EP2471286A2 - Short user messages in system control signaling - Google Patents

Short user messages in system control signaling

Info

Publication number
EP2471286A2
EP2471286A2 EP10814257A EP10814257A EP2471286A2 EP 2471286 A2 EP2471286 A2 EP 2471286A2 EP 10814257 A EP10814257 A EP 10814257A EP 10814257 A EP10814257 A EP 10814257A EP 2471286 A2 EP2471286 A2 EP 2471286A2
Authority
EP
European Patent Office
Prior art keywords
message
control message
radio
data field
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP10814257A
Other languages
German (de)
French (fr)
Inventor
Shantidev Mohanty
Muthaiah Venkatachalam
Pouya Taaghol
Xiangying Yang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US12/646,708 external-priority patent/US8280417B2/en
Application filed by Intel Corp filed Critical Intel Corp
Publication of EP2471286A2 publication Critical patent/EP2471286A2/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0078Avoidance of errors by organising the transmitted data in a format specifically designed to deal with errors, e.g. location
    • H04L1/0079Formats for control data
    • H04L1/008Formats for control data where the control data relates to payload of a different packet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/1607Details of the supervisory signal
    • H04L1/1671Details of the supervisory signal the supervisory signal being transmitted together with control information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/04Error control

Definitions

  • Text messaging allows a cellular telephone or other wireless user device to transfer a text message to another cellular telephone or wireless device. It has become popular enough with cellular telephone users that laws have been passed to prohibit sending text messages while driving. Scientific research has been conducted to study the physical effects of text messaging on thumbs and the mental effects of text messaging on grammar and communication skills. For many radio communications systems, text messaging is supported through Short Message Services (SMS).
  • SMS Short Message Services
  • SMS supports text and sometimes other small data files.
  • MMS Multimedia Message Services
  • MMS Multimedia Message Services
  • the two systems operate using different messages that are a different part of the air interface.
  • Figure 1 is a diagram of a wireless radio system suitable for implementation of an embodiment of the present invention
  • Figure 2 is a signal diagram of receiving and transmitting SMS between a base station and a mobile station in a connected mode according to an embodiment of the present invention
  • Figure 3 is a signal diagram of receiving SMS at a mobile station from a base station in an idle mode according to an embodiment of the present invention
  • Figure 4 is a signal diagram of sending SMS from a mobile station to a base station in an idle mode according to an embodiment of the present invention.
  • Figure 5 is a block diagram of a mobile station or base station for implementing embodiments of the present invention.
  • the MS can send RNG-REQ to a BS (Base Station) using all or a portion of the message's TLV to carry the short message.
  • the MS receives a RNG- RSP from the BS using the TLV to carry the short message.
  • Other messages and control messages can be used depending on the application.
  • FIG. 1 shows an example of a cellular radio system 10.
  • MSs 12, 14 can be mobile or fixed and can take the form of cellular telephones, netbooks, personal computers, media players, appliances, or any of a variety of other wireless connected devices.
  • the MS can also be referred to as a subscriber station, remote station, terminal or by other terms.
  • a number of base stations (BS) 16-24 are provided in the system to provide connections for the MSs.
  • the BS can take a variety of different forms and may cover large or small areas and transmit powers, depending on the application. While the BSs are shown as being similar in Figure 1, they may be connected and configured differently from each other as well.
  • a network access point or an MS peer may act or function as a BS.
  • the first MS is registered with a BS 19 and the second MS is registered with another BS 23. This registration allows each MS to communicate with the BS to support all of the services that the MS and the system support.
  • Each BS 16-24 is connected to a gateway (GW). There are three gateways 25, 26, 27. Each gateway supports several BSs. The gateways may or may not be connected to each other and are all connected directly or indirectly to a Connectivity Service Network (CSN) 30. There may be one or more CSNs in any one system.
  • the CSN is coupled to a telephony or data network backbone 31 that provides access to other telephony systems, data servers and services and more. In some instances, a BS may be connected directly to the CSN through the backbone 31 instead of through a gateway.
  • system administration and management can be distributed between the BS, GW, and CSN in a variety of different ways.
  • the first MS 12 can communicate with the second MS through the respective connected BS and GW. If both MS were registered at the same BS, the BS may be able to support communications without routing through the GW.
  • the second MS were connected to another system, CSN or ISP (Internet Service Provider), then the two MSs can communicate through the backbone 31.
  • Figure 1 shows one example network, however, the present invention can be applied to a wide range of different network configurations and communications can be routed differently to suit different situations and applications.
  • FIG. 2 shows an example of sending text messages or other types of short messages using L2 transfer mechanism.
  • L2 transfer is a concept wherein the MAC control plane is used for transferring higher layer messages. In a WiMAX system this can be a L2 (Layer 2) transfer message such as L2-XFER.
  • the L2 transfer uses a specific type and subtype to transfer the messaging payload (eg: Type 6, subtype a). Bandwidth may be negotiated in advance by the MS with the BS to send the messaging payload on the uplink using the L2 transfer mechanism.
  • the BS then provides an SMS confirmation 33.
  • an L2 transfer message can be used.
  • the L2 transfer uses a specific type and subtype for the confirmation (eg: Type 6, subtype b).
  • Both of the transfer messages of Figure 2 have been altered. Instead of carrying a control message intended for the base station the first transfer message 32 contains a text message or other short message intended for another user.
  • a conventional L2-XFER has a type and subtype attributes.
  • a specific "Type” such as Type 6 and a specific "SubType” such as a SubType is to be defined for carrying the short message.
  • a TLV (Type length Value) or other field associated with the short message can be inserted in the L2- XFER control message.
  • the data in this field can be replaced by a short message to the user and a marker, such as the Type and subtype fieds, to indicate that the short message is a user message, not a control message.
  • the BS can also send SMS to the MS using L2-XFER messages.
  • a L2- Xfer message 34 is sent to the MS.
  • this message may contain a TLV field associated with a short message for the MS user with or without other control related TLV parameters.
  • the TLV for SMS can be identified with any particular predefined type and subtype. Type 6, subtype a, for example can be used as with the transfer from the MS.
  • the BS can send a L2-XFER that includes a confirmation with a text to the MS user.
  • the MS answers the SMS from the BS with a confirmation message 35.
  • This can also be in the form of an AAI_L2-XFER, of a specific Type and subtype (eg: Type 6, subtype b).
  • the confirmation can also include another SMS.
