US20180288676A1 - Access control in new radio - Google Patents

Access control in new radio Download PDF

Info

Publication number
US20180288676A1
US20180288676A1 US15/942,505 US201815942505A US2018288676A1 US 20180288676 A1 US20180288676 A1 US 20180288676A1 US 201815942505 A US201815942505 A US 201815942505A US 2018288676 A1 US2018288676 A1 US 2018288676A1
Authority
US
United States
Prior art keywords
access
layer
aci
network node
wireless device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/942,505
Inventor
Chia-Hung Wei
Chie-Ming Chou
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New Radio LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US15/942,505 priority Critical patent/US20180288676A1/en
Assigned to FG INNOVATION IP COMPANY LIMITED reassignment FG INNOVATION IP COMPANY LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHIA-HUNG WEI, CHIE-MING CHOU
Publication of US20180288676A1 publication Critical patent/US20180288676A1/en
Assigned to FG Innovation Company Limited reassignment FG Innovation Company Limited CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: FG INNOVATION IP COMPANY LIMITED
Priority to US16/444,165 priority patent/US10602429B2/en
Assigned to FG Innovation Company Limited reassignment FG Innovation Company Limited CORRECTIVE ASSIGNMENT TO CORRECT THE RECEIVING PARTY STATE/COUNTRY PREVIOUSLY RECORDED ON REEL 049297 FRAME 0824. ASSIGNOR(S) HEREBY CONFIRMS THE CHANGE OF NAME. Assignors: FG INNOVATION IP COMPANY LIMITED
Priority to US16/749,260 priority patent/US11089536B2/en
Priority to US17/366,663 priority patent/US11706692B2/en
Assigned to NEW RADIO LLC reassignment NEW RADIO LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: REDLAKE IP LLC
Assigned to REDLAKE IP LLC reassignment REDLAKE IP LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FG INNOVATION COMPANY LTD.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Definitions

