11234259B2/en
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of CN114175714A publication Critical patent/CN114175714A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0289Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/12Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • H04W74/0841Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure with collision treatment

Abstract

The present disclosure provides systems, methods, and apparatus, and computer programs encoded on computer storage media, for managing communications with a base station by a processor of a wireless device. In an aspect, a processor of a wireless device may receive a system information change indication in first system information from a base station. The processor may determine scheduling information for the second system information from the first system information. The processor may determine a factor by which a request for second system information will conflict with a request for second system information from another wireless device. The processor may send a request for second system information using the determined factor.

Description

Managing communication of wireless devices with base stations to obtain system information from the base stations while reducing congestion
RELATED APPLICATIONS
This application claims priority to Indian provisional application No. 201941030908 entitled "MANAGING WIRELESS DEVICE communiation WITH A BASE STATION" filed on 31.7.7.2019, the entire contents of which are hereby incorporated by reference for all purposes.
Technical Field
The present disclosure relates generally to wireless devices, and more particularly to managing wireless devices to obtain required system information from a base station while reducing radio link congestion.
Background
The wireless base station provides certain System Information (SI) that enables the wireless device to establish a communication link with the base station. The SI may be provided in one or more blocks, such as a Master Information Block (MIB) or a System Information Block (SIB). In the LTE system, MIB and SIB schedules are fixed, and all SIBs are broadcast by the base station. In 5G New Radio (NR) systems, SI is divided into Minimum System Information (MSIB) and other system information in order to reduce over-the-air signaling. MSIBs, such as MIB and SIB1 messages, are periodically broadcast and include basic information needed by the wireless device to attempt initial access to the cell, as well as information used to acquire other system information. Some base stations may broadcast other system information. However, some base stations may provide other system information based on demand, for example in response to receiving a request for such information from a wireless device.
Disclosure of Invention
The systems, methods, and devices of the present disclosure each have some innovative aspects, no single one of which is solely responsible for the desirable characteristics disclosed herein.
One innovative aspect of the subject matter described in this disclosure can be implemented in a wireless device. Some implementations may include: receiving a System Information (SI) change indication in a first SI from the base station; determining scheduling information of a second SI from the first SI; determining a factor by which a request for the second SI will conflict with a request for the second SI from another wireless device; and sending the request for the second SI using the determined factor.
In some implementations, the first SI may include one or more elements of a system information block 1(SIB1) message. In some implementations, the first SI may include one or more elements of a Master Information Block (MIB) message. Some implementations may include determining whether the second SI is a demand-based SI based on the first SI. In these implementations, determining the factor by which the request for the second SI will conflict with a request for the second SI from another wireless device may include determining the factor by which the request for the second SI will conflict with a request for the second SI from another wireless device in response to determining that the second SI is a demand-based SI.
In some implementations, determining a factor by which a request for the second SI will collide with a request for the second SI from another wireless device may include determining a random back-off (RBO) time for sending the request for the second SI, and sending the request for the second SI using the determined factor may include sending the request for the second SI using the determined RBO time.
In some implementations, determining a factor by which a request for the second SI will conflict with a request for the second SI from another wireless device may include determining an access restriction category for the wireless device, and sending the request for the second SI using the determined factor may include sending the request for the second SI in accordance with the determined access restriction category. In some implementations, determining the factor by which the request for the second SI will conflict with a request for the second SI from another wireless device may include determining a factor for reducing a probability that the request for the second SI will conflict with a request for the second SI from another wireless device.
Another innovative aspect of the subject matter described in this disclosure can be implemented in a wireless device, which can include: receiving network configuration information in first System Information (SI) from a base station; determining, from the network configuration information in the first SI, a type of access channel request to send to the base station; transmitting one or more first requests for a second SI to the base station based on the determined type of access channel request; determining whether an access channel request failure has occurred after sending at least one of the first requests for the second SI; in response to determining that an access channel request failure has occurred, determining an RBO time for transmitting a second access channel request based on the determined type of access channel request; and transmitting a second request for the second SI to the base station based on the RBO time.
In some implementations, the type of access channel request may include one of a Message-1 (Message-1) single resource request, a Message-1 (Message-1) multiple resource request, and a Message-3 (Message-3) request. In some implementations, sending some access channel requests to the base station based on the determined type of access channel request may include sending a plurality of access channel requests to the base station based on the determined type of access channel request, and determining that an access channel request failure has occurred may include determining that an access channel request failure has occurred after sending any of the plurality of access channel requests.
Some implementations may include identifying one or more messages of the second SI that are not received by the wireless device, and sending a request to the base station for the one or more messages of the second SI that are not received by the wireless device using the RBO time. Some implementations may include determining whether a time for receiving the second SI has elapsed, and in response to determining that the time for receiving the second SI has elapsed, sending a third request for the second SI to the base station.
In some implementations, determining whether an access channel request failure has occurred after sending at least one of the first requests for the second SI may include: monitoring the second SI based on the one or more first requests for the second SI and determining that the access channel request failure has occurred based on a failure to receive at least one element of the second SI. In some implementations, monitoring the second SI based on the request for the second SI may include monitoring the second SI requested by another wireless device.
Another innovative aspect of the subject matter described in this disclosure can be implemented in an apparatus of a wireless device. Some implementations of a wireless device may include: a first interface configured to obtain a System Information (SI) change indication in SI, and a processing system coupled to the first interface and configured to: determining scheduling information of a second SI from the first SI; determining a factor by which a request for the second SI will conflict with a request for the second SI from another wireless device; and sending the request for the second SI using the determined factor.
In some implementations, the first SI may include one or more elements of a system information block 1(SIB1) message. In some implementations, the first SI may include one or more elements of a Master Information Block (MIB) message. In some implementations, the processing system may be further configured to determine whether the second SI is a demand-based SI based on the first SI. In these configurations, the processing system may be further configured to determine the factor for reducing a probability that a request for the second SI will collide with a request for the second SI from another wireless device in response to determining that the second SI is a demand-based SI.
In some implementations, the processing system may be further configured to determine an RBO time for transmitting the request for the second SI, and transmit the request for the second SI using the determined RBO time. In some implementations, the processing system may be further configured to determine an access restriction category of the wireless device, and transmit the request for the second SI in accordance with the determined access restriction category. In some implementations, the processing system may be further configured to determine a factor for reducing a probability that the request for the second SI will collide with a request for the second SI from another wireless device.
Another innovative aspect of the subject matter described in this disclosure can be implemented in an apparatus of a wireless device. Some implementations of a wireless device may include: a first interface configured to obtain network configuration information in a first SI, and a processing system coupled to the first interface and configured to: determining from the network configuration information a type of access channel request to send to a base station; transmitting one or more first requests for a second SI to the base station based on the determined type of access channel request; determining whether an access channel request failure has occurred after transmitting at least one of the first requests for the second SI; in response to determining that an access channel request failure has occurred, determining an RBO time for transmitting a second access channel request based on the determined type of access channel request; and transmitting a second request for the second SI to the base station based on the RBO time.
In some implementations, the type of access channel request can include one of a message-1 single resource request, a message-1 multiple resource request, and a message-3 request. In some implementations, the processing system may be further configured to: transmitting a plurality of access channel requests to the base station based on the determined type of access channel request; and determining that an access channel request failure has occurred after transmitting any of the plurality of access channel requests. In some implementations, the processing system may be further configured to: identifying one or more messages of the second SI that are not received by the wireless device; and transmitting a request to the base station for the one or more messages of the second SI that are not received by the wireless device using the RBO time.
In some implementations, the processing system may be further configured to: determining whether a time for receiving the second SI has elapsed; and in response to determining that the time to receive the second SI has elapsed, sending a third request for the second SI to the base station. In some implementations, the processing system may be further configured to: monitoring the second SI based on the one or more first requests for the second SI; and determining that the access channel request failure has occurred based on a failure to receive at least one element of the second SI. In some implementations, the processing system may be further configured to: monitoring the second SI requested by another wireless device.
The details of one or more implementations of the subject matter described in this disclosure are set forth in the accompanying drawings and the description below. Other features, aspects, and advantages will become apparent from the description, the drawings, and the claims. Note that the relative dimensions of the following figures may not be drawn to scale.
Drawings
Fig. 1A shows a block diagram illustrating an example communication system.