  • the system may choose to use other MAC control messages such ranging or registration messages to transfer short messages. These messages can have a "Type" that is defined specifically for SMS or another user messaging protocol.
  • the BS and MS are not connected to allow for the exchange of L2 transfer messages.
  • the BS has a short message to send to the MS, but the MS is in idle mode. Accordingly, it will not receive a RNG-RSP as in Figure 2.
  • the BS sends a page 36 to the MS.
  • the figure is an AAI_PAG-ADV with an action code of ObOl.
  • This page is used to command the MS to do a location update.
  • the stations first perform ranging 37 to request bandwidth from the BS. Then, the MS responds and begins the location update by sending a conventional RNG-REQ 38. In one example this can be a AAI_RNG-REQ on CDMA Allocation A-MAP IE (RAIDl and masking indicator for Ranging).
  • the BS does not reply with a conventional RNG-RSP. Instead, the MS receives a RNG-RSP 40 back from the BS that contains the SMS related TLV fields. As before this message may or may not also contain a control message. In the illustrated example, this is followed by the message 41 with CDMA Allocation A-MAP IE (RAIDl and masking indicator for Ranging). The BS continues to send this message 42 until it receives an acknowledgment 43 from the MS. Both the BS and MS can count timers until the acknowledgment is received. The MS has a timer for the CDMA Allocation A-MAP IE and the BS has a timer for the
  • the MS can instead send a ranging or other control message that includes SMS text in addition to the acknowledgment.
  • the BS when a BS has a downlink SMS for an idle mode MS, the BS includes the SMS in an AAI_RNG-RSP message after sending an
  • AAI P AG-AD V indicating location update.
  • the BS grants a CDMA Allocation A-MAP IE in an unsolicited manner in order to receive AAIJVISG- ACK as a confirmation for the downlink SMS.
  • the MCRC of CDMA Allocation A-MAP IE is masked with a RAID and masking indicator for Ranging, where the RAID is the same as the RAID masked in CDMA Allocation A-MAP IE for the AAI RNG-REQ message sent by the MS.
  • the aBS After the BS transmits the AAI RNG-RSP with SMS, the aBS starts a timer
  • SMS_confirm_resource_alloc_timer grants the CDMA Allocation A-MAP IE to the MS.
  • the MS receives the AAI RNG-RSP with SMS, the MS starts a timer
  • SMS_confirm_resource_waiting_timer waits for the CDMA Allocation A-MAP IE to send the AAI MSG-ACK.
  • the MS can do an unsolicited location update using RNG-REQ 46 and include the SMS as part of it.
  • RNG-REQ 46 code based ranging has been completed 45 so that the stations are ready to communicate.
  • the ranging request signal can take the form of a AAI_RNG-REQ with SMS on CDMA Allocation A-MAP IE (RAIDl and masking indicator for Ranging).
  • the base station can reply with a conventional RNG-RSP 47 or it can include a short message in its RNG-RSP, if it has a queued short message to send.
  • a BS uses an AAI_RNG-RSP message to transmit SMS to an
  • the BS receives the SMS from the MS while the MS is in its idle state through the
  • AAI_RNG-REQ message Upon receiving this, the BS can reply with an AAI_RNG-RSP message. This can be used as a confirmation of the SMS.
  • SMS and MMS are encrypted at the physical layer. This can be done when the messages are specifically configured to carry SMS or MMS.
  • the RNG-REQ and RNG-RSP messages are not encrypted.
  • the control messages typically carried in the TLV of a RNG message is not sensitive. This can be compensated for using an application layer, for example, an SMS layer encryption mechanism or applying encryption in another way.
  • the higher level encryption can be used to encrypt the actual SMS portion carried by the TLV of the RNG message without the RNG message being encrypted at the physical layer.
  • the RNG messages are part of a group of MAC
  • MAC PDU Protocol Data Unit
  • All of the MAC Contol messages begin with a Message Type field and may contain additional fields.
  • the format of the control message is provided in Table 1 below.
  • the first portion of a MAC PDU is a type indicator. 8 bits are allocated. For a RNG-REQ, the type is the number 4. For a RNG-RSP, the type is the number 5. Many more types of MAC PDU's are accommodated using other type numbers. The next 8 bits of the message are zeroes.
  • the MAC PDU contains the TLV data. As described below the TLVs can be of different sizes or lengths and can be combined in a single message in the manners that are specifically allowed. The TLV are intended to be control messages that are transparent to the user and ensure smooth operation of the system.
  • ranging using RNG-REQ and RNG-RSP is the process of acquiring the correct timing offset, frequency offset and power adjustments so that the transmissions of the MS are aligned with the BS, and so that they are received within the appropriate reception thresholds. Ranging is also used to establish the location of a mobile station as it moves from place to place.
  • the ranging messages are used to maintain the quality of the radio communications link at the physical layer. Different messages are used for the uplink and the downlink although the basic structure is the same. Ranging allows the system to adjust time and frequency synchronization and the power and assignments for subcarriers and subchannels. Ranging is done periodically for the various supported carriers between each base station and registered mobile station.
  • the ranging messages are a part of the basic messages for the system. Separate and apart from the broadcast channel and subscriber registration, ranging messages are directed to a specific registered MS and the specific BS to which the MS is registered. Separate and apart from the traffic channels, the basic messages handle control information and system configuration.
  • the Ranging Request (RNG-REQ) message is transmitted by the MS at initialization and periodically to determine network delay and to request a change in transmit power, downlink burst profiles, or other system operation parameters.
  • Initialization refers to when the MS originally seeks to gain access to the network and register with a base station.
  • the RNG-REQ message may be sent in initial ranging and data grant intervals.
  • the TLV field portion of the message is varied depending on the circumstances and there can be more than one TLV fields in a single RNG-REQ message.
  • the TLV fields may encode information including burst profiles, MAC addresses, ranging anomalies, equipment capabilities and identifiers, base station identifiers, handover requests, network reentry requests, emergency call procedures, paging control messages, timing, delay, and retry parameters, power control and management messages, etc. All of these parameters are directed to the system and concern the identification or operation of the MS in the system. None of these messages involve information to be conveyed to users or to the application layer.
  • a system tries to prevent a user from seeing these messages which would otherwise interfere with the user's attention on the information that he is sending to or receiving from other users.
  • the Ranging Response (RNG-RSP) message has similar types of TLV parameters that it can send. These can include timing adjustment Information, frequency, channel, subchannel, and delay assignments, various timers, slot and frame numbers, equipment Nos. and addresses of base stations and modems, and paging parameters, etc. As with the request message, the TLVs for the response message also all relate to control parameters and equipment operation.
  • the TLV for messages between users allows short user messages to be transmitted at almost any time without changing the operational modes of the MS.