  • US62068 application claims the benefit of and priority to a provisional U.S. Patent Application Ser. No. 62/480,512 filed Apr. 2, 2017, entitled “ACCESS CONTROL IN NEW RADIO,” Attorney Docket No. US62068 (hereinafter referred to as “US62068 application”).
  • US62068 application The disclosure of the US62068 application is hereby incorporated fully by reference into the present application.
  • the present disclosure generally relates to wireless communication methods and systems, and more particularly, to access control for the next generation wireless communication networks.
  • NR next generation wireless communication networks
  • 3GPP 3 rd Generation Partnership Project
  • NR will enable new use cases for cellular access, and also increase the capacity for existing data applications.
  • the base stations e.g., next generation node Bs (gNBs)
  • CNs core networks
  • gNBs next generation node Bs
  • CNs core networks
  • a system overload may occur when a large number of user equipments (UEs) try to access the system in a synchronized manner (e.g., at the same time).
  • UEs user equipments
  • a radio access network is responsible for activating access control when the RAN or the CN is overloaded.
  • a current access control scheme under a 4G wireless network may be performed in the RAN (e.g., RAN based), which primarily bars low priority UEs from attempting to perform random access procedures to transition from RRC_IDLE state to RRC_CONNECTED state. That is, the low priority UEs can be barred by the RAN from accessing the wireless network for a predetermined period of time when the RAN or CN is overloaded.
  • RRC_INACTIVE state under an NR wireless network is configured by a base station (e.g., gNB), and may be invisible to the CN.
  • a base station e.g., gNB
  • the CN may not receive a notification of such, and may still consider the UE as in RRC_CONNECTED state.
  • the UE While in RRC_INACTIVE state, the UE may transfer uplink (UL) data to the base state (e.g., gNB) without undergoing RRC state transition (e.g., without transitioning from RRC_INACTIVE state to RRC_CONNECTED state).
  • the base state e.g., gNB
  • RRC state transition e.g., without transitioning from RRC_INACTIVE state to RRC_CONNECTED state.
  • the RANs may set up barring parameters to bar or block RRC_IDLE UEs from performing RRC state transition to RRC_CONNECTED state for data transmission.
  • the access control schemes under the 4G wireless networks do not take into account of the newly introduced RRC_INACTIVE UEs that are capable of direct data uplink transmission to the base station without transitioning into RRC_CONNECTED state. As such, the legacy 4G wireless networks cannot effectively treat the RRC_INACTIVE UEs when the base station and/or the CN is overloaded.
  • the CN may underestimate the network traffic condition in the RANs because of the presence of the RRC_INACTIVE UEs. That is, the CN may consider the RRC_INACTIVE UEs are in the RRC_CONNECTED state, and use their current data rates for the network traffic estimate.
  • the present disclosure is directed to access control in new radio.
  • a method for network access of a wireless device e.g., a UE
  • a network node e.g., a base station
  • the method comprises initiating an access attempt to the network node; reading a first layer of access control information (ACI) from the network node to determine whether an access control indicator in the first layer for an access category is ON, wherein the access control indicator for the access category is associated with a characteristic/classification of the access attempt by the wireless device to the network node; in response to the access control indicator in the first layer for the access category being ON, reading a second layer of the ACI from the network node to determine whether the access attempt to the network node is allowed based on one or more specific parameters associated with the access category in the second layer of the ACI.
  • ACI access control information
  • the method further comprises receiving an access attempt configuration (AAC) from the network node, the AAC including at least one value tag corresponding to the access category.
  • AAC access attempt configuration
  • the method further comprises performing a value tag check to determine whether there is an update associated with the access category.
  • the method further comprises, when the at least one value tag has been updated, using the second layer of the ACI to determine whether the access attempt to the network node is allowed based on the one or more specific parameters associated with the access category in the second layer of the ACI.
  • the AAC is configured by the network node, and includes information of at least one of the wireless device's access class and the ACI's default and current settings.
  • the wireless device's access class is dynamically assigned by the network node based on at least one of the wireless device's ID, quality of service (QoS) requirement and data size.
  • QoS quality of service
  • the method further comprises, in response to the access control indicator in the first layer for the access category being OFF, performing an access procedure to gain access to the network node without reading the second layer of the ACI.
  • the first layer of the ACI is categorized based on a radio resource control (RRC) state of the wireless device, and includes access control indications and common parameters.
  • RRC radio resource control
  • the wireless device makes the access attempt in one of RRC_Inactive state, RRC_Connected state, and RRC_Idle state.
  • the first layer of ACI is broadcasted by the network node through minimum system information.
  • the method further comprises in response to the access control indicator in the first layer for the access category being ON, requesting the second layer of the ACI by the wireless device from the network node when the at least one value tag has been updated; sending, by the network node, the second layer of the ACI to the wireless device in response to the request through other system information.
  • the access category is associated with at least one of random access procedure, RAN-based notification area (RNA), RRC state transition, applications, network slice, RAN slice, quality of service (QoS) requirement and data size.
  • RNA RAN-based notification area
  • QoS quality of service
  • the access category is RNA update such that the RNA update is controlled by the ACI.
  • a wireless device for network access of the wireless device to a network node (e.g., a base station)
  • the wireless device comprises: one or more processors; a non-transitory machine-readable memory storing a program, the program executable by at least one of the one or more processors, the program comprising sets of instructions for: initiating an access attempt to the network node; reading a first layer of access control information (ACI) from the network node to determine whether an access control indicator in the first layer for an access category is ON, wherein the access control indicator for the access category is associated with a characteristic/classification of the access attempt by the wireless device to the network node; in response to the access control indicator in the first layer for the access category being ON, reading a second layer of the ACI from the network node to determine whether the access attempt to the network node is allowed based on one or more specific parameters associated with the access category in the second layer of the ACI.
  • ACI access control information
  • the program further comprises the sets of instructions for receiving an access attempt configuration (AAC) from the network node, the AAC including at least one value tag, the at least one value tag corresponding to the access category.
  • AAC access attempt configuration
  • the program further comprises the sets of instructions for performing a value tag check to determine whether there is an update associated with the access category.
  • the program further comprises the sets of instructions for, when the at least one value tag has been updated, using the second layer of the ACI to determine whether the access attempt to the network node is allowed based on the one or more specific parameters associated with the access category in the second layer of the ACI.
  • the AAC is configured by the network node, and includes information of at least one of the wireless device's access class and the ACI's default and current settings.
  • the wireless device's access class is dynamically assigned by the network node based on at least one of the wireless device's ID, quality of service (QoS) requirement and data size.
  • QoS quality of service
  • the program further comprises the sets of instructions for, in response to the access control indicator in the first layer for the access category being OFF, performing an access procedure to gain access to the network node without reading the second layer of the ACI.
  • the first layer of the ACI is categorized based on a radio resource control (RRC) state of the wireless device, and includes access control indications and common parameters.
  • RRC radio resource control
  • the wireless device makes the access attempt in one of RRC_Inactive state, RRC_Connected state, and RRC_Idle state.
  • the program further comprises the sets of instructions for, in response to the access control indicator in the first layer for the access category being ON, requesting the second layer of the ACI by the wireless device from the network node when the at least one value tag has been updated.
  • a network node for network access of a wireless device (e.g., a UE) to the network node.
  • the network node comprises: one or more processors: a non-transitory machine-readable memory storing a program, the program executable by at least one of the one or more processors, the program comprising sets of instructions for: providing a first layer of access control information (ACI) to the wireless device, the first layer of the ACI having one or more access control indicators corresponding to one or more access categories; providing a second layer of the ACI to the wireless device upon request; wherein the wireless device requests for the second layer of the ACI when at least one of the one or more access control indicators in the first layer of the ACI associated with a characteristic/classification of an access attempt by the wireless device to the network node is ON.
  • ACI access control information
  • the program further comprises the sets of instructions for providing an access attempt configuration (AAC) to the wireless device, the AAC including at least one value tag corresponding to the access category.
  • AAC access attempt configuration
  • the network node dynamically assigns the wireless device's access class based on at least one of the wireless device's ID, quality of service (QoS) requirement and data size.
  • QoS quality of service
  • the access category is associated with at least one of random access procedure, RAN-based notification area (RNA), RRC state transition, applications, network slice, RAN slice, quality of service (QoS) requirement and data size.
  • RNA RAN-based notification area
  • QoS quality of service
  • FIG. 1 is a schematic diagram of UEs performing data transmission using 2-step or 4-step random access procedures in a next generation wireless network, according to an exemplary implementation of the present application.
  • FIG. 2 is a diagram illustrating data transmission using a 2-step random access procedure, according to an exemplary implementation of the present application.
  • FIG. 3 is a diagram illustrating data transmission using a 4-step random access procedure, according to an exemplary implementation of the present application.
  • FIG. 4 is a diagram illustrating an access control information (ACI) structure, according to an exemplary implementation of the present application.
  • ACI access control information
  • FIG. 5 is a flowchart illustrating a method for access control, according to an exemplary implementation of the present application.
  • FIG. 6A is a diagram illustrating an access attempt configuration (AAC) transmission for an RRC_INACTIVE UE, according to an exemplary implementation of the present application.
  • AAC access attempt configuration
  • FIG. 6B is a diagram illustrating an access control information (ACI) transmission for an RRC_INACTIVE UE, according to an exemplary implementation of the present application.
  • ACI access control information
  • FIG. 7A is a diagram illustrating an access attempt configuration (AAC) transmission for an RRC_CONNECTED UE, according to an exemplary implementation of the present application.
  • AAC access attempt configuration
  • FIG. 7B is a diagram illustrating an access control information (ACI) transmission for an RRC_CONNECTED UE, according to an exemplary implementation of the present application.
  • ACI access control information
  • FIG. 8 illustrates a block diagram of a node for wireless communication, according to various aspects of the present application.
  • the present application may include the language, such as, “at least one of [element A] and [element B]”. This language may refer to one or more of the elements. For example, “at least one of A and B” may refer to “A”, “B”, or “A and B”. In some implementations, the present application may include the language, such as, “[element A], [element B], and/or [element C].” This language may refer to either of the elements or any combination thereof. In other words, “A, B, and/or C” may refer to “A”, “B”, “C”, “A and B”, “A and C”, “B and C”, or “A, B, and C”.
  • any network function(s) or algorithm(s) described in the present disclosure may be implemented by hardware, software or a combination of software and hardware. Described functions may correspond to modules may be software, hardware, firmware, or any combination thereof.
  • the software implementation may comprise computer executable instructions stored on computer readable medium such as memory or other type of storage devices.
  • one or more microprocessors or general purpose computers with communication processing capability may be programmed with corresponding executable instructions and carry out the described network function(s) or algorithm(s).
  • the microprocessors or general purpose computers may be formed of applications specific integrated circuitry (ASIC), programmable logic arrays, and/or using one or more digital signal processor (DSPs).
  • ASIC applications specific integrated circuitry
  • DSPs digital signal processor
  • the computer readable medium includes but is not limited to random access memory (RAM), read only memory (ROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), flash memory, compact disc read-only memory (CD ROM), magnetic cassettes, magnetic tape, magnetic disk storage, or any other equivalent medium capable of storing computer-readable instructions.
  • RAM random access memory
  • ROM read only memory
  • EPROM erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • CD ROM compact disc read-only memory
  • magnetic cassettes magnetic tape
  • magnetic disk storage or any other equivalent medium capable of storing computer-readable instructions.
  • a radio communication network architecture typically includes at least one network node (e.g., base station), at least one user equipment (UE), and one or more optional network elements that provide connection towards a network.
  • the UE communicates with the network (e.g., a core network (CN), an evolved packet core (EPC) network, an Evolved Universal Terrestrial Radio Access network (E-UTRAN), a Next-Generation Core (NGC), or an internet), through a radio access network (RAN) established by the network node (e.g., base station).
  • CN core network
  • EPC evolved packet core
  • E-UTRAN Evolved Universal Terrestrial Radio Access network
  • NGC Next-Generation Core
  • internet radio access network
  • a UE may include, but is not limited to, a mobile station, a mobile terminal or device, a user communication radio terminal.
  • a UE may be a portable radio equipment, which includes, but is not limited to, a mobile phone, a tablet, a wearable device, a sensor, or a personal digital assistant (PDA) with wireless communication capability.
  • PDA personal digital assistant
  • the UE is configured to receive and transmit signals over an air interface to one or more cells in a radio access network.
  • a network node may include a base station.
  • a base station may include, but is not limited to, a node B (NB) as in the UMTS, an evolved node B (eNB) as in the LTE-A, a radio network controller (RNC) as in the UMTS, a base station controller (BSC) as in the GSM/GERAN, a ng-eNB as in an E-UTRA base station in connection with the 5GC, a next generation node B (gNB) as in the 5G-AN, and any other apparatus capable of controlling radio communication and managing radio resources within a cell.
  • the base station may connect to serve the one or more UEs through a radio interface to the network.
  • a base station may be configured to provide communication services according to at least one of the following radio access technologies (RATs): Worldwide Interoperability for Microwave Access (WiMAX), Global System for Mobile communications (GSM, often referred to as 2G), GSM EDGE radio access Network (GERAN), General Packet Radio Service (GRPS), Universal Mobile Telecommunication System (UMTS, often referred to as 3G) based on basic wideband-code division multiple access (W-CDMA), high-speed packet access (HSPA), LTE, LTE-A, eLTE (evolved LTE), New Radio (NR, often referred to as 5G), and/or LTE-A Pro.
  • RATs radio access technologies
  • WiMAX Worldwide Interoperability for Microwave Access
  • GSM Global System for Mobile communications
  • GERAN GSM EDGE radio access Network
  • GRPS General Packet Radio Service
  • UMTS Universal Mobile Telecommunication System
  • W-CDMA basic wideband-code division multiple access
  • HSPA high-speed packet access
  • the base station is operable to provide radio coverage to a specific geographical area using a plurality of cells forming the radio access network.
  • the base station supports the operations of the cells.
  • Each cell is operable to provide services to at least one UE within its radio coverage. More specifically, each cell (often referred to as a serving cell) provides services to serve one or more UEs within its radio coverage, (e.g., each cell schedules the downlink and optionally uplink resources to at least one UE within its radio coverage for downlink and optionally uplink packet transmissions).
  • the base station can communicate with one or more UEs in the radio communication system through the plurality of cells.
  • a cell may allocate sidelink (SL) resources for supporting proximity service (ProSe).
  • Each cell may have overlapped coverage areas with other cells.
  • the frame structure for NR is to support flexible configurations for accommodating various next generation (e.g., 5G) communication requirements, such as enhanced mobile broadband (eMBB), massive machine type communication (mMTC), ultra reliable communication and low latency communication (URLLC), while fulfilling high reliability, high data rate and low latency requirements.
  • 5G next generation
  • eMBB enhanced mobile broadband