Fig. 1B shows a data flow diagram illustrating an example of system information provisioning.
FIG. 2 illustrates a component block diagram of an example computing system.
Fig. 3 illustrates a component block diagram of an example software architecture including a radio protocol stack for a user and control plane in wireless communications.
Fig. 4 illustrates a component block diagram of an example system configured to manage paging monitoring by a processor of a wireless device.
Fig. 5 illustrates a process flow diagram of an example method of managing, by a processor of a wireless device, communication with a base station.
Fig. 6A-6C illustrate a process flow diagram of example operations that may be performed as part of a method of managing communication with a base station by a processor of a wireless device.
Fig. 7 illustrates a process flow diagram of an example method of managing, by a processor of a wireless device, communication with a base station.
Fig. 8A-8D illustrate a process flow diagram of example operations that may be performed as part of a method of managing communication with a base station by a processor of a wireless device.
FIG. 9 illustrates a component block diagram of an example network computing device.
FIG. 10 illustrates a component block diagram of an example wireless device.
Like reference numbers and designations in the various drawings indicate like elements.
Detailed description of the invention
To describe the innovative aspects of the present disclosure, the following description is directed to certain implementations. However, one of ordinary skill in the art will readily recognize that the teachings herein may be applied in a number of different ways.
The described implementations may be implemented in any device, system, or network capable of transmitting and receiving Radio Frequency (RF) signals according to any Institute of Electrical and Electronics Engineers (IEEE)16.11 standard, or any IEEE 802.11 standard, Bluetooth standard, Code Division Multiple Access (CDMA), Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Global System for Mobile communications (GSM), GSM/General Packet Radio Service (GPRS), Enhanced Data GSM Environment (EDGE), terrestrial trunked radio (TETRA), wideband CDMA (W-CDMA), evolution data optimized (EV-DO), 1xEV-DO, EV-ReDO, EV-DO RevB, High Speed Packet Access (HSPA), High Speed Downlink Packet Access (HSDPA), High Speed Uplink Packet Access (HSUPA), evolved high speed packet Access (HSPA +), Long Term Evolution (LTE), AMPS, or for use in wireless, wireless-wireless, wireless-wireless, other signals communicated within a cellular or internet of things (IOT) network, such as a system utilizing 3G, 4G, or 5G technologies or further implementations thereof.
Some base stations implementing the 5G NR communication protocol may be configured to broadcast a reduced amount of System Information (SI). Such a base station may be configured to provide additional SI in response to a request from a wireless device. SI is critical for a wireless device to establish communication with a base station. However, when a base station responds to multiple requests to broadcast a demand-based SI (on-demand SI), many wireless devices requesting the demand-based SI from the base station may cause an increase in wireless communication link congestion.
Implementations described herein provide methods for managing wireless devices to enable acquisition of SI required for communication with a base station while also reducing wireless signaling congestion and wireless communication links. In an aspect, a wireless device that is performing a process for managing communications with a base station may receive an SI change indication in a first SI from the base station. The wireless device may determine scheduling information for the second SI from the first SI. The wireless device may determine a factor by which a request for the second SI will conflict with a request for the second SI from another wireless device. The factor may be a factor for reducing a probability that a request for the second SI will collide with a request for the second SI from another wireless device. Using the determined factor, the wireless device may send a request to the base station for the second SI.
In some implementations, the first SI may include one or more elements of a system information block 1(SIB1) message. In some implementations, the first SI may include one or more elements of a Master Information Block (MIB) message.
In some implementations, the wireless device may determine whether the second SI is a demand-based SI based on the first SI. In some implementations, a wireless device may determine, in response to determining that a second SI is a demand-based SI, a factor for reducing a probability that a request for the second SI will collide with a request for the second SI from another wireless device.
In some implementations, a wireless device may determine a random back-off (RBO) time for transmitting a request for a second SI, and may transmit the request for the second SI using the determined RBO time. In some implementations, the wireless device may determine an access restriction category of the wireless device, and may send the request for the second SI according to the determined access restriction category.
In some implementations, a wireless device that is performing a process for managing communications with a base station may receive network configuration information in a first SI from the base station and may determine a type of access channel request to send to the base station from the network configuration information. The wireless device may send some requests for the second SI to the base station based on the determined type of access channel request. The wireless device may determine that an access channel request failure has occurred after transmitting at least one of the requests for the second SI. In some implementations, the wireless device may determine an RBO time for transmitting the second access channel request based on the determined type of access channel request, and may transmit the second request for the second SI to the base station using the RBO time. In some implementations, the type of access channel request may include one of a Message-1 (Message-1) single resource request, a Message-1 (Message-1) multiple resource request, and a Message-3 (Message-3) request.
In some implementations, the wireless device may transmit a plurality of access channel requests to the base station based on the determined type of access channel request, and may determine that an access channel request failure has occurred after transmitting any of the plurality of access channel requests. In some implementations, the wireless device may identify one or more messages of the second SI that are not received by the wireless device. The wireless device may use the RBO time to schedule transmission of a request to the base station for one or more messages of the second SI that are not received by the wireless device.
In some implementations, the wireless device may determine that a time for receiving the second SI has elapsed, and may send a third request for the second SI to the base station. In some implementations, the wireless device may monitor the second SI based on the request for the second SI, and may determine that an access channel request failure has occurred based on a failure to receive at least one element of the second SI. In some implementations, a wireless device may monitor for a second SI that has been requested by another wireless device.
Particular implementations of the subject matter described in this disclosure can be implemented to realize one or more of the following potential advantages. The present disclosure may provide improved techniques for managing communications between a base station and one or more wireless devices. For example, the techniques may be used to manage provisioning of SI from a base station to one or more wireless devices. Additionally, the techniques may provide improvements to increase communication efficiency and reduce wireless communication link congestion between a base station and one or more wireless devices.
The term "wireless device" as used herein refers to any one or all of a wireless router device, a wireless appliance, a cellular telephone, a smartphone, a portable computing device, a personal or mobile multimedia player, a laptop computer, a tablet computer, a smart book, a palmtop computer, a wireless email receiver, a multimedia internet enabled cellular telephone, a wireless gaming controller, an internet of things (IoT) device that supports wireless networks including large and small machines and appliances used by homes and businesses, wireless communication elements within autonomous and semi-autonomous vehicles, wireless devices attached to or incorporated into various mobile platforms, and similar electronic devices including memory, wireless communication components, and programmable processors.
The term "system on a chip" (SOC) as used herein refers to a single Integrated Circuit (IC) chip that contains multiple resources or processors integrated on a single substrate. A single SOC may contain circuitry for digital, analog, mixed signal, and radio frequency functions. A single SOC may also include any number of general or special purpose processors (digital signal processors, modem processors, video processors, etc.), memory blocks (e.g., ROM, RAM, flash memory, etc.), and resources (e.g., timers, voltage regulators, oscillators, etc.). The SOC may also include software for controlling the integrated resources and processors, as well as controlling the peripheral devices.
The term "system in package" (SIP) as may be used herein refers to a single module or package containing multiple resources, computational units, cores or processors on two or more IC chips D, a substrate, or a SOC. For example, a SIP may include a single substrate on which multiple IC chips or semiconductor wafers are stacked in a vertical configuration. Similarly, a SIP may include one or more multi-chip modules (MCMs) on which multiple ICs or semiconductor dies are packaged into a unified substrate. SIP may also include multiple independent SOCs coupled together by high-speed communication circuitry and packaged in close proximity (e.g., on a single motherboard or in a single wireless device). The proximity of the SOC facilitates high speed communication and sharing of memory and resources.
The term "processing system" as used herein refers to a processor, SOC, or SIP coupled to or including a storage device.
The term "multi-core processor" as may be used herein refers to a single Integrated Circuit (IC) chip or chip package that includes two or more independent processing cores (e.g., CPU cores, Internet Protocol (IP) cores, Graphics Processor Unit (GPU) cores, etc.) configured to read and execute program instructions. The SOC may include a plurality of multicore processors, and each processor in the SOC may be referred to as a core. The term "multiprocessor" as may be used herein refers to a system or device comprising two or more processing units configured to read and execute program instructions.
Fig. 1A illustrates an example of a communication system 100 suitable for implementing various implementations. The communication system 100 may be a 5G NR network, or any other suitable network, such as an LTE network.
The communication system 100 may include a heterogeneous network architecture including a communication network 140 and various mobile devices (shown in fig. 1 as wireless devices 120a-120 e). Communication system 100 may also include multiple base stations (shown as BS 110a, BS 110b, BS 110c, and BS 110d) and other network entities. A base station is an entity that communicates with a wireless device (mobile device), and may also be referred to as a NodeB, a Node B, a LET evolved NodeB (eNB), an Access Point (AP), a radio head (radio head), a Transmission Reception Point (TRP), a new radio base station (NR BS), a 5G NodeB (NB), a next generation NodeB (gNB), and so on. Each base station may provide communication coverage for a particular geographic area. In 3GPP, the term "cell" can refer to a coverage area of a base station, a base station subsystem serving the coverage area, or a combination thereof, depending on the context in which the term is used.
The base stations 110a-110d may provide communication coverage for a macrocell, a picocell, a femtocell, another type of cell, or a combination thereof. A macro cell may cover a relatively large geographic area (e.g., several kilometers in radius) and may allow unrestricted access by mobile devices through service subscriptions. A pico cell may cover a relatively small geographic area and may allow unrestricted access by wireless devices through service subscriptions. A femto cell may cover a relatively small geographic area (e.g., a home) and may allow restricted access by mobile devices associated with the femto cell (e.g., mobile devices in a Closed Subscriber Group (CSG)). The base station for the macro cell may be referred to as a macro BS. The base station for the pico cell may be referred to as a pico BS. The base station for the femto cell may be referred to as a femto BS or a home BS. In the example shown in fig. 1, base station 110a may be a macro BS for macro cell 102a, base station 110b may be a pico BS for pico cell 102b, and base station 110c may be a femto BS for femto cell 102 c. The base stations 110a-110d may support one or more (e.g., three) cells. The terms "eNB", "base station", "NR BS", "gNB", "TRP", "AP", "node B", "5G NB" and "cell" may be used interchangeably herein.