  • the ranging messages present the advantage that they can be sent when no active connection is required and that they can be sent at almost any time.
  • the short user message is uniquely identified and both the BS and MS are adapted to identify the message and handle it accordingly.
  • the TLV is one example of an information encoding format. Embodiments of the invention may also be adapted for use with other encoding formats including ASN 1.
  • the short user message is place in an optional field. The short user message can then either be included or not included without affecting other functions. In other words, using an optional field, when the message is parsed the present or absence of the short user message will not affect the parsing of the message.
  • Figure 5 shows an example of a hardware configuration that can be used for both a base station and a mobile station to implement the communications described above.
  • the station 50 is driven by a processor 52.
  • This can be a small, low power processor in the case of a MS or a high power, high speed processor in the case of a BS.
  • the processor has a memory bus that is coupled to a memory 56, such as magnetic, optical, or solid state memory or some combination thereof.
  • the memory contains programming instructions and user data that can be sent and received between stations.
  • Account data 58 can also be connected to the bus.
  • the MS this can include a SIM (Subscriber Identity Module) and other stored personal parameters.
  • SIM Subscriber Identity Module
  • the BS this can include account authorization databases or connections to such databases.
  • a suite of sensors 54 such as positioning sensors, battery or power sensors, cameras and microphones, and transceiver signal sensors are coupled to the processor to provide additional data to the processor.
  • a user interface bus such as USB (Universal Serial Bus) or another type of user interface connection connects the processor to a user interface 60, such as a keyboard, touch screen, mouse, trackball, or other interface, a display 62, and other connectors 64 to allow other devices to be connected.
  • a user interface 60 such as a keyboard, touch screen, mouse, trackball, or other interface
  • the particular user interface can be adapted to suit the particular application.
  • a user can enter or attach text or other short messages through the user interface and can use the interface for system maintenance and control. For a MS, the user can, through the interface, make recordings with the microphone and camera and attach them to short messages that are commanded to be sent to a specific user or group of users using the keyboard or touch screen.
  • the processor 52 is coupled to another communications bus for communications with other devices.
  • a wired interface 66 allows a BS to communicate with other BS's, gateways, base station controllers, operations and maintenance centers, etc.
  • the wired interface can allow for network connections and for a portable device, it may allow the device to be coupled to a personal computer for updates and maintenance.
  • the communications bus also provides for wired or wireless connections to a personal area network (PAN) 68, such as Bluetooth, a local area network (LAN) 70 such as Wi-Fi, and a wide area network 72, or metropolitan area network such as 802.16m. More or fewer network adapters may be provided, depending on the application. Some network functions may be consolidated or separated, and a variety of different networks (PAN) 68, such as Bluetooth, a local area network (LAN) 70 such as Wi-Fi, and a wide area network 72, or metropolitan area network such as 802.16m. More or fewer network adapters may be provided, depending on the application. Some network functions may be consolidated or
  • the wide area network (WAN) adapter 72 includes logic 74 to generate, assemble, encode, encrypt, and queue packets to be sent through the WAN.
  • the logic is coupled to a transceiver 76 to modulate, encode, and amplify the packets from the logic for transmission through an antenna 78 over the WAN.
  • the antenna may have one or more elements, depending on performance, cost and design considerations.
  • the same transmit chain can also function as a receive chain or a separate receive chain (not shown) can be used.
  • the receive chain would perform the reciprocal functions of receiving demodulating, amplifying, parsing, decoding, etc. to obtain data to send back to the processor over the communications bus.
  • the messages are sent to the processor and are then used to adjust operation parameters or call routines for registration, call initiation, etc.
  • the message is sent to the processor and is then provided to the user on the display. In either case, the messages may be stored in memory.
  • the configuration of Figure 5 can also be applied to a portable or desktop computer equipped with a wireless adapter.
  • the WAN adapter 72 can be provided as a separate component on USB, a PCI (Peripheral Component Interconnect) bus, or any other suitable bus, or it can be provided as an internal system component.
  • PCI Peripheral Component Interconnect
  • a lesser or more equipped communications station 50 than the example described above may be desirable for certain implementations. Therefore, the configuration of the system will vary from implementation to implementation depending upon numerous factors, such as price constraints, performance requirements, technological improvements, and/or other circumstances.
  • Embodiments of the present invention have been described in the context of 802.1 lm and particular messages within that communications protocol and standard, however, the invention is not so limited. Embodiments of the present invention can be applied to other communications protocol and other types of control messages within 802.16m and other protocols in order to allow short user messages to be transmitted with little impact on overall system operation. While the present description is in the context of SMS, it can be applied to any of a variety of different short user messages. In addition, while SMS is frequently transmitted from one cellular telephone to another, users can send texts using WiFi, Internet, and telephone-connected devices, including portable and desktop computers, telephones, and media players. A remote data terminal or remote terminal herein can refer to any such device.
  • steps described herein can be performed under the control of a programmed processor, such as the processor 52, in alternative embodiments, the steps can be fully or partially implemented by any programmable or hard coded logic, such as Field Programmable Gate Arrays (FPGAs), TTL logic, or Application Specific Integrated Circuits (ASICs), for example.
  • FPGAs Field Programmable Gate Arrays
  • ASICs Application Specific Integrated Circuits
  • the method of the present invention can be performed by any combination of programmed general purpose computer components or custom hardware components. Therefore, nothing disclosed herein should be construed as limiting the present invention to a particular embodiment wherein the recited steps are performed by a specific combination of hardware components.
  • the present invention can be provided as a computer program product that can include a machine-readable medium having instructions stored thereon, which can be used to program a computer (or other machine) to perform a process according to the present invention.
  • the machine-readable medium can include, but is not limited to, floppy diskettes, optical disks, CD- ROMs, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, magnet or optical cards, flash memory, or any other type of medium suitable for storing electronic instructions.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)