  • mMTC massive machine type communication
  • URLLC ultra reliable communication and low latency communication
  • the orthogonal frequency-division multiplexing (OFDM) technology as agreed in 3GPP may serve as a baseline for NR waveform.
  • the scalable OFDM numerology such as the adaptive sub-carrier spacing, the channel bandwidth, and the Cyclic Prefix (CP) may be also used.
  • two coding schemes are considered for NR: (1) low-density parity-check (LDPC) code and (2) Polar Code.
  • the coding scheme adaption may be configured based on the channel conditions and/or the service applications.
  • a downlink (DL) transmission data, a guard period, and an uplink (UL) transmission data should at least be included, where the respective portions of the DL transmission data, the guard period, the UL transmission data should also be configurable, for example, based on the network dynamics of NR.
  • sidelink resource may also be provided in an NR frame to support ProSe services.
  • FIG. 1 shows a schematic diagram of UEs performing data transmission using 2-step and 4-step random access procedures in a next generation (e.g., 5G NR) wireless network, according to an exemplary implementation of the present application.
  • wireless communication system 100 includes UE 102 a , UE 102 b , base station 104 a (e.g., a gNB) having coverage area 106 a , base station 104 b (e.g., a gNB) having coverage area 106 b , where base stations 104 a and 104 b can access core network (CN) 108 , such as a next generation core network (e.g., 5G Core Network (5GC)).
  • CN core network
  • CN 108 may signal base station 104 a and base station 104 b through 5GC notifications.
  • base station 104 a is within a first RAN-based notification area, RNA1, while base station 104 b is within a second RAN-based notification area, RNA2, that is different from RNA1.
  • RNA1 and RNA2 are neighboring RAN-based notification areas.
  • base stations 104 a and 104 b may be two neighboring cells in a single RAN-based notification area. In FIG.
  • UEs 102 a and 102 b can each use a 2-step or a 4-step random access procedure to establish connection or re-synchronization with their respective base stations 104 a and 104 b . Also, UEs 102 a and 102 b are capable of transmitting uplink (UL) data to their respective base stations 104 a and 104 b using the 2-step or 4-step random access procedure.
  • UL uplink
  • FIG. 2 illustrates a diagram of data transmission using a 2-step random access procedure, according to an exemplary implementation of the present application.
  • Diagram 200 includes UE 202 and base station 204 (e.g., a gNB) where UE 202 may transmit UL data to base station 204 using a 2-step random access procedure.
  • UE 202 and base station 204 may substantially correspond to UE 102 a (or UE 102 b ) and base station 104 a (or base station 104 b ), respectively, in FIG. 1 .
  • action 210 includes UE 202 transmitting a random access channel (RACH) preamble (e.g., MSG 1) to base station 204 .
  • Base station 204 configures random access channel (RACH) resources which are used to let UE 202 transmit the RACH preamble, uplink (UL) data and the UE ID of UE 202 .
  • UE 202 may randomly select a RACH preamble resource to be actually used from the RACH preamble resources (e.g., prescribed by combinations of time resources, frequency resources and sequence resources). Then, UE 202 may transmit the RACH preamble using the selected RACH preamble resource.
  • the UL data along with the UE ID of UE 202 may also be multiplexed with the RACH preamble in the MSG1.
  • action 212 includes base station 204 transmitting a random access response (RAR) (e.g., MSG 2) to UE 202 , when base station 204 detects the RACH preamble, the UL data along with the UE ID of UE 202 .
  • RAR random access response
  • base station 204 may provide an acknowledge (ACK)/non-acknowledgement (NACK) message in MSG 2 to indicate whether base station 204 has received the UL data in MSG 1 successfully.
  • ACK acknowledge
  • NACK non-acknowledgement
  • FIG. 3 illustrates a diagram of data transmission using a 4-step random access procedure, according to an exemplary implementation of the present application.
  • Diagram 300 includes UE 302 and base station 304 (e.g., a gNB), where UE 302 may transmit UL data to base station 304 using a 4-step random access procedure.
  • UE 302 and base station 304 may substantially correspond to UE 102 a (or UE 102 b ) and base station 104 a (or base station 104 b ), respectively, in FIG. 1 .
  • action 310 includes UE 302 transmitting a random access channel (RACH) preamble (e.g., MSG 1) to base station 304 .
  • RACH random access channel
  • UE 302 may randomly select a RACH preamble resource to be actually used from a group of RACH preamble resource candidates (prescribed by combinations of time resources, frequency resources and sequence resources). Then, UE 302 may transmit the RACH preamble using the selected RACH preamble resource.
  • Action 312 includes base station 304 transmitting a random access response (RAR) (e.g., MSG 2) to UE 302 , when base station 304 detects the RACH preamble.
  • RAR random access response
  • the RAR is transmitted over the entire cell covered by base station 304 , since base station 304 may not have been able to identified UE 302 that transmitted the RACH preamble.
  • a physical downlink shared channel (PDSCH) resource in which the RAR is mapped may be indicated by base station 304 to UE 302 via a physical downlink control channel (PDCCH).
  • the RAR may contain information relating to a resource to be used by UE 302 in uplink or information relating to uplink transmission timing for UE 302 .
  • Action 314 includes UE 302 transmitting an RRC connection request or a scheduling request (e.g., MSG 3) using the uplink resource specified by base station 304 via the RAR in action 312 .
  • UE 302 transmits a Resume Request message to base station 304 , where the Resume Request message may not be requesting for transitioning to RRC_CONNECTED state. Instead, the Resume Request message in MSG 3 is used for transmitting uplink (UL) data.
  • Action 316 includes base station 304 transmitting an RRC connection response or a scheduling response (e.g., MSG 4) to UE 302 , when base station 304 detects the RRC connection request or the scheduling request.
  • base station 304 transmits a Resume Response message to UE 302 , where the Resume Response message may not be for resuming, but contains corresponding acknowledgement of the UL data sent in MSG 3 in action 314 .
  • FIGS. 2 and 3 show that according implementations of the present application, UEs can transmit UL data to their respective base stations (e.g., gNBs) in a 5G NR wireless network using either a 2-step or 4-step random access procedure.
  • UE 202 (or UE 302 ) may be in RRC_INACTIVE state, and still able to transmit UL data to base station 204 (or 304 ) without transitioning to RRC_CONNECTED state.
  • FIG. 4 is a diagram illustrating an access control information (ACI) structure, according to an exemplary implementation of the present application.
  • ACI structure 400 may include a plurality of layers.
  • ACI structure 400 includes a first layer (e.g., Layer 1) and a second layer (e.g., Layer 2).
  • Layer 1 of ACI structure 400 includes access control indications and common parameters for each of a plurality of groups (e.g., Group 1 and Group 2).
  • Layer 2 of ACI structure 400 includes sub-categorizations of the access control related information for each group (e.g., based on RRC state) in Layer 1.
  • the sub-categorizations in Layer 2 may be based on the characteristics of the access attempts by the UEs.
  • ACI structure 400 includes two layers, it should be understood that ACI structure 400 may include more than two layers.
  • the multi-layer ACI structure 400 allows the next generation (e.g., 5G NR) wireless network to achieve smaller granularity on controlling access attempt.
  • Layer 1 of ACI structure 400 is divided into a plurality of groups based on RRC state.
  • Group 1 is categorized by RRC_CONNECTED state, while Group 2 is categorized by RRC_INACTIVE state.
  • another group e.g., Group 3 not explicitly shown in FIG. 4
  • each group contains one or more access control indication(s) and access control parameter(s).
  • the access control indications for RRC_CONNECTED state may include, but is not limited to, access control ON/OFF indicators for the corresponding sub-categorizations in Layer 2, value tags for the corresponding sub-categorizations in Layer 2, and sub-categorization mapping of Layer 2.
  • the access control ON/OFF indicators in Layer 1 of ACI structure 400 may provide indication to the UEs on whether a current access control is ON or OFF for a corresponding sub-categorization in Layer 2.
  • the access control ON/OFF indicators may be in the form of a bit map.
  • the value tags in Layer 1 of ACI structure 400 may provide indication to the UEs on whether the access control parameters for each group and/or sub-categorization have been updated.
  • the UE may receive a value tag through a message from the base station (e.g., gNB) in a message containing access control configuration (AAC). If later, when reading the value tag in Layer 1, the UE determines the value tag is the same as the one in the ACC, then the UE already has the information. Thus, there is no need for the base station to broadcast or transmit (or for the UE to read) the information again.
  • the UE may not receive a value tag in the message containing the AAC from the base station.
  • the UE may not receive the current ACI setting in the message containing the AAC. In such case, the UE still performs value tag check upon receiving Layer 1 of the ACI structure, but compares the value tag in Layer 1 of the ACI structure with the value tag that the UE had previously read and stored. In both implementations described above, the UE performs value tag check before requesting Layer 2 of the ACI structure. Reading value tags before reading the specific parameters for the corresponding sub-categorization in Layer 2 can avoid unnecessary ACI reading overhead, when the value tag has not been changed or updated.
  • the access control indications and parameters within each group, layer and sub-categorization of ACI structure 400 can be updated independently.
  • the sub-categorization mapping in Layer 1 of ACI structure 400 may provide information (e.g., a tree-type mapping) to the UEs to let the UEs know the details (e.g., default and/or current settings) of ACI structure 400 . As such, the UEs can find and read the corresponding sub-categorizations without any prior knowledge of the ACI structure 400 . For example, all of the details in Layer 2 of ACI structure 400 may be included in the sub-categorization mapping.
  • the access control parameters for an RRC state may include, but is not limited to, allowed access time duration, data retransmission times, time/frequency resources for data transmission, barring factor and backoff timer.
  • the access control parameters may be common parameters that all of the UEs need to read from the base station.
  • the common parameters may include parameters that are needed by all UEs within each RRC state and/or the parameter's associated settings are the same for each sub-categorization.
  • the indicators for an RRC state may include, but is not limited to, access control ON/OFF indicators for the corresponding sub-categorizations (e.g., access classes) in Layer 2, value tags for the corresponding sub-categorizations (e.g., access classes) in Layer 2, and sub-categorization mapping of Layer 2.
  • Layer 2 includes sub-categorizations of the access control related information based on the one or more characteristics of the access attempts of the UEs.
  • the characteristics of the access attempt may include, but are not limited to, 2-step or 4-step random access channel perspective, same RNA (e.g., home RAN) or different RNA, RRC state transition, applications, network slice, RAN slice, QoS requirement and mobility.
  • RNA e.g., home RAN
  • RRC state transition e.g., RRC state transition
  • applications network slice
  • RAN slice e.g., 5G NR
  • QoS requirement e.g., mobility
  • ACI structure 400 is forward compatible. That is, ACI structure 400 may add or hook new messages and/or parameters in its layered structure to be compatible with future access control structures, schemes and methods.
  • the characteristic of the access attempt for Group 1 may be based on core network slice, RAN slice, and the QoS requirement of the UEs for Layer 2. For example, there is a specific parameter set (e.g., specific parameter sets 1, 2, . . . n) for each QoS requirement (e.g., QoSs 1, 2, . . . n).
  • the characteristics of the access attempt for Group 2 e.g., RRC_INACTIVE state
  • there is a specific parameter set e.g., specific parameter sets 1, 2, . . . n for each of the characteristics.
  • the next generation wireless network may assign and configure independent sets of access control parameters for different application(s)/QoS(s) via different sub-categorizations.
  • ACI structure 400 include multiple groups based on RRC state, where each group includes at least two layers.
  • Layer 1 includes common parameters
  • Layer 2 includes specific-parameters for each sub-categorization.
  • the access control parameters may be common parameters that all of the UEs need to read from the base station.
  • the common parameters may include parameters that are needed by all UEs within each RRC state and the parameter's associated settings are the same for each sub-categorization.
  • the specific parameters are the parameters which associated settings are different between each sub-categorization and can be: allowed time duration, data retransmission times, time/frequency resources for data transmission, two or four steps random access channels perspective, barring factor, backoff timer. It is noted that the specific parameters also can be different for each sub-categorization.
  • ACI structure 400 as a spanning tree structure shown in the FIG. 4 , is merely an example of the present application, as all of the access control parameters can be combined, exchanged, replaced and be used in each layers.
  • ACI structure 400 may contain a lot of information, but not all of the information is needed by every UE trying to access the NR wireless network. According to implementations of the present application, not all UEs need to read the entire ACI structure. That is, the UEs need only the parts of the ACI structure that pertain to them.
  • Each group, layer and/or sub-categorization of the ACI structure can be transmitted or broadcasted separately by using different messages and/or through different network entities (e.g., base stations and/or transmit receive points (TRPs)).
  • TRPs transmit receive points
  • a central node receives the system request, it can instruct a TRP under the central node to transmit the sub-categorization.
  • Layer 1 of ACI structure 400 may further include indicators to indicate the necessary/required information to the UEs for receiving associated sub-categorization in Layer 2 of ACI structure 400 .
  • the necessary/required information indicators may include, but is not limited to, sub-categorization mapping, time/frequency resource used for transmission, the network entity and/or system information by which each sub-categorization is transmitted or broadcasted. Hence, a UE can read only the part of the ACI it needs accordingly.
  • Layer 1 of ACI structure 400 can contain access control ON/OFF indicators for indicating whether an access control scheme is currently ON or OFF for each sub-categorization (can be a bitmap). Layer 1 of ACI structure 400 can also contain value tags for indicating the updated version of access control parameters for each group and/or each sub-categorization. The indicator(s) and parameter(s) within each group, layer and sub-categorization of ACI can be updated independently. The sub-categorizations are determined based on a need basis (e.g., based on current traffic condition).
  • the base station or TRP can periodically broadcast Layer 1 of ACI structure 400 , and transmit or broadcast Layer 2 of ACI structure 400 when requested by the UEs (e.g., on-demand basis).
  • Layer 1 of ACI structure 400 is contained or carried in minimal system information (SI), periodically broadcasted by the base station or TRP.
  • SI minimal system information
  • the base station or TRP may transmit dedicated RRC signaling and/or broadcast Layer 2 of ACI structure 400 to individual UEs when such requests are received from the UEs, where Layer 2 of ACI structure 400 is contained or carried in other SI.
  • ACI structure 400 may become invalid when a UE moves out of the base station's coverage area (e.g., moving out of an NR network into an LTE network), then the UE may adopt the corresponding access control in accordance with the LTE specification.
  • a base station may perform beamforming, and use different beams to broadcast different ACI structures subject to different access control schemes.
  • a UE may need to perform ACI acquisition for every beam from the base station.
  • all beams formed and broadcasted by the base station may have a uniform ACI structure.
  • a UE may skip ACI acquisition when the UE changes from one beam to another beam. For example, when a UE performs beam recovery, it can apply the same parameters acquired from the previous beam, when switching to another beam under the same cell.
  • a base station may use medium access control (MAC) control element (CE) or RRC signaling to request connected UEs to perform ACI acquisition, to change any of the access control ON/OFF indicators in Layer 1 or modify the specific parameters in Layer 2.
  • MAC medium access control
  • CE control element
  • RRC signaling to request connected UEs to perform ACI acquisition, to change any of the access control ON/OFF indicators in Layer 1 or modify the specific parameters in Layer 2.
  • a base station can use paging message to trigger which kind of behavior it desires.
  • FIG. 5 is a flowchart illustrating a method for access control, according to an exemplary implementation of the present application.
  • Flowchart 500 starts with action 580 and ends with action 599 .
  • a UE receives access attempt configuration.
  • the UE may receive the AAC in different RRC messages from a base station on which the UE camps.
  • the AAC may be UE-specific, meaning that the AAC is configured by the base station and may contain the UE's access class(es) (e.g., sub-categorization), which RACH (e.g., 2-step or 4-step or both) is allowed for the UE for each corresponding access attempt purpose, and etc.
  • the AAC may be determined by, for example, the application the UE performs and its associated QoS requirement.
  • the current corresponding specific parameters in Layer 2 of an ACI structure e.g., Layer 2 of ACI structure 400 in FIG. 4
  • the RRC message or ACC for each access attempt purpose.
  • the UE may generate an access attempt. Depending on the RRC state the UE is in, the UE may generate an access attempt for various access attempt purposes, such as data transmission via random access, RAN notification area (RNA) update, and RRC resume procedure.