In some examples, the cell is not necessarily stationary, and the geographic area of the cell may move according to the location of the mobile base station. In some examples, the base stations 110a-110d may be interconnected to each other and to one or more other base stations or network nodes (not shown) in the communication system 100 through various types of backhaul interfaces (e.g., direct physical connections, virtual networks, or a combination thereof) using any suitable transport network.
Communication system 100 may also include a relay station (e.g., relay BS 110 d). A relay station is an entity capable of receiving a data transmission from an upstream station (e.g., a base station or mobile device) and sending the data transmission to a downstream station (e.g., a wireless device or base station). A relay station may also be a wireless device that can relay transmissions for other mobile devices. In the example shown in fig. 1, the relay station 110d may communicate with the macro base station 110a and the wireless device 120d to facilitate communications between the macro base station 110a and the wireless device 120 d. A relay station may also be referred to as a relay base station, relay, etc.
The communication system 100 may be a heterogeneous network including different types of base stations (e.g., macro, pico, femto, relay, etc.). These different types of base stations may have different transmission power levels, different coverage areas, and different effects on interference in communication system 100. For example, macro base stations may have high transmission power levels (e.g., 5 to 40 watts), while pico base stations, femto base stations, and relay base stations may have lower transmission power levels (e.g., 0.1 to 2 watts).
Network controller 130 may be coupled to a set of base stations and may provide coordination and control for these base stations. Network controller 130 may communicate with the base stations via a backhaul. The base stations may also communicate with each other, directly or indirectly, e.g., through a wireless or wired backhaul.
The mobile devices 120a, 120b, 120c can be dispersed throughout the communication system 100, and each wireless device can be stationary or mobile. A wireless device may also be called an access terminal, mobile station, subscriber unit, station, or the like. The wireless devices 120a, 120b, 120c can be cellular phones (e.g., smart phones), Personal Digital Assistants (PDAs), wireless modems, wireless communication devices, handheld devices, laptop computers, cordless phones, Wireless Local Loop (WLL) stations, tablet computers, cameras, gaming devices, netbooks, smartbooks, ultrabooks, medical devices or equipment, biometric sensors/devices, wearable devices (smartwatches, smartclothing, smart glasses, smart wristbands, smart jewelry (e.g., smart rings, smart bracelets)), entertainment devices (e.g., music or video devices or satellite radios), vehicle components or sensors, smart meters/sensors, industrial manufacturing equipment, global positioning system devices, or any other suitable device configured to communicate over a wireless or wired medium.
The macro base station 110a may communicate with the communication network 140 through a wired or wireless communication link 126. The wireless devices 120a, 120b, 120c may communicate with the base stations 110a-110d via wireless communication links 122.
The wired communication link may use various wired networks (e.g., ethernet, TV cable, telephone, fiber optic, and other forms of physical network connections) that may use one or more wired communication protocols such as ethernet, point-to-point protocol, high-level data link control (HDLC), high-level data communication control protocol (ADCCP), and transmission control protocol/internet protocol (TCP/IP).
The wireless communication links 122, 124 may include multiple carrier signals, frequencies, or frequency bands, each of which may include multiple logical channels. The wireless communication link may utilize one or more Radio Access Technologies (RATs). Examples of RATs that may be used in a wireless communication link include 3GPP LTE, 3G, 4G, 5G (e.g., NR), GSM, Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Worldwide Interoperability for Microwave Access (WiMAX), Time Division Multiple Access (TDMA), and other mobile telephone communication technology cellular RATs. Further examples of RATs that may be used in one or more of the various wireless communication links within the communication system 100 include medium range protocols such as Wi-Fi, LTE-U, LTE-Direct, LAA, MuLTEfire, and relatively short range RATs such as ZigBee, bluetooth, and Low Energy (LE) bluetooth.
Some wireless networks, such as LTE, utilize Orthogonal Frequency Division Multiplexing (OFDM) on the downlink and single carrier frequency division multiplexing (SC-FDM) on the uplink. OFDM and SC-FDM partition the system bandwidth into multiple (K) orthogonal subcarriers, which are also commonly referred to as tones (tones), bins (bins), and so on. Each subcarrier may be modulated with data. Typically, modulation symbols are sent in the frequency domain with OFDM and in the time domain with SC-FDM. The spacing between adjacent subcarriers may be fixed, and the total number of subcarriers (K) may depend on the system bandwidth. For example, the spacing of the subcarriers may be 15kHz and the minimum resource allocation (referred to as a "resource block") may be 12 subcarriers (or 180 kHz). Thus, for a system bandwidth of 1.25, 2.5, 5, 10, or 20 megahertz (MHz), the nominal Fast File Transfer (FFT) size may be equal to 128, 256, 512, 1024, or 2048, respectively. The system bandwidth may also be divided into sub-bands. For example, a sub-band may cover 1.08MHz (i.e., 6 resource blocks), and there may be 1, 2, 4, 8, or 16 sub-bands for a system bandwidth of 1.25, 2.5, 5, 10, or 20MHz, respectively.
Although the description of some implementations may use terminology and examples associated with LTE technology, some implementations may be applicable to other wireless communication systems, such as New Radio (NR) or 5G networks. NR may utilize OFDM with Cyclic Prefix (CP) on Uplink (UL) and Downlink (DL) and includes support for half-duplex operation using Time Division Duplex (TDD). A single component carrier bandwidth of 100MHz may be supported. The NR resource blocks may span 12 subcarriers in a duration of 0.1 milliseconds (ms), with a subcarrier bandwidth of 75 kHz. Each radio frame may consist of 50 subframes of length 10 ms. Thus, each subframe may have a length of 0.2 ms. Each subframe may indicate a link direction (i.e., DL or UL) for data transmission, and the link direction of each subframe may be dynamically switched. Each subframe may include DL/UL data as well as DL/UL control data. Beamforming may be supported and beam directions may be dynamically configured. Multiple-input multiple-output (MIMO) transmission with precoding may also be supported. MIMO configuration in DL can support up to eight transmit antennas with multi-layer DL transmission of up to eight streams, and up to two streams per wireless device. Multi-layer transmission with up to two streams per wireless device may be supported. Multiple cell aggregation of up to eight serving cells may be supported. Alternatively, the NR may support a different air interface than the OFDM based air interface.
Some mobile devices may be considered Machine Type Communication (MTC) or evolved or enhanced machine type communication (eMTC) mobile devices. MTC and eMTC mobile devices include, for example, robots, drones, remote devices, sensors, meters, monitors, location tags, etc., which may communicate with a base station, another device (e.g., a remote device), or some other entity. For example, the wireless nodes may provide connectivity to or from a network (e.g., a wide area network such as the internet or a cellular network) via wired or wireless communication links. Some mobile devices may be considered internet of things (IoT) devices, or may be implemented as NB-IoT (narrowband internet of things) devices. The wireless device 120 may be included within a housing that houses components of the wireless device 120, such as a processor component, a memory component, similar components, or a combination thereof.
In general, any number of communication systems and any number of wireless networks may be deployed in a given geographic area. Each communication system and wireless network may support a particular Radio Access Technology (RAT) and may operate on one or more frequencies. A RAT may also be referred to as a radio technology, air interface, etc. The frequencies may also be referred to as carriers, frequency channels, etc. Each frequency may support a single RAT in a given geographic area to avoid interference between communication systems of different RATs. In some cases, NR or 5G RAT networks may be deployed.
In some examples, access to an air interface may be scheduled, where a scheduling entity (e.g., a base station) allocates resources for communication between some or all devices and equipment within a service area or cell of the scheduling entity. The scheduling entity may be responsible for scheduling, allocating, reconfiguring, and releasing resources for one or more subordinate entities. That is, for scheduled communications, the subordinate entity utilizes the resources allocated by the scheduling entity.
The base station is not the only entity that can act as a scheduling entity. In some examples, a wireless device may act as a scheduling entity, scheduling resources for one or more subordinate entities (e.g., one or more other mobile devices). In this example, the wireless device acts as a scheduling entity and other mobile devices utilize resources scheduled by the wireless device for wireless communications. The wireless device may act as a scheduling entity in a peer-to-peer (P2P) network, a mesh network, or other type of network. In the mesh network example, in addition to communicating with the scheduling entity, the mobile devices may optionally communicate directly with each other.
Thus, in a wireless communication network having scheduled access to time-frequency resources and having a cellular configuration, a P2P configuration, and a mesh configuration, a scheduling entity and one or more subordinate entities may communicate using the scheduled resources.
In some implementations, two or more mobile devices 120a-e (e.g., shown as wireless device 120a and wireless device 120e) can communicate directly (e.g., without using base stations 110a-d as intermediaries for communicating with each other) using one or more sidelink channels. For example, the mobile devices 120a-e may communicate using peer-to-peer (P2P) communications, device-to-device (D2D) communications, vehicle-to-all (V2X) protocols (which may include vehicle-to-vehicle (V2V) protocols, vehicle-to-infrastructure (V2I) protocols, or the like), mesh networks, or the like, or a combination thereof. In this case, the wireless devices 120a-e may perform scheduling operations, resource selection operations, and other operations described elsewhere herein as being performed by the base stations 110 a-d.
Fig. 1B shows an example of SI provisioning. To establish communication with base station 110, wireless device 120 may attempt to acquire SI from base station 110. The SI may be provided in one or more system information blocks, such as a Master Information Block (MIB) and one or more System Information Blocks (SIBs). The SI provides timing and structure information that enables the wireless device 120 to receive and decode further information from the base station 110, which enables the wireless device 120 to access communications, cell access, perform cell reselection, intra-frequency, inter-frequency, and inter-RAT cell selection procedures, and other operations, for example, through the base station 110.
In 5G NR, the base station broadcasts certain system information, such as MIB and SIB1 messages. In some implementations, additional SI may also be broadcast. However, in some implementations, in response to a request for additional SI (e.g., a request for demand-based SI), the additional SI (e.g., demand-based SI) may be transmitted by the base station. In some implementations, the broadcasted SI (i.e., MIB or SIB1 message) may include scheduling information to enable the wireless device 120 to request and receive SI based on demand.