Abstract

Short user messages can be conveyed in system management signaling for a data or telephony network. In one example, a first control message is sent from a first radio to a second radio, the control message including a data field, the data field containing a short message directed from a user of the first radio to a user of a third radio. In response, a second control message is received in reply to the first control message from the second radio, the second control message including a data field, the data field containing a response to the short message.

Description

SHORT USER MESSAGES IN SYSTEM CONTROL SIGNALING
FIELD
The present description pertains to the field of short messages for wireless
communications and, in particular, to communicating short messages using a portion of a control message.
BACKGROUND
Text messaging allows a cellular telephone or other wireless user device to transfer a text message to another cellular telephone or wireless device. It has become popular enough with cellular telephone users that laws have been passed to prohibit sending text messages while driving. Scientific research has been conducted to study the physical effects of text messaging on thumbs and the mental effects of text messaging on grammar and communication skills. For many radio communications systems, text messaging is supported through Short Message Services (SMS).
SMS supports text and sometimes other small data files. MMS (Multimedia Message Services) has been adopted to allow for larger data files, such as larger images and videos to be sent from one cellular telephone or other mobile device to another. The two systems operate using different messages that are a different part of the air interface.
With demands for faster transfers of more data and media-rich files, current wireless communications systems are moving to a fourth generation (4G). It appears that LTE (Long Term Evolution) and IEEE (Institute of Electrical and Electronics Engineers Standard) 802.16m will be among those with the greatest use worldwide.
BRIEF DESCRIPTION OF THE DRAWINGS
Embodiments of the present invention are illustrated by way of example, and not limitation, in the figures of the accompanying drawings in which like reference numbers are used to refer to like features, and in which:
Figure 1 is a diagram of a wireless radio system suitable for implementation of an embodiment of the present invention;
Figure 2 is a signal diagram of receiving and transmitting SMS between a base station and a mobile station in a connected mode according to an embodiment of the present invention;
Figure 3 is a signal diagram of receiving SMS at a mobile station from a base station in an idle mode according to an embodiment of the present invention; Figure 4 is a signal diagram of sending SMS from a mobile station to a base station in an idle mode according to an embodiment of the present invention; and
Figure 5 is a block diagram of a mobile station or base station for implementing embodiments of the present invention.
DETAILED DESCRIPTION
In the connected mode, the MS can send RNG-REQ to a BS (Base Station) using all or a portion of the message's TLV to carry the short message. For receiving, the MS receives a RNG- RSP from the BS using the TLV to carry the short message. Other messages and control messages can be used depending on the application.
Figure 1 shows an example of a cellular radio system 10. MSs 12, 14 can be mobile or fixed and can take the form of cellular telephones, netbooks, personal computers, media players, appliances, or any of a variety of other wireless connected devices. The MS can also be referred to as a subscriber station, remote station, terminal or by other terms.
A number of base stations (BS) 16-24 are provided in the system to provide connections for the MSs. The BS can take a variety of different forms and may cover large or small areas and transmit powers, depending on the application. While the BSs are shown as being similar in Figure 1, they may be connected and configured differently from each other as well. In some applications, a network access point or an MS peer may act or function as a BS. In the illustrated example, the first MS is registered with a BS 19 and the second MS is registered with another BS 23. This registration allows each MS to communicate with the BS to support all of the services that the MS and the system support.
Each BS 16-24 is connected to a gateway (GW). There are three gateways 25, 26, 27. Each gateway supports several BSs. The gateways may or may not be connected to each other and are all connected directly or indirectly to a Connectivity Service Network (CSN) 30. There may be one or more CSNs in any one system. The CSN is coupled to a telephony or data network backbone 31 that provides access to other telephony systems, data servers and services and more. In some instances, a BS may be connected directly to the CSN through the backbone 31 instead of through a gateway.
In the illustrated example, system administration and management can be distributed between the BS, GW, and CSN in a variety of different ways. For communications, the first MS 12 can communicate with the second MS through the respective connected BS and GW. If both MS were registered at the same BS, the BS may be able to support communications without routing through the GW. Similarly, if the second MS were connected to another system, CSN or ISP (Internet Service Provider), then the two MSs can communicate through the backbone 31. Figure 1 shows one example network, however, the present invention can be applied to a wide range of different network configurations and communications can be routed differently to suit different situations and applications.
Figure 2 shows an example of sending text messages or other types of short messages using L2 transfer mechanism. L2 transfer is a concept wherein the MAC control plane is used for transferring higher layer messages. In a WiMAX system this can be a L2 (Layer 2) transfer message such as L2-XFER. The L2 transfer uses a specific type and subtype to transfer the messaging payload (eg: Type 6, subtype a). Bandwidth may be negotiated in advance by the MS with the BS to send the messaging payload on the uplink using the L2 transfer mechanism.
The BS then provides an SMS confirmation 33. As with the initial message transfer an L2 transfer message can be used. The L2 transfer uses a specific type and subtype for the confirmation (eg: Type 6, subtype b).
Both of the transfer messages of Figure 2 have been altered. Instead of carrying a control message intended for the base station the first transfer message 32 contains a text message or other short message intended for another user. A conventional L2-XFER has a type and subtype attributes. A specific "Type" such as Type 6 and a specific "SubType" such as a SubType is to be defined for carrying the short message. When there is a short message to be transferred, a TLV (Type length Value) or other field associated with the short message can be inserted in the L2- XFER control message. The data in this field can be replaced by a short message to the user and a marker, such as the Type and subtype fieds, to indicate that the short message is a user message, not a control message.
In Figure 2, the BS can also send SMS to the MS using L2-XFER messages. First, a L2- Xfer message 34 is sent to the MS. As with the L2-XFER from the MS, this message may contain a TLV field associated with a short message for the MS user with or without other control related TLV parameters. The TLV for SMS can be identified with any particular predefined type and subtype. Type 6, subtype a, for example can be used as with the transfer from the MS.
Alternatively, in the connected mode, the BS can send a L2-XFER that includes a confirmation with a text to the MS user.
The MS answers the SMS from the BS with a confirmation message 35. This can also be in the form of an AAI_L2-XFER, of a specific Type and subtype (eg: Type 6, subtype b). The confirmation can also include another SMS. For the MS in a connected mode, the system may choose to use other MAC control messages such ranging or registration messages to transfer short messages. These messages can have a "Type" that is defined specifically for SMS or another user messaging protocol.