  • the UE may read Layer 1 of the ACI structure (e.g., Layer 1 of ACI structure 400 in FIG. 4 ) broadcasted by the base station. For example, the UE may check whether the access control ON/OFF indicators for its corresponding sub-categorizations are ON or OFF by reading the access control ON/OFF indicators within Layer 1 of the ACI structure.
  • the Layer 1 of the ACI structure may be included in the minimal SI or periodically broadcasted SI from the base station.
  • the UE may check whether the access control ON/OFF indicator(s) for the corresponding sub-categorization(s) is ON or OFF. If the access control ON/OFF indicator for a corresponding sub-categorization is OFF, the UE may stop reading or ignore the associated control parameters within Layer 2 of the ACI structure. If the access control ON/OFF indicator for the corresponding sub-categorization is OFF, the UE may also stop reading or ignore the common parameters in Layer 1 of the ACI structure. The UE may proceed to action 598 to perform access procedure.
  • the UE needs to further read the associated control parameters within Layer 2 of the ACI structure (which obtained via other SI or dedicated signaling or on-demand broadcast SI or on-demand other SI) to obtain all access control parameters it needs to apply.
  • the UE may check the value tag of corresponding sub-categorization in Layer 2 in action 590 .
  • the UE may read the value tag in Layer 1, and compare it with a value tag contained in the AAC obtained in action 582 . If the value tag in Layer 1 has not been changed or updated (e.g., the value tag of the corresponding sub-categorization is the same as the value tag contained in the AAC obtained in action 582 ), then the UE may use the specific parameters contained in the UE specific AAC received in action 582 , instead of reading the specific parameters of the corresponding sub-categorization in Layer 2 again.
  • the UE may not receive the current ACI setting in the message containing the UE specific AAC from the base station. In such case, the UE still performs value tag check upon receiving Layer 1 of the ACI structure, but compares the value tag in Layer 1 of the ACI structure with the value tag that the UE had previously read and stored. In both implementations described above, the UE performs value tag check before requesting Layer 2 of the ACI structure. Performing the value tag check in action 590 may avoid unnecessary ACI reading overhead. If the value tag has been updated, then the UE may proceed to action 592 to request and read updated specific parameters in Layer 2 of the ACI structure (which may be obtained through other SI or dedicated signaling or on-demand broadcast SI or on-demand other SI).
  • the UE may be allowed for access attempt. It is noted that, the UE should also access the network by following corresponding specific parameters received in Layer 2 of ACI structure. Otherwise, the UE may be assigned with a backoff time in action 596 , before reading read Layer 1 of the ACI structure again in action 586 .
  • the UE may perform access procedure with the base station.
  • the base station may also perform the UE's AAC configuration update.
  • the base station can provide a new/updated UE specific AAC for performing RAN notification area update, and also can provide a UE-specific AAC for performing data transmission via random access to the UE.
  • FIG. 6A is a diagram illustrating an access attempt configuration (AAC) transmission for an RRC_INACTIVE UE, according to an exemplary implementation of the present application.
  • FIG. 6B is a diagram illustrating an access control information (ACI) transmission for an RRC_INACTIVE UE, according to an exemplary implementation of the present application.
  • FIGS. 6A and 6B illustrate an access control is performed by a base station (e.g., gNB) to control access of an RRC_INACTIVE UE.
  • a base station e.g., gNB
  • the RRCConnectionRelease message contains a UE specific AAC, where the UE specific AAC is configured by base station 604 and contains UE 602 's access class(es) (e.g., sub-categorization) and which RACH (e.g., 2-step or 4-step or both) is allowed for UE 602 for each corresponding access attempt purpose.
  • the AAC configurations are determined by the application UE 602 performs and its associated QoS requirement.
  • a current value tag and/or its corresponding specific parameters in Layer 2 of an ACI structure for UE 602 can also be contained in the RRCConnectionRelease message for each access attempt purpose/category. After receiving the RRCConnectionRelease message, UE 602 transitions into RRC_INACTIVE state in action 683 .
  • UE 602 in RRC_INACTIVE state may generate an access attempt.
  • UE 602 may generate an access attempt for at least one of the following access attempt purposes: data transmission via random access, RAN notification area (RNA) update, and RRC resume procedure.
  • RNA RAN notification area
  • base station 604 may provide Layer 1 of an ACI structure (Layer 1 of ACI structure 400 in FIG. 4 ) to RRC_INACTIVE UE 602 .
  • RRC_INACTIVE UE 602 may check whether the access control ON/OFF indicators for its corresponding sub-categorizations are ON or OFF by reading the access control ON/OFF indicators within Layer 1 of the ACI structure transmitted from base station 604 .
  • UE 602 may obtain Layer 1 of the ACI structure by the minimal SI or periodically broadcasted SI. If the access control ON/OFF indicator for a corresponding sub-categorization is OFF, UE 602 may stop reading or ignore the associated control parameters within Layer 2 of the ACI structure.
  • UE 602 may also stop reading or ignore the common parameters in Layer 1 of the ACI structure. UE 602 may proceed to action 698 to perform access procedure.
  • UE 602 needs to further read the associated control parameters within Layer 2 of the ACI structure (which obtained via other SI or dedicated signaling or on-demand broadcast SI or on-demand other SI) to obtain all access control parameters it needs to apply.
  • UE 602 may check the value tag of corresponding sub-categorization in Layer 2 in action 690 . If the value tag has not been changed or updated (e.g., the value tag of the corresponding sub-categorization is the same as the value tag contained in the AAC obtained in action 682 ), UE 602 may use the UE specific AAC obtained in action 682 which may contain UE 602 's access class(es) (e.g., sub-categorization) and which RACH (e.g., 2-step or 4-step or both) is allowed for UE 602 for each corresponding access attempt purpose.
  • access class(es) e.g., sub-categorization
  • RACH e.g., 2-step or 4-step or both
  • UE 602 may use the specific parameters contained in the UE specific AAC received in action 682 , instead of reading the specific parameters of the corresponding sub-categorization in Layer 2 again. Performing the value tag check in action 690 may avoid unnecessary ACI reading overhead.
  • UE 602 may need to request and read updated specific parameters in Layer 2 of the ACI structure (which may be obtained through other SI or dedicated signaling or on-demand broadcast SI), as shown in action 692 a (e.g., UE 602 requesting Layer 2 of the ACI structure through other SI request) and action 692 b (e.g., base station 604 providing Layer 2 of the ACI structure through other SI upon the request from UE 602 , and UE 602 reading Layer 2 of the ACI).
  • action 692 a e.g., UE 602 requesting Layer 2 of the ACI structure through other SI request
  • action 692 b e.g., base station 604 providing Layer 2 of the ACI structure through other SI upon the request from UE 602 , and UE 602 reading Layer 2 of the ACI.
  • UE 602 may be allowed to access the NR network through base station 604 . Otherwise, UE 602 may be assigned with a backoff time before reading read Layer 1 of the ACI structure again.
  • UE 602 may perform access procedure with base station 604 by following the specific parameters in Layer 2 of the ACI structure.
  • base station 604 may also perform the UE's AAC configuration update.
  • base station 604 can provide a new/updated UE specific AAC for performing RAN notification area update, and also can provide a UE-specific AAC for performing data transmission via random access to UE 602 .
  • FIG. 7A is a diagram illustrating an access attempt configuration (AAC) transmission for an RRC_CONNECTED UE, according to an exemplary implementation of the present application.
  • FIG. 7B is a diagram illustrating an access control information (ACI) transmission for an RRC_CONNECTED UE, according to an exemplary implementation of the present application.
  • AAC access attempt configuration
  • ACI access control information
  • UE 702 is in RRC_CONNECTED state in action 781 .
  • base station 704 transmits an RRCReconfiguration message to UE 702 in action 782 .
  • the RRCReconfiguration message contains a UE specific AAC, where the UE specific AAC is configured by base station 704 (e.g., gNB) and contains UE 702 's access class(es) (e.g., sub-categorization).
  • the AAC configurations are determined by the application UE 702 performs and its associated QoS requirement.
  • a current value tag and/or its corresponding specific parameters in Layer 2 of an ACI structure for the RRC_CONNECTED UE 702 can also be contained in the RRCReconfiguration message for each access attempt purpose/category.
  • UE 702 in RRC_CONNECTED state generates an access attempt.
  • base station 704 may provide Layer 1 of an ACI structure (Layer 1 of ACI structure 400 in FIG. 4 ) to RRC_CONNECTED UE 702 .
  • RRC_CONNECTED UE 702 may check whether the access control indicators for its corresponding sub-categorizations are ON or OFF by reading the access control ON/OFF indicators within Layer 1 of the ACI structure transmitted from base station 704 786 .
  • UE 702 may obtain Layer 1 of the ACI structure by the minimal SI or periodically broadcasted SI from base station 704 .
  • UE 702 may stop reading or ignore the associated control parameters within Layer 2 of the ACI structure. If the access control ON/OFF indicator for the corresponding sub-categorization is OFF, UE 702 may also stop reading or ignore the common parameters in Layer 1 of the ACI structure. UE 702 may proceed to action 798 to perform access procedure. On the other hand, if the access control ON/OFF indicator for a corresponding sub-categorization is ON, UE 702 needs to further read the associated control parameters within Layer 2 of the ACI structure (which obtained via other SI or dedicated signaling or on-demand broadcast SI or on-demand other SI) to obtain all access control parameters it needs to apply.
  • the access control ON/OFF indicator for a corresponding sub-categorization is ON, UE 702 needs to further read the associated control parameters within Layer 2 of the ACI structure (which obtained via other SI or dedicated signaling or on-demand broadcast SI or on-demand other SI) to obtain all access control parameters it needs to apply.
  • UE 702 may check the value tag of corresponding sub-categorization in Layer 2 in action 790 . If the value tag has not been updated (e.g., the value tag of the corresponding sub-categorization is the same as the value tag contained in the AAC obtained in action 782 ), UE 702 may use the UE specific AAC obtained in action 782 which contains UE 702 's access class(es) (e.g., sub-categorization). That is, UE 702 may use the specific parameters contained in the UE specific AAC received in action 782 , instead of reading the specific parameters of the corresponding sub-categorization in Layer 2 again.
  • the value tag has not been updated (e.g., the value tag of the corresponding sub-categorization is the same as the value tag contained in the AAC obtained in action 782 )
  • UE 702 may use the UE specific AAC obtained in action 782 which contains UE 702 's access class(es) (e.g., sub
  • Performing the value tag check in action 790 may avoid unnecessary ACI reading overhead. If the value tag has been updated, then UE 702 may need to request and read updated specific parameters in Layer 2 of the ACI structure (which may be obtained through other SI or dedicated signaling or on-demand broadcast SI or on-demand other SI), as shown in action 792 a (e.g., UE 702 requesting Layer 2 of the ACI structure through other SI request) and action 792 b (e.g., base station 704 providing Layer 2 of the ACI structure through other SI upon the request from UE 702 , and UE 702 reading Layer 2 of the ACI).
  • action 792 a e.g., UE 702 requesting Layer 2 of the ACI structure through other SI request
  • action 792 b e.g., base station 704 providing Layer 2 of the ACI structure through other SI upon the request from UE 702 , and UE 702 reading Layer 2 of the ACI.
  • UE 702 may be allowed to access the NR network through base station 704 by following the specific parameters in Layer 2 of ACI structure. Otherwise, UE 702 may be assigned with a backoff time before reading read Layer 1 of the ACI structure again.
  • UE 702 may perform access procedure with base station 704 . During the access procedure (e.g., data transmission via random access, RAN notification area (RNA) update) performed by UE 702 , base station 704 may also perform the UE's AAC configuration update. Within the access stage, base station 704 can provide a new/updated UE specific AAC for performing RAN notification area update, and also can provide a UE-specific AAC for performing data transmission via random access to UE 702 .
  • RNA RAN notification area
  • FIG. 8 illustrates a block diagram of a node for wireless communication, in accordance with various aspects of the present application.
  • node 800 may be a wireless device, such as UEs 102 a / 102 b , 202 , 302 , 602 , and 702 described with respect to FIGS. 1A / 1 B, 2 , 3 , 6 A/ 6 B, and 7 A/ 7 B, respectively.
  • node 800 may be a network node, such as base stations 104 a / 104 b , 204 , 304 , 604 , and 704 described with respect to FIGS. 1A / 1 B, 2 , 3 , 6 A/ 6 B, and 7 A/ 7 B, respectively.
  • node 800 may include transceiver 820 , processor 826 , memory 828 , one or more presentation components 834 , and at least one antenna 836 .
  • Node 800 may also include an RF spectrum band module, a base station communications module, a network communications module, and a system communications management module, input/output (I/O) ports, I/O components, and power supply (not explicitly shown in FIG. 8 ). Each of these components may be in communication with each other, directly or indirectly, over one or more buses 840 .
  • Transceiver 820 having transmitter 822 and receiver 824 may be configured to transmit and/or receive time and/or frequency resource partitioning information.
  • transceiver 820 may be configured to transmit in different types of subframes and slots including, but not limited to, usable, non-usable and flexibly usable subframes and slot formats.
  • Transceiver 820 may be configured to receive data and control channels.
  • Node 800 may include a variety of computer-readable media.
  • Computer-readable media can be any available media that can be accessed by node 800 and include both volatile and non-volatile media, removable and non-removable media.
  • Computer-readable media may comprise computer storage media and communication media.
  • Computer storage media includes both volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data.
  • Computer storage media includes RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices.
  • Computer storage media does not comprise a propagated data signal.
  • Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
  • modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
  • communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media.
  • Memory 828 may include computer-storage media in the form of volatile and/or non-volatile memory. Memory 828 may be removable, non-removable, or a combination thereof. Exemplary memory includes solid-state memory, hard drives, optical-disc drives, and etc. As illustrated in FIG. 8 , memory 828 may store computer-readable, computer-executable instructions 832 (e.g., software codes) that are configured to, when executed, cause processor 826 to perform various functions described herein, for example, with reference to FIGS. 1 through 7B . Alternatively, instructions 832 may not be directly executable by processor 826 but be configured to cause node 800 (e.g., when compiled and executed) to perform various functions described herein.
  • instructions 832 may not be directly executable by processor 826 but be configured to cause node 800 (e.g., when compiled and executed) to perform various functions described herein.
  • Processor 826 may include an intelligent hardware device, e.g., a central processing unit (CPU), a microcontroller, an ASIC, and etc.
  • Processor 826 may include memory.
  • Processor 826 may process data 830 and instructions 832 received from memory 828 , and information through transceiver 820 , the base band communications module, and/or the network communications module.
  • Processor 826 may also process information to be sent to transceiver 820 for transmission through antenna 836 , to the network communications module for transmission to a core network.
  • One or more presentation components 834 presents data indications to a person or other device.
  • Exemplary one or more presentation components 834 include a display device, speaker, printing component, vibrating component, and etc.
  • an access attempt configuration can either configured by a base station or a UE based on a message broadcasted by the base station.
  • the AAC may contain information of the UE's access class, and/or ACI structure and ACI's default and/or current settings.
  • the UE access class assignment can be based on UE ID, QoS requirement, data size, and etc.
  • conventional access control methods can provide traffic control based on the specific access class or application of the UEs, which are predefined in the UEs and fixed (e.g., stored in the UEs) after the manufacturing process.
  • a base station can deny or allow specific access class or application by reading it directly from the UEs. Although this is a simple and straightforward process, this type of access control offers no flexibility, and can result in inefficient use of radio resource in the network.
  • implementations of the present application provide access control based on different parameters that can be dynamically assigned and selected.
  • the base station determines the configuration and the parameters based on factors, such as current traffic condition. As such, the base station can dynamically assign the sub-categorization(s) for the UE. This allows the base station to have a very small granularity.
  • the access control method can dynamically assign radio resource based on traffic and resource conditions, which allows the network to preserve radio resource for high priority traffic/data/application.
  • the ACI structures according implementations of the present application are hierarchical structures. The fundamental parameters are listed in Layer 1. Layer 2 may include delta information. The base station controls the ON/OFF of these parameters.
  • the base station's loading is light, all the parameters are off. All UEs are allowed access. However, if the loading is heavy, the base station may configure the layered ACI structure to determine which UEs can get access first based on a hierarchy.
  • the ACI structure can allow the base station to determine which class the UE belongs, and to decide, at any given point, which types of UEs can get access or endure the access control scheme.