When wireless device 120 powers on, wireless device 120 may perform cell search and acquire one or more synchronization signals, e.g., Primary Synchronization Signal (PSS) and Secondary Synchronization Signal (SSS), and a Physical Broadcast Channel (PBCH), from base station 110. Using the synchronization signal and information from the PBCH, the wireless device 120 may receive, decode, and store MIB messages from the base station 110. Using the parameters from the decoded MIB, the wireless device 120 may receive and decode the SIB1 message. In some implementations, the SIB1 message may indicate that the base station 110 is configured to provide one or more demand-based SI messages. To acquire demand-based SI messages, wireless device 120 may send a request for one or more demand-based SI messages to base station 110. In some implementations, sending the request for one or more demand-based SI messages may be part of a Random Access Channel (RACH) request procedure.
Fig. 2 illustrates an example computing system or SIP 200 architecture that may be used in a wireless device implementing various implementations. Referring to fig. 1A-2, an example computing system 200 (which may be SIP in some implementations) is shown to include two SOCs 202, 204 coupled to a clock 206, a voltage regulator 208, and a wireless transceiver 266, the wireless transceiver 266 configured to send and receive wireless communications to/from a wireless device (e.g., base station 110a) via an antenna (not shown). In some implementations, the first SOC202 operates as a Central Processing Unit (CPU) of the wireless device that executes instructions of a software application by performing arithmetic, logical, control, and input/output (I/O) operations specified by the instructions. In some implementations, the second SOC204 may operate as a dedicated processing unit. For example, the second SOC204 may operate as a dedicated 5G processing unit responsible for managing high capacity, high speed (e.g., 5Gbps, etc.), or very high frequency, short wavelength (e.g., 28GHz millimeter wave (mmWave) spectrum, etc.) communications.
The first SOC202 may include a Digital Signal Processor (DSP)210, a modem processor 212, a graphics processor 214, an applications processor 216, one or more coprocessors 218 (e.g., vector coprocessors) connected to the one or more processors, a memory 220, customization circuits 222, system components and resources 224, interconnect/bus modules 226, one or more temperature sensors 230, a thermal management unit 232, and a Thermal Power Envelope (TPE) component 234. Second SOC204 may include a 5G modem processor 252, a power management unit 254, an interconnect/bus module 264, a plurality of mmWave transceivers 256, a memory 258, and various additional processors 260, such as an application processor, a packet processor, and the like.
Each processor 210, 212, 214, 216, 218, 252, 260 may include one or more cores, and each processor/core may perform operations independently of the other processors/cores. For example, the first SOC202 may include processors executing a first type of operating system (e.g., FreeBSD, LINUX, OS X, etc.) and processors executing a second type of operating system (e.g., MICROSOFT WINDOWS 10). Further, any or all of the processors 210, 212, 214, 216, 218, 252, 260 may be included as part of a processor cluster architecture (e.g., a synchronous processor cluster architecture, an asynchronous or heterogeneous processor cluster architecture, etc.).
The first and second SOCs 202, 204 may include various system components, resources, and custom circuitry for managing sensor data, analog-to-digital conversion, wireless data transmission, and for performing other specialized operations, such as decoding data packets and processing encoded audio and video signals for rendering in a web browser. For example, the system components and resources 224 of the first SOC202 may include power amplifiers, voltage regulators, oscillators, phase-locked loops, peripheral bridges, data controllers, memory controllers, system controllers, access ports, timers, and other similar components for supporting processors and software clients running on wireless devices. The system components and resources 224 or the customization circuitry 222 may also include circuitry to interface with peripheral devices such as cameras, electronic displays, wireless communication devices, external memory chips, and the like.
The first and second SOCs 202, 204 may communicate via an interconnect/bus module 250. The various processors 210, 212, 214, 216, 218 may be interconnected via an interconnect/bus module 226 to one or more memory elements 220, system components and resources 224, and customization circuitry 222 and thermal management unit 232. Similarly, the processor 252 may be interconnected to the power management unit 254, the mmWave transceiver 256, the memory 258, and various additional processors 260 via an interconnection/bus module 264. The interconnect/ bus modules 226, 250, 264 may include an array of reconfigurable logic gates or implement a bus architecture (e.g., CoreConnect, AMBA, etc.). Communication may be provided by advanced interconnects, such as a high performance network on chip (NoC).
The first or second SOC202, 204 may further include input/output modules (not shown), such as a clock 206 and a voltage regulator 208, for communicating with resources external to the SOC. Resources external to the SOC (e.g., clock 206, voltage regulator 208) may be shared by two or more internal SOC processors/cores.
In addition to the example SIP 200 discussed above, some implementations may be implemented in a wide variety of computing systems, which may include a single processor, multiple processors, multi-core processors, or any combination thereof.
Fig. 3 shows an example of a software architecture 300, the software architecture 300 including radio protocol stacks for user and control planes in wireless communications between a base station 350 (e.g., base station 110a) and wireless devices 320 (e.g., wireless devices 102a-e, 200). Referring to fig. 1A-3, a wireless device 320 may implement a software architecture 300 to communicate with a base station 350 in a communication system (e.g., 100). In various implementations, the layers in the software architecture 300 may form logical connections with corresponding layers in the software of the base station 350. Software architecture 300 may be distributed among one or more processors (e.g., processors 212, 214, 216, 218, 252, 260). Although shown with respect to one radio protocol stack, in a multi-SIM (subscriber identity module) wireless device, software architecture 300 may include multiple protocol stacks, each of which may be associated with a different SIM (e.g., two protocol stacks associated with two SIMs, respectively, in a dual-SIM wireless communication device). Although described below with reference to the LTE communication layer, software architecture 300 may support any of a variety of standards and protocols for wireless communication or may include additional protocol stacks that support any of a variety of standards and protocols for wireless communication.
The software architecture 300 may include a non-access stratum (NAS)302 and an Access Stratum (AS) 304. NAS302 may include functions and protocols that support packet filtering, security management, mobility control, session management, and traffic and signaling between the SIM of a wireless device (e.g., SIM 204) and its core network. AS 304 may include functionality and protocols to support communication between a SIM (e.g., SIM 204) and entities of a supported access network (e.g., base stations). In particular, AS 304 may include at least three layers (layer 1, layer 2, and layer 3), each of which may include various sub-layers.
In the user and control planes, layer 1 (L1) of AS 304 may be a physical layer (PHY)306, which may oversee the function of implementing transmission or reception over the air interface. Examples of such physical layer 306 functions may include Cyclic Redundancy Check (CRC) attachment, coding blocks, scrambling and descrambling, modulation and demodulation, signal measurement, MIMO, and so forth. The physical layer may include various logical channels including a Physical Downlink Control Channel (PDCCH) and a Physical Downlink Shared Channel (PDSCH).
In the user and control plane, layer 2 (L2) of AS 304 may be responsible for the link between wireless device 320 and base station 350 over physical layer 306. In various implementations, layer 2 may include a Medium Access Control (MAC) sublayer 308, a Radio Link Control (RLC) sublayer 310, and a Packet Data Convergence Protocol (PDCP) sublayer 312, each of which forms a logical connection that terminates at the base station 350.
In the control plane, layer 3 (L3) of AS 304 may include a Radio Resource Control (RRC) sublayer 3. Although not shown, software architecture 300 may include additional layer 3 sub-layers, as well as various upper layers above layer 3. In various implementations, the RRC sublayer 313 can provide functionality including broadcasting system information, paging (paging), and establishing and releasing RRC signaling connections between the wireless device 320 and the base station 350.
In various implementations, the PDCP sublayer 312 may provide uplink functions including multiplexing between different radio bearers and logical channels, sequence number addition, handover data processing, integrity protection, ciphering, and header compression. In the downlink, the PDCP sublayer 312 may provide functions including in-order delivery of data packets, redundant data packet detection, integrity verification, decryption, and header decompression.
In the uplink, the RLC sublayer 310 may provide segmentation and concatenation of upper layer data packets, retransmission of lost data packets, and automatic repeat request (ARQ). In the downlink, while the functions of the RLC sublayer 310 may include reordering of data packets to compensate for out-of-order reception, reassembly of upper layer data packets, and ARQ.
In the uplink, the MAC sublayer 308 may provide functions including multiplexing between logical and transport channels, random access procedures, logical channel priority, and Hybrid ARQ (HARQ) operations. In downlink, the MAC layer functions may include intra-cell channel mapping, demultiplexing, Discontinuous Reception (DRX), and HARQ operations.
While the software architecture 300 may provide functionality for sending data over a physical medium, the software architecture 300 may further include at least one host layer 314 to provide data transfer services to various applications in the wireless device 320. In some implementations, the application-specific functionality provided by the at least one host layer 314 may provide an interface between the software architecture and the general-purpose processor 206.
In other implementations, software architecture 300 may include one or more higher logical layers (e.g., transport, session, presentation, application, etc.) that provide host layer functionality. For example, in some implementations, the software architecture 300 may include a network layer (e.g., an IP layer) where logical connections terminate at a Packet Data Network (PDN) gateway (PGW). In some implementations, the software architecture 300 can include an application layer where logical connections terminate at another device (e.g., end user device, server, etc.). In some implementations, the software architecture 300 may further include a hardware interface 316 between the physical layer 306 and communication hardware (e.g., one or more RF transceivers) in the AS 304.
Fig. 4 is a block diagram illustrating components of a system 400, the system 400 configured to manage communications with a base station by a processor of a wireless device. Referring to fig. 1A-4, a system 400 may include a wireless device 402 (e.g., 120a-120e, 200, 320) and a base station 404 (e.g., 110a-110d, 200, 350).
The wireless device 402 may be configured by machine-readable instructions 406. The machine-readable instructions 406 may include one or more instruction modules. The instruction modules may include computer program modules. The instruction modules may include one or more of an SI scheduling information determination module 410, a factor determination module 412, a network configuration information determination module 414, an access channel request failure determination module 416, an access channel request time determination module 418, a message identification module 420, a time determination module 422, an SI monitoring module 424, and other instruction modules.
The SI scheduling information determining module 410 may be configured to determine scheduling information of a second SI from a first SI.
The factor determination module 412 may be configured to determine a factor for reducing a probability that a request for the second SI will collide with a request for the second SI from another wireless device. In some implementations, the factor determination module 412 may be configured to determine an RBO time for transmitting the request for the second SI. In some implementations, the factor determination module 412 may be configured to determine whether the second SI is a demand-based SI based on the first SI. In some implementations, the factor determination module 412 can be configured to determine an access restriction category for the wireless device.