In idle mode, the BS and MS are not connected to allow for the exchange of L2 transfer messages. In Figure 3, the BS has a short message to send to the MS, but the MS is in idle mode. Accordingly, it will not receive a RNG-RSP as in Figure 2. The BS sends a page 36 to the MS. In the illustrated example, the figure is an AAI_PAG-ADV with an action code of ObOl. This page is used to command the MS to do a location update. The stations first perform ranging 37 to request bandwidth from the BS. Then, the MS responds and begins the location update by sending a conventional RNG-REQ 38. In one example this can be a AAI_RNG-REQ on CDMA Allocation A-MAP IE (RAIDl and masking indicator for Ranging).
However, the BS does not reply with a conventional RNG-RSP. Instead, the MS receives a RNG-RSP 40 back from the BS that contains the SMS related TLV fields. As before this message may or may not also contain a control message. In the illustrated example, this is followed by the message 41 with CDMA Allocation A-MAP IE (RAIDl and masking indicator for Ranging). The BS continues to send this message 42 until it receives an acknowledgment 43 from the MS. Both the BS and MS can count timers until the acknowledgment is received. The MS has a timer for the CDMA Allocation A-MAP IE and the BS has a timer for the
acknowledgment. As an alternative, the MS can instead send a ranging or other control message that includes SMS text in addition to the acknowledgment.
In one particular example as shown in Figure 3, when a BS has a downlink SMS for an idle mode MS, the BS includes the SMS in an AAI_RNG-RSP message after sending an
AAI P AG-AD V indicating location update. After sending the AAI RNG-RSP with SMS, the BS grants a CDMA Allocation A-MAP IE in an unsolicited manner in order to receive AAIJVISG- ACK as a confirmation for the downlink SMS. The MCRC of CDMA Allocation A-MAP IE is masked with a RAID and masking indicator for Ranging, where the RAID is the same as the RAID masked in CDMA Allocation A-MAP IE for the AAI RNG-REQ message sent by the MS.
After the BS transmits the AAI RNG-RSP with SMS, the aBS starts a timer
SMS_confirm_resource_alloc_timer and grants the CDMA Allocation A-MAP IE to the MS. When the MS receives the AAI RNG-RSP with SMS, the MS starts a timer
SMS_confirm_resource_waiting_timer and waits for the CDMA Allocation A-MAP IE to send the AAI MSG-ACK.
If the MS has data to send for a short message and the MS is in idle mode, then it can do an unsolicited location update using RNG-REQ 46 and include the SMS as part of it. This is shown in Figure 4. In this example, code based ranging has been completed 45 so that the stations are ready to communicate. The ranging request signal can take the form of a AAI_RNG-REQ with SMS on CDMA Allocation A-MAP IE (RAIDl and masking indicator for Ranging). The base station can reply with a conventional RNG-RSP 47 or it can include a short message in its RNG-RSP, if it has a queued short message to send.
In one particular example, a BS uses an AAI_RNG-RSP message to transmit SMS to an
MS in the downlink. An SMS from the MS in the idle state may be included in a AAI_RNG-REQ message. This can be indicated using, for example, a Ranging Purpose Indication Bit#l=l ("idle mode location update"). If the uplink resource for the RNG-REQ message is not enough to send an AAI_RNG-REQ including the SMS, then the AAI_RNG-REQ may be fragmented using a RNG-REQ fragmentation method.
The BS receives the SMS from the MS while the MS is in its idle state through the
AAI_RNG-REQ message. Upon receiving this, the BS can reply with an AAI_RNG-RSP message. This can be used as a confirmation of the SMS.
In prior systems, SMS and MMS are encrypted at the physical layer. This can be done when the messages are specifically configured to carry SMS or MMS. In 802.16m the RNG-REQ and RNG-RSP messages are not encrypted. The control messages typically carried in the TLV of a RNG message is not sensitive. This can be compensated for using an application layer, for example, an SMS layer encryption mechanism or applying encryption in another way. The higher level encryption can be used to encrypt the actual SMS portion carried by the TLV of the RNG message without the RNG message being encrypted at the physical layer.
In the 802.16 example discussed above the RNG messages are part of a group of MAC
(Media Access Control) control messages.
These messages are carried in the Payload of a MAC PDU (Protocol Data Unit). All of the MAC Contol messages begin with a Message Type field and may contain additional fields. The format of the control message is provided in Table 1 below.
Table 1
In Table 1, the first portion of a MAC PDU is a type indicator. 8 bits are allocated. For a RNG-REQ, the type is the number 4. For a RNG-RSP, the type is the number 5. Many more types of MAC PDU's are accommodated using other type numbers. The next 8 bits of the message are zeroes. After this header, the MAC PDU contains the TLV data. As described below the TLVs can be of different sizes or lengths and can be combined in a single message in the manners that are specifically allowed. The TLV are intended to be control messages that are transparent to the user and ensure smooth operation of the system.
In 802.16m, ranging using RNG-REQ and RNG-RSP is the process of acquiring the correct timing offset, frequency offset and power adjustments so that the transmissions of the MS are aligned with the BS, and so that they are received within the appropriate reception thresholds. Ranging is also used to establish the location of a mobile station as it moves from place to place.
The ranging messages are used to maintain the quality of the radio communications link at the physical layer. Different messages are used for the uplink and the downlink although the basic structure is the same. Ranging allows the system to adjust time and frequency synchronization and the power and assignments for subcarriers and subchannels. Ranging is done periodically for the various supported carriers between each base station and registered mobile station.
The ranging messages are a part of the basic messages for the system. Separate and apart from the broadcast channel and subscriber registration, ranging messages are directed to a specific registered MS and the specific BS to which the MS is registered. Separate and apart from the traffic channels, the basic messages handle control information and system configuration.
The Ranging Request (RNG-REQ) message is transmitted by the MS at initialization and periodically to determine network delay and to request a change in transmit power, downlink burst profiles, or other system operation parameters. Initialization refers to when the MS originally seeks to gain access to the network and register with a base station. The RNG-REQ message may be sent in initial ranging and data grant intervals. The TLV field portion of the message is varied depending on the circumstances and there can be more than one TLV fields in a single RNG-REQ message.
The TLV fields may encode information including burst profiles, MAC addresses, ranging anomalies, equipment capabilities and identifiers, base station identifiers, handover requests, network reentry requests, emergency call procedures, paging control messages, timing, delay, and retry parameters, power control and management messages, etc. All of these parameters are directed to the system and concern the identification or operation of the MS in the system. None of these messages involve information to be conveyed to users or to the application layer.
Typically, a system tries to prevent a user from seeing these messages which would otherwise interfere with the user's attention on the information that he is sending to or receiving from other users.
The Ranging Response (RNG-RSP) message has similar types of TLV parameters that it can send. These can include timing adjustment Information, frequency, channel, subchannel, and delay assignments, various timers, slot and frame numbers, equipment Nos. and addresses of base stations and modems, and paging parameters, etc. As with the request message, the TLVs for the response message also all relate to control parameters and equipment operation.
Using the TLV for messages between users allows short user messages to be transmitted at almost any time without changing the operational modes of the MS. The ranging messages present the advantage that they can be sent when no active connection is required and that they can be sent at almost any time. In order to accommodate such a function, the short user message is uniquely identified and both the BS and MS are adapted to identify the message and handle it accordingly.
The TLV is one example of an information encoding format. Embodiments of the invention may also be adapted for use with other encoding formats including ASN 1. In many of the described embodiments of the invention, the short user message is place in an optional field. The short user message can then either be included or not included without affecting other functions. In other words, using an optional field, when the message is parsed the present or absence of the short user message will not affect the parsing of the message.
Figure 5 shows an example of a hardware configuration that can be used for both a base station and a mobile station to implement the communications described above. In Figure 5, the station 50 is driven by a processor 52. This can be a small, low power processor in the case of a MS or a high power, high speed processor in the case of a BS.
The processor has a memory bus that is coupled to a memory 56, such as magnetic, optical, or solid state memory or some combination thereof. The memory contains programming instructions and user data that can be sent and received between stations. Account data 58 can also be connected to the bus. For the MS, this can include a SIM (Subscriber Identity Module) and other stored personal parameters. For the BS this can include account authorization databases or connections to such databases.
A suite of sensors 54, such as positioning sensors, battery or power sensors, cameras and microphones, and transceiver signal sensors are coupled to the processor to provide additional data to the processor.
A user interface bus, such as USB (Universal Serial Bus) or another type of user interface connection connects the processor to a user interface 60, such as a keyboard, touch screen, mouse, trackball, or other interface, a display 62, and other connectors 64 to allow other devices to be connected. The particular user interface can be adapted to suit the particular application. A user can enter or attach text or other short messages through the user interface and can use the interface for system maintenance and control. For a MS, the user can, through the interface, make recordings with the microphone and camera and attach them to short messages that are commanded to be sent to a specific user or group of users using the keyboard or touch screen.
The processor 52 is coupled to another communications bus for communications with other devices. A wired interface 66 allows a BS to communicate with other BS's, gateways, base station controllers, operations and maintenance centers, etc. For the BS, the wired interface can allow for network connections and for a portable device, it may allow the device to be coupled to a personal computer for updates and maintenance. The communications bus also provides for wired or wireless connections to a personal area network (PAN) 68, such as Bluetooth, a local area network (LAN) 70 such as Wi-Fi, and a wide area network 72, or metropolitan area network such as 802.16m. More or fewer network adapters may be provided, depending on the application. Some network functions may be consolidated or separated, and a variety of different
communications protocols and configurations may be used.
The wide area network (WAN) adapter 72 includes logic 74 to generate, assemble, encode, encrypt, and queue packets to be sent through the WAN. The logic is coupled to a transceiver 76 to modulate, encode, and amplify the packets from the logic for transmission through an antenna 78 over the WAN. The antenna may have one or more elements, depending on performance, cost and design considerations. The same transmit chain can also function as a receive chain or a separate receive chain (not shown) can be used. The receive chain would perform the reciprocal functions of receiving demodulating, amplifying, parsing, decoding, etc. to obtain data to send back to the processor over the communications bus.
In the case of receiving a packet with control messages, the messages are sent to the processor and are then used to adjust operation parameters or call routines for registration, call initiation, etc. In the case of receiving a packet with a user message, the message is sent to the processor and is then provided to the user on the display. In either case, the messages may be stored in memory.
The configuration of Figure 5 can also be applied to a portable or desktop computer equipped with a wireless adapter. The WAN adapter 72 can be provided as a separate component on USB, a PCI (Peripheral Component Interconnect) bus, or any other suitable bus, or it can be provided as an internal system component.
A lesser or more equipped communications station 50 than the example described above may be desirable for certain implementations. Therefore, the configuration of the system will vary from implementation to implementation depending upon numerous factors, such as price constraints, performance requirements, technological improvements, and/or other circumstances.
Embodiments of the present invention have been described in the context of 802.1 lm and particular messages within that communications protocol and standard, however, the invention is not so limited. Embodiments of the present invention can be applied to other communications protocol and other types of control messages within 802.16m and other protocols in order to allow short user messages to be transmitted with little impact on overall system operation. While the present description is in the context of SMS, it can be applied to any of a variety of different short user messages. In addition, while SMS is frequently transmitted from one cellular telephone to another, users can send texts using WiFi, Internet, and telephone-connected devices, including portable and desktop computers, telephones, and media players. A remote data terminal or remote terminal herein can refer to any such device.
While the steps described herein can be performed under the control of a programmed processor, such as the processor 52, in alternative embodiments, the steps can be fully or partially implemented by any programmable or hard coded logic, such as Field Programmable Gate Arrays (FPGAs), TTL logic, or Application Specific Integrated Circuits (ASICs), for example.
Additionally, the method of the present invention can be performed by any combination of programmed general purpose computer components or custom hardware components. Therefore, nothing disclosed herein should be construed as limiting the present invention to a particular embodiment wherein the recited steps are performed by a specific combination of hardware components.
The present invention can be provided as a computer program product that can include a machine-readable medium having instructions stored thereon, which can be used to program a computer (or other machine) to perform a process according to the present invention. The machine-readable medium can include, but is not limited to, floppy diskettes, optical disks, CD- ROMs, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, magnet or optical cards, flash memory, or any other type of medium suitable for storing electronic instructions.
In the present description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, the present invention can be practiced without some of these specific details. In other instances, well- known structures and devices are shown in block diagram form. The specific detail can be supplied by one of average skill in the art as appropriate for any particular implementation.
Although this disclosure describes illustrative embodiments of the invention in detail, it is to be understood that the invention is not limited to the precise embodiments described. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. Various adaptations, modifications and alterations may be practiced within the scope of the invention defined by the appended claims.

Claims

CLAIMS What is claimed is:
1. A method comprising:
sending a first control message from a first radio to a second radio, the control message including a data field, the data field containing a short message directed from a user of a to a user of a remote data terminal;
receiving a second control message in reply to the first control message from the second radio, the second control message including a data field, the data field containing a response to the short message.
2. The method of Claim 1, wherein the reply is an acknowledgment of the short message.
3. The method of Claim 1, wherein the reply is a second short message from a remote user to the user of the first radio.
4. The method of Claim 1 , wherein the second short message is from a user of a third radio.
5. The method of Claim 1, wherein the short message is a text message.
6. The method of Claim 1, wherein the short message is a short message service message.
7. The method of Claim 1 , wherein the short message is a multimedia message.
8. The method of Claim 1, wherein the data field is assigned for use for a control message.
9. The method of Claim 1, wherein the first control message is a media access control message.
10. The method of Claim 1, wherein the media access control message is used for connected mode and idle mode media access control operations.
11. The method of Claim 1 , further comprising receiving a page from the second radio and wherein sending a first control message is in response to receiving the page.
12. The method of Claim 9, wherein the first control message is a location update.
13. The method of Claim 1 , further comprising encrypting the short message at an application layer before sending.
14. The method of Claim 1, wherein the response to the short message is encrypted, the method further comprising decrypting the response to the short message at an application layer.
15. An apparatus comprising :
a processor to generate control message, the control message including a data field, the data field containing a short message directed from a user of the first radio to a user of a remote data terminal; and
a transceiver to send the control message from a first radio to a second radio and to receive a second control message in reply to the first control message from the second radio, the second control message including a data field, the data field containing a response to the short message.
16. The apparatus of Claim 15, wherein the processor is further to encrypt the short message at an application layer before sending.
17. The apparatus of Claim 15, wherein the data field is assigned for use for a control message.
18. A machine -readable medium having instructions stored thereon that when operated on by the machine cause the machine to perform operations comprising:
sending a first control message from a first radio to a second radio, the control message including a data field, the data field containing a short message directed from a user of the first radio to a user of a third radio;
receiving a second control message in reply to the first control message from the second radio, the second control message including a data field, the data field containing a response to the short message.
19. The medium of Claim 18, the instructions further comprising receiving a page from the second radio and wherein sending a first control message is in response to receiving the page.
20. The medium of Claim 19, wherein the first control message is a location update.
EP10814257A 2009-08-24 2010-08-24 Short user messages in system control signaling Withdrawn EP2471286A2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US27526609P 2009-08-24 2009-08-24
US12/646,708 US8280417B2 (en) 2009-12-23 2009-12-23 Short user messages in system control signaling
PCT/US2010/046527 WO2011028544A2 (en) 2009-08-24 2010-08-24 Short user messages in system control signaling

Publications (1)

Publication Number Publication Date
EP2471286A2 true EP2471286A2 (en) 2012-07-04

Family

ID=43649897

Family Applications (1)

Application Number Title Priority Date Filing Date
EP10814257A Withdrawn EP2471286A2 (en) 2009-08-24 2010-08-24 Short user messages in system control signaling

Country Status (6)

Country Link
EP (1) EP2471286A2 (en)
JP (1) JP5462366B2 (en)
KR (1) KR101369753B1 (en)
CN (1) CN102484776B (en)
RU (1) RU2524866C2 (en)
WO (1) WO2011028544A2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101627165B1 (en) * 2009-09-22 2016-06-14 삼성전자주식회사 Method and apparatus for supporting short messaging service of mobile station during idle mode in wireless communicaion system
KR101896583B1 (en) * 2011-09-08 2018-09-07 한국전자통신연구원 Method for communication of terminal and base station