Abstract

A method executed by a wireless device for network access of the wireless device to a network node is disclosed. The method includes initiating an access attempt to the network node; reading a first layer of access control information (ACI) from the network node to determine whether an access control indicator in the first layer for an access category is ON, wherein the access control indicator for the access category is associated with a characteristic/classification of the access attempt by the wireless device to the network node; in response to the access control indicator in the first layer for the access category being ON, reading a second layer of the ACI from the network node to determine whether the access attempt to the network node is allowed based on one or more specific parameters associated with the access category in the second layer of the ACI.

Description

    CROSS-REFERENCE TO RELATED APPLICATION(S)
  • The present application claims the benefit of and priority to a provisional U.S. Patent Application Ser. No. 62/480,512 filed Apr. 2, 2017, entitled “ACCESS CONTROL IN NEW RADIO,” Attorney Docket No. US62068 (hereinafter referred to as “US62068 application”). The disclosure of the US62068 application is hereby incorporated fully by reference into the present application.
  • FIELD
  • The present disclosure generally relates to wireless communication methods and systems, and more particularly, to access control for the next generation wireless communication networks.
  • BACKGROUND
  • The 3rd Generation Partnership Project (3GPP) is currently developing protocols for the next generation wireless communication networks, also referred to as New Radio (NR). NR will enable new use cases for cellular access, and also increase the capacity for existing data applications. Even though the capacity of a system under NR may increase, there still can be situations where the base stations (e.g., next generation node Bs (gNBs)) and/or core networks (CNs) of the system may become overloaded. For example, a system overload may occur when a large number of user equipments (UEs) try to access the system in a synchronized manner (e.g., at the same time).
  • In a fourth generation (4G) wireless network, such as long term evolution (LTE), evolved LTE (eLTE), or LTE-Advanced (LTE-A), a radio access network (RAN) is responsible for activating access control when the RAN or the CN is overloaded. For example, a current access control scheme under a 4G wireless network may be performed in the RAN (e.g., RAN based), which primarily bars low priority UEs from attempting to perform random access procedures to transition from RRC_IDLE state to RRC_CONNECTED state. That is, the low priority UEs can be barred by the RAN from accessing the wireless network for a predetermined period of time when the RAN or CN is overloaded.
  • Based on the current 3GPP standard discussion, in addition to the current RRC_CONNECTED and RRC_IDLE states, a new RRC state, RRC_INACTIVE state, is introduced in the NR wireless networks. RRC_INACTIVE state under an NR wireless network is configured by a base station (e.g., gNB), and may be invisible to the CN. For example, when a base station (e.g., gNB) suspends a UE from RRC_CONNECTED to RRC_INACTIVE state, the CN may not receive a notification of such, and may still consider the UE as in RRC_CONNECTED state. While in RRC_INACTIVE state, the UE may transfer uplink (UL) data to the base state (e.g., gNB) without undergoing RRC state transition (e.g., without transitioning from RRC_INACTIVE state to RRC_CONNECTED state).
  • In the legacy 4G wireless networks, when the CN is overloaded and sends instructions to the RANs to block or bar traffic, the RANs may set up barring parameters to bar or block RRC_IDLE UEs from performing RRC state transition to RRC_CONNECTED state for data transmission. However, the access control schemes under the 4G wireless networks do not take into account of the newly introduced RRC_INACTIVE UEs that are capable of direct data uplink transmission to the base station without transitioning into RRC_CONNECTED state. As such, the legacy 4G wireless networks cannot effectively treat the RRC_INACTIVE UEs when the base station and/or the CN is overloaded.
  • For example, if RRC_INACTIVE UEs are present in a wireless network, and the CN does not know that some UEs under the RAN are suspended in the RRC_INACTIVE state (e.g., temporarily do not have data to upload), the CN may underestimate the network traffic condition in the RANs because of the presence of the RRC_INACTIVE UEs. That is, the CN may consider the RRC_INACTIVE UEs are in the RRC_CONNECTED state, and use their current data rates for the network traffic estimate. However, when these RRC_INACTIVE UEs start transferring data (e.g., using 2-step or 4-step RACH procedure) to their base stations, the actual data traffic would be greater than what the CN had originally estimated (e.g., the RAN continues to bring in additional traffic from the RRC_INACTIVE UEs to the CN), thereby exacerbating the traffic condition and overloading the base stations and/or the CN.
  • Thus, there is a need in the art for access control in new radio wireless networks to block traffic by dynamically assigning access control categorizations and sub-categorizations (e.g., barring factors) based on traffic conditions, to take into account of and manage each of the RRC states in NR, to conserve radio resources (e.g., stop unnecessary consumption of radio resource), and to preserve base station and/or CN's processing capacity for high priority traffic, data and/or applications from specific UEs.
  • SUMMARY
  • The present disclosure is directed to access control in new radio.
  • In a first aspect, a method for network access of a wireless device (e.g., a UE) to a network node (e.g., a base station) is disclosed, The method comprises initiating an access attempt to the network node; reading a first layer of access control information (ACI) from the network node to determine whether an access control indicator in the first layer for an access category is ON, wherein the access control indicator for the access category is associated with a characteristic/classification of the access attempt by the wireless device to the network node; in response to the access control indicator in the first layer for the access category being ON, reading a second layer of the ACI from the network node to determine whether the access attempt to the network node is allowed based on one or more specific parameters associated with the access category in the second layer of the ACI.
  • In an implementation of the first aspect, the method further comprises receiving an access attempt configuration (AAC) from the network node, the AAC including at least one value tag corresponding to the access category.
  • In another implementation of the first aspect, the method further comprises performing a value tag check to determine whether there is an update associated with the access category.
  • In another implementation of the first aspect, when the at least one value tag has not been updated, using the AAC to determine whether the access attempt to the network node is allowed.
  • In another implementation of the first aspect, the method further comprises, when the at least one value tag has been updated, using the second layer of the ACI to determine whether the access attempt to the network node is allowed based on the one or more specific parameters associated with the access category in the second layer of the ACI.
  • In another implementation of the first aspect, the AAC is configured by the network node, and includes information of at least one of the wireless device's access class and the ACI's default and current settings.
  • In another implementation of the first aspect, the wireless device's access class is dynamically assigned by the network node based on at least one of the wireless device's ID, quality of service (QoS) requirement and data size.
  • In another implementation of the first aspect, the method further comprises, in response to the access control indicator in the first layer for the access category being OFF, performing an access procedure to gain access to the network node without reading the second layer of the ACI.
  • In another implementation of the first aspect, the first layer of the ACI is categorized based on a radio resource control (RRC) state of the wireless device, and includes access control indications and common parameters.
  • In another implementation of the first aspect, the wireless device makes the access attempt in one of RRC_Inactive state, RRC_Connected state, and RRC_Idle state.
  • In another implementation of the first aspect, the first layer of ACI is broadcasted by the network node through minimum system information.
  • In another implementation of the first aspect, the method further comprises in response to the access control indicator in the first layer for the access category being ON, requesting the second layer of the ACI by the wireless device from the network node when the at least one value tag has been updated; sending, by the network node, the second layer of the ACI to the wireless device in response to the request through other system information.
  • In another implementation of the first aspect, the access category is associated with at least one of random access procedure, RAN-based notification area (RNA), RRC state transition, applications, network slice, RAN slice, quality of service (QoS) requirement and data size.
  • In another implementation of the first aspect, the access category is RNA update such that the RNA update is controlled by the ACI.
  • In a second aspect, a wireless device (e.g., a UE) for network access of the wireless device to a network node (e.g., a base station) is disclosed. The wireless device comprises: one or more processors; a non-transitory machine-readable memory storing a program, the program executable by at least one of the one or more processors, the program comprising sets of instructions for: initiating an access attempt to the network node; reading a first layer of access control information (ACI) from the network node to determine whether an access control indicator in the first layer for an access category is ON, wherein the access control indicator for the access category is associated with a characteristic/classification of the access attempt by the wireless device to the network node; in response to the access control indicator in the first layer for the access category being ON, reading a second layer of the ACI from the network node to determine whether the access attempt to the network node is allowed based on one or more specific parameters associated with the access category in the second layer of the ACI.
  • In an implementation of the second aspect, the program further comprises the sets of instructions for receiving an access attempt configuration (AAC) from the network node, the AAC including at least one value tag, the at least one value tag corresponding to the access category.
  • In another implementation of the second aspect, the program further comprises the sets of instructions for performing a value tag check to determine whether there is an update associated with the access category.
  • In another implementation of the second aspect, when the at least one value tag has not been updated, using the AAC to determine whether the access attempt to the network node is allowed.
  • In another implementation of the second aspect, the program further comprises the sets of instructions for, when the at least one value tag has been updated, using the second layer of the ACI to determine whether the access attempt to the network node is allowed based on the one or more specific parameters associated with the access category in the second layer of the ACI.
  • In another implementation of the second aspect, the AAC is configured by the network node, and includes information of at least one of the wireless device's access class and the ACI's default and current settings.
  • In another implementation of the second aspect, the wireless device's access class is dynamically assigned by the network node based on at least one of the wireless device's ID, quality of service (QoS) requirement and data size.
  • In another implementation of the second aspect, the program further comprises the sets of instructions for, in response to the access control indicator in the first layer for the access category being OFF, performing an access procedure to gain access to the network node without reading the second layer of the ACI.
  • In another implementation of the second aspect, the first layer of the ACI is categorized based on a radio resource control (RRC) state of the wireless device, and includes access control indications and common parameters.
  • In another implementation of the second aspect, the wireless device makes the access attempt in one of RRC_Inactive state, RRC_Connected state, and RRC_Idle state.
  • In another implementation of the second aspect, the program further comprises the sets of instructions for, in response to the access control indicator in the first layer for the access category being ON, requesting the second layer of the ACI by the wireless device from the network node when the at least one value tag has been updated.
  • In a third aspect, a network node (e.g., a base station) for network access of a wireless device (e.g., a UE) to the network node is disclosed. The network node comprises: one or more processors: a non-transitory machine-readable memory storing a program, the program executable by at least one of the one or more processors, the program comprising sets of instructions for: providing a first layer of access control information (ACI) to the wireless device, the first layer of the ACI having one or more access control indicators corresponding to one or more access categories; providing a second layer of the ACI to the wireless device upon request; wherein the wireless device requests for the second layer of the ACI when at least one of the one or more access control indicators in the first layer of the ACI associated with a characteristic/classification of an access attempt by the wireless device to the network node is ON.
  • In an implementation of the third aspect, the program further comprises the sets of instructions for providing an access attempt configuration (AAC) to the wireless device, the AAC including at least one value tag corresponding to the access category.
  • In another implementation of the third aspect, the network node dynamically assigns the wireless device's access class based on at least one of the wireless device's ID, quality of service (QoS) requirement and data size.
  • In another implementation of the third aspect, the access category is associated with at least one of random access procedure, RAN-based notification area (RNA), RRC state transition, applications, network slice, RAN slice, quality of service (QoS) requirement and data size.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic diagram of UEs performing data transmission using 2-step or 4-step random access procedures in a next generation wireless network, according to an exemplary implementation of the present application.
  • FIG. 2 is a diagram illustrating data transmission using a 2-step random access procedure, according to an exemplary implementation of the present application.
  • FIG. 3 is a diagram illustrating data transmission using a 4-step random access procedure, according to an exemplary implementation of the present application.
  • FIG. 4 is a diagram illustrating an access control information (ACI) structure, according to an exemplary implementation of the present application.
  • FIG. 5 is a flowchart illustrating a method for access control, according to an exemplary implementation of the present application.
  • FIG. 6A is a diagram illustrating an access attempt configuration (AAC) transmission for an RRC_INACTIVE UE, according to an exemplary implementation of the present application.
  • FIG. 6B is a diagram illustrating an access control information (ACI) transmission for an RRC_INACTIVE UE, according to an exemplary implementation of the present application.
  • FIG. 7A is a diagram illustrating an access attempt configuration (AAC) transmission for an RRC_CONNECTED UE, according to an exemplary implementation of the present application.
  • FIG. 7B is a diagram illustrating an access control information (ACI) transmission for an RRC_CONNECTED UE, according to an exemplary implementation of the present application.
  • FIG. 8 illustrates a block diagram of a node for wireless communication, according to various aspects of the present application.
  • DETAILED DESCRIPTION
  • The following description contains specific information pertaining to exemplary embodiments in the present disclosure. The drawings in the present disclosure and their accompanying detailed description are directed to merely exemplary embodiments. However, the present disclosure is not limited to merely these exemplary embodiments. Other variations and embodiments of the present disclosure will occur to those skilled in the art. Unless noted otherwise, like or corresponding elements among the figures may be indicated by like or corresponding reference numerals. Moreover, the drawings and illustrations in the present disclosure are generally not to scale, and are not intended to correspond to actual relative dimensions.
  • The following description contains specific information pertaining to exemplary implementations in the present disclosure. The drawings in the present disclosure and their accompanying detailed description are directed to merely exemplary implementations. However, the present disclosure is not limited to merely these exemplary implementations. Other variations and implementations of the present disclosure will occur to those skilled in the art. Unless noted otherwise, like or corresponding elements among the figures may be indicated by like or corresponding reference numerals. Moreover, the drawings and illustrations in the present disclosure are generally not to scale, and are not intended to correspond to actual relative dimensions.
  • For the purpose of consistency and ease of understanding, like features are identified (although, in some examples, not shown) by numerals in the exemplary figures. However, the features in different implementations may be differed in other respects, and thus shall not be narrowly confined to what is shown in the figures.
  • The description uses the phrases “in one implementation,” or “in some implementations,” which may each refer to one or more of the same or different implementations. The term “coupled” is defined as connected, whether directly or indirectly through intervening components, and is not necessarily limited to physical connections. The term “comprising,” when utilized, means “including, but not necessarily limited to”; it specifically indicates open-ended inclusion or membership in the so-described combination, group, series and the equivalent.
  • In some implementations, the present application may include the language, such as, “at least one of [element A] and [element B]”. This language may refer to one or more of the elements. For example, “at least one of A and B” may refer to “A”, “B”, or “A and B”. In some implementations, the present application may include the language, such as, “[element A], [element B], and/or [element C].” This language may refer to either of the elements or any combination thereof. In other words, “A, B, and/or C” may refer to “A”, “B”, “C”, “A and B”, “A and C”, “B and C”, or “A, B, and C”.
  • Additionally, for the purposes of explanation and non-limitation, specific details, such as functional entities, techniques, protocols, standard, and the like are set forth for providing an understanding of the described technology. In other examples, detailed description of well-known methods, technologies, system, architectures, and the like are omitted so as not to obscure the description with unnecessary details.
  • Persons skilled in the art will immediately recognize that any network function(s) or algorithm(s) described in the present disclosure may be implemented by hardware, software or a combination of software and hardware. Described functions may correspond to modules may be software, hardware, firmware, or any combination thereof. The software implementation may comprise computer executable instructions stored on computer readable medium such as memory or other type of storage devices. For example, one or more microprocessors or general purpose computers with communication processing capability may be programmed with corresponding executable instructions and carry out the described network function(s) or algorithm(s). The microprocessors or general purpose computers may be formed of applications specific integrated circuitry (ASIC), programmable logic arrays, and/or using one or more digital signal processor (DSPs). Although some of the exemplary implementations described in this specification are oriented to software installed and executing on computer hardware, nevertheless, alternative exemplary implementations implemented as firmware or as hardware or combination of hardware and software are well within the scope of the present disclosure.
  • The computer readable medium includes but is not limited to random access memory (RAM), read only memory (ROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), flash memory, compact disc read-only memory (CD ROM), magnetic cassettes, magnetic tape, magnetic disk storage, or any other equivalent medium capable of storing computer-readable instructions.
  • A radio communication network architecture (e.g., a long term evolution (LTE) system, an LTE-Advanced (LTE-A) system, or an LTE-Advanced Pro system) typically includes at least one network node (e.g., base station), at least one user equipment (UE), and one or more optional network elements that provide connection towards a network. The UE communicates with the network (e.g., a core network (CN), an evolved packet core (EPC) network, an Evolved Universal Terrestrial Radio Access network (E-UTRAN), a Next-Generation Core (NGC), or an internet), through a radio access network (RAN) established by the network node (e.g., base station).
  • It should be noted that, in the present application, a UE may include, but is not limited to, a mobile station, a mobile terminal or device, a user communication radio terminal. For example, a UE may be a portable radio equipment, which includes, but is not limited to, a mobile phone, a tablet, a wearable device, a sensor, or a personal digital assistant (PDA) with wireless communication capability. The UE is configured to receive and transmit signals over an air interface to one or more cells in a radio access network.
  • A network node may include a base station. A base station may include, but is not limited to, a node B (NB) as in the UMTS, an evolved node B (eNB) as in the LTE-A, a radio network controller (RNC) as in the UMTS, a base station controller (BSC) as in the GSM/GERAN, a ng-eNB as in an E-UTRA base station in connection with the 5GC, a next generation node B (gNB) as in the 5G-AN, and any other apparatus capable of controlling radio communication and managing radio resources within a cell. The base station may connect to serve the one or more UEs through a radio interface to the network.
  • A base station may be configured to provide communication services according to at least one of the following radio access technologies (RATs): Worldwide Interoperability for Microwave Access (WiMAX), Global System for Mobile communications (GSM, often referred to as 2G), GSM EDGE radio access Network (GERAN), General Packet Radio Service (GRPS), Universal Mobile Telecommunication System (UMTS, often referred to as 3G) based on basic wideband-code division multiple access (W-CDMA), high-speed packet access (HSPA), LTE, LTE-A, eLTE (evolved LTE), New Radio (NR, often referred to as 5G), and/or LTE-A Pro. However, the scope of the present application should not be limited to the above mentioned protocols.
  • The base station is operable to provide radio coverage to a specific geographical area using a plurality of cells forming the radio access network. The base station supports the operations of the cells. Each cell is operable to provide services to at least one UE within its radio coverage. More specifically, each cell (often referred to as a serving cell) provides services to serve one or more UEs within its radio coverage, (e.g., each cell schedules the downlink and optionally uplink resources to at least one UE within its radio coverage for downlink and optionally uplink packet transmissions). The base station can communicate with one or more UEs in the radio communication system through the plurality of cells. A cell may allocate sidelink (SL) resources for supporting proximity service (ProSe). Each cell may have overlapped coverage areas with other cells.
  • As discussed above, the frame structure for NR is to support flexible configurations for accommodating various next generation (e.g., 5G) communication requirements, such as enhanced mobile broadband (eMBB), massive machine type communication (mMTC), ultra reliable communication and low latency communication (URLLC), while fulfilling high reliability, high data rate and low latency requirements. The orthogonal frequency-division multiplexing (OFDM) technology as agreed in 3GPP may serve as a baseline for NR waveform. The scalable OFDM numerology, such as the adaptive sub-carrier spacing, the channel bandwidth, and the Cyclic Prefix (CP) may be also used. Additionally, two coding schemes are considered for NR: (1) low-density parity-check (LDPC) code and (2) Polar Code. The coding scheme adaption may be configured based on the channel conditions and/or the service applications.
  • Moreover, it is also considered that in a transmission time interval TX of a single NR frame, a downlink (DL) transmission data, a guard period, and an uplink (UL) transmission data should at least be included, where the respective portions of the DL transmission data, the guard period, the UL transmission data should also be configurable, for example, based on the network dynamics of NR. In addition, sidelink resource may also be provided in an NR frame to support ProSe services.
  • FIG. 1 shows a schematic diagram of UEs performing data transmission using 2-step and 4-step random access procedures in a next generation (e.g., 5G NR) wireless network, according to an exemplary implementation of the present application. As shown in FIG. 1, wireless communication system 100 includes UE 102 a, UE 102 b, base station 104 a (e.g., a gNB) having coverage area 106 a, base station 104 b (e.g., a gNB) having coverage area 106 b, where base stations 104 a and 104 b can access core network (CN) 108, such as a next generation core network (e.g., 5G Core Network (5GC)). In the present implementation, CN 108 may signal base station 104 a and base station 104 b through 5GC notifications. In the one implementation, base station 104 a is within a first RAN-based notification area, RNA1, while base station 104 b is within a second RAN-based notification area, RNA2, that is different from RNA1. In the present exemplary implementation, RNA1 and RNA2 are neighboring RAN-based notification areas. In another implementation, base stations 104 a and 104 b may be two neighboring cells in a single RAN-based notification area. In FIG. 1, UEs 102 a and 102 b can each use a 2-step or a 4-step random access procedure to establish connection or re-synchronization with their respective base stations 104 a and 104 b. Also, UEs 102 a and 102 b are capable of transmitting uplink (UL) data to their respective base stations 104 a and 104 b using the 2-step or 4-step random access procedure.
  • FIG. 2 illustrates a diagram of data transmission using a 2-step random access procedure, according to an exemplary implementation of the present application. Diagram 200 includes UE 202 and base station 204 (e.g., a gNB) where UE 202 may transmit UL data to base station 204 using a 2-step random access procedure. In the present implementation, UE 202 and base station 204 may substantially correspond to UE 102 a (or UE 102 b) and base station 104 a (or base station 104 b), respectively, in FIG. 1.
  • As illustrated in FIG. 2, action 210 includes UE 202 transmitting a random access channel (RACH) preamble (e.g., MSG 1) to base station 204. Base station 204 configures random access channel (RACH) resources which are used to let UE 202 transmit the RACH preamble, uplink (UL) data and the UE ID of UE 202. UE 202 may randomly select a RACH preamble resource to be actually used from the RACH preamble resources (e.g., prescribed by combinations of time resources, frequency resources and sequence resources). Then, UE 202 may transmit the RACH preamble using the selected RACH preamble resource. The UL data along with the UE ID of UE 202 may also be multiplexed with the RACH preamble in the MSG1.
  • As illustrated in FIG. 2, action 212 includes base station 204 transmitting a random access response (RAR) (e.g., MSG 2) to UE 202, when base station 204 detects the RACH preamble, the UL data along with the UE ID of UE 202. For UL data transmission, base station 204 may provide an acknowledge (ACK)/non-acknowledgement (NACK) message in MSG 2 to indicate whether base station 204 has received the UL data in MSG 1 successfully.
  • FIG. 3 illustrates a diagram of data transmission using a 4-step random access procedure, according to an exemplary implementation of the present application. Diagram 300 includes UE 302 and base station 304 (e.g., a gNB), where UE 302 may transmit UL data to base station 304 using a 4-step random access procedure. In the present implementation, UE 302 and base station 304 may substantially correspond to UE 102 a (or UE 102 b) and base station 104 a (or base station 104 b), respectively, in FIG. 1.
  • As illustrated in FIG. 3, action 310 includes UE 302 transmitting a random access channel (RACH) preamble (e.g., MSG 1) to base station 304. In the present implementation, UE 302 may randomly select a RACH preamble resource to be actually used from a group of RACH preamble resource candidates (prescribed by combinations of time resources, frequency resources and sequence resources). Then, UE 302 may transmit the RACH preamble using the selected RACH preamble resource.
  • Action 312 includes base station 304 transmitting a random access response (RAR) (e.g., MSG 2) to UE 302, when base station 304 detects the RACH preamble. The RAR is transmitted over the entire cell covered by base station 304, since base station 304 may not have been able to identified UE 302 that transmitted the RACH preamble. For example, a physical downlink shared channel (PDSCH) resource in which the RAR is mapped may be indicated by base station 304 to UE 302 via a physical downlink control channel (PDCCH). Also, the RAR may contain information relating to a resource to be used by UE 302 in uplink or information relating to uplink transmission timing for UE 302.
  • Action 314 includes UE 302 transmitting an RRC connection request or a scheduling request (e.g., MSG 3) using the uplink resource specified by base station 304 via the RAR in action 312. In the present implementation, UE 302 transmits a Resume Request message to base station 304, where the Resume Request message may not be requesting for transitioning to RRC_CONNECTED state. Instead, the Resume Request message in MSG 3 is used for transmitting uplink (UL) data.
  • Action 316 includes base station 304 transmitting an RRC connection response or a scheduling response (e.g., MSG 4) to UE 302, when base station 304 detects the RRC connection request or the scheduling request. In the present implementation, base station 304 transmits a Resume Response message to UE 302, where the Resume Response message may not be for resuming, but contains corresponding acknowledgement of the UL data sent in MSG 3 in action 314.
  • Thus, FIGS. 2 and 3 show that according implementations of the present application, UEs can transmit UL data to their respective base stations (e.g., gNBs) in a 5G NR wireless network using either a 2-step or 4-step random access procedure. For example, UE 202 (or UE 302) may be in RRC_INACTIVE state, and still able to transmit UL data to base station 204 (or 304) without transitioning to RRC_CONNECTED state.
  • FIG. 4 is a diagram illustrating an access control information (ACI) structure, according to an exemplary implementation of the present application. ACI structure 400 may include a plurality of layers. In the present implementation, ACI structure 400 includes a first layer (e.g., Layer 1) and a second layer (e.g., Layer 2). Layer 1 of ACI structure 400 includes access control indications and common parameters for each of a plurality of groups (e.g., Group 1 and Group 2). Layer 2 of ACI structure 400 includes sub-categorizations of the access control related information for each group (e.g., based on RRC state) in Layer 1. For example, the sub-categorizations in Layer 2 may be based on the characteristics of the access attempts by the UEs. Although FIG. 4 illustrates that ACI structure 400 includes two layers, it should be understood that ACI structure 400 may include more than two layers. The multi-layer ACI structure 400 allows the next generation (e.g., 5G NR) wireless network to achieve smaller granularity on controlling access attempt.
  • In the present implementation, Layer 1 of ACI structure 400 is divided into a plurality of groups based on RRC state. For example, in Layer 1, Group 1 is categorized by RRC_CONNECTED state, while Group 2 is categorized by RRC_INACTIVE state. It should be noted that another group (e.g., Group 3 not explicitly shown in FIG. 4) may be categorized by RRC_IDLE state in ACI structure 400. As illustrated in FIG. 4, each group contains one or more access control indication(s) and access control parameter(s). For example, in Group 1, the access control indications for RRC_CONNECTED state may include, but is not limited to, access control ON/OFF indicators for the corresponding sub-categorizations in Layer 2, value tags for the corresponding sub-categorizations in Layer 2, and sub-categorization mapping of Layer 2.
  • The access control ON/OFF indicators in Layer 1 of ACI structure 400 may provide indication to the UEs on whether a current access control is ON or OFF for a corresponding sub-categorization in Layer 2. In one implementation, the access control ON/OFF indicators may be in the form of a bit map.
  • The value tags in Layer 1 of ACI structure 400 may provide indication to the UEs on whether the access control parameters for each group and/or sub-categorization have been updated. In one implementation, before receiving ACI structure 400, the UE may receive a value tag through a message from the base station (e.g., gNB) in a message containing access control configuration (AAC). If later, when reading the value tag in Layer 1, the UE determines the value tag is the same as the one in the ACC, then the UE already has the information. Thus, there is no need for the base station to broadcast or transmit (or for the UE to read) the information again. In another implementation, the UE may not receive a value tag in the message containing the AAC from the base station. That is, the UE may not receive the current ACI setting in the message containing the AAC. In such case, the UE still performs value tag check upon receiving Layer 1 of the ACI structure, but compares the value tag in Layer 1 of the ACI structure with the value tag that the UE had previously read and stored. In both implementations described above, the UE performs value tag check before requesting Layer 2 of the ACI structure. Reading value tags before reading the specific parameters for the corresponding sub-categorization in Layer 2 can avoid unnecessary ACI reading overhead, when the value tag has not been changed or updated. The access control indications and parameters within each group, layer and sub-categorization of ACI structure 400 can be updated independently.
  • The sub-categorization mapping in Layer 1 of ACI structure 400 may provide information (e.g., a tree-type mapping) to the UEs to let the UEs know the details (e.g., default and/or current settings) of ACI structure 400. As such, the UEs can find and read the corresponding sub-categorizations without any prior knowledge of the ACI structure 400. For example, all of the details in Layer 2 of ACI structure 400 may be included in the sub-categorization mapping.
  • In each group, the access control parameters for an RRC state may include, but is not limited to, allowed access time duration, data retransmission times, time/frequency resources for data transmission, barring factor and backoff timer. In one implementation, the access control parameters may be common parameters that all of the UEs need to read from the base station. The common parameters may include parameters that are needed by all UEs within each RRC state and/or the parameter's associated settings are the same for each sub-categorization.
  • In each group the indicators for an RRC state may include, but is not limited to, access control ON/OFF indicators for the corresponding sub-categorizations (e.g., access classes) in Layer 2, value tags for the corresponding sub-categorizations (e.g., access classes) in Layer 2, and sub-categorization mapping of Layer 2.
  • As shown in FIG. 4, Layer 2 includes sub-categorizations of the access control related information based on the one or more characteristics of the access attempts of the UEs. The characteristics of the access attempt may include, but are not limited to, 2-step or 4-step random access channel perspective, same RNA (e.g., home RAN) or different RNA, RRC state transition, applications, network slice, RAN slice, QoS requirement and mobility. For example, when a next generation (e.g., 5G NR) wireless network is congested or having limited resource, the UEs with high QoS/application requirements may be given precedence over other UEs in radio resource assignment. It should be noted, ACI structure 400 is forward compatible. That is, ACI structure 400 may add or hook new messages and/or parameters in its layered structure to be compatible with future access control structures, schemes and methods.
  • As shown in FIG. 4, the characteristic of the access attempt for Group 1 (e.g., RRC_CONNECTED state) may be based on core network slice, RAN slice, and the QoS requirement of the UEs for Layer 2. For example, there is a specific parameter set (e.g., specific parameter sets 1, 2, . . . n) for each QoS requirement (e.g., QoSs 1, 2, . . . n). The characteristics of the access attempt for Group 2 (e.g., RRC_INACTIVE state) may be based on core network slice, RAN slice, and 2-step or 4-step random access procedures for Layer 2. For example, there is a specific parameter set (e.g., specific parameter sets 1, 2, . . . n) for each of the characteristics. It should be noted that the next generation wireless network may assign and configure independent sets of access control parameters for different application(s)/QoS(s) via different sub-categorizations.
  • As shown in FIG. 4, ACI structure 400 include multiple groups based on RRC state, where each group includes at least two layers. Within each group of ACI structure 400, Layer 1 includes common parameters, while Layer 2 includes specific-parameters for each sub-categorization. In one implementation, the access control parameters may be common parameters that all of the UEs need to read from the base station. For example, the common parameters may include parameters that are needed by all UEs within each RRC state and the parameter's associated settings are the same for each sub-categorization. The specific parameters are the parameters which associated settings are different between each sub-categorization and can be: allowed time duration, data retransmission times, time/frequency resources for data transmission, two or four steps random access channels perspective, barring factor, backoff timer. It is noted that the specific parameters also can be different for each sub-categorization. ACI structure 400, as a spanning tree structure shown in the FIG. 4, is merely an example of the present application, as all of the access control parameters can be combined, exchanged, replaced and be used in each layers.
  • ACI structure 400 may contain a lot of information, but not all of the information is needed by every UE trying to access the NR wireless network. According to implementations of the present application, not all UEs need to read the entire ACI structure. That is, the UEs need only the parts of the ACI structure that pertain to them. Each group, layer and/or sub-categorization of the ACI structure can be transmitted or broadcasted separately by using different messages and/or through different network entities (e.g., base stations and/or transmit receive points (TRPs)). For example, a central node receives the system request, it can instruct a TRP under the central node to transmit the sub-categorization.
  • Layer 1 of ACI structure 400 may further include indicators to indicate the necessary/required information to the UEs for receiving associated sub-categorization in Layer 2 of ACI structure 400. The necessary/required information indicators may include, but is not limited to, sub-categorization mapping, time/frequency resource used for transmission, the network entity and/or system information by which each sub-categorization is transmitted or broadcasted. Hence, a UE can read only the part of the ACI it needs accordingly.
  • Layer 1 of ACI structure 400 can contain access control ON/OFF indicators for indicating whether an access control scheme is currently ON or OFF for each sub-categorization (can be a bitmap). Layer 1 of ACI structure 400 can also contain value tags for indicating the updated version of access control parameters for each group and/or each sub-categorization. The indicator(s) and parameter(s) within each group, layer and sub-categorization of ACI can be updated independently. The sub-categorizations are determined based on a need basis (e.g., based on current traffic condition).
  • Based on the resource allocation and the supported service a base station or TRP provides, the base station or TRP can periodically broadcast Layer 1 of ACI structure 400, and transmit or broadcast Layer 2 of ACI structure 400 when requested by the UEs (e.g., on-demand basis). In one implementation, Layer 1 of ACI structure 400 is contained or carried in minimal system information (SI), periodically broadcasted by the base station or TRP. Also, the base station or TRP may transmit dedicated RRC signaling and/or broadcast Layer 2 of ACI structure 400 to individual UEs when such requests are received from the UEs, where Layer 2 of ACI structure 400 is contained or carried in other SI. It should be noted that ACI structure 400 may become invalid when a UE moves out of the base station's coverage area (e.g., moving out of an NR network into an LTE network), then the UE may adopt the corresponding access control in accordance with the LTE specification.
  • According to an implementation of the present application, a base station (e.g., gNB) may perform beamforming, and use different beams to broadcast different ACI structures subject to different access control schemes. A UE may need to perform ACI acquisition for every beam from the base station. In another implementation, all beams formed and broadcasted by the base station may have a uniform ACI structure. A UE may skip ACI acquisition when the UE changes from one beam to another beam. For example, when a UE performs beam recovery, it can apply the same parameters acquired from the previous beam, when switching to another beam under the same cell.
  • According to an implementation of the present application, a base station may use medium access control (MAC) control element (CE) or RRC signaling to request connected UEs to perform ACI acquisition, to change any of the access control ON/OFF indicators in Layer 1 or modify the specific parameters in Layer 2. In another implementation, for RRC_INACTIVE UEs, a base station can use paging message to trigger which kind of behavior it desires.
  • FIG. 5 is a flowchart illustrating a method for access control, according to an exemplary implementation of the present application. Flowchart 500 starts with action 580 and ends with action 599. In action 582, a UE receives access attempt configuration. Depending on the RRC state the UE is in, the UE may receive the AAC in different RRC messages from a base station on which the UE camps. The AAC may be UE-specific, meaning that the AAC is configured by the base station and may contain the UE's access class(es) (e.g., sub-categorization), which RACH (e.g., 2-step or 4-step or both) is allowed for the UE for each corresponding access attempt purpose, and etc. In one implementation of the present application, the AAC may be determined by, for example, the application the UE performs and its associated QoS requirement. In addition, the current corresponding specific parameters in Layer 2 of an ACI structure (e.g., Layer 2 of ACI structure 400 in FIG. 4) for the UE can also be contained in the RRC message or ACC for each access attempt purpose.
  • In action 584, the UE may generate an access attempt. Depending on the RRC state the UE is in, the UE may generate an access attempt for various access attempt purposes, such as data transmission via random access, RAN notification area (RNA) update, and RRC resume procedure. In action 586, after the UE generates an access attempt, the UE may read Layer 1 of the ACI structure (e.g., Layer 1 of ACI structure 400 in FIG. 4) broadcasted by the base station. For example, the UE may check whether the access control ON/OFF indicators for its corresponding sub-categorizations are ON or OFF by reading the access control ON/OFF indicators within Layer 1 of the ACI structure. The Layer 1 of the ACI structure may be included in the minimal SI or periodically broadcasted SI from the base station.
  • In action 588, the UE may check whether the access control ON/OFF indicator(s) for the corresponding sub-categorization(s) is ON or OFF. If the access control ON/OFF indicator for a corresponding sub-categorization is OFF, the UE may stop reading or ignore the associated control parameters within Layer 2 of the ACI structure. If the access control ON/OFF indicator for the corresponding sub-categorization is OFF, the UE may also stop reading or ignore the common parameters in Layer 1 of the ACI structure. The UE may proceed to action 598 to perform access procedure. On the other hand, if the access control ON/OFF indicator for a corresponding sub-categorization is ON, the UE needs to further read the associated control parameters within Layer 2 of the ACI structure (which obtained via other SI or dedicated signaling or on-demand broadcast SI or on-demand other SI) to obtain all access control parameters it needs to apply.
  • Before the UE obtaining Layer 2 of the ACI structure, the UE may check the value tag of corresponding sub-categorization in Layer 2 in action 590. In one implementation, the UE may read the value tag in Layer 1, and compare it with a value tag contained in the AAC obtained in action 582. If the value tag in Layer 1 has not been changed or updated (e.g., the value tag of the corresponding sub-categorization is the same as the value tag contained in the AAC obtained in action 582), then the UE may use the specific parameters contained in the UE specific AAC received in action 582, instead of reading the specific parameters of the corresponding sub-categorization in Layer 2 again. In another implementation, the UE may not receive the current ACI setting in the message containing the UE specific AAC from the base station. In such case, the UE still performs value tag check upon receiving Layer 1 of the ACI structure, but compares the value tag in Layer 1 of the ACI structure with the value tag that the UE had previously read and stored. In both implementations described above, the UE performs value tag check before requesting Layer 2 of the ACI structure. Performing the value tag check in action 590 may avoid unnecessary ACI reading overhead. If the value tag has been updated, then the UE may proceed to action 592 to request and read updated specific parameters in Layer 2 of the ACI structure (which may be obtained through other SI or dedicated signaling or on-demand broadcast SI or on-demand other SI).
  • As shown in action 594, if the UE reads and passes all the specific parameters based on the corresponding sub-categorizations, the UE may be allowed for access attempt. It is noted that, the UE should also access the network by following corresponding specific parameters received in Layer 2 of ACI structure. Otherwise, the UE may be assigned with a backoff time in action 596, before reading read Layer 1 of the ACI structure again in action 586.
  • In action 598, once the UE is allowed to access the network, the UE may perform access procedure with the base station. During the access procedure (e.g., data transmission via random access, RAN notification area (RNA) update) performed by the UE, the base station may also perform the UE's AAC configuration update. Within the access stage, the base station can provide a new/updated UE specific AAC for performing RAN notification area update, and also can provide a UE-specific AAC for performing data transmission via random access to the UE.
  • FIG. 6A is a diagram illustrating an access attempt configuration (AAC) transmission for an RRC_INACTIVE UE, according to an exemplary implementation of the present application. FIG. 6B is a diagram illustrating an access control information (ACI) transmission for an RRC_INACTIVE UE, according to an exemplary implementation of the present application. FIGS. 6A and 6B illustrate an access control is performed by a base station (e.g., gNB) to control access of an RRC_INACTIVE UE.
  • As shown in FIG. 6A, during an RRC Suspend procedure, base station 604 transmits an RRCConnectionRelease message to UE 602 in action 682. In the present implementation, the RRCConnectionRelease message contains a UE specific AAC, where the UE specific AAC is configured by base station 604 and contains UE 602's access class(es) (e.g., sub-categorization) and which RACH (e.g., 2-step or 4-step or both) is allowed for UE 602 for each corresponding access attempt purpose. In one implementation of the present application, the AAC configurations are determined by the application UE 602 performs and its associated QoS requirement. In addition, a current value tag and/or its corresponding specific parameters in Layer 2 of an ACI structure (e.g., Layer 2 of ACI structure 400 in FIG. 4) for UE 602 can also be contained in the RRCConnectionRelease message for each access attempt purpose/category. After receiving the RRCConnectionRelease message, UE 602 transitions into RRC_INACTIVE state in action 683.
  • As shown in FIG. 6B, in action 684, UE 602 in RRC_INACTIVE state may generate an access attempt. In RRC_INACTIVE state, UE 602 may generate an access attempt for at least one of the following access attempt purposes: data transmission via random access, RAN notification area (RNA) update, and RRC resume procedure.
  • In action 686, base station 604 may provide Layer 1 of an ACI structure (Layer 1 of ACI structure 400 in FIG. 4) to RRC_INACTIVE UE 602. RRC_INACTIVE UE 602 may check whether the access control ON/OFF indicators for its corresponding sub-categorizations are ON or OFF by reading the access control ON/OFF indicators within Layer 1 of the ACI structure transmitted from base station 604. In the present implementation, UE 602 may obtain Layer 1 of the ACI structure by the minimal SI or periodically broadcasted SI. If the access control ON/OFF indicator for a corresponding sub-categorization is OFF, UE 602 may stop reading or ignore the associated control parameters within Layer 2 of the ACI structure. If the access control ON/OFF indicator for the corresponding sub-categorization is OFF, UE 602 may also stop reading or ignore the common parameters in Layer 1 of the ACI structure. UE 602 may proceed to action 698 to perform access procedure. On the other hand, if the access control ON/OFF indicator for a corresponding sub-categorization is ON, UE 602 needs to further read the associated control parameters within Layer 2 of the ACI structure (which obtained via other SI or dedicated signaling or on-demand broadcast SI or on-demand other SI) to obtain all access control parameters it needs to apply.
  • Before UE 602 making a request to base station 604 for Layer 2 of the ACI structure, UE 602 may check the value tag of corresponding sub-categorization in Layer 2 in action 690. If the value tag has not been changed or updated (e.g., the value tag of the corresponding sub-categorization is the same as the value tag contained in the AAC obtained in action 682), UE 602 may use the UE specific AAC obtained in action 682 which may contain UE 602's access class(es) (e.g., sub-categorization) and which RACH (e.g., 2-step or 4-step or both) is allowed for UE 602 for each corresponding access attempt purpose. That is, UE 602 may use the specific parameters contained in the UE specific AAC received in action 682, instead of reading the specific parameters of the corresponding sub-categorization in Layer 2 again. Performing the value tag check in action 690 may avoid unnecessary ACI reading overhead. If the value tag has been updated, then UE 602 may need to request and read updated specific parameters in Layer 2 of the ACI structure (which may be obtained through other SI or dedicated signaling or on-demand broadcast SI), as shown in action 692 a (e.g., UE 602 requesting Layer 2 of the ACI structure through other SI request) and action 692 b (e.g., base station 604 providing Layer 2 of the ACI structure through other SI upon the request from UE 602, and UE 602 reading Layer 2 of the ACI).
  • In action 694, if UE 602 passes all the specific parameters based on the corresponding sub-categorizations, UE 602 may be allowed to access the NR network through base station 604. Otherwise, UE 602 may be assigned with a backoff time before reading read Layer 1 of the ACI structure again. In action 698, once UE 602 is allowed to access the NR network, UE 602 may perform access procedure with base station 604 by following the specific parameters in Layer 2 of the ACI structure. During the access procedure (e.g., data transmission via random access, RAN notification area (RNA) update) performed by UE 602, base station 604 may also perform the UE's AAC configuration update. Within the access stage, base station 604 can provide a new/updated UE specific AAC for performing RAN notification area update, and also can provide a UE-specific AAC for performing data transmission via random access to UE 602.
  • FIG. 7A is a diagram illustrating an access attempt configuration (AAC) transmission for an RRC_CONNECTED UE, according to an exemplary implementation of the present application. FIG. 7B is a diagram illustrating an access control information (ACI) transmission for an RRC_CONNECTED UE, according to an exemplary implementation of the present application.
  • As shown in FIG. 7A, UE 702 is in RRC_CONNECTED state in action 781. During an RRC Reconfiguration procedure, base station 704 transmits an RRCReconfiguration message to UE 702 in action 782. In the present implementation, the RRCReconfiguration message contains a UE specific AAC, where the UE specific AAC is configured by base station 704 (e.g., gNB) and contains UE 702's access class(es) (e.g., sub-categorization). In one implementation of the present application, the AAC configurations are determined by the application UE 702 performs and its associated QoS requirement. In addition, a current value tag and/or its corresponding specific parameters in Layer 2 of an ACI structure (e.g., Layer 2 of ACI structure 400 in FIG. 4) for the RRC_CONNECTED UE 702 can also be contained in the RRCReconfiguration message for each access attempt purpose/category.
  • As shown in FIG. 7B, in action 784, UE 702 in RRC_CONNECTED state generates an access attempt. In action 786, base station 704 may provide Layer 1 of an ACI structure (Layer 1 of ACI structure 400 in FIG. 4) to RRC_CONNECTED UE 702. RRC_CONNECTED UE 702 may check whether the access control indicators for its corresponding sub-categorizations are ON or OFF by reading the access control ON/OFF indicators within Layer 1 of the ACI structure transmitted from base station 704 786. In the present implementation, UE 702 may obtain Layer 1 of the ACI structure by the minimal SI or periodically broadcasted SI from base station 704. If the access control ON/OFF indicator for a corresponding sub-categorization is OFF, UE 702 may stop reading or ignore the associated control parameters within Layer 2 of the ACI structure. If the access control ON/OFF indicator for the corresponding sub-categorization is OFF, UE 702 may also stop reading or ignore the common parameters in Layer 1 of the ACI structure. UE 702 may proceed to action 798 to perform access procedure. On the other hand, if the access control ON/OFF indicator for a corresponding sub-categorization is ON, UE 702 needs to further read the associated control parameters within Layer 2 of the ACI structure (which obtained via other SI or dedicated signaling or on-demand broadcast SI or on-demand other SI) to obtain all access control parameters it needs to apply.
  • Before UE 702 making a request to base station 704 for Layer 2 of the ACI structure, UE 702 may check the value tag of corresponding sub-categorization in Layer 2 in action 790. If the value tag has not been updated (e.g., the value tag of the corresponding sub-categorization is the same as the value tag contained in the AAC obtained in action 782), UE 702 may use the UE specific AAC obtained in action 782 which contains UE 702's access class(es) (e.g., sub-categorization). That is, UE 702 may use the specific parameters contained in the UE specific AAC received in action 782, instead of reading the specific parameters of the corresponding sub-categorization in Layer 2 again. Performing the value tag check in action 790 may avoid unnecessary ACI reading overhead. If the value tag has been updated, then UE 702 may need to request and read updated specific parameters in Layer 2 of the ACI structure (which may be obtained through other SI or dedicated signaling or on-demand broadcast SI or on-demand other SI), as shown in action 792 a (e.g., UE 702 requesting Layer 2 of the ACI structure through other SI request) and action 792 b (e.g., base station 704 providing Layer 2 of the ACI structure through other SI upon the request from UE 702, and UE 702 reading Layer 2 of the ACI).
  • In action 794, if UE 702 passes all the specific parameters based on the corresponding sub-categorizations, UE 702 may be allowed to access the NR network through base station 704 by following the specific parameters in Layer 2 of ACI structure. Otherwise, UE 702 may be assigned with a backoff time before reading read Layer 1 of the ACI structure again. In action 798, once UE 702 is allowed to access the NR network, UE 702 may perform access procedure with base station 704. During the access procedure (e.g., data transmission via random access, RAN notification area (RNA) update) performed by UE 702, base station 704 may also perform the UE's AAC configuration update. Within the access stage, base station 704 can provide a new/updated UE specific AAC for performing RAN notification area update, and also can provide a UE-specific AAC for performing data transmission via random access to UE 702.
  • FIG. 8 illustrates a block diagram of a node for wireless communication, in accordance with various aspects of the present application. In one implementation, node 800 may be a wireless device, such as UEs 102 a/102 b, 202, 302, 602, and 702 described with respect to FIGS. 1A/1B, 2, 3, 6A/6B, and 7A/7B, respectively. In another implementation, node 800 may be a network node, such as base stations 104 a/104 b, 204, 304, 604, and 704 described with respect to FIGS. 1A/1B, 2, 3, 6A/6B, and 7A/7B, respectively.
  • As shown in FIG. 8, node 800 may include transceiver 820, processor 826, memory 828, one or more presentation components 834, and at least one antenna 836. Node 800 may also include an RF spectrum band module, a base station communications module, a network communications module, and a system communications management module, input/output (I/O) ports, I/O components, and power supply (not explicitly shown in FIG. 8). Each of these components may be in communication with each other, directly or indirectly, over one or more buses 840.
  • Transceiver 820 having transmitter 822 and receiver 824 may be configured to transmit and/or receive time and/or frequency resource partitioning information. In some implementations, transceiver 820 may be configured to transmit in different types of subframes and slots including, but not limited to, usable, non-usable and flexibly usable subframes and slot formats. Transceiver 820 may be configured to receive data and control channels.
  • Node 800 may include a variety of computer-readable media. Computer-readable media can be any available media that can be accessed by node 800 and include both volatile and non-volatile media, removable and non-removable media. By way of example, and not limitation, computer-readable media may comprise computer storage media and communication media. Computer storage media includes both volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data.
  • Computer storage media includes RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Computer storage media does not comprise a propagated data signal. Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media.
  • Memory 828 may include computer-storage media in the form of volatile and/or non-volatile memory. Memory 828 may be removable, non-removable, or a combination thereof. Exemplary memory includes solid-state memory, hard drives, optical-disc drives, and etc. As illustrated in FIG. 8, memory 828 may store computer-readable, computer-executable instructions 832 (e.g., software codes) that are configured to, when executed, cause processor 826 to perform various functions described herein, for example, with reference to FIGS. 1 through 7B. Alternatively, instructions 832 may not be directly executable by processor 826 but be configured to cause node 800 (e.g., when compiled and executed) to perform various functions described herein.
  • Processor 826 may include an intelligent hardware device, e.g., a central processing unit (CPU), a microcontroller, an ASIC, and etc. Processor 826 may include memory. Processor 826 may process data 830 and instructions 832 received from memory 828, and information through transceiver 820, the base band communications module, and/or the network communications module. Processor 826 may also process information to be sent to transceiver 820 for transmission through antenna 836, to the network communications module for transmission to a core network.
  • One or more presentation components 834 presents data indications to a person or other device. Exemplary one or more presentation components 834 include a display device, speaker, printing component, vibrating component, and etc.
  • In accordance with implementations of the present application, an access attempt configuration (AAC) can either configured by a base station or a UE based on a message broadcasted by the base station. The AAC may contain information of the UE's access class, and/or ACI structure and ACI's default and/or current settings. The UE access class assignment can be based on UE ID, QoS requirement, data size, and etc. For example, conventional access control methods can provide traffic control based on the specific access class or application of the UEs, which are predefined in the UEs and fixed (e.g., stored in the UEs) after the manufacturing process. A base station can deny or allow specific access class or application by reading it directly from the UEs. Although this is a simple and straightforward process, this type of access control offers no flexibility, and can result in inefficient use of radio resource in the network. By contrast, implementations of the present application provide access control based on different parameters that can be dynamically assigned and selected.
  • For example, which categorization and sub-categorization(s) the UE belongs, is determined after the UE enters the cell coverage area of the base station. The base station determines the configuration and the parameters based on factors, such as current traffic condition. As such, the base station can dynamically assign the sub-categorization(s) for the UE. This allows the base station to have a very small granularity. The access control method can dynamically assign radio resource based on traffic and resource conditions, which allows the network to preserve radio resource for high priority traffic/data/application. Moreover, the ACI structures according implementations of the present application are hierarchical structures. The fundamental parameters are listed in Layer 1. Layer 2 may include delta information. The base station controls the ON/OFF of these parameters. For example, the base station's loading is light, all the parameters are off. All UEs are allowed access. However, if the loading is heavy, the base station may configure the layered ACI structure to determine which UEs can get access first based on a hierarchy. The ACI structure can allow the base station to determine which class the UE belongs, and to decide, at any given point, which types of UEs can get access or endure the access control scheme.
  • From the above description it is manifest that various techniques can be used for implementing the concepts described in the present application without departing from the scope of those concepts. Moreover, while the concepts have been described with specific reference to certain implementations, a person of ordinary skill in the art would recognize that changes can be made in form and detail without departing from the scope of those concepts. As such, the described implementations are to be considered in all respects as illustrative and not restrictive. It should also be understood that the present application is not limited to the particular implementations described above, but many rearrangements, modifications, and substitutions are possible without departing from the scope of the present disclosure.

Claims (29)

1. A method for network access of a wireless device to a network node, the method comprising:
initiating an access attempt to the network node;
reading a first layer of access control information (ACI) from the network node to determine whether an access control indicator in the first layer for an access category is ON, wherein the access control indicator for the access category is associated with a characteristic/classification of the access attempt by the wireless device to the network node;
in response to the access control indicator in the first layer for the access category being ON, reading a second layer of the ACI from the network node to determine whether the access attempt to the network node is allowed based on one or more specific parameters associated with the access category in the second layer of the ACI.
2. The method of claim 1, further comprising receiving an access attempt configuration (AAC) from the network node, the AAC including at least one value tag corresponding to the access category.
3. The method of claim 2, further comprising performing a value tag check to determine whether there is an update associated with the access category.
4. The method of claim 3, wherein, when the at least one value tag has not been updated, using the AAC to determine whether the access attempt to the network node is allowed.
5. The method of claim 3, further comprising, when the at least one value tag has been updated, using the second layer of the ACI to determine whether the access attempt to the network node is allowed based on the one or more specific parameters associated with the access category in the second layer of the ACI.
6. The method of claim 2, wherein the AAC is configured by the network node, and includes information of at least one of the wireless device's access class and the ACI's default and current settings.
7. The method of claim 6, wherein the wireless device's access class is dynamically assigned by the network node based on at least one of the wireless device's ID, quality of service (QoS) requirement and data size.
8. The method of claim 1, further comprising:
in response to the access control indicator in the first layer for the access category being OFF, performing an access procedure to gain access to the network node without reading the second layer of the ACI.
9. The method of claim 1, wherein the first layer of the ACI is categorized based on a radio resource control (RRC) state of the wireless device, and includes access control indications and common parameters.
10. The method of claim 9, wherein the wireless device makes the access attempt in one of RRC_Inactive state, RRC_Connected state, and RRC_Idle state.
11. The method of claim 1, wherein the first layer of ACI is broadcasted by the network node through minimum system information.
12. The method of claim 1, further comprising:
in response to the access control indicator in the first layer for the access category being ON, requesting the second layer of the ACI by the wireless device from the network node when the at least one value tag has been updated;
sending, by the network node, the second layer of the ACI to the wireless device in response to the request through other system information.
13. The method of claim 1, wherein the access category is associated with at least one of random access procedure, RAN-based notification area (RNA), RRC state transition, applications, network slice, RAN slice, quality of service (QoS) requirement and data size.
14. The method of claim 1, wherein the access category is RNA update such that the RNA update is controlled by the ACI.
15. A wireless device for network access of the wireless device to a network node, the wireless device comprising:
one or more processors;
a non-transitory machine-readable memory storing a program, the program executable by at least one of the one or more processors, the program comprising sets of instructions for:
initiating an access attempt to the network node;
reading a first layer of access control information (ACI) from the network node to determine whether an access control indicator in the first layer for an access category is ON, wherein the access control indicator for the access category is associated with a characteristic/classification of the access attempt by the wireless device to the network node;
in response to the access control indicator in the first layer for the access category being ON, reading a second layer of the ACI from the network node to determine whether the access attempt to the network node is allowed based on one or more specific parameters associated with the access category in the second layer of the ACI.
16. The wireless device of claim 15, wherein the program further comprises the sets of instructions for:
receiving an access attempt configuration (AAC) from the network node, the AAC including at least one value tag, the at least one value tag corresponding to the access category.
17. The wireless device of claim 16, wherein the program further comprises the sets of instructions for:
performing a value tag check to determine whether there is an update associated with the access category.
18. The wireless device of claim 17, wherein, when the at least one value tag has not been updated, using the AAC to determine whether the access attempt to the network node is allowed.
19. The wireless device of claim 17, wherein the program further comprises the sets of instructions for:
when the at least one value tag has been updated, using the second layer of the ACI to determine whether the access attempt to the network node is allowed based on the one or more specific parameters associated with the access category in the second layer of the ACI.
20. The wireless device of claim 16, wherein the AAC is configured by the network node, and includes information of at least one of the wireless device's access class and the ACI's default and current settings.
21. The wireless device of claim 20, wherein the wireless device's access class is dynamically assigned by the network node based on at least one of the wireless device's ID, quality of service (QoS) requirement and data size.
22. The wireless device of claim 15, wherein the program further comprises the sets of instructions for:
in response to the access control indicator in the first layer for the access category being OFF, performing an access procedure to gain access to the network node without reading the second layer of the ACI.
23. The wireless device of claim 15, wherein the first layer of the ACI is categorized based on a radio resource control (RRC) state of the wireless device, and includes access control indications and common parameters.
24. The wireless device of claim 23, wherein the wireless device makes the access attempt in one of RRC_Inactive state, RRC_Connected state, and RRC_Idle state.
25. The wireless device of claim 15, wherein the program further comprises the sets of instructions for:
in response to the access control indicator in the first layer for the access category being ON, requesting the second layer of the ACI by the wireless device from the network node when the at least one value tag has been updated.
26. A network node for network access of a wireless device to the network node, the network node comprising:
one or more processors;
a non-transitory machine-readable memory storing a program, the program executable by at least one of the one or more processors, the program comprising sets of instructions for:
providing a first layer of access control information (ACI) to the wireless device, the first layer of the ACI having one or more access control indicators corresponding to one or more access categories;
providing a second layer of the ACI to the wireless device upon request;
wherein the wireless device requests for the second layer of the ACI when at least one of the one or more access control indicators in the first layer of the ACI associated with a characteristic/classification of an access attempt by the wireless device to the network node is ON.
27. The network node of claim 26, wherein the program further comprises the sets of instructions for:
providing an access attempt configuration (AAC) to the wireless device, the AAC including at least one value tag corresponding to the access category.
28. The network node of claim 26, wherein the network node dynamically assigns the wireless device's access class based on at least one of the wireless device's ID, quality of service (QoS) requirement and data size.
29. The network node of claim 26, wherein the access category is associated with at least one of random access procedure, RAN-based notification area (RNA), RRC state transition, applications, network slice, RAN slice, quality of service (QoS) requirement and data size.
US15/942,505 2017-04-02 2018-03-31 Access control in new radio Abandoned US20180288676A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US15/942,505 US20180288676A1 (en) 2017-04-02 2018-03-31 Access control in new radio
US16/444,165 US10602429B2 (en) 2017-04-02 2019-06-18 Access control in new radio
US16/749,260 US11089536B2 (en) 2017-04-02 2020-01-22 Access control in new radio
US17/366,663 US11706692B2 (en) 2017-04-02 2021-07-02 Access control in new radio

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201762480512P 2017-04-02 2017-04-02
US15/942,505 US20180288676A1 (en) 2017-04-02 2018-03-31 Access control in new radio

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/444,165 Division US10602429B2 (en) 2017-04-02 2019-06-18 Access control in new radio

Publications (1)

Publication Number Publication Date
US20180288676A1 true US20180288676A1 (en) 2018-10-04

Family

ID=63670346

Family Applications (4)

Application Number Title Priority Date Filing Date
US15/942,505 Abandoned US20180288676A1 (en) 2017-04-02 2018-03-31 Access control in new radio
US16/444,165 Active US10602429B2 (en) 2017-04-02 2019-06-18 Access control in new radio
US16/749,260 Active US11089536B2 (en) 2017-04-02 2020-01-22 Access control in new radio
US17/366,663 Active 2038-06-16 US11706692B2 (en) 2017-04-02 2021-07-02 Access control in new radio

Family Applications After (3)

Application Number Title Priority Date Filing Date
US16/444,165 Active US10602429B2 (en) 2017-04-02 2019-06-18 Access control in new radio
US16/749,260 Active US11089536B2 (en) 2017-04-02 2020-01-22 Access control in new radio
US17/366,663 Active 2038-06-16 US11706692B2 (en) 2017-04-02 2021-07-02 Access control in new radio

Country Status (6)

Country Link
US (4) US20180288676A1 (en)
EP (1) EP3607799A4 (en)
JP (2) JP2020511855A (en)
KR (1) KR102343161B1 (en)
CN (1) CN111096041B (en)
WO (1) WO2018184512A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111132306A (en) * 2018-10-30 2020-05-08 中国移动通信有限公司研究院 Method and equipment for configuring notification area of access network
US20200389924A1 (en) * 2019-06-10 2020-12-10 Qualcomm Incorporated Design considerations for a random access response for a two-step random access procedure
US11115879B2 (en) * 2017-09-08 2021-09-07 Guangdong Oppo Mobile Telecommunications Corp., Ltd. State switching method, network device and terminal device
US20220104064A1 (en) * 2020-09-25 2022-03-31 Verizon Patent And Licensing Inc. Admission and congestion control service
US11432331B2 (en) * 2017-06-14 2022-08-30 Vivo Mobile Communication Co., Ltd. System information transmission method, terminal and network device
US11903033B2 (en) * 2018-07-25 2024-02-13 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Random access method and communication device

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017163735A1 (en) * 2016-03-23 2017-09-28 日本電気株式会社 Core node, base station, wireless terminal, communication method, wireless resource allocation method, base station selection method, and readable medium
WO2019109288A1 (en) * 2017-12-07 2019-06-13 北京小米移动软件有限公司 Information broadcast method and device, service implementation method and device, and access point
US20210259021A1 (en) * 2020-02-13 2021-08-19 Asustek Computer Inc. Method and apparatus for fallback action of small data transmission in a wireless communication system
US20230156849A1 (en) * 2020-08-06 2023-05-18 Apple Inc. Access control of user equipments for inactive direct transmissions

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170064601A1 (en) * 2015-09-01 2017-03-02 Qualcomm Incorporated Service-based, separated access and paging cell selection and reselection
US20170251500A1 (en) * 2016-02-29 2017-08-31 Samsung Electronics Co., Ltd. Apparatus and method for signaling system information
US20170325157A1 (en) * 2016-05-09 2017-11-09 Qualcomm Incorporated Scalable system information block (sib) bitmap structure
US20170331670A1 (en) * 2016-05-13 2017-11-16 Telefonaktiebolaget Lm Ericsson (Publ) Network Architecture, Methods, and Devices for a Wireless Communications Network

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9622211B2 (en) * 2012-01-30 2017-04-11 Telefonaktiebolaget Lm Ericsson (Publ) Access spreading with selective paging
GB2499189B (en) * 2012-01-31 2014-02-12 Broadcom Corp Method and apparatus for informing UE about access barring
EP2988552B1 (en) 2013-05-13 2019-01-16 Huawei Technologies Co., Ltd. Access control method and device
WO2015031202A1 (en) * 2013-08-30 2015-03-05 Interdigital Patent Holdings, Inc. Methods for application specific access control
US10075902B2 (en) * 2014-04-08 2018-09-11 Qualcomm Incorporated Method of unified control of random access and traffic ingress in a congested radio access network
CN107079332B (en) * 2014-11-10 2020-11-06 Lg 电子株式会社 Method and user equipment for blocking network access through ACDC
US9769733B2 (en) * 2015-02-10 2017-09-19 Qualcomm Incorporated Incremental transmission of system information
US9807764B2 (en) * 2015-07-10 2017-10-31 Qualcomm Incorporated Compensation for excess transmission opportunity time
CN108353347B (en) * 2015-09-04 2021-03-26 瑞典爱立信有限公司 Controlling access to a wireless communication network
CN109417746B (en) * 2016-04-20 2021-06-08 康维达无线有限责任公司 System information provision and lightweight connection signaling
US20180220369A1 (en) * 2017-02-02 2018-08-02 Htc Corporation Device and Method of Handling an Inactive State in a Wireless Communication System
KR102276839B1 (en) * 2017-03-17 2021-07-14 삼성전자주식회사 Radio Access Network Notification Area Update Failed
US20190037635A1 (en) * 2017-07-28 2019-01-31 Asustek Computer Inc. Method and apparatus of recovering rrc connection in a wireless communication system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170064601A1 (en) * 2015-09-01 2017-03-02 Qualcomm Incorporated Service-based, separated access and paging cell selection and reselection
US20170251500A1 (en) * 2016-02-29 2017-08-31 Samsung Electronics Co., Ltd. Apparatus and method for signaling system information
US20170325157A1 (en) * 2016-05-09 2017-11-09 Qualcomm Incorporated Scalable system information block (sib) bitmap structure
US20170331670A1 (en) * 2016-05-13 2017-11-16 Telefonaktiebolaget Lm Ericsson (Publ) Network Architecture, Methods, and Devices for a Wireless Communications Network

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11432331B2 (en) * 2017-06-14 2022-08-30 Vivo Mobile Communication Co., Ltd. System information transmission method, terminal and network device
US20220361249A1 (en) * 2017-06-14 2022-11-10 Vivo Mobile Communication Co., Ltd. System information transmission method, terminal and network device
US11937306B2 (en) * 2017-06-14 2024-03-19 Vivo Mobile Communication Co., Ltd. System information transmission method, terminal and network device
US11115879B2 (en) * 2017-09-08 2021-09-07 Guangdong Oppo Mobile Telecommunications Corp., Ltd. State switching method, network device and terminal device
US11903033B2 (en) * 2018-07-25 2024-02-13 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Random access method and communication device
CN111132306A (en) * 2018-10-30 2020-05-08 中国移动通信有限公司研究院 Method and equipment for configuring notification area of access network
US20200389924A1 (en) * 2019-06-10 2020-12-10 Qualcomm Incorporated Design considerations for a random access response for a two-step random access procedure
US11672013B2 (en) * 2019-06-10 2023-06-06 Qualcomm Incorporated Considerations for a random access response for a two-step random access procedure
US20230345542A1 (en) * 2019-06-10 2023-10-26 Qualcomm Incorporated Design considerations for a random access response for a two-step random access procedure
US20220104064A1 (en) * 2020-09-25 2022-03-31 Verizon Patent And Licensing Inc. Admission and congestion control service

Also Published As

Publication number Publication date
CN111096041B (en) 2023-04-14
KR102343161B1 (en) 2021-12-23
WO2018184512A1 (en) 2018-10-11
KR20190131548A (en) 2019-11-26
US20200162995A1 (en) 2020-05-21
JP2020511855A (en) 2020-04-16
US10602429B2 (en) 2020-03-24
US20210337459A1 (en) 2021-10-28
JP2022116224A (en) 2022-08-09
US20190335381A1 (en) 2019-10-31
US11706692B2 (en) 2023-07-18
US11089536B2 (en) 2021-08-10
EP3607799A1 (en) 2020-02-12
EP3607799A4 (en) 2020-12-16
CN111096041A (en) 2020-05-01

Similar Documents

Publication Publication Date Title
US11706692B2 (en) Access control in new radio
US11564251B2 (en) Data packet delivery in RRC inactive state
US11202336B2 (en) Small data transmission in radio resource control (RRC) inactive state
US20230030443A1 (en) Method of small data transmission and related device
US10791502B2 (en) On-demand system information request procedure and error handling
US11343809B2 (en) Methods and related devices of channel state information (CSI) reporting for bandwidth part (BWP) switch operation
WO2021008582A1 (en) Method and apparatus for sidelink operation
US11197250B2 (en) Reporting power headroom in multiple connectivity next generation networks
WO2021239109A1 (en) Management of system information block segmentation
WO2020187288A1 (en) System information update in next generation wireless networks
KR20230152916A (en) Method and apparatus for base station energy savings in a wireless communication system

Legal Events

Date Code Title Description
AS Assignment

Owner name: FG INNOVATION IP COMPANY LIMITED, CHINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHIA-HUNG WEI;CHIE-MING CHOU;REEL/FRAME:046619/0449

Effective date: 20180620

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

AS Assignment

Owner name: FG INNOVATION COMPANY LIMITED, TAIWAN

Free format text: CHANGE OF NAME;ASSIGNOR:FG INNOVATION IP COMPANY LIMITED;REEL/FRAME:049297/0824

Effective date: 20190214

AS Assignment

Owner name: FG INNOVATION COMPANY LIMITED, HONG KONG

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE RECEIVING PARTY STATE/COUNTRY PREVIOUSLY RECORDED ON REEL 049297 FRAME 0824. ASSIGNOR(S) HEREBY CONFIRMS THE CHANGE OF NAME;ASSIGNOR:FG INNOVATION IP COMPANY LIMITED;REEL/FRAME:050111/0503

Effective date: 20190214

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: NEW RADIO LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:REDLAKE IP LLC;REEL/FRAME:066339/0683

Effective date: 20240201

Owner name: REDLAKE IP LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FG INNOVATION COMPANY LTD.;REEL/FRAME:066339/0653

Effective date: 20240131