The network configuration information determination module 414 may be configured to determine a type of access channel request to send to the base station from the network configuration information.
The access channel request failure determination module 416 may be configured to determine that an access channel request failure has occurred after transmitting at least one of the requests for the second SI. In some implementations, the access channel request failure determination module 416 may be configured to determine that an access channel request failure has occurred after transmitting any of the plurality of access channel requests. In some implementations, the access channel request failure determination module 416 may be configured to determine that an access channel request failure has occurred based on a failure to receive at least one element of the second SI.
The access channel request time determination module 418 may be configured to determine an RBO time for transmitting the second access channel request based on the determined type of access channel request.
The message identification module 420 may be configured to identify one or more messages of the second SI that are not received by the wireless device.
The time determination module 422 may be configured to determine that a time for receiving the second SI has elapsed.
The SI monitoring module 424 may be configured to monitor the second SI based on the request for the second SI. In some implementations, the SI monitoring module 424 may be configured to monitor a second SI requested by another wireless device.
Fig. 5 illustrates a process flow diagram of an example method 500 for managing, by a processor of a wireless device, communication with a base station. Referring to fig. 1-5, the method 500 may be implemented by a processor (e.g., the processor 212, 216, 252, or 260 depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, and 402 depicted and described in fig. 1-4).
In block 502, the processor may receive an SI change indication in a first SI from a base station. In some implementations, the first SI may include one or more elements of a system information block 1(SIB1) message. In some implementations, the first SI may include one or more elements of a Master Information Block (MIB) message. In some implementations, the first SI may include one or more elements of either or both of MIB and SIB1 messages. In some implementations, a wireless device may be configured with a first interface to receive (or otherwise obtain) an SI change indication in a first SI.
In block 504, the processor may determine scheduling information for a second SI from the SI change indication in the first SI. In some implementations, the processor may determine scheduling information for the second SI from the first SI. For example, the processor may determine from the MIB or SIB1 messages scheduling information that enables the processor to attempt to acquire the demand-based SI from the base station.
In block 506, the processor may determine a factor by which the request for the second SI will conflict with a request for the second SI from another wireless device. In some implementations, the processor may determine a factor for reducing a probability that a request for the second SI will collide with a request for the second SI from another wireless device. In some implementations, the determined factor may include a random back-off (RBO) time. In some implementations, the determined factor can include an access restriction category of the wireless device.
In block 508, the processor may send a request for a second SI based on the determined factor. For example, the processor may use a random back-off time (random back-off time) to determine a time to transmit the request for the second SI. As another example, the access restriction category may provide a probability factor that the processor may use to determine a time to send the request for the second SI. The processor may send a request for a second SI at the determined time. In some implementations, the wireless device may be configured with a second interface to send (or output, or transmit) a request for a second SI based on the determined factor.
Fig. 6A illustrates a process flow diagram of an example method 600a for managing communication with a base station by a processor of a wireless device. Referring to fig. 1A-6A, the method 600b may be implemented by a processor (e.g., 212, 216, 252, or 260, depicted and described in fig. 2) of a wireless device (e.g., wireless devices 120a-120e, 200, 320, 402, depicted and described in fig. 1-4).
In block 602, the processor may perform operations comprising determining whether a second SI is a demand-based SI based on a first SI.
In block 604, in response to determining that the second SI is a demand-based SI, the processor may determine a factor by which a request for the second SI will conflict with a request for the second SI from another wireless device. In some implementations, the factor may be a factor for reducing a probability that a request for the second SI will collide with a request for the second SI from another wireless device. In some implementations, in response to determining that the second SI is a demand-based SI, the processor may determine a factor for reducing a probability that a request for the second SI will collide with a request for the second SI from another wireless device.
The processor may then perform the operations of block 508 (fig. 5).
Fig. 6B illustrates a process flow diagram of an example method 600B for managing communication with a base station by a processor of a wireless device. Referring to fig. 1A-6B, the method 600B may be implemented by a processor (e.g., 212, 216, 252, or 260, depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, 402, depicted and described in fig. 1-4).
In some implementations following the operation of block 504 (fig. 5), in block 606, the processor may determine an RBO time for sending the request for the second SI (e.g., using a back-off timer). In some implementations, the processor can determine that the back-off time is less than half of a current modification period (modification period) of the SIB1 message. For example, certain SIs (e.g., SI-broadcast status) may indicate whether the base station is broadcasting an SI message. In some implementations, when the value of the indication is set to "broadcast" or another suitable value, the value of the indication is valid until the end of the Broadcast Control Channel (BCCH) modification period. In some implementations, the modification period of the SIB1 message may be defined as the boundary that the SIB1 message may change. In some implementations, the modification period may be calculated as a "modification period, which represents m ═ modificationperiodconff × defaultPagingCycle in the number of radio frames". By setting the back-off timer to less than half of the SIB1 message modification period, the processor may have one or more SI opportunities to read the SIB message for the remaining time. For example, if the demand-based SI RACH procedure is successful, the processor may have at least one SI opportunity to read another SI within the then current SIB1 modification period.
In block 608, the processor may determine when to send the request for the second SI using the determined RBO time.
Fig. 6C illustrates a process flow diagram of an example method 600C for managing communication with a base station by a processor of a wireless device. Referring to fig. 1A-6C, the method 600C may be implemented by a processor (e.g., 212, 216, 252, or 260, depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, 402, depicted and described in fig. 1-4).
In block 610, the processor may determine an access restriction category for the wireless device. For example, a base station may be configured to provide or assign an access category to a wireless device. Depending on the access category, the wireless device may delay sending the request for the second SI.
In some implementations, the access category determined in block 610 may include a restriction factor.
In some implementations, the restriction factor may include a value (e.g., from 0 to 0.95 in steps of 0.05) that the wireless device may use to determine whether to send a request for the second SI. In some implementations, the processor may use the restriction factor as a threshold for determining whether to send the request for the second SI. For example, the processor may generate a random number and determine whether the generated random number is above or below a limiting factor.
In some implementations, the access category may include a restriction time. In some implementations, the processor may use the restricted time as a time period during which the processor may refrain from sending the request for the second SI.
In block 612, the processor may send a request for a second SI according to the determined access restriction category.
Fig. 7 illustrates a process flow diagram of an example method 700 of managing, by a processor of a wireless device, communication with a base station. Referring to fig. 1A-7, the method 700 may be implemented by a processor (e.g., 212, 216, 252, or 260, depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, 402, depicted and described in fig. 1-4).
In block 702, a processor may receive network configuration information in first System Information (SI) from a base station. In some implementations, a wireless device may be configured with a first interface to receive network configuration information in a first SI from a base station.
In block 704, the processor may determine a type of access channel request to send to the base station from the network configuration information in the first SI.
In block 706, the processor may perform transmitting one or more first requests for a second SI to the base station based on the determined type of access channel request.
In block 708, the processor may determine whether an access channel request failure has occurred after sending at least one of the first requests for the second SI.
In block 710, in response to determining that an access channel request failure has occurred, the processor may determine an RBO time for sending a second access channel request based on the determined type of access channel request.
In block 712, the processor may send a second request for a second SI to the base station based on the RBO time. In other words, the processor may use the RBO time to determine when to transmit the second request for the second SI, and transmit the request at the determined time.
Fig. 8A illustrates a process flow diagram of an example method 800a for managing communication with a base station by a processor of a wireless device. Referring to fig. 1A-8A, the method 800a may be implemented by a processor (e.g., 212, 216, 252, or 260, depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, 402, depicted and described in fig. 1-4).
In some implementations following the operation of block 704 (fig. 7), in block 802, the processor may send a plurality of access channel requests to the base station based on the determined type of access channel request.
In block 804, the processor may determine whether an access channel request failure has occurred after sending any of the plurality of access channel requests. In some implementations, the processor may determine that the SI status indication in the SIB1 broadcast by the base station has not changed to indicate that the base station is broadcasting the second SI.
The processor may then perform the operations of block 710 (fig. 7).
Fig. 8B illustrates a process flow diagram of an example method 800B of managing, by a processor of a wireless device, communication with a base station. Referring to fig. 1A-8B, the method 800B may be implemented by a processor (e.g., 212, 216, 252, or 260, depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, 402, depicted and described in fig. 1-4).
In some implementations following the operation of block 712 (fig. 7), in block 806, the processor may identify one or more messages of the second SI that are not received by the wireless device. In some implementations, the processor may determine or detect that one or more messages of the second SI are still not received after sending the second request for the second SI. In some implementations, the processor may determine that the SI status indication in the SIB1 broadcast by the base station has not changed to indicate that the base station is broadcasting the second SI.
In block 808, at a time based on the RBO time, the processor may send a request to the base station for one or more messages of the second SI that are not received by the wireless device.
Fig. 8C illustrates a process flow diagram of an example method 800C of managing, by a processor of a wireless device, communication with a base station. Referring to fig. 1A-8C, the method 800C may be implemented by a processor (e.g., 212, 216, 252, or 260, depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, 402, depicted and described in fig. 1-4).