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2152942C (en) * 1993-11-01 2000-08-01 Michael David Fehnel A message transmission system and method for a radiocommunication system
US5903726A (en) * 1996-06-26 1999-05-11 Mci Communications Corporation System using portion of a short message payload to identify short message service types and delivering the message if user subscribes to the services
ES2289816T3 (en) * 1998-07-16 2008-02-01 Telemac Corporation METHOD FOR THE MANAGEMENT OF A PREPAID WIRELESS SERVICE.
DE19861323B4 (en) * 1998-12-08 2006-02-16 Robert Bosch Gmbh Method for transmitting short messages
SE516658C2 (en) * 2000-07-21 2002-02-12 Ericsson Telefon Ab L M Procedure and Device for Enhanced Short Message Services
JP3485176B2 (en) * 2000-08-23 2004-01-13 日本電気株式会社 Protocol terminator
KR100461883B1 (en) * 2000-11-09 2004-12-14 엘지전자 주식회사 Short Message Service Method Using Control Channel in Mobile Communication System
JP2003264860A (en) * 2002-01-07 2003-09-19 Fujitsu Ltd Method for providing information reflecting mobile user action, and mobile switching center information providing apparatus, and mobile unit implementing the same
EP1510026A4 (en) * 2002-05-29 2010-10-13 Interdigital Tech Corp Method and apparatus for transmission of internet control message protocol messages in a communications network
US7139259B2 (en) * 2002-07-09 2006-11-21 Qualcomm, Inc. Method and apparatus for conveying reports for SMS messages in wireless communication systems
WO2004032542A2 (en) * 2002-10-04 2004-04-15 International Business Machines Corporation Method and apparatus for an e-commerce message using sms
CN1231874C (en) * 2002-10-28 2005-12-14 国际商业机器公司 Communication breaking rules and regulations monitoring system and method based on multimedia information transferring service
KR20040108133A (en) * 2003-06-16 2004-12-23 삼성전자주식회사 Mobile communication system for call setup and call setup method thereof
CN100551142C (en) * 2003-08-11 2009-10-14 摩托罗拉公司 A kind of method and device thereof that is used for from the wireless device forwarding information
AU2003285357B2 (en) * 2003-11-07 2010-12-02 Telecom Italia S.P.A. Method and system for the authentication of a user of a data processing system
US7039430B2 (en) * 2004-03-04 2006-05-02 Samsung Electronics Co., Ltd. System and method for controlling an operational mode of a MAC layer in a broadband wireless access communication system
US7995517B2 (en) * 2004-03-24 2011-08-09 Lg Electronics Inc. System and method for transmitting units of messages in a mobile communication system
KR20060111789A (en) * 2005-04-25 2006-10-30 (주) 엘지텔레콤 Electronic commercial system for interworking dmb and financial chip based mobile banking service and method therefof
JP2005323391A (en) * 2005-06-03 2005-11-17 Mitsubishi Electric Corp Handoff method and agent device
US7209759B1 (en) * 2005-06-23 2007-04-24 Cisco Technology, Inc. Method and system for customizing distributed short message routing
US20070238474A1 (en) * 2006-04-06 2007-10-11 Paul Ballas Instant text reply for mobile telephony devices
RU2346413C2 (en) * 2006-12-28 2009-02-10 Общество С Ограниченной Ответственностью "Суперфон" Method of advertisement data messages distribution
CN101202965B (en) * 2007-12-10 2011-04-06 中兴通讯股份有限公司 Method for transmitting safe point-to-point short message facing to connectionless
US8571524B2 (en) * 2008-02-06 2013-10-29 Qualcomm Incorporated Method and apparatus for delivery confirmation of a message

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2011028544A3 *

Also Published As

Publication number Publication date
KR20120063491A (en) 2012-06-15
KR101369753B1 (en) 2014-03-06
RU2012111263A (en) 2013-10-10
WO2011028544A3 (en) 2011-06-16
JP5462366B2 (en) 2014-04-02
CN102484776A (en) 2012-05-30
CN102484776B (en) 2016-03-02
RU2524866C2 (en) 2014-08-10
WO2011028544A2 (en) 2011-03-10
JP2013502891A (en) 2013-01-24

Similar Documents

Publication Publication Date Title
US8280417B2 (en) Short user messages in system control signaling
US10536967B2 (en) Method for selecting of sidelink grant for a D2D UE in a D2D communication system and device therefor
EP3595399B1 (en) Method for transmitting an explicit signal of layer-2 state variables for d2d communication system and device therefor
EP3100372B1 (en) Configurung a mac pdu for d2d commucation
US10044839B2 (en) Method for performing a packet filtering for prose in a D2D communication system and device therefor
US10547377B2 (en) Method for handling an ID collision for D2D communication system and device therefor
US10313065B2 (en) Method for transmitting a MAC PDU on SL-DCH in a D2D communication system and device therefor
US20190053326A1 (en) Method and device for transmitting data unit
US10292131B2 (en) Methods and arrangements in a wireless communication network for managing capability information for paging
WO2011047503A1 (en) Method and apparatus for provision of paging messages in relay network
WO2011000419A1 (en) Apparatus and methods for transmitting paging messages for peer to peer communication
US20210127295A1 (en) Method and apparatus for transmitting packet based on type of packet by transmission end in wireless communication system
JP7516589B2 (en) COMMUNICATION CONTROL METHOD, USER EQUIPMENT, PROCESSOR, NETWORK DEVICE, PROGRAM, AND SYSTEM
EP4315689A1 (en) Methods and apparatus for disabled harq processes
US20200404698A1 (en) Method and apparatus for transmitting signals by tm rlc entity of transmission end in wireless communication system
KR101369753B1 (en) Short user messages in system control signaling
WO2022061751A1 (en) Method and apparatus for multicast and broadcast services

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20120117

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20160301