In some implementations following the operation of block 712 (fig. 7), in block 810 the processor may determine whether a time for receiving the second SI has elapsed. In some implementations, the processor may determine that a time period (e.g., a read timer) for receiving the second SI has expired.
In block 812, the processor may send a third request for a second SI to the base station. In some implementations, the processor may restart a Random Access Channel (RACH) request procedure. In some implementations, in response to determining that the time for receiving the second SI has elapsed, the processor may send a third request for the second SI to the base station.
Fig. 8D illustrates a process flow diagram of an example method 800D for managing, by a processor of a wireless device, communication with a base station. Referring to fig. 1A-8D, the method 800D may be implemented by a processor (e.g., 212, 216, 252, or 260, depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, 402, depicted and described in fig. 1-4).
In some implementations following the operation of block 706 (fig. 7), in block 814, the processor may perform operations including monitoring the second SI based on the one or more first requests for the second SI.
In optional block 816, the processor may monitor for a second SI requested by another wireless device.
In block 818, the processor may determine that an access channel request failure has occurred based on a failure to receive at least one element of the second SI.
Fig. 9 illustrates a component block diagram of an example network computing device 900. Computing device 900 may be implemented as a base station. Such a network computing device may include at least the components shown in fig. 9. Referring to fig. 1-9, a network computing device 900 may typically include a processor 901 coupled to volatile memory 902 and a large capacity nonvolatile memory (e.g., disk drive 903). The network computing device 900 may also include a peripheral memory access device such as a floppy disk drive, a high density Compact Disc (CD) or Digital Video Disc (DVD) drive 906 coupled to the processor 901. The network computing device 900 may also include a network access port 904 (or interface) coupled to the processor 901 for establishing a data connection with a network, such as the internet or a local area network coupled to other system computers and servers. The network computing device 900 may include one or more antennas 907 for transmitting and receiving electromagnetic radiation that may be coupled to the wireless communication links. The network computing device 900 may include additional access ports (e.g., USB, firewire, thunderbolt, etc.) for coupling to peripheral devices, external memory, or other devices.
Fig. 10 shows a component block diagram of an example wireless device 1000. In various implementations, the wireless device 1000 may be similar to the wireless devices 120, 200, 320, and 402 shown in fig. 1-4. The wireless device 1000 may include a first SOC202 (e.g., SOC-CPU) coupled to a second SOC204 (e.g., a 5G capable SOC). The first and second SOCs 202, 204 may be coupled to internal memories 1006, 1016, a display 1012, and a speaker 1014. Additionally, the wireless device 1000 may include an antenna 1004 for transmitting and receiving electromagnetic radiation of a cellular telephone transceiver 266 that may be connected to a wireless data link or coupled to one or more processors in the first or second SOCs 202, 204. The wireless device 1000 typically also includes menu selection buttons or rocker switches 1020 for receiving user inputs.
The wireless device 1000 also includes a voice encode/decode (CODEC) circuit 1010 that digitizes voice received from the microphone into packets suitable for wireless transmission and decodes the received voice packets to generate an analog signal that is provided to the speaker to generate the voice. Further, one or more of the processors in the first and second SOCs 202, 204, the wireless transceiver 266, and the CODEC 1010 may include Digital Signal Processor (DSP) circuitry (not separately shown).
The processors of the network computing device 900 and the wireless device 1000 may be any programmable microprocessor, microcomputer or multiple processor chip or chips that can be configured by software instructions (applications) to perform a variety of functions, including the functions of the various implementations described below. In some mobile devices, multiple processors may be provided, such as one processor in SOC204 dedicated to wireless communication functions and one processor in SOC202 dedicated to running other applications. Typically, software applications may be stored in the memory 1006, 1016 before being accessed and loaded into the processor. The processor may include internal memory sufficient to store the application software instructions.
The various implementations shown and described are provided by way of example only to illustrate various features of the claims. However, features illustrated and described for any given implementation are not necessarily limited to the associated implementation and may be used or combined with other implementations illustrated and described. Furthermore, the claims are not intended to be limited to any one example implementation. For example, one or more operations of the methods 500, 600a-600c, 700, and 800a-800d may be replaced by one or more operations of the methods 500, 600a-600c, 700, and 800a-800d, or combined with one or more operations of the methods 500, 600a-600c, 700, and 800a-800 d.
As used in this application, the terms "component," "module," "system," and the like are intended to include a computer-related entity, such as but not limited to hardware, firmware, a combination of hardware and software, or software in execution, configured to perform a particular operation or function. For example, a component may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, or a computer. By way of illustration, both an application running on a wireless device and the wireless device can be referred to as a component. One or more components may reside within a process or thread of execution and a component may be localized on one processor or core or distributed between two or more processors or cores. Further, these components can execute from various non-transitory computer readable media having various instructions or data structures stored thereon. The components may communicate by way of local or remote processes, function or procedure calls, electronic signals, data packets, memory reads/writes, and other known network, computer, processor, or process related communication methods.
A number of different cellular and mobile communication services and standards are available or contemplated in the future, all of which may be implemented and benefit from various implementations. Such services and standards include, for example, third generation partnership project (3GPP), Long Term Evolution (LTE) systems, third generation wireless mobile communication technology (3G), fourth generation wireless mobile communication technology (4G), fifth generation wireless mobile communication technology (5G), Global System for Mobile communications (GSM), Universal Mobile Telecommunications System (UMTS), 3GSM, General Packet Radio Service (GPRS), code Division Multiple Access (CDMA) systems (e.g., cdmaOne, CDMA1020TM), enhanced data rates for GSM evolution (EDGE), Advanced Mobile Phone System (AMPS), digital AMPS (IS-136/TDMA), evolution data optimized (EV-DO), Digital Enhanced Cordless Telecommunications (DECT), Worldwide Interoperability for Microwave Access (WiMAX), Wireless Local Area Networks (WLAN), Wi-Fi protected Access I & II (WPA2, WPA), and Integrated digital enhanced networks (iDEN). For example, each of these techniques involves the transmission and reception of voice, data, signaling, or content messages. It should be understood that any reference to terms or technical details relating to a single telecommunications standard or technology is for illustrative purposes only and is not intended to limit the scope of the claims to a particular communication system or technology unless specifically recited in the claim language.
As used herein, a phrase referring to "at least one of" a list of items refers to any combination of those items, including a single member. For example, "at least one of a, b, or c" is intended to encompass a, b, c, a-b, a-c, b-c, and a-b-c.
The various illustrative logics, logical blocks, modules, circuits, and algorithm processes described in connection with the implementations disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. Interchangeability of hardware and software has been described generally in terms of their functionality, and illustrated in the various illustrative components, blocks, modules, circuits, and processes described above. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system.
The hardware and data processing apparatus used to implement the various illustrative logics, logical blocks, modules, and circuits described in connection with the aspects disclosed herein may be implemented or performed with a general purpose single-or multi-chip processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor or any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. In some implementations, certain processes and methods may be performed by circuitry that is specific to a given function.
In one or more aspects, the functions described may be implemented in hardware, digital electronic circuitry, computer software, firmware (including the structures disclosed in this specification and their equivalents), or any combination thereof. Implementations of the subject matter described in this specification can also be implemented as one or more computer programs, i.e., one or more modules of computer program instructions, encoded on a computer storage medium for execution by, or to control the operation of, data processing apparatus.
If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. The processes of a method or algorithm disclosed herein may be implemented in a software module executable by a processor, which may reside on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that can communicate a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also, any connection is properly termed a computer-readable medium. Disk (Disk) and disc (disc), as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy Disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media. Additionally, the operations of a method or algorithm may be provided as one or any combination or set of codes and instructions on a machine-readable medium and a computer-readable medium, which may be incorporated into a computer program product.
In one or more aspects, the functions described may be implemented by a processor, which may be coupled to a memory. The memory may be a non-transitory computer-readable storage medium that stores processor-executable instructions. The memory may store an operating system, user applications, or other executable instructions. The memory may also store application data, such as an array data structure. The processor may read and write information to and from the memory. The memory may also store instructions associated with one or more protocol stacks. The protocol stack typically includes computer executable instructions to implement communications using a radio access protocol or a communications protocol.
Various modifications to the implementations described in this disclosure will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other implementations without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the implementations shown herein but is to be accorded the widest scope consistent with the present disclosure, principles and novel features disclosed herein.
Certain features that are described in this specification in the context of separate implementations can also be implemented in combination in a single implementation. Conversely, various features that are described in the context of a single implementation can also be implemented in multiple implementations separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. Further, the figures may schematically depict one or more example processes in the form of a flow diagram. However, other operations not shown may be incorporated in the example process shown schematically. For example, one or more additional operations may be performed before, after, concurrently with, or between any of the illustrated operations. In some cases, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the implementations described above should not be understood as requiring such separation in all implementations, and it should be understood that the described program components and systems can generally be integrated in a single software product or packaged into multiple software products. Additionally, other implementations are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results.

Claims (30)

1. A method of managing, by a processor of a wireless device, communication with a base station, comprising:
receiving a System Information (SI) change indication in a first SI from the base station;
determining scheduling information for a second SI from the SI change indication in the first SI;
determining a factor by which a request for the second SI will conflict with a request for the second SI from another wireless device; and
sending the request for the second SI using the determined factor.
2. The method of claim 1, wherein the first SI comprises one or more elements of a system information block 1(SIB1) message.
3. The method of claim 1, wherein the first SI comprises one or more elements of a Master Information Block (MIB) message.
4. The method of claim 1, further comprising determining whether the second SI is a demand-based SI based on the first SI.
5. The method of claim 4, wherein determining the factor by which a request for the second SI will conflict with a request for the second SI from another wireless device comprises: in response to determining that the second SI is a demand-based SI, determining a factor by which a request for the second SI will conflict with a request for the second SI from another wireless device.
6. The method of claim 1, wherein:
determining a factor by which a request for the second SI will collide with a request for the second SI from another wireless device comprises determining a random back-off (RBO) time for sending the request for the second SI; and
sending the request for the second SI using the determined factor comprises sending the request for the second SI using the determined RBO time.
7. The method of claim 1, wherein:
determining a factor by which a request for the second SI will conflict with a request for the second SI from another wireless device comprises determining an access restriction category for the wireless device; and
sending the request for the second SI using the determined factor comprises sending the request for the second SI in accordance with the determined access restriction category.
8. The method of claim 1, wherein determining a factor by which a request for the second SI will conflict with a request for the second SI from another wireless device comprises: determining a factor for reducing a probability that a request for the second SI will collide with a request for the second SI from another wireless device.
9. A method of managing, by a processor of a wireless device, communication with a base station, comprising:
receiving network configuration information in first System Information (SI) from the base station;
determining, from the network configuration information in the first SI, a type of access channel request to send to the base station;
transmitting one or more first requests for a second SI to the base station based on the determined type of access channel request;
determining whether an access channel request failure has occurred after transmitting at least one of the first requests for the second SI;
in response to determining that an access channel request failure has occurred, determining a random back-off (RBO) time for transmitting a second access channel request based on the determined type of access channel request; and
transmitting a second request for the second SI to the base station based on the RBO time.
10. The method of claim 9, wherein the type of access channel request comprises one of a message-1 single resource request, a message-1 multiple resource request, and a message-3 request.
11. The method of claim 9, wherein:
transmitting some access channel requests to the base station based on the determined type of access channel request comprises transmitting a plurality of access channel requests to the base station based on the determined type of access channel request; and
determining that an access channel request failure has occurred comprises determining that an access channel request failure has occurred after transmitting any of the plurality of access channel requests.
12. The method of claim 9, further comprising:
identifying one or more messages of the second SI that are not received by the wireless device; and
sending, to the base station, a request for the one or more messages of the second SI not received by the wireless device using the RBO time.
13. The method of claim 9, further comprising:
determining whether a time for receiving the second SI has elapsed; and
in response to determining that the time to receive the second SI has elapsed, sending a third request for the second SI to the base station.
14. The method of claim 9, wherein determining whether an access channel request failure has occurred after sending at least one of the first requests for the second SI comprises:
monitoring the second SI based on the one or more first requests for the second SI; and
determining that the access channel request failure has occurred based on a failure to receive at least one element of the second SI.
15. The method of claim 14, wherein monitoring the second SI based on the request for the second SI comprises:
monitoring the second SI requested by another wireless device.
16. An apparatus of a wireless device, comprising:
a first interface configured to acquire a System Information (SI) change indication in SI; and
a processing system coupled to the first interface and configured to:
determining scheduling information for a second SI from the SI change indication in the first SI;
determining a factor by which a request for the second SI will conflict with a request for the second SI from another wireless device; and
a second interface configured to output the request for the second SI using the determined factor.
17. The apparatus of claim 16, wherein the first SI comprises one or more elements of a system information block 1(SIB1) message.
18. The apparatus of claim 16, wherein the first SI comprises one or more elements of a Master Information Block (MIB) message.
19. The apparatus of claim 16, wherein the processing system is further configured to determine whether the second SI is a demand-based SI based on the first SI.
20. The apparatus of claim 19, wherein the processing system is further configured to determine a factor by which a request for the second SI will conflict with a request for the second SI from another wireless device, in response to determining that the second SI is a demand-based SI.
21. The apparatus of claim 16, wherein the processing system is further configured to:
determining a random back-off (RBO) time for transmitting a request for the second SI; and
sending the request for the second SI using the determined RBO time.
22. The apparatus of claim 16, wherein the processing system is further configured to:
determining an access restriction category for the wireless device; and
sending the request for the second SI in accordance with the determined access restriction category.
23. The apparatus of claim 16, wherein the processing system is further configured to determine a factor for reducing a probability that the request for the second SI will collide with a request for the second SI from another wireless device.
24. An apparatus of a wireless device, comprising:
a first interface configured to acquire network configuration information in first System Information (SI); and
a processing system coupled to the first interface and configured to:
determining, from the network configuration information in the first SI, a type of access channel request to send to a base station;
transmitting one or more first requests for a second SI to the base station based on the determined type of access channel request;
determining whether an access channel request failure has occurred after transmitting at least one of the first requests for the second SI;
in response to determining that an access channel request failure has occurred, determining a random back-off (RBO) time for transmitting a second access channel request based on the determined type of access channel request; and
transmitting a second request for the second SI to the base station based on the RBO time.
25. The apparatus of claim 24, wherein the type of access channel request comprises one of a message-1 single resource request, a message-1 multiple resource request, and a message-3 request.
26. The apparatus of claim 24, wherein the processing system is further configured to:
transmitting a plurality of access channel requests to the base station based on the determined type of access channel request; and
determining that an access channel request failure has occurred comprises determining that an access channel request failure has occurred after transmitting any of the plurality of access channel requests.
27. The apparatus of claim 24, wherein the processing system is further configured to:
identifying one or more messages of the second SI that are not received by the wireless device; and
sending, to the base station, a request for the one or more messages of the second SI not received by the wireless device using the RBO time.
28. The apparatus of claim 24, wherein the processing system is further configured to:
determining whether a time for receiving the second SI has elapsed; and
in response to determining that the time to receive the second SI has elapsed, sending a third request for the second SI to the base station.
29. The apparatus of claim 24, wherein the processing system is further configured to:
monitoring the second SI based on the one or more first requests for the second SI; and
determining that the access channel request failure has occurred based on a failure to receive at least one element of the second SI.
30. The apparatus of claim 24, wherein the processing system is further configured to:
monitoring the second SI requested by another wireless device.
CN202080054090.6A 2019-07-31 2020-07-16 Managing communication of wireless devices with base stations to obtain system information from the base stations while reducing congestion Pending CN114175714A (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
IN201941030908 2019-07-31
IN201941030908 2019-07-31
US16/929,410 US11234259B2 (en) 2020-07-15 2020-07-15 Managing wireless device communication with a base station
US16/929,410 2020-07-15
PCT/US2020/042218 WO2021021448A1 (en) 2019-07-31 2020-07-16 Managing wireless device communication to obtain system information from a base station while reducing collisions

Publications (1)

Publication Number Publication Date
CN114175714A true CN114175714A (en) 2022-03-11

Family

ID=71944403

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080054090.6A Pending CN114175714A (en) 2019-07-31 2020-07-16 Managing communication of wireless devices with base stations to obtain system information from the base stations while reducing congestion

Country Status (3)

Country Link
EP (1) EP4005286A1 (en)
CN (1) CN114175714A (en)
WO (1) WO2021021448A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110096660A1 (en) * 2008-06-24 2011-04-28 Panasonic Corporation Handover processing method, and mobile terminal used in the method
WO2016130355A1 (en) * 2015-02-10 2016-08-18 Qualcomm Incorporated System information updating
WO2018227867A1 (en) * 2017-06-12 2018-12-20 西安交通大学 User classification-based differential backoff method in 5g big connection internet of things
WO2018228940A1 (en) * 2017-06-16 2018-12-20 Panasonic Intellectual Property Corporation Of America User equipment and base station participating in a system information acquisition procedure
EP3419340A1 (en) * 2016-03-11 2018-12-26 LG Electronics Inc. -1- System information signal reception method, user equipment, system information signal transmitting method and base station
CN109845340A (en) * 2017-01-26 2019-06-04 Lg 电子株式会社 The method and apparatus of Request System information

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110096660A1 (en) * 2008-06-24 2011-04-28 Panasonic Corporation Handover processing method, and mobile terminal used in the method
WO2016130355A1 (en) * 2015-02-10 2016-08-18 Qualcomm Incorporated System information updating
EP3419340A1 (en) * 2016-03-11 2018-12-26 LG Electronics Inc. -1- System information signal reception method, user equipment, system information signal transmitting method and base station
CN109845340A (en) * 2017-01-26 2019-06-04 Lg 电子株式会社 The method and apparatus of Request System information
WO2018227867A1 (en) * 2017-06-12 2018-12-20 西安交通大学 User classification-based differential backoff method in 5g big connection internet of things
WO2018228940A1 (en) * 2017-06-16 2018-12-20 Panasonic Intellectual Property Corporation Of America User equipment and base station participating in a system information acquisition procedure

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ITRI: "Discussion on indicating the broadcast of on-demand SIBs", 3GPP TSG-RAN WG2 MEETING #97 R2-1701345 *

Also Published As

Publication number Publication date
EP4005286A1 (en) 2022-06-01
WO2021021448A1 (en) 2021-02-04

Similar Documents

Publication Publication Date Title
US20210127359A1 (en) Bandwidth Part (BWP) For Unicast/Multicast and Resource Allocation For Multicast
CN114175810A (en) Managing cross-carrier scheduling by wireless devices
US11405859B2 (en) Enhancement to system information block (SIB) validity check for non-public networks (NPNs)
US11770772B2 (en) Discontinuous reception for sidelink control signaling
CN115023982B (en) Method and apparatus for determining transmit power of uplink transmission
WO2022020988A1 (en) Wake-up signal collision handling for nr multicast
US11234259B2 (en) Managing wireless device communication with a base station
CN114731541A (en) User Equipment (UE) mobility history information management
US20210105732A1 (en) Clarification on cumulative timing advance (ta)
CN114830579B (en) Managing primary cell cross-carrier scheduling
CN115280790A (en) Method for supporting ENTV broadcast mode and unicast mode in UE
CN114175714A (en) Managing communication of wireless devices with base stations to obtain system information from the base stations while reducing congestion
US11690022B2 (en) Managing transmit power control
US11764855B2 (en) Managing beam selection
US20220346025A1 (en) Early Uplink Transmit Power Control
US20220346137A1 (en) Managing Uplink Spatial Filter Configuration
US20230403732A1 (en) Managing Downlink Traffic Reception And Cross-Link Interference
US20240107455A1 (en) Managing control channel monitoring
TW202110136A (en) Managing paging monitoring by a wireless device
CN114450987A (en) User plane integrity protection (UP IP) capability signaling in 5G/4G systems
CN115668145A (en) Processing data using remote network computing resources
CN114128368A (en) Managing paging monitoring by wireless devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination