WO2011149316A2 - Apparatus and method for supporting mobility in a heterogeneous wireless communication system - Google Patents

Apparatus and method for supporting mobility in a heterogeneous wireless communication system Download PDF

Info

Publication number
WO2011149316A2
WO2011149316A2 PCT/KR2011/003927 KR2011003927W WO2011149316A2 WO 2011149316 A2 WO2011149316 A2 WO 2011149316A2 KR 2011003927 W KR2011003927 W KR 2011003927W WO 2011149316 A2 WO2011149316 A2 WO 2011149316A2
Authority
WO
WIPO (PCT)
Prior art keywords
cell
macro
information
context information
pico
Prior art date
Application number
PCT/KR2011/003927
Other languages
French (fr)
Other versions
WO2011149316A3 (en
Inventor
Chan-Ho Min
Soeng-Hun Kim
Original Assignee
Samsung Electronics Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co., Ltd. filed Critical Samsung Electronics Co., Ltd.
Priority to JP2013510035A priority Critical patent/JP5622930B2/en
Priority to EP11786948.7A priority patent/EP2578018B1/en
Priority to CN201180035667.XA priority patent/CN103026753B/en
Publication of WO2011149316A2 publication Critical patent/WO2011149316A2/en
Publication of WO2011149316A3 publication Critical patent/WO2011149316A3/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/32Reselection being triggered by specific parameters by location or mobility data, e.g. speed data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/02Buffering or recovering information during reselection ; Modification of the traffic flow during hand-off
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0083Determination of parameters used for hand-off, e.g. generation or modification of neighbour cell lists
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0083Determination of parameters used for hand-off, e.g. generation or modification of neighbour cell lists
    • H04W36/0085Hand-off measurements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/04Reselecting a cell layer in multi-layered cells
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/19Connection re-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/06Reselecting a communication resource in the serving access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters

Definitions

  • the present invention relates to a wireless communication system. More particularly, the present invention relates to an apparatus and method for supporting mobility in a heterogeneous wireless communication system.
  • a pico cell has the following characteristics.
  • the pico cell has a smaller coverage than a macro cell and may overlap with the macro cell.
  • the pico cell operates in the same or a different frequency from the macro cell, and uses a low transmit power compared to a macro BS.
  • the pico cell can be accessed only by some licensed users or can be accessed by all users.
  • a heterogeneous network refers to a cellular deployment of a form in which Base Stations (BSs) using a low transmit power are overlapped with each other within the coverage of a macro BS. That is, cells of different sizes are mixed or overlapped with each other.
  • BSs managing the respective overlapped cells make use of the same wireless technology.
  • a BS using less transmit output in the heterogeneous network can be a micro BS, a Remote Radio Head (RRH), a pico enhanced Node B (eNB), a home eNB, a femto BS, a relay node and the like.
  • RRH Remote Radio Head
  • eNB pico enhanced Node B
  • eNB home eNB
  • femto BS a relay node and the like.
  • the heterogeneous network can be constructed according to FIGURE 1.
  • FIGURE 1 illustrates a heterogeneous wireless communication system according to the conventional art.
  • a plurality of pico cells 110-1 and 110-2, a plurality of femto cells 120-1 to 120-3, and a plurality of relay nodes 130-1 and 130-2 are overlapped within a macro cell 100, and each cell provides service to Mobile Stations (MSs) located within its own coverage.
  • MSs Mobile Stations
  • the MSs located in the coverage of the plurality of pico cells 110-1 and 110-2, the plurality of femto cells 120-1 to 120-3, and the plurality of relay nodes 130-1 and 130-2 are also located in the coverage of the macro cell 100; however, the MSs have preferential access to a micro cell with an excellent channel state rather than the macro cell 100. That is, if the MS accessing the macro cell 100 enters the coverage of the micro cell, the MS performs handover to the micro cell from the macro cell 100.
  • FIGURE 2 illustrates an example of a movement path of an MS in a heterogeneous wireless communication system according to the conventional art.
  • an MS 230 moves while connecting with a macro BS 200 within a cell of the macro BS 200.
  • the MS 230 passes a cell edge portion of a pico BS 210. So, the MS 230 that has access to the macro BS 200 during a time (t1) 251 is located within a cell of the pico BS 210 during a time (t2) 252, and performs handover to the pico BS 210. Then, the MS 230 leaves the cell of the pico BS 210.
  • the MS 230 When leaving the cell of the pico BS 210, the MS 230 should again perform handover to the macro BS 200 to maintain seamless service. At this time, if the MS 230 is moving quickly, the time (t2) 252 when the MS 230 stays in the cell of the pico BS 210 would be very short. As such, it fails to ensure enough time to perform a handover, so a Radio Link Failure (RLF) may take place before the handover to the macro BS 200 is completed, causing data loss, service interruption and such. Particularly, in a real-time service such as Voice over Internet Protocol (VoIP), service interruption felt by a user may be critical. Furthermore, during handover from the macro BS 200 to the pico BS 210, the macro BS 200 discards context information of the MS 230. As such, attempts by the MS 230 to reconnect to the macro BS 200 will take a long time.
  • RLF Radio Link Failure
  • Another aspect of the present invention is to provide an apparatus and method for reducing a time taken to do re-handover to a macro cell in a wireless communication system.
  • Another aspect of the present invention is to provide an apparatus and method for an MS suffering a Radio Link Failure (RLF) in a pico cell to establish connection to a macro cell in a wireless communication system.
  • RLF Radio Link Failure
  • an operation method of a Mobile Station (MS) in a wireless communication system includes storing system information of a first Base Station (BS) of a first cell when performing handover from the first cell to a second cell.
  • the method also includes detecting that a connection with the second cell is lost prior to a handover from the second cell. Reconnection to the first BS is performed using the stored system information.
  • a portion of a coverage of the second cell overlaps a coverage of the first cell.
  • an operation method of a Base Station (BS) of a first cell in a wireless communication system includes transmitting a request for a path switch for a Mobile Station (MS) to an upper node when the MS performs handover from a second cell to the first cell.
  • MS Mobile Station
  • the changed context information is transmitted to a second BS of the second cell. A portion of a coverage of the first cell is included in a coverage of the second cell.
  • an operation method of a Base Station (BS) of a first cell in a wireless communication system includes, after a Mobile Station (MS) performs handover from the first cell to a second cell, receiving changed context information of the MS from a second BS of the second cell. Context information of the MS is updated using the changed context information. A coverage of a second cell is included in a coverage of the first cell.
  • MS Mobile Station
  • an apparatus for a Mobile Station (MS) in a wireless communication system includes a storage unit and a controller.
  • the storage unit stores system information of a first Base Station (BS) of a first cell when the MS is performing handover from the first cell to a second cell.
  • the controller detects that a connection with the second cell is lost prior to a handover from the second cell and performs reconnection to the first BS using the stored system information. A portion of a coverage of the second cell is included in a coverage of the first cell.
  • BS Base Station
  • an apparatus of a Base Station (BS) of a first cell in a wireless communication system includes a controller and a backhaul communication unit.
  • the controller transmits a request for a path switch for a Mobile Station (MS) to an upper node when an MS performs handover from a second cell to the first cell.
  • the backhaul communication unit transmits the changed context information to a second BS of the second cell when context information of the MS is changed. A portion of a coverage of the first cell is included in a coverage of the second cell.
  • an apparatus for a Base Station (BS) of a first cell in a wireless communication system includes a backhaul communication unit and a controller.
  • the backhaul communication unit receives changed context information of a Mobile Station (MS) from a second BS of a second cell after the MS performs handover from the first cell to the second cell.
  • the controller updates context information of the MS using the changed context information. A portion of a coverage of the second cell is included in a coverage of the first cell.
  • FIGURE 1 is a diagram of a heterogeneous wireless communication system according to the conventional art
  • FIGURE 2 is a diagram of an example of a movement path of a Mobile Station (MS) in a heterogeneous wireless communication system according to the conventional art;
  • FIGURE 3 is a ladder diagram of a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to an embodiment of the present invention
  • FIGURES 4 and 5 are ladder diagrams of a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to a first type of embodiments of the present invention
  • FIGURE 6 is a ladder diagram of a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to a second type of embodiments of the present invention
  • FIGURE 7 is a ladder diagram of a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to a third type of embodiments of the present invention.
  • FIGURE 8 is a ladder diagram of a scheme for security key delivery in a heterogeneous wireless communication system according to an embodiment of the present invention.
  • FIGURE 9 is a ladder diagram of a signal exchange considering security key delivery when an MS reconnects from a pico cell to a macro cell in a heterogeneous wireless communication system according to the third type of embodiments of the present invention.
  • FIGURE 10 is a ladder diagram of a signal exchange considering context information change when an MS reconnects from a pico cell to a macro cell in a heterogeneous wireless communication system according to the third type of embodiments of the present invention.
  • FIGURE 11 illustrates a process of a pico Base Station (BS) in a heterogeneous wireless communication system according to the first type of embodiments of the present invention
  • FIGURE 12 illustrates a process of a macro BS in a heterogeneous wireless communication system according to the first type of embodiments of the present invention
  • FIGURE 13 illustrates a process of a macro BS in a heterogeneous wireless communication system according to the second type of embodiments of the present invention
  • FIGURE 14 illustrates a process of an MS in a heterogeneous wireless communication system according to the second type of embodiments of the present invention
  • FIGURE 15 illustrates a process of a macro BS in a heterogeneous wireless communication system according to the third type of embodiments of the present invention
  • FIGURE 16 illustrates a process of an MS in a heterogeneous wireless communication system according to the third type of embodiments of the present invention.
  • FIGURE 17 is a block diagram of an MS in a heterogeneous wireless communication system according to an embodiment of the present invention.
  • FIGURE 18 is a block diagram of a BS in a heterogeneous wireless communication system according to an embodiment of the present invention.
  • FIGURES 3 through 18, discussed below, and the various embodiments used to describe the principles of the present disclosure in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the disclosure. Those skilled in the art will understand that the principles of the present disclosure may be implemented in any suitably arranged wireless communications system.
  • embodiments of the present invention provide a technology for a Mobile Station (MS) suffering a Radio Link Failure (RLF) in a pico cell to reconnect to a macro cell in a wireless communication system.
  • MS Mobile Station
  • RLF Radio Link Failure
  • the embodiments of the present invention use terms and names defined in the Third Generation Partnership Project Long Term Evolution (3GPP LTE).
  • 3GPP LTE Third Generation Partnership Project Long Term Evolution
  • the embodiments of the present invention are not limited by the terms and names, and are also analogously applicable to systems following other rules.
  • a ‘pico Base Station (BS)’ may be interchanged with a ‘Home enhanced Node B (HeNB)’
  • a ‘macro BS’ may be interchanged with an ‘enhanced Node B (eNB)’.
  • FIGURE 3 illustrates a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to an embodiment of the present invention.
  • an MS 310 entering a cell of a pico BS 320 receives a handover command from a macro BS 330 (step 301).
  • the handover command is transmitted through a Radio Resource Control (RRC) connection reconfiguration message.
  • RRC Radio Resource Control
  • the macro BS 330 prior to transmitting the handover command, performs a procedure of determining whether to perform a handover based on signal measurement information reported from the MS 310 and identifying whether the handover is acceptable to the pico BS 320.
  • the pico BS 320 performs admission control according to a request of the macro BS 330.
  • the macro BS 330 transmitting the handover command transmits Sequence Number (SN) state information of the MS 310 to the pico BS 320, i.e. a target BS of handover (step 303).
  • the SN state information indicates a progress state of a sequence number for data in a Packet Data Convergence Protocol (PDCP) layer and is used for data encryption, integrity protection, and such.
  • PDCP Packet Data Convergence Protocol
  • the MS 310 receiving the handover command transmits a handover confirm to the pico BS 320 (step 305).
  • the handover confirm is transmitted through an RRC connection reconfiguration complete message.
  • the MS 310 transmits to the macro BS 330 a Random Access (RA) preamble to acquire synchronization with the macro BS 330 and, in response to this, the macro BS 330 transmits to the MS 310 a Timing Advance (TA) that represents a difference of synchronization between the MS 310 and the macro BS 330.
  • RA Random Access
  • TA Timing Advance
  • the macro BS 330 transmits to the MS 310, together with the TA, information on uplink resources necessary for transmitting the handover confirm.
  • the MS 310 controls uplink synchronization using the TA and then, transmits the handover confirm through allocated uplink resources.
  • the pico BS 320 transmits to a Mobility Management Entity (MME) 340 a path switch request message informing that a serving cell of the MS 310 changes (step 307).
  • MME Mobility Management Entity
  • the MME 340 transmits to a Serving Gateway (S-GW) 350 a user plane update request message (step 309), and the S-GW 350 receiving the user plane update request message re-establishes a downlink traffic path for the MS 310.
  • the S-GW 350 transmits to the MME 340 a user plane update response message (step 311).
  • the MME 340 transmits a path switch response message to the pico BS 320 (step 313).
  • the pico BS 320 identifying the path re-establishment transmits to the macro BS 330 a user context release request for the MS 310 (step 315).
  • the MS 310 then maintains the connection with the pico BS 320, and transmits/receives uplink/downlink traffic through the pico BS 320 and the S-GW 350.
  • the MS 310 detects an RLF (step 319), and discovers the macro BS 330 (step 321).
  • the MS 310 detects that the connection with the pico BS 320 is not kept, and detects a signal of the macro BS 330.
  • the MS 310 attempts RRC connection re-establishment to the macro BS 330.
  • the MS 310 has to acquire system information of the macro BS 330.
  • the system information is acquired by receiving at least one System Information Block (SIB) broadcasted by the macro BS 330.
  • SIB System Information Block
  • the RRC connection re-establishment fails (step 323). This is because the macro BS 330 has discarded context information of the MS 310 according to step 315. As such, the MS 310 enters an idle mode (step 325) and, during the idle mode, performs new RRC connection establishment with the macro BS 330 (step 327).
  • SIB System Information Block
  • technique 1) is divided into a technique for a macro BS to keep context information of an MS through a user context update procedure, and a technique for an MS to keep system information of a macro BS during a connection to a pico BS through a system information update procedure.
  • technique for using the user context update procedure and the technique for using the system information update procedure, one or both techniques are applicable.
  • the MS When an MS suffers an RLF in a pico cell in an environment where the pico cell is overlapped within a macro cell, there is a great possibility that the MS discovers a macro cell that has previously been connected with the MS. Thus, the MS will seek to reconnect to the macro BS. At this time, through an RRC connection re-establishment procedure, the MS attempts to connect with the macro cell.
  • the RRC connection re-establishment procedure is a procedure that is executable with the macro BS that includes context information of a corresponding MS, the RRC connection re-establishment procedure fails with the macro BS that has already deleted the context information of the MS.
  • embodiments of the present invention propose ways for the macro BS to keep the context information of the MS.
  • FIGURES 4 and 5 illustrate a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to a first type of embodiments of the present invention.
  • an MS 410 entering a cell of a pico BS 420 receives a handover command from a macro BS 430 (step 401), and the macro BS 430 transmits SN state information of the MS 410 to the pico BS 420 that is a target BS of handover (step 403). Also, the MS 410 receiving the handover command transmits a handover confirm to the pico BS 420 (step 405). The pico BS 420 then transmits to the MME 440 a path switch request message informing that a serving cell of the MS 410 changes (step 407). In response, the MME 440 transmits to the S-GW 450 a user plane update request message (step 409).
  • the S-GW 450 re-establishes a downlink traffic path for the MS 410 and transmits a user plane update response message to the MME 440 (step 411).
  • the MME 440 transmits a path switch response message to the pico BS 420 (step 413).
  • the pico BS 420 identifying the accomplishment of path re-establishment transmits to the macro BS 430 a user context release request for the MS 410 (step 415).
  • the MS 410 maintains the connection with the pico BS 420, and transmits/receives uplink/downlink traffic through the pico BS 420 and the S-GW 450 (step 417).
  • the pico BS 420 transmits the full context information of the MS 410 to the macro BS 430 (step 419).
  • step 415 of transmitting the user context release request may be omitted and, in this situation, step 419 of transmitting the full context information may also be omitted.
  • the context information is information associated with transmit resources that are in use for the MS 410, bearer setup and such, and is forwarded from a source BS to a target BS during a handover preparation procedure and such.
  • the context information includes measurement configuration that an MS uses in a source cell, information associated with radio resources that the MS uses in the source cell, such as Radio Bearer (RB) configuration information, Media Access Control (MAC) layer configuration information, physical layer related information and such, Cell - Radio Network Temporary Identifier (C-RNTI) that the MS uses in the source cell, security related information and such.
  • RB Radio Bearer
  • MAC Media Access Control
  • C-RNTI Cell - Radio Network Temporary Identifier
  • the pico BS 420 previously forwards the context information of the MS 410 to the macro BS 430 before handover is triggered.
  • the pico BS 420 transmits context update information to the macro BS 430 (step 421). That is, if the context information of the MS 410 changes during the course of data transmission/reception, or the signal intensity of the MS 410 decreases below the threshold, the pico BS 420 forwards the context information of the MS 410 to the macro BS 430 through a context update message.
  • changing of the context information means that measurement configuration used by the MS 410 in the pico BS 420 changes, new radio bearer connection is established, in-use radio bearer connection becomes extinct, or a C-RNTI changes and so forth.
  • the macro BS 430 can maintain the latest context information of the MS 410.
  • the MS 410 detects an RLF (step 423). In other words, the MS 410 detects that the connection with the pico BS 420 is lost. Accordingly, the MS 410 preferentially searches for the macro BS 430, i.e. the latest accessed macro cell. That is, the MS 410 preferentially performs a cell search process for a previous serving cell before handover to a current serving cell. As a result, the MS 410 discovers the macro BS 430 (step 425). In other words, the MS 410 detects a signal of the macro BS 430. Accordingly, the MS 410 performs RRC connection re-establishment for the macro BS 430 (step 427). At this time, the macro BS 430 can successfully achieve the RRC connection re-establishment because the macro BS 430 has the context information of the MS 410.
  • FIGURE 5 illustrates a detailed process of the RRC connection re-establishment.
  • the MS 410 transmits an RRC re-establishment request message to the macro BS 430 (step 451).
  • the RRC re-establishment request message includes identification information of an MS, information representing the cause of RRC re-establishment, and Physical Cell IDentifier (PCI) information of a reconnection target cell.
  • the RRC re-establishment request message informs that it intends to re-establish connection with the macro BS 430.
  • PCI Physical Cell IDentifier
  • the macro BS 430 receiving the RRC re-establishment request message identifies that a sender of the RRC re-establishment request message is the MS 410, identifies that the context information of the MS 410 has been stored, and performs a Message Authentication Code - Integrity (MAC-I) verification procedure (step 453). Because the macro BS 430 has kept the context information of the MS 410 through a context update procedure, the macro BS 430 determining that the context information has been stored transmits an RRC re-establishment message to the MS 410 (step 455).
  • MAC-I Message Authentication Code - Integrity
  • the macro BS 430 transmits a data forwarding request to a BS previously accessed by the MS 410 (i.e., the pico BS 420 that has previously provided the context update message) (step 459).
  • a data forwarding request i.e., the pico BS 420 that has previously provided the context update message
  • information on a wired bearer to perform data forwarding can be transmitted.
  • the pico BS 420 receiving the data forwarding request transmits SN state information of the MS 410 to the macro BS 430 (step 461), and the pico BS 420 forwards data for the MS 410 stored in a buffer to the macro BS 430 (step 463).
  • the SN state information represents a progress state of a sequence number for data in a PDCP layer, and is used for data encryption, integrity protection and such.
  • the MS 410 and the macro BS 430 restore connection through an RRC connection reconfiguration procedure (step 465) and transmits/receives a traffic with the macro BS 430 and the S-GW 450 (step 467).
  • embodiments of the present invention propose a way for the MS to keep the system information of the macro BS.
  • FIGURE 6 illustrates a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to a second type of embodiments of the present invention.
  • an MS 510 entering a cell of a pico BS 520 receives a handover command from a macro BS 530 (step 501).
  • the handover command includes a command instructing the MS 510 to store system information of the macro BS 530.
  • the handover command includes an indication associated with system information reuse.
  • the indication of the system information reuse is set to a value representing affirmation
  • the MS 510 stores the system information of the macro BS 530.
  • the MS 510 marks the cell for which the system information is stored.
  • a PCI and center frequency information of the macro BS 530 can be used as cell identification information. Accordingly, although the MS 510 does handover to the pico BS 520, the system information of the macro BS 530 is not discarded.
  • the macro BS 530 transmits SN state information of the MS 510 to the pico BS 520, i.e. a target BS of handover (step 503). Also, the MS 510 receiving the handover command transmits a handover confirm to the pico BS 520 (step 505). The pico BS 520 then transmits to the MME 540 a path switch request message informing that a serving cell of the MS 510 changes (step 507). In response, the MME 540 transmits to an S-GW 550 a user plane update request message (step 509), and the S-GW 550 re-establishes a downlink traffic path for the MS 510 and transmits a user plane update response message to the MME 540 (step 511).
  • the MME 540 then transmits a path switch response message to the pico BS 520 (step 513).
  • the pico BS 520 identifying the accomplishment of the path re-establishment then transmits to the macro BS 530 a user context release request for the MS 510 (step 515).
  • the MS 510 maintains the connection with the pico BS 520, and transmits/receives uplink/downlink traffic through the pico BS 520 and the S-GW 550 (step 517).
  • the MS 510 preferentially searches for the macro BS 530. If the macro BS 530 is found, it is desirable to transmit an RRC connection re-establishment request to the macro BS 530 as quickly as possible. To this end, the MS 510 has to camp on or connect to the macro BS 530 and acquire system information of the macro BS. To reduce a time taken until the MS 510 acquires the system information of the macro BS 530, the macro BS 530 forwards, if its own system information is changed, the changed system information to the MS 510 through the pico BS 520.
  • the macro BS 530 changes system information by a communication environment or system operator (step 519). So, the macro BS 530 forwards a system information update message including the changed system information to the MS 510 through the pico BS 520 (steps 521 and 523). However, if the system information of the macro BS 530 does not change, steps of 521 and 523 may not occur. If change takes place twice or more, steps of 521 and 523 can also be performed twice or more. At this time, the pico BS 520 transmits the system information update message to the MS 510 in a broadcast, multicast, or unicast.
  • the system information update message includes the system information of the macro BS 530, e.g., can include all information of a Master Information Block (MIB), a System Information Block 1 (SIB1), an SIB2 and so forth.
  • MIB Master Information Block
  • SIB1 System Information Block 1
  • SIB2 System Information Block 2
  • Table 1 Table 1 below.
  • the MS 510 then detects an RLF (step 525). In other words, the MS 510 detects that the connection with the pico BS 520 is lost. Accordingly, the MS 510 preferentially searches for the macro BS 530, i.e. the latest accessed macro cell. For example, the MS 510 preferentially performs a cell search process for a previous serving cell before handover to a current serving cell. As a result, the MS 510 discovers the macro BS 530 (step 527). That is, the MS 510 detects a signal of the macro BS 530.
  • the MS 510 discovering the macro BS 530 determines whether the system information stored in the MS 510 is the system information of the macro BS 530 (step 529). That is, the MS 510 determines whether identification information marked at system information storage is consistent with corresponding information of the macro BS 530. For example, when the system information is indexed to a PCI and center frequency information, if a PCI of the macro BS 530 and a center frequency are consistent with a PCI and a center frequency mapped with the stored system information, the MS 510 determines that it can reuse the stored system information for the macro BS 530.
  • the MS 510 uses random access related parameters included in the system information, in a random access process preceding an RRC connection re-establishment procedure. And the MS 510 performs the RRC connection re-establishment procedure with the macro BS 530 (step 531). If the system information stored in the MS 510 is not the system information of the macro BS 530, the MS 510 receives system information broadcasted from the macro BS 530, and then performs the RRC connection re-establishment procedure. At this time, to prevent the erroneous use of the stored system information, the MS 510 discards the stored system information if the RRC connection re-establishment procedure is completed. In other words, if a first RRC connection re-establishment procedure is completed, the stored system information is discarded although not used.
  • the MS can also restore connection with the macro cell by, instead of performing an RRC connection re-establishment procedure to the macro cell, reusing context information that has previously been used in a macro BS before handover to the pico cell.
  • the macro BS stores, without discarding, the context information that was previously used by the MS.
  • the MS also stores, though handing over to the pico cell, the context information that has previously been used in the macro BS, and then restores connection with the macro BS instead of going through a normal handover procedure.
  • the MS transmits a predefined control message for connection restoration, and restores connection with the macro BS by reusing context information that has previously been used in the macro BS. Accordingly, embodiments of the present invention propose a way for the MS to reconnect to the macro cell through a specific control message.
  • FIGURE 7 illustrates a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to a third type of embodiments of the present invention.
  • an MS 610 entering a cell of a pico BS 620 receives a handover command from a macro BS 630 (step 601).
  • the handover command includes backup configuration information for restoration of connection with the macro BS 630.
  • the backup configuration information can include a value of a specific timer representing a time duration for keeping context information with the macro BS 630.
  • the specific timer is called a ‘timer X’. That is, the macro BS 630 sets a value of the timer X, and transmits the handover command including the backup configuration information that includes the timer X.
  • the MS 610 receiving the handover command including the backup configuration information stores context information that was previously used with the macro BS 630, and the macro BS 630 also stores the context information of the MS 610 (step 603).
  • the context information is stored in the MS 610 and the macro BS 630 until the timer X expires. In other words, if the timer X expires, the MS 610 and the macro BS 630 delete the context information. After that, the MS 610 transmits a handover confirm to the pico BS 620 (step 605).
  • a handover procedure is completed among the pico BS 620, the macro BS 630, and the MS 610, and the MS 610 transmits/receives uplink/downlink traffic with the pico BS 620 (step 607).
  • the handover process can include a path switch and user plane update procedure of an MME and S-GW.
  • the MS 610 detects an RLF (step 609). In other words, the MS 610 detects that its connection with the pico BS 620 is lost. Accordingly, the MS 610 preferentially searches the macro BS 630, i.e. the latest accessed macro cell. For example, the MS 610 preferentially performs a cell search process for a previous serving cell before handover to a current serving cell. As a result, the MS 610 discovers the macro BS 630 (step 611). That is, the MS 610 detects a signal of the macro BS 630.
  • the MS 610 determines whether the timer X has expired. Here, it is assumed that the timer X has not expired and therefore, the MS 610 transmits a return indicator to the macro BS 630 so as to request connection restoration (step 613). At this time, if the context information of the MS 610 has changed after handover and the current context information is not consistent with the context information stored in step 603, the MS 610 includes information indicating the changed portion in the return indicator. Accordingly, a connection re-establishment procedure between the MS 610 and the macro BS 630 is performed, and then the MS 610 transmits/receives uplink/downlink traffic with the macro BS 630 (step 615).
  • FIGURE 7 When restoring connection with a macro cell without a normal handover procedure as shown in FIGURE 7, which security key the macro cell should use to perform a security procedure (i.e., data scrambling/descrambling and integrity protection) becomes ambiguous.
  • a source BS delivers and forwards a security key to a target BS, and the target BS executes the data scrambling/descrambling and integrity protection using the key forwarded from the source BS.
  • FIGURE 8 A scheme of delivering a security key when the normal handover procedure is performed is illustrated in FIGURE 8.
  • FIGURE 8 illustrates a scheme of security key delivery at normal handover in a heterogeneous wireless communication system according to an embodiment of the present invention.
  • a source BS 720 determines handover of an MS 710 (step 701), and delivers a security key (hereinafter, referred to as ‘KeNB*’) on an eNB to be provided to a target BS 730 (step 703).
  • KeNB* a security key
  • a KeNB* delivery scheme is different depending on whether a Next Hop (NH) and a Next hop Chaining Counter (NCC) are stored.
  • NH Next Hop
  • NCC Next hop Chaining Counter
  • the NH is a pseudo key provided by an MME 740, and the NH is not used as an actual key but instead a bit stream of the same size as that of a key used for delivering a new key.
  • the NCC is a counter variable representing a change of the NH.
  • the source BS 720 delivers the KeNB* using the NH, the NCC, a PCI of the target BS 730, and frequency information (e.g., Evolved Absolute Radio Frequency Channel Number ? Downlink (EARFCN-DL)) as input variables in a Key Delivery Function (KDF) according to a scheme ‘A 791’.
  • KDF Key Delivery Function
  • the source BS 720 delivers the KeNB* using a security key (hereinafter, referred to as ‘KeNB’) used by the source BS 720, a PCI of the target BS 730, and center frequency information (e.g., EARFCN-DL) as input variables in a KDF according to a scheme ‘B 792’.
  • KeNB security key
  • PCI of the target BS 730
  • center frequency information e.g., EARFCN-DL
  • the scheme ‘B 792’ is a scheme for the exceptional situation in which the NH and the NCC have not been stored.
  • the source BS 720 transmits a handover request message including the KeNB* and the NCC to the target BS 730 (step 705).
  • the target BS 730 uses the KeNB* as its own KeNB (step 707), and transmits a handover command message including the NCC to the MS 710 (step 709).
  • the MS 710 determines in which scheme the source BS 720 has delivered the KeNB* based on a value of the NCC, and delivers a KeNB* in the determined scheme (step 711).
  • the MS 710 delivers the KeNB* according to the scheme ‘A 791’, and if not the same, the MS 710 delivers the KeNB* according to the scheme ‘B 792’.
  • the MS 710 transmits a handover confirm message to the target BS 730 (step 713), and in response, the target BS 730 transmits a path switch request to the MME 740 (step 715), and the MME 740 transmits a path switch response including an NCC and an NH to the target BS 730 (step 717).
  • the target BS 730 stores the NCC and the NH (step 719).
  • a new security key to be used in the second cell is delivered by a BS of the first cell and is forwarded to a BS of the second cell. Additionally, the MS delivers a new security key through a scheme dependent on an increase or non-increase of an NCC included in a handover command message received from the BS of the second cell.
  • a security key cannot be delivered according to the procedure of FIGURE 8 because information on the security key is not exchanged among the first cell, the second cell, and the MS. In other words, in FIGURE 7, the MS 610 and the macro BS 630 cannot deliver a security key according to the procedure of FIGURE 8.
  • embodiments of the present invention propose a method for delivering a new security key to be used in a macro cell when an MS moves from a pico cell to the macro cell using a return indicator.
  • the macro BS knows a PCI of a target BS (i.e., the macro BS) and center frequency information among input values for delivering a new key.
  • a PCI of a target BS i.e., the macro BS
  • center frequency information among input values for delivering a new key.
  • the NH is provided by an MME and thus, in order for the macro BS to acquire the NH, a new signaling procedure between a macro BS and the MME should be defined.
  • the security key that has previously been used in the pico cell was delivered by the macro BS in a process where the MS performs a handover to a pico BS, the macro BS can know the security key without performing a new procedure.
  • the macro BS stores the security key that has previously been used in the pico BS, together with context information of the MS. Afterwards, if a return indicator is received from the MS, the macro BS delivers a new security key using a stored security key, its own PCI and center frequency information, and uses the delivered new security key. Accordingly, the same result is obtained as when the pico BS delivers and forwards a security key according to the scheme ‘B 792’.
  • FIGURE 9 illustrates a signal exchange considering security key delivery when an MS reconnects from a pico cell to a macro cell in a heterogeneous wireless communication system according to the third type of embodiments of the present invention.
  • an MS 810 entering a cell of a pico BS 820 receives a handover command from a macro BS 830 (step 801).
  • the handover command includes backup configuration information for restoration of connection with the macro BS 830.
  • the backup configuration information can include a value of a specific timer representing a time duration for keeping context information with the macro BS 830.
  • the specific timer is called a ‘timer X’. That is, the macro BS 830 sets a value of the timer X, and transmits the handover command including the backup configuration information including the timer X.
  • the MS 810 receiving the handover command including the backup configuration information stores context information that has previously been used with the macro BS 830 (step 803).
  • the MS 810 marks to which cell the stored context information corresponds. For example, the MS 810 indexes the stored context information to a PCI of a cell of the macro BS 830 and center frequency information. Or, the MS 810 indexes the context information to a Cell Global Identifier (CGI) of a macro cell.
  • CGI Cell Global Identifier
  • the CGI which is unique identification information given to each cell within a system of the same service provider is, for example, a size of ‘28’ bits and is broadcasted as system information of a cell.
  • the macro BS 830 stores context information of the MS 810 and a KeNB of the pico BS 820 (step 803).
  • the handover command of the macro BS 830 is generated by the macro BS 830.
  • the context information is stored in the MS 810 and the macro BS 830 until the timer X expires. In other words, when the timer X expires, the MS 810 and the macro BS 830 delete the context information.
  • the MS 810 transmits a handover confirm to the pico BS 820 (step 807).
  • a handover procedure is completed among the pico BS 820, the macro BS 830, and the MS 810, and the MS 810 transmits/receives uplink/downlink traffic with the pico BS 820 (step 809).
  • the handover procedure can include a path switch and user plane update procedure of an MME and S-GW.
  • the MS 810 detects an RLF (step 811). In other words, the MS 810 detects that its connection with the pico BS 820 is lost. Accordingly, the MS 810 preferentially searches for the macro BS 830, i.e. the latest accessed macro cell.
  • the MS 810 preferentially performs a cell search process for a previous serving cell before handover to a current serving cell.
  • the MS 810 discovers the macro BS 830 (step 813). That is, the MS 810 detects a signal of the macro BS 830, and determines that a channel quality is above a specific threshold.
  • the MS 810 determines whether it can reuse stored context information for a discovered cell (step 815).
  • the MS 810 determines whether the discovered cell, i.e. the macro BS 830, is a BS corresponding to the stored context information. Whether the context information corresponds to the macro BS 830 is determined based on the consistency of information indexing the stored context information (i.e., center frequency information and a PCI, or a CGI). Also, the MS 810 determines whether the timer X has expired. Although not illustrated in FIGURE 9, if the context information and the macro BS 830 do not correspond to each other or the timer X has expired, the MS 810 performs an RRC connection re-establishment process.
  • the MS 810 determines that it can reuse the stored context information, and regenerates a radio bearer with the macro BS 830 using the stored context information (step 817). That is, the MS 810 operates as if the MS 810 received an RRC connection reconfiguration message including the stored context information.
  • the MS 810 delivers a new security key (KeNB) to be used in the macro BS 830, using a security key that has previously been used in the pico BS 820 and a PCI of the macro BS 830 and center frequency information (step 819). That is, when the MS 810 performs a normal handover procedure, the MS 810 delivers the new security key in the same scheme as when an NCC does not increase.
  • KeNB new security key
  • the MS 810 After delivering the security key, the MS 810 transmits a return indicator to the macro BS 803 so as to request connection restoration (step 821). At this time, the MS 810 integrity-protects the return indicator using a new security key. That is, the MS 810 applies a predetermined integrity protection algorithm, a new security key, and other input value to the return indicator, generates a Message Authentication Code-Integrity (MAC-I), and transmits the MAC-I together with the return indicator.
  • MAC-I Message Authentication Code-Integrity
  • the macro BS 830 receiving the return indicator and the MAC-I identifies a C-RNTI of the MS 810, and detects that the MS 810 is an MS returned without a normal handover procedure. Additionally, the macro BS 830 identifies stored context information of the MS 810 and a security key that has previously been used by the MS 810 in the pico BS 820 and then delivers a new security key (KeNB) (step 823). That is, the macro BS 830 delivers the new security key using the security key that has previously been used by the MS 810 in the pico BS 820 and its own PCI and center frequency information. The macro BS 830 authenticates a MAC-I using the new security key (step 825). After that, the MS 810 transmits/receives uplink/downlink traffic with the macro BS 830 (step 827).
  • KeNB new security key
  • a situation of a radio bearer can change at the time of connection restoration. That is, an MS regenerates at least one radio bearer according to radio bearer setup information included in the context information.
  • the radio bearer setup information included in the context information may not be consistent with a current radio bearer situation.
  • the radio bearer ‘a’ corresponding to the service ‘a’ is no longer necessary when the MS re-establishes connection for a macro BS, and a new radio bearer for the service ‘c’ should be re-set.
  • FIGURE 10 illustrates a signal exchange considering a change of context information when an MS reconnects from a pico cell to a macro cell in a heterogeneous wireless communication system according to the third type of embodiments of the present invention.
  • an MS 910 entering a cell of a pico BS 920 receives a handover command from a macro BS 930 (step 901).
  • the handover command includes backup configuration information for restoration of connection with the macro BS 930.
  • the backup configuration information can include a value of a specific timer representing a time duration for keeping context information with the macro BS 930.
  • the specific timer is called a ‘timer X’. That is, the macro BS 930 sets a value of the timer X, and transmits the handover command that includes the backup configuration information including the timer X.
  • the MS 910 receiving the handover command including the backup configuration information stores context information that has previously been used with the macro BS 930, and the macro BS 930 stores the context information of the MS 910 (step 903).
  • the MS 910 marks to which cell the stored context information corresponds.
  • the MS 910 indexes the stored context information to a PCI of a cell of the macro BS 930 and center frequency information.
  • the MS 910 indexes the context information to a CGI of a macro cell.
  • the CGI which is unique identification information given to each cell within a system of the same service provider is, for example, a size of ‘28’ bits and is broadcasted as system information of a cell.
  • the context information is stored in the MS 910 and the macro BS 930 until the timer X expires. In other words, when the timer X expires, the MS 910 and the macro BS 930 delete the context information.
  • the MS 910 transmits a handover confirm to the pico BS 920 (step 905).
  • a handover procedure is completed among the pico BS 920, the macro BS 930, and the MS 910, and the MS 910 transmits/receives uplink/downlink traffic with the pico BS 920 (step 907).
  • the handover procedure can include a path switch and user plane update procedure of an MME and S-GW.
  • the MS 910 detects an RLF (step 909). In other words, the MS 910 detects that its connection with the pico BS 920 is lost. Accordingly, the MS 910 preferentially searches for the macro BS 930, i.e. the latest accessed macro cell.
  • the MS 910 preferentially performs a cell search process for a previous serving cell before handover to a current serving cell.
  • the MS 910 discovers the macro BS 930 (step 911). That is, the MS 910 detects a signal of the macro BS 930, and determines that a channel quality is above a specific threshold.
  • the MS 910 determines whether it can reuse stored context information for a discovered cell (step 913).
  • the MS 910 determines whether the discovered cell, i.e. the macro BS 930, is a BS corresponding to the stored context information. Whether the context information corresponds to the macro BS 930 is determined based on the consistency (or inconsistency) of information indexing the stored context information (i.e., center frequency information and a PCI, or a CGI). Also, the MS 910 determines whether the timer X has expired. Although not illustrated in FIGURE 10, if the context information and the macro BS 930 do not correspond to each other or the timer X has expired, the MS 910 performs an RRC connection re-establishment process.
  • the MS 910 determines that it can reuse the stored context information and regenerates a radio bearer with the macro BS 930 using the stored context information (step 915). That is, the MS 910 operates as if the MS 910 received an RRC connection reconfiguration message including the stored context information.
  • the MS 910 uses a C-RNTI included in the context information, and regenerates at least one radio bearer according to radio bearer setup information included in the context information.
  • the radio bearer is set up by service held by the MS 910.
  • the radio bearer setup information included in the context information may not be consistent with that of a current radio bearer situation. For example, if the MS 910 uses services ‘a’ and ‘b’ and sets radio bearers ‘a’ and ‘b’ before handover to the pico BS but stops the service ‘a’ and initiates a service ‘c’ after doing the handover to the pico BS, the radio bearer ‘a’ corresponding to the service ‘a’ is no longer necessary at a time the MS 910 re-establishes connection for the macro BS 930, and a new radio bearer for the service ‘c’ should be set.
  • the MS 910 stops a corresponding service until again generating the newly set radio bearer with the macro BS 930 (step 917).
  • the MS 910 transmits a return indicator to the macro BS 903 so as to request connection restoration (step 919).
  • the MS 910 transmits, together with the return indicator, information on a radio bearer no longer used at a current time point among radio bearers reflected in the stored context information.
  • the macro BS 930 receiving the return indicator restores at least one radio bearer with reference to the stored context information and the released radio bearer information and transmits a return completion message to the MS 910 (step 921).
  • the macro BS 930 transmits to the pico BS 920 a request for data forwarding for the MS 810 and context information that has previously been used by the MS 810 in the pico BS 920 (step 923).
  • the pico BS 920 forwards the context information of the MS 810 to the macro BS 930 (step 925), and the macro BS 930 determines whether the context information received from the pico BS 920 contains a radio bearer for a new service (i.e. a radio bearer not set through the restoration).
  • the macro BS 930 When the context information does not contain the radio bearer not set, the macro BS 930 generates a radio bearer for the new service through an RRC connection reconfiguration procedure with the MS 910 (step 927). Consequently, the MS 910 can resume the service stopped in step 917. After that, the MS 910 and the macro BS 930 transmit/receive uplink/downlink traffic (step 929).
  • FIGURE 11 illustrates a process of a pico BS in a heterogeneous wireless communication system according to the first type of embodiments of the present invention.
  • the pico BS identifies whether there is an MS doing handover from a macro cell to the pico BS.
  • the pico BS receives an MS handover request from a macro BS, determines that it can permit MS handover through admission control, transmits to the macro BS an ACKnowledge (ACK) for the MS handover request, and then identifies whether the MS accesses the pico BS.
  • ACK ACKnowledge
  • the pico BS proceeds to block 1003 and transmits a request for releasing context information of the MS to the macro BS. That is, because the MS accesses the pico BS successfully, the pico BS indicates that there is no need to keep context information of the MS.
  • the pico BS proceeds to block 1005 and transmits the full context information of the MS to the macro BS. That is, according to an embodiment of the present invention, the pico BS provides the full context information of the MS to the macro BS such that an RRC connection re-establishment process can succeed for a situation in which the MS reconnects to the macro BS without normal handover (i.e. in a situation where the MS should reconnect to the macro BS without a normal handover process).
  • Block 1005 occurs after the request for releasing the context information in block 1003. As such, if block 1003 is omitted, block 1005 can also be omitted.
  • the pico BS then proceeds to block 1007 and identifies whether the context information of the MS has changed.
  • the context information includes measurement configuration used by the MS, radio resource related information, in detail, bearer configuration information, Media Access Control (MAC) layer configuration information, physical layer related information and such, Cell - Radio Network Temporary Identifier (C-RNTI), security related information, and so forth.
  • the context information can change if a radio bearer is generated or becomes obsolete between the start and end of service.
  • the pico BS proceeds to block 1009 and transmits the changed context information to the macro BS. That is, the pico BS provides the changed context information to the macro BS such that the macro BS can keep the latest context information. After that, the pico BS returns to block 1007.
  • the pico BS when a signal intensity for the MS decreases below a threshold, the pico BS can transmit the context information of the MS to the macro BS. Also, after the connection with the MS fails without handover, if data forwarding is requested from the macro BS, the pico BS forwards SN state information of the MS and data to be transmitted to the MS, to the macro BS.
  • FIGURE 12 illustrates a process of a macro BS in a heterogeneous wireless communication system according to the first type of embodiments of the present invention.
  • the macro BS identifies whether context information of an MS doing handover to a pico cell of a pico BS is received from the pico BS. That is, the macro BS commands the MS to do handover to the pico BS according to a measurement report of the MS. After the MS completes the handover to the pico BS, the macro BS identifies whether the context information of the MS is received from the pico BS.
  • the macro BS proceeds to block 1103 and stores the received context information. That is, the macro BS stores the context information of the MS such that an RRC connection re-establishment process can succeed in a situation where the MS should reconnect to the macro BS without a normal handover process.
  • Blocks 1101 and 1103 are performed on the premise that the context information of the MS has been discarded after the handover of the MS. Thus, blocks 1101 and 1103 may not be performed if previous context information is not discarded.
  • the macro BS proceeds to block 1105 and identifies whether changed context information is received from the pico BS.
  • the context information can change in a process in which the MS performs communication with the pico BS after doing handover to the pico cell.
  • the pico BS provides the changed context information to the macro BS such that the macro BS can keep the latest context information. That is, the macro BS identifies whether context information received in block 1105 is different compared to the context information received in block 1101.
  • the macro BS proceeds to block 1107 and updates stored context information using the changed context information. After that, the macro BS returns to block 1105.
  • the macro BS proceeds to block 1109 and identifies whether an RRC connection re-establishment request is received from the MS. That is, the macro BS identifies whether an RRC connection re-establishment request message is received from the MS.
  • a random access process can be first carried out before the RRC connection re-establishment request message is received.
  • the macro BS proceeds to block 1111 and determines whether the MS transmitting the RRC connection re-establishment request is an MS corresponding to the stored context information, based on the sender’s identification information included in the RRC connection re-establishment request message. In other words, the macro BS determines whether the RRC connection re-establishment request is received from the MS corresponding to the stored context information.
  • the macro BS proceeds to block 1113 and performs an RRC connection re-establishment process according to the request of the MS. That is, because the macro BS has the context information of the MS, the macro BS can perform the RRC connection re-establishment process.
  • the macro BS receives an RRC re-establishment request message from the MS, determines that the context information of the MS has been stored, performs a MAC-I authentication process for the MS, transmits an RRC re-establishment message, and transmits a request for data forwarding to the pico BS.
  • FIGURE 13 illustrates a process of a macro BS in a heterogeneous wireless communication system according to the second type of embodiments of the present invention.
  • the macro BS transmits an instruction for storing system information of the macro BS to an MS doing handover to a pico cell. That is, the macro BS determines handover to a pico BS according to a measurement report of the MS, performs a process for handover and then, when transmitting a handover command to the MS, transmits to the MS the instruction for storing the system information of the macro BS together with the handover command.
  • the macro BS proceeds to block 1203 and identifies whether the system information of the macro BS changes.
  • the system information which is setup information necessary for accessing the macro BS, can change according to an operation state or setup state of the macro BS.
  • the macro BS proceeds to block 1205 and transmits the changed system information to the MS through the pico BS. That is, the macro BS transmits to the pico BS a system information update message including the changed system information, and then the pico BS forwards the system information message to the MS in a broadcast, multicast or unicast scheme.
  • the system information update message can be configured according to Table 1 above.
  • the macro BS proceeds to block 1207 and identifies whether an RRC connection re-establishment request is received from the MS. That is, the macro BS identifies whether the RRC connection re-establishment request message is received from the MS.
  • a random access process can be carried out before the RRC connection re-establishment request message is received.
  • the macro BS proceeds to block 1209 and performs an RRC connection re-establishment process. At this time, the RRC connection re-establishment process can fail if the macro BS has not stored the context information of the MS.
  • FIGURE 14 illustrates a process of an MS in a heterogeneous wireless communication system according to the second type of embodiments of the present invention.
  • the MS identifies whether it receives an instruction for storing system information from a macro BS at handover from a macro cell to a pico cell. That is, the MS identifies whether it has received the instruction for storing the system information together with a handover command received from the macro BS.
  • the MS proceeds to block 1303 and stores the system information of the macro BS.
  • the system information which is setup information necessary for accessing the macro BS, represents information received through an MIB, an SIB and such.
  • the system information includes at least one of the fields of Table 2 above.
  • the MS marks which cell to which the stored system information corresponds.
  • the MS can use a PCI of the macro BS and center frequency information as cell identification information.
  • the MS proceeds to block 1305 and identifies whether changed system information is received from the macro BS. That is, when the system information changes, the macro BS transmits a system information update message including the changed system information to the MS through the pico BS. At this time, the system information update message is received from the pico BS in a broadcast, multicast or unicast scheme.
  • the system information update message can be configured according to Table 1 above.
  • the MS proceeds to block 1307 and updates stored system information using the changed system information. That is, the MS maintains the system information of the macro BS in the latest state.
  • the MS proceeds to block 1309 and determines whether an RLF takes place in the pico cell. In other words, the MS detects that its connection with the pico BS is not kept. For example, the MS detects the RLF if a channel quality with the pico BS is deteriorated below a threshold or a synchronization signal of the pico BS cannot be detected.
  • the MS proceeds to block 1311 and preferentially performs a cell search process for the macro BS.
  • the MS determines whether a signal of the macro BS, which is a BS that has been previously accessed before the pico BS, is received. For example, the MS attempts to detect a synchronization signal of the macro BS and such.
  • the MS proceeds to block 1313 and determines whether it discovers the macro BS. That is, the MS detects a signal of the macro BS, and determines whether it is in a state of being capable of performing communication with the macro BS. For example, whether it is in a state of being capable of performing communication with the macro BS is determined through a channel quality, synchronization signal detection (or non-detection), system information decoding possibility (or impossibility), and so forth.
  • the MS proceeds to block 1315 and attempts RRC connection re-establishment with the macro BS using the stored system information of the macro BS. That is, the MS performs a random access process using random access related parameters included in the system information and then transmits an RRC connection re-establishment request to the macro BS.
  • FIGURE 15 illustrates a process of a macro BS in a heterogeneous wireless communication system according to the third type of embodiments of the present invention.
  • the macro BS transmits an instruction for storing context information of an MS doing handover to a pico cell, to the MS, and forwards a timer value to the MS.
  • the timer value indicates a time for storing of the context information. That is, the macro BS determines handover to a pico BS according to a measurement report of the MS, performs a process for handover, and then, when transmitting a handover command to the MS, the macro BS transmits to the MS the instruction for storing, together with the handover command, the context information that has previously been used when the MS accesses the macro BS.
  • the macro BS proceeds to block 1403 and stores the context information of the MS. That is, the macro BS transmits to the MS the instruction for storing the context information of the MS and also stores the context information of the MS. Accordingly, the context information is stored in the MS and the macro BS until the timer expires.
  • the macro BS After storing the context information of the MS, the macro BS proceeds to block 1405 and stores a security key provided to the pico BS. If normal handover is carried out, a serving BS delivers a security key to be used by a target BS and provides the security key to the target BS. Thus, the macro BS delivers the security key to be used by the pico BS, for the MS. At this time, if the security key is forwarded to the pico BS, the security key becomes information unnecessary for the macro BS. However, according to an embodiment of the present invention, the macro BS stores a security key provided to the pico BS for a situation where the MS reconnects to the macro BS without the normal handover.
  • the macro BS After storing the security key, the macro BS proceeds to block 1407 and identifies whether a recovery request message is received from the MS before the expiration of the timer.
  • the recovery request message is a control message for the MS to make a request for resuming connection with the macro BS without the normal handover or an RRC connection re-establishment process.
  • the recovery request message includes at least one of a return indicator for requesting connection resume, a MAC-I for security authentication, and radio bearer information that becomes obsolete after the handover to the pico BS. If the timer expires without receiving the recovery request message, the macro BS terminates the process according to the embodiment of the present invention.
  • the macro BS proceeds to block 1409 and determines whether it is possible to reuse the context information stored in block 1403. That is, the macro BS determines whether the MS transmitting the recovery request message is an MS that corresponds to the stored context information. For example, the macro BS compares sender’s identification information included in the recovery request message with MS’s identification information included in the stored context information.
  • the macro BS proceeds to block 1411 and delivers a new security key for the MS. That is, the macro BS delivers a new security key using the security key that has previously been used by the MS in the pico BS and its own PCI and center frequency information.
  • the macro BS can authenticate a MAC-I included in the recovery request message using the new security key.
  • the macro BS proceeds to block 1413 and recovers at least one radio bearer with the MS according to the stored context information.
  • the macro BS restores only a radio bearer with the exception of the obsolete radio bearer.
  • the macro BS notifies the MS of connection return completion.
  • the macro BS After recovering the at least one radio bearer in block 1413, the macro BS proceeds to block 1415 and transmits a request for context information of an MS to the pico BS and acquires the context information from the pico BS. That is, because the context information of the MS can change after being stored in block 1403, the macro BS transmits the context information request to the pico BS in order to acquire the latest context information.
  • the macro BS After acquiring the context information from the pico BS in block 1415, the macro BS proceeds to block 1417 and determines whether information on service added to the latest context information exists. In other words, the macro BS determines whether there is information not included in the stored context information of block 1403, among information on service included in the latest context information. That is, the macro BS determines whether a radio bearer generated after handover to the pico cell exists using the latest context information and, accordingly, whether a radio bearer to be additionally generated exists.
  • the macro BS proceeds to block 1419 and generates a radio bearer for the added service.
  • the macro BS then transmits/receives traffic with the MS.
  • FIGURE 16 illustrates a process of an MS in a heterogeneous wireless communication system according to the third type of embodiments of the present invention.
  • the MS identifies whether a context information storage instruction and a timer value are received from a macro BS during a handover from a macro cell to a pico cell.
  • the timer value indicates a time to maintain the storing of the context information. That is, the MS determines whether it has received an instruction for storing the context information that has previously been used when the MS accesses the macro BS, together with a handover command received from the macro BS.
  • the MS proceeds to block 1503 and stores context information that has previously been used during an access to the macro BS.
  • the MS marks which cell to which the stored context information corresponds. For example, the MS indexes the stored context information to a PCI of the macro BS and center frequency information. Alternatively, the MS indexes the stored context information to a CGI of a macro cell.
  • the MS proceeds to block 1505 and determines whether an RLF has occurred in the pico cell. In other words, the MS detects whether its connection with the pico BS is lost. For example, the MS detects the RLF when a channel quality with the pico BS is deteriorated below a threshold or a synchronization signal of the pico BS cannot be detected.
  • the MS proceeds to block 1507 and preferentially performs a cell search process for the macro BS.
  • the MS determines whether a signal of the macro BS (i.e. a BS that has previously been accessed before the pico BS) is received. For example, the MS attempts to detect a synchronization signal of the macro BS and such.
  • the MS proceeds to block 1509 and identifies whether it has discovered the macro BS. That is, the MS detects a signal of the macro BS, and determines whether it is in a state of being capable of performing communication with the macro BS. For example, whether the MS can perform communication with the macro BS is determined through a channel quality, synchronization signal detection (or non-detection), system information decoding possibility (or impossibility), and so forth. If it fails to discover the macro BS, the MS terminates the process according to an embodiment of the present invention.
  • the MS proceeds to block 1511 and determines whether the stored context information can be reused. That is, the MS determines whether the macro BS is a BS corresponding to the stored context information. Whether the context information corresponds to the macro BS is determined based on the consistency (or inconsistency) of information indexing the stored indexing information (i.e., center frequency information and a PCI, or a CGI). Also, the MS determines whether the timer X has expired. If the MS cannot reuse the stored context information in block 1511, the MS terminates the process according to the embodiment of the present invention.
  • the MS proceeds to block 1513 and delivers a security key for the macro BS.
  • the MS delivers a new security key to be used in the macro BS by using a security key that has previously been used in the pico BS and a PCI of the macro BS and center frequency information. That is, when the MS performs a normal handover procedure, the MS delivers the new security key in the same scheme as when an NCC does not increase.
  • the MS proceeds to block 1515 and determines whether a radio bearer added after handover to the pico cell exists. That is, the MS determines whether the added radio bearer exists by newly generating service after the handover to the pico cell.
  • the existence (or non-existence) of the added radio bearer is determined based on whether any information on service included in the latest context information is not included in the stored context information of block 1503.
  • the MS proceeds to block 1517 and regenerates at least one radio bearer that has previously been used with the macro BS according to the context information stored in block 1503. At this time, if a radio bearer that is obsolete after the handover to the pico cell exists, the MS regenerates only a radio bearer with the exception of the obsolete radio bearer.
  • the MS After regenerating the at least one radio bearer in block 1517, the MS proceeds to block 1519 and transmits a recovery request message to the macro BS.
  • the recovery request message is a control message for requesting the MS to resume connection with the macro BS without normal handover or an RRC connection re-establishment process.
  • the recovery request message includes at least one of a return indicator for requesting connection resume, a MAC-I for security authentication, and radio bearer information that is obsolete after handover to a pico BS. Accordingly, the at least one radio bearer is restored in the macro BS, and the MS performs communication with the macro BS.
  • the MS proceeds to block 1521 and temporarily stops service provided through the added radio bearer. Because the macro BS cannot know information on the radio bearer added in the pico cell, the MS cannot be provided with the service through the added radio bearer until the same radio bearer as the added radio bearer is newly generated.
  • the MS proceeds to block 1523 and regenerates at least one radio bearer that has previously been used with the macro BS according to the context information stored in block 1503. At this time, if a radio bearer that is obsolete after handover to the pico cell exists, the MS regenerates only a radio bearer with the exception of the extinct radio bearer.
  • the MS After regenerating the at least one radio bearer in block 1523, the MS proceeds to block 1525 and transmits a recovery request message to the macro BS.
  • the recovery request message is a control message for requesting the MS to resume connection with the macro BS without normal handover or an RRC connection re-establishment process.
  • the recovery request message includes at least one of a return indicator for requesting connection resume, a MAC-I for security authentication, and radio bearer information that is obsolete after handover to a pico BS.
  • the MS After that, in block 1527, the MS generates a radio bearer for the service stopped in block 1521. Accordingly, all radio bearers that have previously been used in the pico cell between the macro BS and the MS are recovered, and the MS performs communication with the macro BS.
  • FIGURE 17 illustrates an MS in a heterogeneous wireless communication system according to an embodiment of the present invention.
  • the MS includes a Radio Frequency (RF) processor 1602, a modem 1604, a storage unit 1606, and a controller 1608.
  • RF Radio Frequency
  • the RF processor 1602 performs a function for transmitting/receiving a signal through a wireless channel, such as signal band conversion, amplification, and so forth. That is, the RF processor 1602 up converts a baseband signal provided from the modem 1604 into an RF band signal and transmits the RF band signal through an antenna, and down converts an RF band signal received through the antenna into a baseband signal.
  • the modem 1604 performs a function of conversion between a baseband signal and a bit stream according to a physical layer standard of a system. For example, during data transmission, the modem 1604 generates complex symbols by encoding and modulating a transmit bit stream, maps the complex symbols to subcarriers, and configures Orthogonal Frequency Division Multiplexing (OFDM) symbols through Inverse Fast Fourier Transform (IFFT) operation and Cyclic Prefix (CP) insertion. Also, during data reception, the modem 1604 divides a baseband signal provided from the RF processor 1602 in an OFDM symbol unit, restores signals mapped to subcarriers through Fast Fourier Transform (FFT) operation, and restores a reception bit stream through demodulation and decoding. Also, the modem 1604 measures a channel quality using a receive signal, and detects a physical signal such as a synchronization signal and such.
  • OFDM Orthogonal Frequency Division Multiplexing
  • IFFT Inverse Fast Fourier Transform
  • the storage unit 1606 stores a program necessary for an operation of the MS, setup information, temporary data, and such.
  • the setup information includes system information of a BS, context information of the MS, authentication key information, and so forth.
  • the controller 1608 controls general functions of the MS. For example, the controller 1608 generates a data packet and provides the data packet to the modem 1604, and analyzes and processes a data packet provided from the modem 1604. Also, the controller 1608 interprets a control message received through the modem 1604, performs operation corresponding to the control message, processing and such, and generates a control message to be transmitted to a BS. Also, the controller 1608 determines a channel situation through channel quality information, a decoding success rate, a physical signal detection result, and such, which are provided from the modem 1604.
  • the controller 1608 controls a function for reconnecting to a macro BS when an RLF occurs in a pico cell.
  • a function of the controller 1608 for reconnecting to the macro BS is described below.
  • the controller 1608 operates as follows to reconnect to the macro BS when an RLF takes place in the pico cell.
  • the controller 1608 determines that it has received an instruction for storing system information from a macro BS during handover from a macro cell to a pico cell, and stores the system information in the storage unit 1606 such that the system information of the macro BS is not discarded after handover.
  • the controller 1608 which cell to which the stored system information corresponds. For example, a PCI of the macro BS and center frequency information can be used as cell identification information. After that, if changed system information is received from a pico BS, i.e.
  • the controller 1608 updates the system information stored in the storage unit 1606 using the changed system information. After that, if an RLF takes place in the pico cell, the controller 1608 preferentially performs a cell search process for the macro BS through the modem 1604, and as a result, if it discovers the macro BS, the controller 1608 attempts connection re-establishment with the macro BS using the system information of the macro BS stored in the controller 1606. That is, the controller 1608 performs a random access process using random access related parameters included in the system information and then transmits a request for RRC connection re-establishment to the macro BS.
  • the controller 1608 operates as follows to reconnect to the macro BS when an RLF takes place in the pico cell.
  • the controller 1608 identifies that a context information storage instruction and a timer value are received from a macro BS at handover from a macro cell to a pico cell and stores, in the storage unit 1606, context information that has previously been used during an access to the macro BS.
  • the controller 1608 marks which cell to which the stored context information corresponds.
  • the context information is indexed to a PCI of a cell of the macro BS and center frequency information or is indexed to a CGI of a macro cell.
  • the controller 1608 preferentially performs a cell search process for the macro BS through the modem 1604, and as a result, if it discovers the macro BS, the controller 1608 determines whether the discovered macro BS is a BS corresponding to the stored context information using the information indexing the context information stored in the storage unit 1606. If it is possible to reuse the stored context information, the controller 1608 delivers a new security key to be used in the macro BS using a security key that has previously been used in the pico BS and the a PCI of the macro BS and center frequency information, and regenerates at least one radio bearer that has previously been used with the macro BS according to the context information stored in the storage unit 1606.
  • the controller 1608 regenerates only a radio bearer with the exception of the obsolete radio bearer. After generating a recovery request message, the controller 1608 transmits the recovery request message to the macro BS through the modem 1604 and the RF processor 1602. However, when a radio bearer newly added after handover to the pico cell exists, the controller 1608 temporarily stops a service provided through the added radio bearer, and after transmitting the recovery request message, the controller 1608 generates a radio bearer for the stopped service with the macro BS.
  • FIGURE 18 is a block diagram of a BS in a heterogeneous wireless communication system according to an embodiment of the present invention.
  • the construction of FIGURE 18 may be applicable to a pico BS or a macro BS.
  • FIGURE 18FIGURE 17 includes an RF processor 1702, a modem 1704, a storage unit 1706, a backhaul communication unit 1708, and a controller 1710.
  • the RF processor 1702 performs a function for transmitting/receiving a signal through a wireless channel, such as signal band conversion, amplification and such. That is, the RF processor 1702 up converts a baseband signal provided from the modem 1704 into an RF band signal and transmits the RF band signal through an antenna, and down converts an RF band signal received through the antenna into a baseband signal.
  • the modem 1704 performs a function of conversion between a baseband signal and a bit stream according to a physical layer standard of a system. For example, during data transmission, the modem 1704 generates complex symbols by encoding and modulating a transmit bit stream, maps the complex symbols to subcarriers, and configures OFDM symbols through IFFT operation and CP insertion. Also, during data reception, the modem 1704 divides a baseband signal provided from the RF processor 1702 in an OFDM symbol unit, restores signals mapped to subcarriers through FFT operation, and restores a reception bit stream through demodulation and decoding. Also, the modem 1704 measures a channel quality using a receive signal, and detects a physical signal such as a synchronization signal and such.
  • the storage unit 1706 stores a program for operating the BS, setup information, temporary data and such.
  • the setup information includes system information of a BS, context information of the BS, authentication key information and so forth.
  • the backhaul communication unit 1708 provides an interface for performing communication with other BS through a backhaul network.
  • the controller 1710 controls general functions of the BS. For example, the controller 1710 generates a data packet and provides the data packet to the modem 1704, and analyzes and processes a data packet provided from the modem 1704. Also, the controller 1710 interprets a control message received through the modem 1704, performs operation corresponding to the control message, processing and such, and generates a control message to be transmitted to an MS. Also, the controller 1710 determines a channel situation through channel quality information, a decoding success rate, a physical signal detection result, and such, which are provided from the modem 1704.
  • the controller 1710 controls a function for supporting an MS to reconnect to a macro BS when the MS suffers an RLF in a pico cell.
  • a function of the controller 1710 for supporting the MS to reconnect to the macro BS is described below.
  • the controller 1710 When the BS is a pico BS according to the first type of embodiments of the present invention, the controller 1710 operates as follows. If an MS performs handover from a macro cell to the pico BS, the controller 1710 transmits a request for releasing context information of the MS to the macro BS and then transmits the full context information of the MS to the macro BS. However, the transmission of the full context information is an operation that follows the request for releasing the context information, and if the release request is not performed, the operation of transmitting the full context information may be omitted. After that, if the context information of the MS is changed, the controller 1710 transmits the changed context information to the macro BS.
  • the controller 1710 When the BS is a macro BS according to the first type of embodiments of the present invention, the controller 1710 operates as follows. After an MS does handover to a pico BS, if context information of the MS is received from the pico BS, the controller 1710 stores the context information in the storage unit 1706. An operation of receiving and storing the context information is carried out on the premise that the context information of the MS has been discarded after the handover of the MS. Thus, if the previous context information is not discarded, an operation of receiving and storing the context information may be omitted. After that, if the changed context information of the MS is received, the controller 1710 updates context information stored in the storage unit 1706 by using the changed context information.
  • the controller 1710 determines whether the MS transmitting the RRC connection re-establishment request is an MS corresponding to the stored context information using sender’s identification information included in the RRC connection re-establishment request message. If the MS transmitting the RRC connection re-establishment request is the MS corresponding to the stored context information, the controller 1710 performs an RRC connection re-establishment process according to the request of the MS. At this time, because the context information of the MS has been stored in the storage unit 1706, the RRC connection re-establishment procedure can be performed successfully.
  • the controller 1710 When the BS is a macro BS according to the second type of embodiments of the present invention, the controller 1710 operates as follows. The controller 1710 transmits an instruction for storing system information of the macro BS to an MS doing handover to a pico cell. After that, if the system information of the macro BS is changed, the controller 1710 transmits a system information update message including the changed system information to the pico BS through the backhaul communication unit 1708. Accordingly, the changed system information is forwarded to the MS via the pico BS. Also, if an RRC connection re-establishment request is received from the MS, the controller 1710 performs an RRC connection re-establishment procedure. At this time, if the context information of the MS has not been stored in the storage unit 1706, the RRC connection re-establishment procedure can fail.
  • the controller 1710 When the BS is a macro BS according to the third type of embodiments of the present invention, the controller 1710 operates as follows. The controller 1710 transmits to the MS an instruction for storing context information of an MS doing handover to a pico cell, and forwards a timer value to the MS. And, the controller 1710 stores the context information of the MS, delivers a security key to be provided to a pico BS, and stores the security key in the storage unit 1706. After that, if a recovery request message is received from the MS before the timer expires, the controller 1710 determines whether it is possible to reuse the context information stored in the storage unit 1706. If it is possible to reuse the stored context information, the controller 1710 delivers a new security key for the MS.
  • the controller 1710 delivers a new security key using a security key that has previously been used by the MS in the pico BS and its own PCI and center frequency information. After that, the controller 1710 recovers at least one radio bearer with the MS according to context information stored in the storage unit 1706, and notifies the MS of connection return completion. At this time, when obsolete radio bearer information is included in the recovery request message, the controller 1710 recovers only a radio bearer with the exception of the obsolete radio bearer. After recovering the at least one radio bearer, the controller 1710 transmits a request for context information of an MS to the pico BS through the backhaul communication unit 1708, and acquires the context information from the pico BS. Next, if information on service added to the latest context information acquired from the pico BS exists, the controller 1710 generates a radio bearer for the added service.
  • an MS can minimize a service interruption time by reconnecting to a macro cell quickly when the MS suffers an RLF after handover to a pico cell in a heterogeneous wireless communication system.

Abstract

An apparatus and method in a heterogeneous wireless communication system reconnect a Mobile Station (MS) to a previously connected cell upon occurrence of a Radio Link Failure (RLF) in a current cell when a portion of a coverage of the second cell is included in a coverage of the first cell. A Mobile Station (MS) stores system information of a first Base Station (BS) of a first cell when performing handover from the first cell to a second cell. When changed system information of the first BS is received from a second BS of the second cell, the MS updates the stored system information using the changed system information. And when detecting that a connection with the second cell is lost prior to a handover from the second cell, the MS performs reconnection to the first BS using the stored system information.

Description

APPARATUS AND METHOD FOR SUPPORTING MOBILITY IN A HETEROGENEOUS WIRELESS COMMUNICATION SYSTEM
The present invention relates to a wireless communication system. More particularly, the present invention relates to an apparatus and method for supporting mobility in a heterogeneous wireless communication system.
In wireless communication systems, the recent trend is that a demand for high-speed data services continuously increases from the traffic perspective, and data services are provided mainly in a specific small area from the coverage perspective. Accordingly, developers and service providers of wireless communication systems have concerns regarding the small-size cells such as a pico cell and a hot zone.
Generally, a pico cell has the following characteristics. The pico cell has a smaller coverage than a macro cell and may overlap with the macro cell. Also, the pico cell operates in the same or a different frequency from the macro cell, and uses a low transmit power compared to a macro BS. In some situations, the pico cell can be accessed only by some licensed users or can be accessed by all users.
In recent years, the standards group, i.e. the Third Generation Partnership Project Radio Access Network Working Group 1 (3GPP RAN WG1), is considering heterogeneous networks. A heterogeneous network refers to a cellular deployment of a form in which Base Stations (BSs) using a low transmit power are overlapped with each other within the coverage of a macro BS. That is, cells of different sizes are mixed or overlapped with each other. However, BSs managing the respective overlapped cells make use of the same wireless technology. A BS using less transmit output in the heterogeneous network can be a micro BS, a Remote Radio Head (RRH), a pico enhanced Node B (eNB), a home eNB, a femto BS, a relay node and the like. For example, the heterogeneous network can be constructed according to FIGURE 1.
FIGURE 1 illustrates a heterogeneous wireless communication system according to the conventional art. Referring to FIGURE 1, a plurality of pico cells 110-1 and 110-2, a plurality of femto cells 120-1 to 120-3, and a plurality of relay nodes 130-1 and 130-2 are overlapped within a macro cell 100, and each cell provides service to Mobile Stations (MSs) located within its own coverage. At this time, the MSs located in the coverage of the plurality of pico cells 110-1 and 110-2, the plurality of femto cells 120-1 to 120-3, and the plurality of relay nodes 130-1 and 130-2 are also located in the coverage of the macro cell 100; however, the MSs have preferential access to a micro cell with an excellent channel state rather than the macro cell 100. That is, if the MS accessing the macro cell 100 enters the coverage of the micro cell, the MS performs handover to the micro cell from the macro cell 100.
When an MS moves into a macro cell, a situation of FIGURE 2 may occur. FIGURE 2 illustrates an example of a movement path of an MS in a heterogeneous wireless communication system according to the conventional art. In FIGURE 2, an MS 230 moves while connecting with a macro BS 200 within a cell of the macro BS 200. According to the movement of the MS 230, the MS 230 passes a cell edge portion of a pico BS 210. So, the MS 230 that has access to the macro BS 200 during a time (t1) 251 is located within a cell of the pico BS 210 during a time (t2) 252, and performs handover to the pico BS 210. Then, the MS 230 leaves the cell of the pico BS 210.
When leaving the cell of the pico BS 210, the MS 230 should again perform handover to the macro BS 200 to maintain seamless service. At this time, if the MS 230 is moving quickly, the time (t2) 252 when the MS 230 stays in the cell of the pico BS 210 would be very short. As such, it fails to ensure enough time to perform a handover, so a Radio Link Failure (RLF) may take place before the handover to the macro BS 200 is completed, causing data loss, service interruption and such. Particularly, in a real-time service such as Voice over Internet Protocol (VoIP), service interruption felt by a user may be critical. Furthermore, during handover from the macro BS 200 to the pico BS 210, the macro BS 200 discards context information of the MS 230. As such, attempts by the MS 230 to reconnect to the macro BS 200 will take a long time.
As described above, in an environment where a macro cell and a micro cell are overlapped, a situation for re-handover to the macro cell can occur. But, as an MS moves quickly, it is impossible to ensure enough time to perform handover. Furthermore, it is also difficult to reconnect to a macro BS. Thus, there is a need to propose an alternative for minimizing service interruption by quickly reconnecting to the macro BS in the above situation.
To address the above-discussed deficiencies of the prior art, it is a primary aspect of the present invention to provide an apparatus and method for minimizing service interruption when moving from a pico cell to a macro cell in a wireless communication system.
Another aspect of the present invention is to provide an apparatus and method for reducing a time taken to do re-handover to a macro cell in a wireless communication system.
Another aspect of the present invention is to provide an apparatus and method for an MS suffering a Radio Link Failure (RLF) in a pico cell to establish connection to a macro cell in a wireless communication system.
The above aspects are achieved by providing an apparatus and method for supporting mobility in a heterogeneous wireless communication system.
According to one aspect of the present invention, an operation method of a Mobile Station (MS) in a wireless communication system is provided. The method includes storing system information of a first Base Station (BS) of a first cell when performing handover from the first cell to a second cell. The method also includes detecting that a connection with the second cell is lost prior to a handover from the second cell. Reconnection to the first BS is performed using the stored system information. During this operation of the method, a portion of a coverage of the second cell overlaps a coverage of the first cell.
According to another aspect of the present invention, an operation method of a Base Station (BS) of a first cell in a wireless communication system is provided. The method includes transmitting a request for a path switch for a Mobile Station (MS) to an upper node when the MS performs handover from a second cell to the first cell. When context information of the MS is changed, the changed context information is transmitted to a second BS of the second cell. A portion of a coverage of the first cell is included in a coverage of the second cell.
According to another aspect of the present invention, an operation method of a Base Station (BS) of a first cell in a wireless communication system is provided. The method includes, after a Mobile Station (MS) performs handover from the first cell to a second cell, receiving changed context information of the MS from a second BS of the second cell. Context information of the MS is updated using the changed context information. A coverage of a second cell is included in a coverage of the first cell.
According to another aspect of the present invention, an apparatus for a Mobile Station (MS) in a wireless communication system is provided. The apparatus includes a storage unit and a controller. The storage unit stores system information of a first Base Station (BS) of a first cell when the MS is performing handover from the first cell to a second cell. The controller detects that a connection with the second cell is lost prior to a handover from the second cell and performs reconnection to the first BS using the stored system information. A portion of a coverage of the second cell is included in a coverage of the first cell.
According to another aspect of the present invention, an apparatus of a Base Station (BS) of a first cell in a wireless communication system is provided. The apparatus includes a controller and a backhaul communication unit. The controller transmits a request for a path switch for a Mobile Station (MS) to an upper node when an MS performs handover from a second cell to the first cell. The backhaul communication unit transmits the changed context information to a second BS of the second cell when context information of the MS is changed. A portion of a coverage of the first cell is included in a coverage of the second cell.
According to yet another aspect of the present invention, an apparatus for a Base Station (BS) of a first cell in a wireless communication system is provided. The apparatus includes a backhaul communication unit and a controller. The backhaul communication unit receives changed context information of a Mobile Station (MS) from a second BS of a second cell after the MS performs handover from the first cell to the second cell. The controller updates context information of the MS using the changed context information. A portion of a coverage of the second cell is included in a coverage of the first cell.
Before undertaking the DETAILED DESCRIPTION OF THE INVENTION below, it may be advantageous to set forth definitions of certain words and phrases used throughout this patent document: the terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation; the term “or,” is inclusive, meaning and/or; the phrases “associated with” and “associated therewith,” as well as derivatives thereof, may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like; and the term “controller” means any device, system or part thereof that controls at least one operation, such a device may be implemented in hardware, firmware or software, or some combination of at least two of the same. It should be noted that the functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. Definitions for certain words and phrases are provided throughout this patent document, those of ordinary skill in the art should understand that in many, if not most instances, such definitions apply to prior, as well as future uses of such defined words and phrases.
For a more complete understanding of the present disclosure and its advantages, reference is now made to the following description taken in conjunction with the accompanying drawings, in which like reference numerals represent like parts:
FIGURE 1 is a diagram of a heterogeneous wireless communication system according to the conventional art;
FIGURE 2 is a diagram of an example of a movement path of a Mobile Station (MS) in a heterogeneous wireless communication system according to the conventional art;
FIGURE 3 is a ladder diagram of a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to an embodiment of the present invention;
FIGURES 4 and 5 are ladder diagrams of a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to a first type of embodiments of the present invention;
FIGURE 6 is a ladder diagram of a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to a second type of embodiments of the present invention;
FIGURE 7 is a ladder diagram of a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to a third type of embodiments of the present invention;
FIGURE 8 is a ladder diagram of a scheme for security key delivery in a heterogeneous wireless communication system according to an embodiment of the present invention;
FIGURE 9 is a ladder diagram of a signal exchange considering security key delivery when an MS reconnects from a pico cell to a macro cell in a heterogeneous wireless communication system according to the third type of embodiments of the present invention;
FIGURE 10 is a ladder diagram of a signal exchange considering context information change when an MS reconnects from a pico cell to a macro cell in a heterogeneous wireless communication system according to the third type of embodiments of the present invention;
FIGURE 11 illustrates a process of a pico Base Station (BS) in a heterogeneous wireless communication system according to the first type of embodiments of the present invention;
FIGURE 12 illustrates a process of a macro BS in a heterogeneous wireless communication system according to the first type of embodiments of the present invention;
FIGURE 13 illustrates a process of a macro BS in a heterogeneous wireless communication system according to the second type of embodiments of the present invention;
FIGURE 14 illustrates a process of an MS in a heterogeneous wireless communication system according to the second type of embodiments of the present invention;
FIGURE 15 illustrates a process of a macro BS in a heterogeneous wireless communication system according to the third type of embodiments of the present invention;
FIGURE 16 illustrates a process of an MS in a heterogeneous wireless communication system according to the third type of embodiments of the present invention;
FIGURE 17 is a block diagram of an MS in a heterogeneous wireless communication system according to an embodiment of the present invention; and
FIGURE 18 is a block diagram of a BS in a heterogeneous wireless communication system according to an embodiment of the present invention.
Throughout the drawings, like reference numerals will be understood to refer to like parts, components and structures.
FIGURES 3 through 18, discussed below, and the various embodiments used to describe the principles of the present disclosure in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the disclosure. Those skilled in the art will understand that the principles of the present disclosure may be implemented in any suitably arranged wireless communications system.
Preferred embodiments of the present invention will be described with reference to the accompanying drawings. In the following description, well-known functions or constructions are not described in detail as they would obscure the invention unnecessarily.
Below, embodiments of the present invention provide a technology for a Mobile Station (MS) suffering a Radio Link Failure (RLF) in a pico cell to reconnect to a macro cell in a wireless communication system. For convenience, the embodiments of the present invention use terms and names defined in the Third Generation Partnership Project Long Term Evolution (3GPP LTE). However, the embodiments of the present invention are not limited by the terms and names, and are also analogously applicable to systems following other rules. Also, in the following description, a ‘pico Base Station (BS)’ may be interchanged with a ‘Home enhanced Node B (HeNB)’, and a ‘macro BS’ may be interchanged with an ‘enhanced Node B (eNB)’.
In order to be helpful to the understanding of the present invention, a procedure of performing reconnection to a macro cell in a situation of FIGURE 2 is described. FIGURE 3 illustrates a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to an embodiment of the present invention.
Referring to FIGURE 3, an MS 310 entering a cell of a pico BS 320 receives a handover command from a macro BS 330 (step 301). For example, the handover command is transmitted through a Radio Resource Control (RRC) connection reconfiguration message. Although not illustrated in FIGURE 3, prior to transmitting the handover command, the macro BS 330 performs a procedure of determining whether to perform a handover based on signal measurement information reported from the MS 310 and identifying whether the handover is acceptable to the pico BS 320. At this time, the pico BS 320 performs admission control according to a request of the macro BS 330.
The macro BS 330 transmitting the handover command transmits Sequence Number (SN) state information of the MS 310 to the pico BS 320, i.e. a target BS of handover (step 303). The SN state information indicates a progress state of a sequence number for data in a Packet Data Convergence Protocol (PDCP) layer and is used for data encryption, integrity protection, and such.
The MS 310 receiving the handover command transmits a handover confirm to the pico BS 320 (step 305). For example, the handover confirm is transmitted through an RRC connection reconfiguration complete message. At this time, although not illustrated in FIGURE 3, the MS 310 transmits to the macro BS 330 a Random Access (RA) preamble to acquire synchronization with the macro BS 330 and, in response to this, the macro BS 330 transmits to the MS 310 a Timing Advance (TA) that represents a difference of synchronization between the MS 310 and the macro BS 330. At this time, the macro BS 330 transmits to the MS 310, together with the TA, information on uplink resources necessary for transmitting the handover confirm. In response, the MS 310 controls uplink synchronization using the TA and then, transmits the handover confirm through allocated uplink resources.
The pico BS 320 then transmits to a Mobility Management Entity (MME) 340 a path switch request message informing that a serving cell of the MS 310 changes (step 307). In response, the MME 340 transmits to a Serving Gateway (S-GW) 350 a user plane update request message (step 309), and the S-GW 350 receiving the user plane update request message re-establishes a downlink traffic path for the MS 310. The S-GW 350 transmits to the MME 340 a user plane update response message (step 311). Next, the MME 340 transmits a path switch response message to the pico BS 320 (step 313). The pico BS 320 identifying the path re-establishment transmits to the macro BS 330 a user context release request for the MS 310 (step 315).
The MS 310 then maintains the connection with the pico BS 320, and transmits/receives uplink/downlink traffic through the pico BS 320 and the S-GW 350. At this time, the MS 310 detects an RLF (step 319), and discovers the macro BS 330 (step 321). In other words, the MS 310 detects that the connection with the pico BS 320 is not kept, and detects a signal of the macro BS 330. Accordingly, the MS 310 attempts RRC connection re-establishment to the macro BS 330. At this time, in order to attempt the RRC connection re-establishment, the MS 310 has to acquire system information of the macro BS 330. The system information is acquired by receiving at least one System Information Block (SIB) broadcasted by the macro BS 330. However, the RRC connection re-establishment fails (step 323). This is because the macro BS 330 has discarded context information of the MS 310 according to step 315. As such, the MS 310 enters an idle mode (step 325) and, during the idle mode, performs new RRC connection establishment with the macro BS 330 (step 327).
Embodiments of the present invention propose the following techniques:
1) technique for supporting an MS to perform a fast RRC connection re-establishment procedure to a macro cell; and
2) technique for re-establishing connection to a macro cell using a specific indicator.
Here, technique 1) is divided into a technique for a macro BS to keep context information of an MS through a user context update procedure, and a technique for an MS to keep system information of a macro BS during a connection to a pico BS through a system information update procedure. However, between the technique for using the user context update procedure and the technique for using the system information update procedure, one or both techniques are applicable.
With regard to technique 1), the technique for using the user context update procedure is described below.
When an MS suffers an RLF in a pico cell in an environment where the pico cell is overlapped within a macro cell, there is a great possibility that the MS discovers a macro cell that has previously been connected with the MS. Thus, the MS will seek to reconnect to the macro BS. At this time, through an RRC connection re-establishment procedure, the MS attempts to connect with the macro cell. However, because the RRC connection re-establishment procedure is a procedure that is executable with the macro BS that includes context information of a corresponding MS, the RRC connection re-establishment procedure fails with the macro BS that has already deleted the context information of the MS. Thus, embodiments of the present invention propose ways for the macro BS to keep the context information of the MS.
FIGURES 4 and 5 illustrate a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to a first type of embodiments of the present invention.
Referring to FIGURE 4, an MS 410 entering a cell of a pico BS 420 receives a handover command from a macro BS 430 (step 401), and the macro BS 430 transmits SN state information of the MS 410 to the pico BS 420 that is a target BS of handover (step 403). Also, the MS 410 receiving the handover command transmits a handover confirm to the pico BS 420 (step 405). The pico BS 420 then transmits to the MME 440 a path switch request message informing that a serving cell of the MS 410 changes (step 407). In response, the MME 440 transmits to the S-GW 450 a user plane update request message (step 409). In response, the S-GW 450 re-establishes a downlink traffic path for the MS 410 and transmits a user plane update response message to the MME 440 (step 411). Next, the MME 440 transmits a path switch response message to the pico BS 420 (step 413). The pico BS 420 identifying the accomplishment of path re-establishment transmits to the macro BS 430 a user context release request for the MS 410 (step 415). Next, the MS 410 maintains the connection with the pico BS 420, and transmits/receives uplink/downlink traffic through the pico BS 420 and the S-GW 450 (step 417).
After the handover is completed through steps 401 to 417, the pico BS 420 transmits the full context information of the MS 410 to the macro BS 430 (step 419). According to another embodiment of the present invention, step 415 of transmitting the user context release request may be omitted and, in this situation, step 419 of transmitting the full context information may also be omitted. Here, the context information is information associated with transmit resources that are in use for the MS 410, bearer setup and such, and is forwarded from a source BS to a target BS during a handover preparation procedure and such. For example, the context information includes measurement configuration that an MS uses in a source cell, information associated with radio resources that the MS uses in the source cell, such as Radio Bearer (RB) configuration information, Media Access Control (MAC) layer configuration information, physical layer related information and such, Cell - Radio Network Temporary Identifier (C-RNTI) that the MS uses in the source cell, security related information and such. Taking into consideration the situation of FIGURE 2 according to an embodiment of the present invention, because the MS 410 that has access to the pico BS 420 leaves the pico cell before going through a normal handover procedure, the context information of the MS 410 cannot be forwarded to the macro BS 430. According to an embodiment of the present invention, the pico BS 420 previously forwards the context information of the MS 410 to the macro BS 430 before handover is triggered.
Afterwards, if the context information of the MS 410 changes or a signal intensity of the MS 410 decreases below a threshold, the pico BS 420 transmits context update information to the macro BS 430 (step 421). That is, if the context information of the MS 410 changes during the course of data transmission/reception, or the signal intensity of the MS 410 decreases below the threshold, the pico BS 420 forwards the context information of the MS 410 to the macro BS 430 through a context update message. For example, changing of the context information means that measurement configuration used by the MS 410 in the pico BS 420 changes, new radio bearer connection is established, in-use radio bearer connection becomes extinct, or a C-RNTI changes and so forth. Accordingly, if the context information does not change, transmission of the context update information may not occur, and if a change of the context information takes place twice or more, the transmission of the context update information may also be carried out twice or more. Accordingly, the macro BS 430 can maintain the latest context information of the MS 410.
The MS 410 then detects an RLF (step 423). In other words, the MS 410 detects that the connection with the pico BS 420 is lost. Accordingly, the MS 410 preferentially searches for the macro BS 430, i.e. the latest accessed macro cell. That is, the MS 410 preferentially performs a cell search process for a previous serving cell before handover to a current serving cell. As a result, the MS 410 discovers the macro BS 430 (step 425). In other words, the MS 410 detects a signal of the macro BS 430. Accordingly, the MS 410 performs RRC connection re-establishment for the macro BS 430 (step 427). At this time, the macro BS 430 can successfully achieve the RRC connection re-establishment because the macro BS 430 has the context information of the MS 410.
FIGURE 5 illustrates a detailed process of the RRC connection re-establishment. Referring to FIGURE 5, the MS 410 transmits an RRC re-establishment request message to the macro BS 430 (step 451). The RRC re-establishment request message includes identification information of an MS, information representing the cause of RRC re-establishment, and Physical Cell IDentifier (PCI) information of a reconnection target cell. The RRC re-establishment request message informs that it intends to re-establish connection with the macro BS 430.
The macro BS 430 receiving the RRC re-establishment request message identifies that a sender of the RRC re-establishment request message is the MS 410, identifies that the context information of the MS 410 has been stored, and performs a Message Authentication Code - Integrity (MAC-I) verification procedure (step 453). Because the macro BS 430 has kept the context information of the MS 410 through a context update procedure, the macro BS 430 determining that the context information has been stored transmits an RRC re-establishment message to the MS 410 (step 455). Next, the macro BS 430 transmits a data forwarding request to a BS previously accessed by the MS 410 (i.e., the pico BS 420 that has previously provided the context update message) (step 459). Along with the data forwarding request, information on a wired bearer to perform data forwarding can be transmitted.
The pico BS 420 receiving the data forwarding request transmits SN state information of the MS 410 to the macro BS 430 (step 461), and the pico BS 420 forwards data for the MS 410 stored in a buffer to the macro BS 430 (step 463). The SN state information represents a progress state of a sequence number for data in a PDCP layer, and is used for data encryption, integrity protection and such. After that, the MS 410 and the macro BS 430 restore connection through an RRC connection reconfiguration procedure (step 465) and transmits/receives a traffic with the macro BS 430 and the S-GW 450 (step 467).
With regard to technique 1), the technique for using the system information update procedure is described below.
When an MS suffers an RLF in a pico cell in an environment where the pico cell is overlapped within a macro cell, there is a great possibility that the MS discovers a macro cell that has previously been connected with the MS. Accordingly, the MS will seek to re-establish connection with a macro BS. At this time, the MS attempts to connect with the macro cell through an RRC connection re-establishment procedure. Prior to performing the RRC connection re-establishment procedure, the MS has to enter a state of being able to transmit/receive a signal with the macro BS through a random access process. To this end, the MS has to acquire system information of the macro BS, particularly, information associated with the random access. Therefore, the MS cannot attempt the RRC connection re-establishment procedure without acquiring the system information of the macro BS. Accordingly, embodiments of the present invention propose a way for the MS to keep the system information of the macro BS.
FIGURE 6 illustrates a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to a second type of embodiments of the present invention.
Referring to FIGURE 6, an MS 510 entering a cell of a pico BS 520 receives a handover command from a macro BS 530 (step 501). Here, the handover command includes a command instructing the MS 510 to store system information of the macro BS 530. For example, the handover command includes an indication associated with system information reuse. When the indication of the system information reuse is set to a value representing affirmation, the MS 510 stores the system information of the macro BS 530. At this time, the MS 510 marks the cell for which the system information is stored. For example, a PCI and center frequency information of the macro BS 530 can be used as cell identification information. Accordingly, although the MS 510 does handover to the pico BS 520, the system information of the macro BS 530 is not discarded.
The macro BS 530 transmits SN state information of the MS 510 to the pico BS 520, i.e. a target BS of handover (step 503). Also, the MS 510 receiving the handover command transmits a handover confirm to the pico BS 520 (step 505). The pico BS 520 then transmits to the MME 540 a path switch request message informing that a serving cell of the MS 510 changes (step 507). In response, the MME 540 transmits to an S-GW 550 a user plane update request message (step 509), and the S-GW 550 re-establishes a downlink traffic path for the MS 510 and transmits a user plane update response message to the MME 540 (step 511). The MME 540 then transmits a path switch response message to the pico BS 520 (step 513). The pico BS 520 identifying the accomplishment of the path re-establishment then transmits to the macro BS 530 a user context release request for the MS 510 (step 515). Then, the MS 510 maintains the connection with the pico BS 520, and transmits/receives uplink/downlink traffic through the pico BS 520 and the S-GW 550 (step 517).
After the handover is completed through steps of 501 to 517, if the MS 510 suffers an RLF in a pico cell, the MS 510 preferentially searches for the macro BS 530. If the macro BS 530 is found, it is desirable to transmit an RRC connection re-establishment request to the macro BS 530 as quickly as possible. To this end, the MS 510 has to camp on or connect to the macro BS 530 and acquire system information of the macro BS. To reduce a time taken until the MS 510 acquires the system information of the macro BS 530, the macro BS 530 forwards, if its own system information is changed, the changed system information to the MS 510 through the pico BS 520.
That is, the macro BS 530 changes system information by a communication environment or system operator (step 519). So, the macro BS 530 forwards a system information update message including the changed system information to the MS 510 through the pico BS 520 (steps 521 and 523). However, if the system information of the macro BS 530 does not change, steps of 521 and 523 may not occur. If change takes place twice or more, steps of 521 and 523 can also be performed twice or more. At this time, the pico BS 520 transmits the system information update message to the MS 510 in a broadcast, multicast, or unicast. The system information update message includes the system information of the macro BS 530, e.g., can include all information of a Master Information Block (MIB), a System Information Block 1 (SIB1), an SIB2 and so forth. For example, a construction of the system information update message is shown according to Table 1 below.
Table 1
Figure PCTKR2011003927-appb-T000001
Figure PCTKR2011003927-appb-I000001
Figure PCTKR2011003927-appb-I000002
The respective fields of Table 1 are defined in Table 2 below.
Table 2
Figure PCTKR2011003927-appb-T000002
Figure PCTKR2011003927-appb-I000003
Figure PCTKR2011003927-appb-I000004
The MS 510 then detects an RLF (step 525). In other words, the MS 510 detects that the connection with the pico BS 520 is lost. Accordingly, the MS 510 preferentially searches for the macro BS 530, i.e. the latest accessed macro cell. For example, the MS 510 preferentially performs a cell search process for a previous serving cell before handover to a current serving cell. As a result, the MS 510 discovers the macro BS 530 (step 527). That is, the MS 510 detects a signal of the macro BS 530.
The MS 510 discovering the macro BS 530 determines whether the system information stored in the MS 510 is the system information of the macro BS 530 (step 529). That is, the MS 510 determines whether identification information marked at system information storage is consistent with corresponding information of the macro BS 530. For example, when the system information is indexed to a PCI and center frequency information, if a PCI of the macro BS 530 and a center frequency are consistent with a PCI and a center frequency mapped with the stored system information, the MS 510 determines that it can reuse the stored system information for the macro BS 530.
And, although not illustrated in FIGURE 6, the MS 510 uses random access related parameters included in the system information, in a random access process preceding an RRC connection re-establishment procedure. And the MS 510 performs the RRC connection re-establishment procedure with the macro BS 530 (step 531). If the system information stored in the MS 510 is not the system information of the macro BS 530, the MS 510 receives system information broadcasted from the macro BS 530, and then performs the RRC connection re-establishment procedure. At this time, to prevent the erroneous use of the stored system information, the MS 510 discards the stored system information if the RRC connection re-establishment procedure is completed. In other words, if a first RRC connection re-establishment procedure is completed, the stored system information is discarded although not used.
Next, technique 2) is described as follows.
When an MS suffers an RLF in a pico cell in an environment where the pico cell is overlapped within a macro cell, the MS can also restore connection with the macro cell by, instead of performing an RRC connection re-establishment procedure to the macro cell, reusing context information that has previously been used in a macro BS before handover to the pico cell. In this situation, after the macro BS allows the MS to handover to the pico cell, the macro BS stores, without discarding, the context information that was previously used by the MS. The MS also stores, though handing over to the pico cell, the context information that has previously been used in the macro BS, and then restores connection with the macro BS instead of going through a normal handover procedure. For this purpose, the MS transmits a predefined control message for connection restoration, and restores connection with the macro BS by reusing context information that has previously been used in the macro BS. Accordingly, embodiments of the present invention propose a way for the MS to reconnect to the macro cell through a specific control message.
FIGURE 7 illustrates a signal exchange for an MS to reconnect from a pico cell to a macro cell in a heterogeneous wireless communication system according to a third type of embodiments of the present invention.
Referring to FIGURE 7, an MS 610 entering a cell of a pico BS 620 receives a handover command from a macro BS 630 (step 601). Here, the handover command includes backup configuration information for restoration of connection with the macro BS 630. For example, the backup configuration information can include a value of a specific timer representing a time duration for keeping context information with the macro BS 630. Below, the specific timer is called a ‘timer X’. That is, the macro BS 630 sets a value of the timer X, and transmits the handover command including the backup configuration information that includes the timer X.
The MS 610 receiving the handover command including the backup configuration information stores context information that was previously used with the macro BS 630, and the macro BS 630 also stores the context information of the MS 610 (step 603). The context information is stored in the MS 610 and the macro BS 630 until the timer X expires. In other words, if the timer X expires, the MS 610 and the macro BS 630 delete the context information. After that, the MS 610 transmits a handover confirm to the pico BS 620 (step 605). As such, a handover procedure is completed among the pico BS 620, the macro BS 630, and the MS 610, and the MS 610 transmits/receives uplink/downlink traffic with the pico BS 620 (step 607). Although not illustrated in FIGURE 7, the handover process can include a path switch and user plane update procedure of an MME and S-GW.
Afterwards, the MS 610 detects an RLF (step 609). In other words, the MS 610 detects that its connection with the pico BS 620 is lost. Accordingly, the MS 610 preferentially searches the macro BS 630, i.e. the latest accessed macro cell. For example, the MS 610 preferentially performs a cell search process for a previous serving cell before handover to a current serving cell. As a result, the MS 610 discovers the macro BS 630 (step 611). That is, the MS 610 detects a signal of the macro BS 630.
Accordingly, the MS 610 determines whether the timer X has expired. Here, it is assumed that the timer X has not expired and therefore, the MS 610 transmits a return indicator to the macro BS 630 so as to request connection restoration (step 613). At this time, if the context information of the MS 610 has changed after handover and the current context information is not consistent with the context information stored in step 603, the MS 610 includes information indicating the changed portion in the return indicator. Accordingly, a connection re-establishment procedure between the MS 610 and the macro BS 630 is performed, and then the MS 610 transmits/receives uplink/downlink traffic with the macro BS 630 (step 615).
When restoring connection with a macro cell without a normal handover procedure as shown in FIGURE 7, which security key the macro cell should use to perform a security procedure (i.e., data scrambling/descrambling and integrity protection) becomes ambiguous. When a normal handover procedure is performed, a source BS delivers and forwards a security key to a target BS, and the target BS executes the data scrambling/descrambling and integrity protection using the key forwarded from the source BS. A scheme of delivering a security key when the normal handover procedure is performed is illustrated in FIGURE 8.
FIGURE 8 illustrates a scheme of security key delivery at normal handover in a heterogeneous wireless communication system according to an embodiment of the present invention. Referring to FIGURE 8, a source BS 720 determines handover of an MS 710 (step 701), and delivers a security key (hereinafter, referred to as ‘KeNB*’) on an eNB to be provided to a target BS 730 (step 703). At this time, a KeNB* delivery scheme is different depending on whether a Next Hop (NH) and a Next hop Chaining Counter (NCC) are stored. The NH is a pseudo key provided by an MME 740, and the NH is not used as an actual key but instead a bit stream of the same size as that of a key used for delivering a new key. The NCC is a counter variable representing a change of the NH. When the NH and the NCC have been stored in the source BS 720, the source BS 720 delivers the KeNB* using the NH, the NCC, a PCI of the target BS 730, and frequency information (e.g., Evolved Absolute Radio Frequency Channel Number ? Downlink (EARFCN-DL)) as input variables in a Key Delivery Function (KDF) according to a scheme ‘A 791’. In contrast, when the NH and the NCC have not been stored in the source BS 720, the source BS 720 delivers the KeNB* using a security key (hereinafter, referred to as ‘KeNB’) used by the source BS 720, a PCI of the target BS 730, and center frequency information (e.g., EARFCN-DL) as input variables in a KDF according to a scheme ‘B 792’. In general, the scheme ‘B 792’ is a scheme for the exceptional situation in which the NH and the NCC have not been stored.
After that, the source BS 720 transmits a handover request message including the KeNB* and the NCC to the target BS 730 (step 705). In response, the target BS 730 uses the KeNB* as its own KeNB (step 707), and transmits a handover command message including the NCC to the MS 710 (step 709). At this time, the MS 710 determines in which scheme the source BS 720 has delivered the KeNB* based on a value of the NCC, and delivers a KeNB* in the determined scheme (step 711). That is, if the value of the NCC received through the handover command message is the same as a value stored in the MS 710, the MS 710 delivers the KeNB* according to the scheme ‘A 791’, and if not the same, the MS 710 delivers the KeNB* according to the scheme ‘B 792’. Afterwards, the MS 710 transmits a handover confirm message to the target BS 730 (step 713), and in response, the target BS 730 transmits a path switch request to the MME 740 (step 715), and the MME 740 transmits a path switch response including an NCC and an NH to the target BS 730 (step 717). After acquiring the NCC and NH through the path switch response, the target BS 730 stores the NCC and the NH (step 719).
As illustrated in FIGURE 8, when an MS performs a handover from a first cell to a second cell, a new security key to be used in the second cell is delivered by a BS of the first cell and is forwarded to a BS of the second cell. Additionally, the MS delivers a new security key through a scheme dependent on an increase or non-increase of an NCC included in a handover command message received from the BS of the second cell. However, when the normal handover procedure of FIGURE 7 is not performed, a security key cannot be delivered according to the procedure of FIGURE 8 because information on the security key is not exchanged among the first cell, the second cell, and the MS. In other words, in FIGURE 7, the MS 610 and the macro BS 630 cannot deliver a security key according to the procedure of FIGURE 8.
Thus, embodiments of the present invention propose a method for delivering a new security key to be used in a macro cell when an MS moves from a pico cell to the macro cell using a return indicator.
Although an MS moves from a pico cell to a macro cell without a normal handover procedure, because a macro BS itself is a target cell, the macro BS knows a PCI of a target BS (i.e., the macro BS) and center frequency information among input values for delivering a new key. At this time, whether an NH or a security key that has previously been used in the pico cell is needed comes into question depending on the scheme in which the MS delivers a security key. The NH is provided by an MME and thus, in order for the macro BS to acquire the NH, a new signaling procedure between a macro BS and the MME should be defined. In contrast, because the security key that has previously been used in the pico cell was delivered by the macro BS in a process where the MS performs a handover to a pico BS, the macro BS can know the security key without performing a new procedure.
Therefore, when the MS does handover to the pico BS, the macro BS stores the security key that has previously been used in the pico BS, together with context information of the MS. Afterwards, if a return indicator is received from the MS, the macro BS delivers a new security key using a stored security key, its own PCI and center frequency information, and uses the delivered new security key. Accordingly, the same result is obtained as when the pico BS delivers and forwards a security key according to the scheme ‘B 792’.
FIGURE 9 illustrates a signal exchange considering security key delivery when an MS reconnects from a pico cell to a macro cell in a heterogeneous wireless communication system according to the third type of embodiments of the present invention.
Referring to FIGURE 9, an MS 810 entering a cell of a pico BS 820 receives a handover command from a macro BS 830 (step 801). Here, the handover command includes backup configuration information for restoration of connection with the macro BS 830. For example, the backup configuration information can include a value of a specific timer representing a time duration for keeping context information with the macro BS 830. Hereinafter, the specific timer is called a ‘timer X’. That is, the macro BS 830 sets a value of the timer X, and transmits the handover command including the backup configuration information including the timer X.
The MS 810 receiving the handover command including the backup configuration information stores context information that has previously been used with the macro BS 830 (step 803). At this time, the MS 810 marks to which cell the stored context information corresponds. For example, the MS 810 indexes the stored context information to a PCI of a cell of the macro BS 830 and center frequency information. Or, the MS 810 indexes the context information to a Cell Global Identifier (CGI) of a macro cell. Here, the CGI, which is unique identification information given to each cell within a system of the same service provider is, for example, a size of ‘28’ bits and is broadcasted as system information of a cell. The macro BS 830 stores context information of the MS 810 and a KeNB of the pico BS 820 (step 803). Here, before the handover command of the macro BS 830 is transmitted, the handover command of the macro BS 830 is generated by the macro BS 830. Also, the context information is stored in the MS 810 and the macro BS 830 until the timer X expires. In other words, when the timer X expires, the MS 810 and the macro BS 830 delete the context information.
The MS 810 transmits a handover confirm to the pico BS 820 (step 807). As such, a handover procedure is completed among the pico BS 820, the macro BS 830, and the MS 810, and the MS 810 transmits/receives uplink/downlink traffic with the pico BS 820 (step 809). Although not illustrated in FIGURE 9, the handover procedure can include a path switch and user plane update procedure of an MME and S-GW. Afterwards, the MS 810 detects an RLF (step 811). In other words, the MS 810 detects that its connection with the pico BS 820 is lost. Accordingly, the MS 810 preferentially searches for the macro BS 830, i.e. the latest accessed macro cell. For example, the MS 810 preferentially performs a cell search process for a previous serving cell before handover to a current serving cell. As a result, the MS 810 discovers the macro BS 830 (step 813). That is, the MS 810 detects a signal of the macro BS 830, and determines that a channel quality is above a specific threshold.
Accordingly, the MS 810 determines whether it can reuse stored context information for a discovered cell (step 815). In detail, the MS 810 determines whether the discovered cell, i.e. the macro BS 830, is a BS corresponding to the stored context information. Whether the context information corresponds to the macro BS 830 is determined based on the consistency of information indexing the stored context information (i.e., center frequency information and a PCI, or a CGI). Also, the MS 810 determines whether the timer X has expired. Although not illustrated in FIGURE 9, if the context information and the macro BS 830 do not correspond to each other or the timer X has expired, the MS 810 performs an RRC connection re-establishment process.
Because the context information and the macro BS 830 correspond to each other and the timer X has not expired, the MS 810 determines that it can reuse the stored context information, and regenerates a radio bearer with the macro BS 830 using the stored context information (step 817). That is, the MS 810 operates as if the MS 810 received an RRC connection reconfiguration message including the stored context information. Next, the MS 810 delivers a new security key (KeNB) to be used in the macro BS 830, using a security key that has previously been used in the pico BS 820 and a PCI of the macro BS 830 and center frequency information (step 819). That is, when the MS 810 performs a normal handover procedure, the MS 810 delivers the new security key in the same scheme as when an NCC does not increase.
After delivering the security key, the MS 810 transmits a return indicator to the macro BS 803 so as to request connection restoration (step 821). At this time, the MS 810 integrity-protects the return indicator using a new security key. That is, the MS 810 applies a predetermined integrity protection algorithm, a new security key, and other input value to the return indicator, generates a Message Authentication Code-Integrity (MAC-I), and transmits the MAC-I together with the return indicator.
The macro BS 830 receiving the return indicator and the MAC-I identifies a C-RNTI of the MS 810, and detects that the MS 810 is an MS returned without a normal handover procedure. Additionally, the macro BS 830 identifies stored context information of the MS 810 and a security key that has previously been used by the MS 810 in the pico BS 820 and then delivers a new security key (KeNB) (step 823). That is, the macro BS 830 delivers the new security key using the security key that has previously been used by the MS 810 in the pico BS 820 and its own PCI and center frequency information. The macro BS 830 authenticates a MAC-I using the new security key (step 825). After that, the MS 810 transmits/receives uplink/downlink traffic with the macro BS 830 (step 827).
In the embodiment of FIGURE 9, a situation of a radio bearer can change at the time of connection restoration. That is, an MS regenerates at least one radio bearer according to radio bearer setup information included in the context information. Thus, when the MS 810 stops an existing service or initiates a new service after handover to a pico BS, the radio bearer setup information included in the context information may not be consistent with a current radio bearer situation. For example, if the MS uses services ‘a’ and ‘b’ and sets radio bearers ‘a’ and ‘b’ before doing handover to the pico BS but stops the service ‘a’ and initiates a service ‘c’ after doing the handover to the pico BS, the radio bearer ‘a’ corresponding to the service ‘a’ is no longer necessary when the MS re-establishes connection for a macro BS, and a new radio bearer for the service ‘c’ should be re-set.
FIGURE 10 illustrates a signal exchange considering a change of context information when an MS reconnects from a pico cell to a macro cell in a heterogeneous wireless communication system according to the third type of embodiments of the present invention.
Referring to FIGURE 10, an MS 910 entering a cell of a pico BS 920 receives a handover command from a macro BS 930 (step 901). Here, the handover command includes backup configuration information for restoration of connection with the macro BS 930. For example, the backup configuration information can include a value of a specific timer representing a time duration for keeping context information with the macro BS 930. Hereinafter, the specific timer is called a ‘timer X’. That is, the macro BS 930 sets a value of the timer X, and transmits the handover command that includes the backup configuration information including the timer X.
The MS 910 receiving the handover command including the backup configuration information stores context information that has previously been used with the macro BS 930, and the macro BS 930 stores the context information of the MS 910 (step 903). At this time, the MS 910 marks to which cell the stored context information corresponds. For example, the MS 910 indexes the stored context information to a PCI of a cell of the macro BS 930 and center frequency information. Alternatively, the MS 910 indexes the context information to a CGI of a macro cell. Here, the CGI, which is unique identification information given to each cell within a system of the same service provider is, for example, a size of ‘28’ bits and is broadcasted as system information of a cell. Also, the context information is stored in the MS 910 and the macro BS 930 until the timer X expires. In other words, when the timer X expires, the MS 910 and the macro BS 930 delete the context information.
After that, the MS 910 transmits a handover confirm to the pico BS 920 (step 905). As such, a handover procedure is completed among the pico BS 920, the macro BS 930, and the MS 910, and the MS 910 transmits/receives uplink/downlink traffic with the pico BS 920 (step 907). Although not illustrated in FIGURE 10, the handover procedure can include a path switch and user plane update procedure of an MME and S-GW. After that, the MS 910 detects an RLF (step 909). In other words, the MS 910 detects that its connection with the pico BS 920 is lost. Accordingly, the MS 910 preferentially searches for the macro BS 930, i.e. the latest accessed macro cell. For example, the MS 910 preferentially performs a cell search process for a previous serving cell before handover to a current serving cell. As a result, the MS 910 discovers the macro BS 930 (step 911). That is, the MS 910 detects a signal of the macro BS 930, and determines that a channel quality is above a specific threshold.
Accordingly, the MS 910 determines whether it can reuse stored context information for a discovered cell (step 913). In detail, the MS 910 determines whether the discovered cell, i.e. the macro BS 930, is a BS corresponding to the stored context information. Whether the context information corresponds to the macro BS 930 is determined based on the consistency (or inconsistency) of information indexing the stored context information (i.e., center frequency information and a PCI, or a CGI). Also, the MS 910 determines whether the timer X has expired. Although not illustrated in FIGURE 10, if the context information and the macro BS 930 do not correspond to each other or the timer X has expired, the MS 910 performs an RRC connection re-establishment process.
Assuming that the context information and the macro BS 930 correspond to each other and the timer X has not expired, the MS 910 determines that it can reuse the stored context information and regenerates a radio bearer with the macro BS 930 using the stored context information (step 915). That is, the MS 910 operates as if the MS 910 received an RRC connection reconfiguration message including the stored context information. In detail, the MS 910 uses a C-RNTI included in the context information, and regenerates at least one radio bearer according to radio bearer setup information included in the context information. The radio bearer is set up by service held by the MS 910. Thus, when the MS 910 stops an existing service or triggers a new service after handover to a pico BS, the radio bearer setup information included in the context information may not be consistent with that of a current radio bearer situation. For example, if the MS 910 uses services ‘a’ and ‘b’ and sets radio bearers ‘a’ and ‘b’ before handover to the pico BS but stops the service ‘a’ and initiates a service ‘c’ after doing the handover to the pico BS, the radio bearer ‘a’ corresponding to the service ‘a’ is no longer necessary at a time the MS 910 re-establishes connection for the macro BS 930, and a new radio bearer for the service ‘c’ should be set.
Accordingly, when information of a radio bearer for a newly initiated service is not reflected in the stored context information (that is, when there is a newly set radio bearer after handover to the pico BS 920), the MS 910 stops a corresponding service until again generating the newly set radio bearer with the macro BS 930 (step 917). Next, the MS 910 transmits a return indicator to the macro BS 903 so as to request connection restoration (step 919). At this time, the MS 910 transmits, together with the return indicator, information on a radio bearer no longer used at a current time point among radio bearers reflected in the stored context information.
The macro BS 930 receiving the return indicator restores at least one radio bearer with reference to the stored context information and the released radio bearer information and transmits a return completion message to the MS 910 (step 921). Next, the macro BS 930 transmits to the pico BS 920 a request for data forwarding for the MS 810 and context information that has previously been used by the MS 810 in the pico BS 920 (step 923). In response, the pico BS 920 forwards the context information of the MS 810 to the macro BS 930 (step 925), and the macro BS 930 determines whether the context information received from the pico BS 920 contains a radio bearer for a new service (i.e. a radio bearer not set through the restoration). When the context information does not contain the radio bearer not set, the macro BS 930 generates a radio bearer for the new service through an RRC connection reconfiguration procedure with the MS 910 (step 927). Consequently, the MS 910 can resume the service stopped in step 917. After that, the MS 910 and the macro BS 930 transmit/receive uplink/downlink traffic (step 929).
An operation and construction of an MS and BS for re-establishing connection as above according to embodiments of the present invention are described below with reference to the drawings.
FIGURE 11 illustrates a process of a pico BS in a heterogeneous wireless communication system according to the first type of embodiments of the present invention.
Referring to FIGURE 11, in block 1001, the pico BS identifies whether there is an MS doing handover from a macro cell to the pico BS. In other words, the pico BS receives an MS handover request from a macro BS, determines that it can permit MS handover through admission control, transmits to the macro BS an ACKnowledge (ACK) for the MS handover request, and then identifies whether the MS accesses the pico BS.
If the MS does handover from the macro cell and access the pico BS, the pico BS proceeds to block 1003 and transmits a request for releasing context information of the MS to the macro BS. That is, because the MS accesses the pico BS successfully, the pico BS indicates that there is no need to keep context information of the MS.
Next, the pico BS proceeds to block 1005 and transmits the full context information of the MS to the macro BS. That is, according to an embodiment of the present invention, the pico BS provides the full context information of the MS to the macro BS such that an RRC connection re-establishment process can succeed for a situation in which the MS reconnects to the macro BS without normal handover (i.e. in a situation where the MS should reconnect to the macro BS without a normal handover process). Block 1005 occurs after the request for releasing the context information in block 1003. As such, if block 1003 is omitted, block 1005 can also be omitted.
The pico BS then proceeds to block 1007 and identifies whether the context information of the MS has changed. The context information includes measurement configuration used by the MS, radio resource related information, in detail, bearer configuration information, Media Access Control (MAC) layer configuration information, physical layer related information and such, Cell - Radio Network Temporary Identifier (C-RNTI), security related information, and so forth. Thus, the context information can change if a radio bearer is generated or becomes obsolete between the start and end of service.
If the context information changes, the pico BS proceeds to block 1009 and transmits the changed context information to the macro BS. That is, the pico BS provides the changed context information to the macro BS such that the macro BS can keep the latest context information. After that, the pico BS returns to block 1007.
Although not illustrated in FIGURE 11, when a signal intensity for the MS decreases below a threshold, the pico BS can transmit the context information of the MS to the macro BS. Also, after the connection with the MS fails without handover, if data forwarding is requested from the macro BS, the pico BS forwards SN state information of the MS and data to be transmitted to the MS, to the macro BS.
FIGURE 12 illustrates a process of a macro BS in a heterogeneous wireless communication system according to the first type of embodiments of the present invention.
Referring to FIGURE 12, in block 1101, the macro BS identifies whether context information of an MS doing handover to a pico cell of a pico BS is received from the pico BS. That is, the macro BS commands the MS to do handover to the pico BS according to a measurement report of the MS. After the MS completes the handover to the pico BS, the macro BS identifies whether the context information of the MS is received from the pico BS.
If the context information of the MS is received from the pico BS, the macro BS proceeds to block 1103 and stores the received context information. That is, the macro BS stores the context information of the MS such that an RRC connection re-establishment process can succeed in a situation where the MS should reconnect to the macro BS without a normal handover process. Blocks 1101 and 1103 are performed on the premise that the context information of the MS has been discarded after the handover of the MS. Thus, blocks 1101 and 1103 may not be performed if previous context information is not discarded.
After that, the macro BS proceeds to block 1105 and identifies whether changed context information is received from the pico BS. The context information can change in a process in which the MS performs communication with the pico BS after doing handover to the pico cell. The pico BS provides the changed context information to the macro BS such that the macro BS can keep the latest context information. That is, the macro BS identifies whether context information received in block 1105 is different compared to the context information received in block 1101.
If changed context information is received from the pico BS in block 1105, the macro BS proceeds to block 1107 and updates stored context information using the changed context information. After that, the macro BS returns to block 1105.
If the changed context information is not received in block 1105, the macro BS proceeds to block 1109 and identifies whether an RRC connection re-establishment request is received from the MS. That is, the macro BS identifies whether an RRC connection re-establishment request message is received from the MS. Although not illustrated in FIGURE 12, a random access process can be first carried out before the RRC connection re-establishment request message is received.
If the RRC connection re-establishment request is received from the MS in block 1109, the macro BS proceeds to block 1111 and determines whether the MS transmitting the RRC connection re-establishment request is an MS corresponding to the stored context information, based on the sender’s identification information included in the RRC connection re-establishment request message. In other words, the macro BS determines whether the RRC connection re-establishment request is received from the MS corresponding to the stored context information.
If the MS transmitting the RRC connection re-establishment request is the MS corresponding to the stored context information in block 1111, the macro BS proceeds to block 1113 and performs an RRC connection re-establishment process according to the request of the MS. That is, because the macro BS has the context information of the MS, the macro BS can perform the RRC connection re-establishment process. In detail, the macro BS receives an RRC re-establishment request message from the MS, determines that the context information of the MS has been stored, performs a MAC-I authentication process for the MS, transmits an RRC re-establishment message, and transmits a request for data forwarding to the pico BS.
FIGURE 13 illustrates a process of a macro BS in a heterogeneous wireless communication system according to the second type of embodiments of the present invention.
Referring to FIGURE 13, in block 1201, the macro BS transmits an instruction for storing system information of the macro BS to an MS doing handover to a pico cell. That is, the macro BS determines handover to a pico BS according to a measurement report of the MS, performs a process for handover and then, when transmitting a handover command to the MS, transmits to the MS the instruction for storing the system information of the macro BS together with the handover command.
After that, the macro BS proceeds to block 1203 and identifies whether the system information of the macro BS changes. The system information, which is setup information necessary for accessing the macro BS, can change according to an operation state or setup state of the macro BS.
If the system information of the macro BS changes in block 1203, the macro BS proceeds to block 1205 and transmits the changed system information to the MS through the pico BS. That is, the macro BS transmits to the pico BS a system information update message including the changed system information, and then the pico BS forwards the system information message to the MS in a broadcast, multicast or unicast scheme. For example, the system information update message can be configured according to Table 1 above.
In contrast, if the system information of the macro BS does not change in block 1203, the macro BS proceeds to block 1207 and identifies whether an RRC connection re-establishment request is received from the MS. That is, the macro BS identifies whether the RRC connection re-establishment request message is received from the MS. Although not illustrated in FIGURE 13, a random access process can be carried out before the RRC connection re-establishment request message is received.
If the RRC connection re-establishment request is received from the MS in block 1207, the macro BS proceeds to block 1209 and performs an RRC connection re-establishment process. At this time, the RRC connection re-establishment process can fail if the macro BS has not stored the context information of the MS.
FIGURE 14 illustrates a process of an MS in a heterogeneous wireless communication system according to the second type of embodiments of the present invention.
Referring to FIGURE 14, in block 1301, the MS identifies whether it receives an instruction for storing system information from a macro BS at handover from a macro cell to a pico cell. That is, the MS identifies whether it has received the instruction for storing the system information together with a handover command received from the macro BS.
If the instruction for storing the system information has been received, the MS proceeds to block 1303 and stores the system information of the macro BS. The system information, which is setup information necessary for accessing the macro BS, represents information received through an MIB, an SIB and such. For example, the system information includes at least one of the fields of Table 2 above. At this time, the MS marks which cell to which the stored system information corresponds. For example, the MS can use a PCI of the macro BS and center frequency information as cell identification information.
After that, the MS proceeds to block 1305 and identifies whether changed system information is received from the macro BS. That is, when the system information changes, the macro BS transmits a system information update message including the changed system information to the MS through the pico BS. At this time, the system information update message is received from the pico BS in a broadcast, multicast or unicast scheme. For example, the system information update message can be configured according to Table 1 above.
If the changed system information is received from the macro BS in block 1305, the MS proceeds to block 1307 and updates stored system information using the changed system information. That is, the MS maintains the system information of the macro BS in the latest state.
In contrast, if the changed system information is not received from the macro BS in block 1305, the MS proceeds to block 1309 and determines whether an RLF takes place in the pico cell. In other words, the MS detects that its connection with the pico BS is not kept. For example, the MS detects the RLF if a channel quality with the pico BS is deteriorated below a threshold or a synchronization signal of the pico BS cannot be detected.
If the RLF takes place, the MS proceeds to block 1311 and preferentially performs a cell search process for the macro BS. In other words, the MS determines whether a signal of the macro BS, which is a BS that has been previously accessed before the pico BS, is received. For example, the MS attempts to detect a synchronization signal of the macro BS and such.
Next, the MS proceeds to block 1313 and determines whether it discovers the macro BS. That is, the MS detects a signal of the macro BS, and determines whether it is in a state of being capable of performing communication with the macro BS. For example, whether it is in a state of being capable of performing communication with the macro BS is determined through a channel quality, synchronization signal detection (or non-detection), system information decoding possibility (or impossibility), and so forth.
If the macro BS is discovered, the MS proceeds to block 1315 and attempts RRC connection re-establishment with the macro BS using the stored system information of the macro BS. That is, the MS performs a random access process using random access related parameters included in the system information and then transmits an RRC connection re-establishment request to the macro BS.
FIGURE 15 illustrates a process of a macro BS in a heterogeneous wireless communication system according to the third type of embodiments of the present invention.
Referring to FIGURE 15, in block 1401, the macro BS transmits an instruction for storing context information of an MS doing handover to a pico cell, to the MS, and forwards a timer value to the MS. Here, the timer value indicates a time for storing of the context information. That is, the macro BS determines handover to a pico BS according to a measurement report of the MS, performs a process for handover, and then, when transmitting a handover command to the MS, the macro BS transmits to the MS the instruction for storing, together with the handover command, the context information that has previously been used when the MS accesses the macro BS.
Next, the macro BS proceeds to block 1403 and stores the context information of the MS. That is, the macro BS transmits to the MS the instruction for storing the context information of the MS and also stores the context information of the MS. Accordingly, the context information is stored in the MS and the macro BS until the timer expires.
After storing the context information of the MS, the macro BS proceeds to block 1405 and stores a security key provided to the pico BS. If normal handover is carried out, a serving BS delivers a security key to be used by a target BS and provides the security key to the target BS. Thus, the macro BS delivers the security key to be used by the pico BS, for the MS. At this time, if the security key is forwarded to the pico BS, the security key becomes information unnecessary for the macro BS. However, according to an embodiment of the present invention, the macro BS stores a security key provided to the pico BS for a situation where the MS reconnects to the macro BS without the normal handover.
After storing the security key, the macro BS proceeds to block 1407 and identifies whether a recovery request message is received from the MS before the expiration of the timer. Here, the recovery request message is a control message for the MS to make a request for resuming connection with the macro BS without the normal handover or an RRC connection re-establishment process. For example, the recovery request message includes at least one of a return indicator for requesting connection resume, a MAC-I for security authentication, and radio bearer information that becomes obsolete after the handover to the pico BS. If the timer expires without receiving the recovery request message, the macro BS terminates the process according to the embodiment of the present invention.
In contrast, if the recovery request message is received before the expiration of the timer in block 1407, the macro BS proceeds to block 1409 and determines whether it is possible to reuse the context information stored in block 1403. That is, the macro BS determines whether the MS transmitting the recovery request message is an MS that corresponds to the stored context information. For example, the macro BS compares sender’s identification information included in the recovery request message with MS’s identification information included in the stored context information.
If it is possible to reuse the stored context information, the macro BS proceeds to block 1411 and delivers a new security key for the MS. That is, the macro BS delivers a new security key using the security key that has previously been used by the MS in the pico BS and its own PCI and center frequency information. Next, although not illustrated in FIGURE 15, the macro BS can authenticate a MAC-I included in the recovery request message using the new security key.
After that, the macro BS proceeds to block 1413 and recovers at least one radio bearer with the MS according to the stored context information. When obsolete radio bearer information is included in the received recovery request message of block 1407, the macro BS restores only a radio bearer with the exception of the obsolete radio bearer. In addition, the macro BS notifies the MS of connection return completion.
After recovering the at least one radio bearer in block 1413, the macro BS proceeds to block 1415 and transmits a request for context information of an MS to the pico BS and acquires the context information from the pico BS. That is, because the context information of the MS can change after being stored in block 1403, the macro BS transmits the context information request to the pico BS in order to acquire the latest context information.
After acquiring the context information from the pico BS in block 1415, the macro BS proceeds to block 1417 and determines whether information on service added to the latest context information exists. In other words, the macro BS determines whether there is information not included in the stored context information of block 1403, among information on service included in the latest context information. That is, the macro BS determines whether a radio bearer generated after handover to the pico cell exists using the latest context information and, accordingly, whether a radio bearer to be additionally generated exists.
If the information on the added service exists, the macro BS proceeds to block 1419 and generates a radio bearer for the added service. The macro BS then transmits/receives traffic with the MS.
FIGURE 16 illustrates a process of an MS in a heterogeneous wireless communication system according to the third type of embodiments of the present invention.
Referring to FIGURE 16, in block 1501, the MS identifies whether a context information storage instruction and a timer value are received from a macro BS during a handover from a macro cell to a pico cell. Here, the timer value indicates a time to maintain the storing of the context information. That is, the MS determines whether it has received an instruction for storing the context information that has previously been used when the MS accesses the macro BS, together with a handover command received from the macro BS.
If the context information storage instruction and timer value are received in block 1501, the MS proceeds to block 1503 and stores context information that has previously been used during an access to the macro BS. At this time, the MS marks which cell to which the stored context information corresponds. For example, the MS indexes the stored context information to a PCI of the macro BS and center frequency information. Alternatively, the MS indexes the stored context information to a CGI of a macro cell.
After that, the MS proceeds to block 1505 and determines whether an RLF has occurred in the pico cell. In other words, the MS detects whether its connection with the pico BS is lost. For example, the MS detects the RLF when a channel quality with the pico BS is deteriorated below a threshold or a synchronization signal of the pico BS cannot be detected.
If the RLF takes place, the MS proceeds to block 1507 and preferentially performs a cell search process for the macro BS. In other words, the MS determines whether a signal of the macro BS (i.e. a BS that has previously been accessed before the pico BS) is received. For example, the MS attempts to detect a synchronization signal of the macro BS and such.
Next, the MS proceeds to block 1509 and identifies whether it has discovered the macro BS. That is, the MS detects a signal of the macro BS, and determines whether it is in a state of being capable of performing communication with the macro BS. For example, whether the MS can perform communication with the macro BS is determined through a channel quality, synchronization signal detection (or non-detection), system information decoding possibility (or impossibility), and so forth. If it fails to discover the macro BS, the MS terminates the process according to an embodiment of the present invention.
If the macro BS is detected, the MS proceeds to block 1511 and determines whether the stored context information can be reused. That is, the MS determines whether the macro BS is a BS corresponding to the stored context information. Whether the context information corresponds to the macro BS is determined based on the consistency (or inconsistency) of information indexing the stored indexing information (i.e., center frequency information and a PCI, or a CGI). Also, the MS determines whether the timer X has expired. If the MS cannot reuse the stored context information in block 1511, the MS terminates the process according to the embodiment of the present invention.
If the MS can reuse the stored context information in block 1511, the MS proceeds to block 1513 and delivers a security key for the macro BS. In other words, the MS delivers a new security key to be used in the macro BS by using a security key that has previously been used in the pico BS and a PCI of the macro BS and center frequency information. That is, when the MS performs a normal handover procedure, the MS delivers the new security key in the same scheme as when an NCC does not increase.
After that, the MS proceeds to block 1515 and determines whether a radio bearer added after handover to the pico cell exists. That is, the MS determines whether the added radio bearer exists by newly generating service after the handover to the pico cell. Here, the existence (or non-existence) of the added radio bearer is determined based on whether any information on service included in the latest context information is not included in the stored context information of block 1503.
If the added radio bearer does not exist in block 1515, the MS proceeds to block 1517 and regenerates at least one radio bearer that has previously been used with the macro BS according to the context information stored in block 1503. At this time, if a radio bearer that is obsolete after the handover to the pico cell exists, the MS regenerates only a radio bearer with the exception of the obsolete radio bearer.
After regenerating the at least one radio bearer in block 1517, the MS proceeds to block 1519 and transmits a recovery request message to the macro BS. Here, the recovery request message is a control message for requesting the MS to resume connection with the macro BS without normal handover or an RRC connection re-establishment process. For example, the recovery request message includes at least one of a return indicator for requesting connection resume, a MAC-I for security authentication, and radio bearer information that is obsolete after handover to a pico BS. Accordingly, the at least one radio bearer is restored in the macro BS, and the MS performs communication with the macro BS.
If the added radio bearer exists in block 1515, the MS proceeds to block 1521 and temporarily stops service provided through the added radio bearer. Because the macro BS cannot know information on the radio bearer added in the pico cell, the MS cannot be provided with the service through the added radio bearer until the same radio bearer as the added radio bearer is newly generated.
Next, the MS proceeds to block 1523 and regenerates at least one radio bearer that has previously been used with the macro BS according to the context information stored in block 1503. At this time, if a radio bearer that is obsolete after handover to the pico cell exists, the MS regenerates only a radio bearer with the exception of the extinct radio bearer.
After regenerating the at least one radio bearer in block 1523, the MS proceeds to block 1525 and transmits a recovery request message to the macro BS. Here, the recovery request message is a control message for requesting the MS to resume connection with the macro BS without normal handover or an RRC connection re-establishment process. For example, the recovery request message includes at least one of a return indicator for requesting connection resume, a MAC-I for security authentication, and radio bearer information that is obsolete after handover to a pico BS.
After that, in block 1527, the MS generates a radio bearer for the service stopped in block 1521. Accordingly, all radio bearers that have previously been used in the pico cell between the macro BS and the MS are recovered, and the MS performs communication with the macro BS.
FIGURE 17 illustrates an MS in a heterogeneous wireless communication system according to an embodiment of the present invention.
As illustrated in FIGURE 17, the MS includes a Radio Frequency (RF) processor 1602, a modem 1604, a storage unit 1606, and a controller 1608.
The RF processor 1602 performs a function for transmitting/receiving a signal through a wireless channel, such as signal band conversion, amplification, and so forth. That is, the RF processor 1602 up converts a baseband signal provided from the modem 1604 into an RF band signal and transmits the RF band signal through an antenna, and down converts an RF band signal received through the antenna into a baseband signal.
The modem 1604 performs a function of conversion between a baseband signal and a bit stream according to a physical layer standard of a system. For example, during data transmission, the modem 1604 generates complex symbols by encoding and modulating a transmit bit stream, maps the complex symbols to subcarriers, and configures Orthogonal Frequency Division Multiplexing (OFDM) symbols through Inverse Fast Fourier Transform (IFFT) operation and Cyclic Prefix (CP) insertion. Also, during data reception, the modem 1604 divides a baseband signal provided from the RF processor 1602 in an OFDM symbol unit, restores signals mapped to subcarriers through Fast Fourier Transform (FFT) operation, and restores a reception bit stream through demodulation and decoding. Also, the modem 1604 measures a channel quality using a receive signal, and detects a physical signal such as a synchronization signal and such.
The storage unit 1606 stores a program necessary for an operation of the MS, setup information, temporary data, and such. For example, the setup information includes system information of a BS, context information of the MS, authentication key information, and so forth.
The controller 1608 controls general functions of the MS. For example, the controller 1608 generates a data packet and provides the data packet to the modem 1604, and analyzes and processes a data packet provided from the modem 1604. Also, the controller 1608 interprets a control message received through the modem 1604, performs operation corresponding to the control message, processing and such, and generates a control message to be transmitted to a BS. Also, the controller 1608 determines a channel situation through channel quality information, a decoding success rate, a physical signal detection result, and such, which are provided from the modem 1604.
Particularly, the controller 1608 controls a function for reconnecting to a macro BS when an RLF occurs in a pico cell. A function of the controller 1608 for reconnecting to the macro BS is described below.
According to the second type of embodiments of the present invention, the controller 1608 operates as follows to reconnect to the macro BS when an RLF takes place in the pico cell. The controller 1608 determines that it has received an instruction for storing system information from a macro BS during handover from a macro cell to a pico cell, and stores the system information in the storage unit 1606 such that the system information of the macro BS is not discarded after handover. At this time, the controller 1608 which cell to which the stored system information corresponds. For example, a PCI of the macro BS and center frequency information can be used as cell identification information. After that, if changed system information is received from a pico BS, i.e. the current serving BS, the controller 1608 updates the system information stored in the storage unit 1606 using the changed system information. After that, if an RLF takes place in the pico cell, the controller 1608 preferentially performs a cell search process for the macro BS through the modem 1604, and as a result, if it discovers the macro BS, the controller 1608 attempts connection re-establishment with the macro BS using the system information of the macro BS stored in the controller 1606. That is, the controller 1608 performs a random access process using random access related parameters included in the system information and then transmits a request for RRC connection re-establishment to the macro BS.
According to the third type of embodiments of the present invention, the controller 1608 operates as follows to reconnect to the macro BS when an RLF takes place in the pico cell. The controller 1608 identifies that a context information storage instruction and a timer value are received from a macro BS at handover from a macro cell to a pico cell and stores, in the storage unit 1606, context information that has previously been used during an access to the macro BS. At this time, the controller 1608 marks which cell to which the stored context information corresponds. For example, the context information is indexed to a PCI of a cell of the macro BS and center frequency information or is indexed to a CGI of a macro cell. After that, if an RLF takes place in the pico cell, the controller 1608 preferentially performs a cell search process for the macro BS through the modem 1604, and as a result, if it discovers the macro BS, the controller 1608 determines whether the discovered macro BS is a BS corresponding to the stored context information using the information indexing the context information stored in the storage unit 1606. If it is possible to reuse the stored context information, the controller 1608 delivers a new security key to be used in the macro BS using a security key that has previously been used in the pico BS and the a PCI of the macro BS and center frequency information, and regenerates at least one radio bearer that has previously been used with the macro BS according to the context information stored in the storage unit 1606. At this time, if a radio bearer that is obsolete after handover to the pico cell exists, the controller 1608 regenerates only a radio bearer with the exception of the obsolete radio bearer. After generating a recovery request message, the controller 1608 transmits the recovery request message to the macro BS through the modem 1604 and the RF processor 1602. However, when a radio bearer newly added after handover to the pico cell exists, the controller 1608 temporarily stops a service provided through the added radio bearer, and after transmitting the recovery request message, the controller 1608 generates a radio bearer for the stopped service with the macro BS.
FIGURE 18 is a block diagram of a BS in a heterogeneous wireless communication system according to an embodiment of the present invention. The construction of FIGURE 18 may be applicable to a pico BS or a macro BS.
As illustrated in FIGURE 18FIGURE 17includes an RF processor 1702, a modem 1704, a storage unit 1706, a backhaul communication unit 1708, and a controller 1710.
The RF processor 1702 performs a function for transmitting/receiving a signal through a wireless channel, such as signal band conversion, amplification and such. That is, the RF processor 1702 up converts a baseband signal provided from the modem 1704 into an RF band signal and transmits the RF band signal through an antenna, and down converts an RF band signal received through the antenna into a baseband signal.
The modem 1704 performs a function of conversion between a baseband signal and a bit stream according to a physical layer standard of a system. For example, during data transmission, the modem 1704 generates complex symbols by encoding and modulating a transmit bit stream, maps the complex symbols to subcarriers, and configures OFDM symbols through IFFT operation and CP insertion. Also, during data reception, the modem 1704 divides a baseband signal provided from the RF processor 1702 in an OFDM symbol unit, restores signals mapped to subcarriers through FFT operation, and restores a reception bit stream through demodulation and decoding. Also, the modem 1704 measures a channel quality using a receive signal, and detects a physical signal such as a synchronization signal and such.
The storage unit 1706 stores a program for operating the BS, setup information, temporary data and such. For example, the setup information includes system information of a BS, context information of the BS, authentication key information and so forth. The backhaul communication unit 1708 provides an interface for performing communication with other BS through a backhaul network.
The controller 1710 controls general functions of the BS. For example, the controller 1710 generates a data packet and provides the data packet to the modem 1704, and analyzes and processes a data packet provided from the modem 1704. Also, the controller 1710 interprets a control message received through the modem 1704, performs operation corresponding to the control message, processing and such, and generates a control message to be transmitted to an MS. Also, the controller 1710 determines a channel situation through channel quality information, a decoding success rate, a physical signal detection result, and such, which are provided from the modem 1704.
Particularly, the controller 1710 controls a function for supporting an MS to reconnect to a macro BS when the MS suffers an RLF in a pico cell. A function of the controller 1710 for supporting the MS to reconnect to the macro BS is described below.
When the BS is a pico BS according to the first type of embodiments of the present invention, the controller 1710 operates as follows. If an MS performs handover from a macro cell to the pico BS, the controller 1710 transmits a request for releasing context information of the MS to the macro BS and then transmits the full context information of the MS to the macro BS. However, the transmission of the full context information is an operation that follows the request for releasing the context information, and if the release request is not performed, the operation of transmitting the full context information may be omitted. After that, if the context information of the MS is changed, the controller 1710 transmits the changed context information to the macro BS.
When the BS is a macro BS according to the first type of embodiments of the present invention, the controller 1710 operates as follows. After an MS does handover to a pico BS, if context information of the MS is received from the pico BS, the controller 1710 stores the context information in the storage unit 1706. An operation of receiving and storing the context information is carried out on the premise that the context information of the MS has been discarded after the handover of the MS. Thus, if the previous context information is not discarded, an operation of receiving and storing the context information may be omitted. After that, if the changed context information of the MS is received, the controller 1710 updates context information stored in the storage unit 1706 by using the changed context information. Also, if an RRC connection re-establishment request is received from the MS, the controller 1710 determines whether the MS transmitting the RRC connection re-establishment request is an MS corresponding to the stored context information using sender’s identification information included in the RRC connection re-establishment request message. If the MS transmitting the RRC connection re-establishment request is the MS corresponding to the stored context information, the controller 1710 performs an RRC connection re-establishment process according to the request of the MS. At this time, because the context information of the MS has been stored in the storage unit 1706, the RRC connection re-establishment procedure can be performed successfully.
When the BS is a macro BS according to the second type of embodiments of the present invention, the controller 1710 operates as follows. The controller 1710 transmits an instruction for storing system information of the macro BS to an MS doing handover to a pico cell. After that, if the system information of the macro BS is changed, the controller 1710 transmits a system information update message including the changed system information to the pico BS through the backhaul communication unit 1708. Accordingly, the changed system information is forwarded to the MS via the pico BS. Also, if an RRC connection re-establishment request is received from the MS, the controller 1710 performs an RRC connection re-establishment procedure. At this time, if the context information of the MS has not been stored in the storage unit 1706, the RRC connection re-establishment procedure can fail.
When the BS is a macro BS according to the third type of embodiments of the present invention, the controller 1710 operates as follows. The controller 1710 transmits to the MS an instruction for storing context information of an MS doing handover to a pico cell, and forwards a timer value to the MS. And, the controller 1710 stores the context information of the MS, delivers a security key to be provided to a pico BS, and stores the security key in the storage unit 1706. After that, if a recovery request message is received from the MS before the timer expires, the controller 1710 determines whether it is possible to reuse the context information stored in the storage unit 1706. If it is possible to reuse the stored context information, the controller 1710 delivers a new security key for the MS. That is, the controller 1710 delivers a new security key using a security key that has previously been used by the MS in the pico BS and its own PCI and center frequency information. After that, the controller 1710 recovers at least one radio bearer with the MS according to context information stored in the storage unit 1706, and notifies the MS of connection return completion. At this time, when obsolete radio bearer information is included in the recovery request message, the controller 1710 recovers only a radio bearer with the exception of the obsolete radio bearer. After recovering the at least one radio bearer, the controller 1710 transmits a request for context information of an MS to the pico BS through the backhaul communication unit 1708, and acquires the context information from the pico BS. Next, if information on service added to the latest context information acquired from the pico BS exists, the controller 1710 generates a radio bearer for the added service.
As described above, an MS can minimize a service interruption time by reconnecting to a macro cell quickly when the MS suffers an RLF after handover to a pico cell in a heterogeneous wireless communication system.
While the invention has been shown and described with reference to certain preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (15)

  1. A method for an operation of a Mobile Station (MS) in a wireless communication system, the method comprising:
    storing [1303] system information of a first Base Station (BS) taking charge of a first cell when performing handover from the first cell to a second cell;
    detecting [1309] that connection with the second cell is fail without handover; and
    performing [1315] reconnection to the first BS using the stored system information,
    wherein the coverage of the second cell is comprised in the coverage of the first cell.
  2. The method of claim 1, further comprising :
    if [1305] changed system information of the first BS is received from a second BS taking charge of the second cell, updating [1307] the stored system information using the changed system information.
  3. The method of claim 1, wherein performing [1315] the reconnection to the first BS comprises performing [1315] a random access procedure to the first BS using random access related parameters comprised in the stored system information.
  4. An apparatus for a Mobile Station (MS) [1608, 1606] arranged to implement a method of one of claims 1 to 3.
  5. A method for an operation of a Base Station (BS) taking charge of a first cell in a wireless communication system, the method comprising:
    transmitting [407] a request for path switch for a Mobile Station (MS) to an upper node when the MS performs handover from a second cell to a first cell,; and
    if context information of the MS is changed, transmitting [421] the changed context information to a second BS taking charge of the second cell,
    wherein the coverage of the first cell is comprised in the coverage of the second cell.
  6. The method of claim 5, further comprising:
    after transmitting [407] the path switch request, transmitting [415] a request for releasing the context information of the MS to the second BS; and
    transmitting [419] the full context information of the MS to the second BS.
  7. The method of claim 5, wherein the context information comprises at least one of measurement configuration that the MS uses in a source cell, Radio Bearer (RB) configuration information, Media Access Control (MAC) layer configuration information, physical layer related information, Cell - Radio Network Temporary Identifier (C-RNTI), and security related information.
  8. The method of claim 5, further comprising:
    after connection with the MS is fail [423] without handover, forwarding [461] Sequence Number (SN) state information of the MS and data for the MS to the second BS, if a request for data forwarding for the MS is received [459] from the second BS.
  9. An apparatus for a Base Station (BS) [1706, 1708, 1710] arranged to implement a method of one of claims 5 to 8.
  10. A method for an operation of a Base Station (BS) taking charge of a first cell in a wireless communication system, the method comprising:
    after a Mobile Station (MS) performs [405] handover from the first cell to a second cell, receiving [421] changed context information of the MS from a second BS taking charge of the second cell; and
    updating [1107] context information of the MS using the changed context information,
    wherein the coverage of the second cell is comprised in the coverage of the first cell.
  11. The method of claim 10, further comprising:
    after the MS performs handover [405] from the first cell to the second cell, receiving [415] a request for releasing the context information of the MS from the second BS;
    discarding [415] the context information of the MS;
    receiving [1101] the full context information of the MS from the second BS; and
    storing [1103] the full context information of the MS.
  12. The method of claim 10, wherein the context information comprises at least one of measurement configuration that the MS uses in a source cell, Radio Bearer (RB) configuration information, Media Access Control (MAC) layer configuration information, physical layer related information, Cell - Radio Network Temporary Identifier (C-RNTI), and security related information.
  13. The method of claim 10, further comprising:
    if a Radio Resource Control (RRC) re-establishment request message is received [1109] from the MS, determining [1111] that the context information of the MS has been stored;
    performing [825] a Message Authentication Code - Integrity (MAC-I) authentication procedure for the MS;
    sending [827] an RRC re-establishment message to the MS; and
    sending [459] a request for forwarding data for the MS, to the second BS.
  14. The method of claim 10, further comprising:
    after the MS performs handover [505] from the first cell to the second cell, if system information is changed, generating [519] a system information update message of informing the changed system information; and
    sending [521, 523] the system information update message to the MS through the second BS taking charge of the second cell.
  15. An apparatus for a Base Station (BS) [1706, 1708, 1710] arranged to implement a method of one of claims 10 to 14.
PCT/KR2011/003927 2010-05-28 2011-05-27 Apparatus and method for supporting mobility in a heterogeneous wireless communication system WO2011149316A2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2013510035A JP5622930B2 (en) 2010-05-28 2011-05-27 Apparatus and method for supporting mobility in a wireless communication system in which cells are superimposed
EP11786948.7A EP2578018B1 (en) 2010-05-28 2011-05-27 Apparatus and method for supporting mobility in a heterogeneous wireless communication system
CN201180035667.XA CN103026753B (en) 2010-05-28 2011-05-27 Ambulant apparatus and method are supported in heterogeneous wireless communication system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020100050277A KR101724371B1 (en) 2010-05-28 2010-05-28 Apparatus and method for supporting mobility in heterogeneous wireless communication system
KR10-2010-0050277 2010-05-28

Publications (2)

Publication Number Publication Date
WO2011149316A2 true WO2011149316A2 (en) 2011-12-01
WO2011149316A3 WO2011149316A3 (en) 2012-02-23

Family

ID=45004606

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2011/003927 WO2011149316A2 (en) 2010-05-28 2011-05-27 Apparatus and method for supporting mobility in a heterogeneous wireless communication system

Country Status (6)

Country Link
US (1) US10237907B2 (en)
EP (1) EP2578018B1 (en)
JP (1) JP5622930B2 (en)
KR (1) KR101724371B1 (en)
CN (1) CN103026753B (en)
WO (1) WO2011149316A2 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013127565A1 (en) * 2012-03-01 2013-09-06 Nokia Siemens Networks Oy Method to improve reestablishment success rate in lte system – at source enb during ping pongs
GB2504978A (en) * 2012-08-16 2014-02-19 Ip Access Ltd Enabling system information values to be exchanged between cells which are attached to different base station controllers
CN104620668A (en) * 2012-07-05 2015-05-13 Kddi株式会社 Wireless communication terminal, base station, wireless communication method, communication method, wireless communication program, communication program, and wireless communication system
EP2897413A1 (en) * 2013-10-04 2015-07-22 Humax Holdings Co., Ltd. Method for transceiving handover message during connection of plural LTE base stations
WO2015126293A1 (en) * 2014-02-21 2015-08-27 Telefonaktiebolaget L M Ericsson (Publ) Method and devices for protection of control plane functionality
EP2887735A4 (en) * 2012-08-15 2015-09-09 China Academy Of Telecomm Tech Data forwarding method and device
EP2903338A4 (en) * 2012-09-25 2016-06-22 Ntt Docomo Inc Mobile communication method
EP3032876A4 (en) * 2013-08-05 2016-07-20 Fujitsu Ltd Base station apparatus, mobile terminal, and wireless communication system
JPWO2014103098A1 (en) * 2012-12-28 2017-01-12 日本電気株式会社 Wireless communication system, base station, mobile station, communication control method, and program
JPWO2014103097A1 (en) * 2012-12-28 2017-01-12 日本電気株式会社 Wireless communication system, base station, mobile station, communication control method, and program
JP2019205207A (en) * 2012-10-30 2019-11-28 ソニー株式会社 User device, base station, and method thereof
GB2600088A (en) * 2020-10-07 2022-04-27 British Telecomm A method of operating user equipment in a telecommunications network

Families Citing this family (113)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101527978B1 (en) * 2008-08-06 2015-06-18 엘지전자 주식회사 Method and apparatus of communication using subframe between base station and relay
PL2454902T3 (en) * 2009-06-23 2014-02-28 Ericsson Telefon Ab L M Method and arrangements to reconfigure a radio base station in a wireless communication system
CN102448131B (en) * 2010-09-30 2015-04-29 华为技术有限公司 Message processing method, device and system thereof
CN102740494A (en) * 2011-04-02 2012-10-17 上海贝尔股份有限公司 Method for carrying out random access
KR101932107B1 (en) 2011-05-02 2018-12-24 삼성전자 주식회사 Method and apparatus for performining and controlling access of user equipment
GB2490968A (en) 2011-05-20 2012-11-21 Nec Corp Sharing radio access networks fairly between multiple operators
WO2013007313A1 (en) * 2011-07-14 2013-01-17 Telefonaktiebolaget L M Ericsson (Publ) Reactivation of dedicated bearers
CN102883441B (en) * 2011-07-15 2015-04-22 华为技术有限公司 Wireless broadband communication method and device
US8395985B2 (en) 2011-07-25 2013-03-12 Ofinno Technologies, Llc Time alignment in multicarrier OFDM network
US20130039287A1 (en) * 2011-08-12 2013-02-14 Venkata Ratnakar Rao Rayavarapu Simplified ue + enb messaging
US8848592B2 (en) 2011-08-15 2014-09-30 Lg Electronics Inc. Method and apparatus for supporting CSG service in wireless communication system
JP5767530B2 (en) * 2011-08-15 2015-08-19 株式会社Nttドコモ Wireless communication system and communication control method
JP2014532339A (en) * 2011-09-30 2014-12-04 富士通株式会社 Method for realizing multimedia broadcast multicast service, home base station, and user apparatus
JP5882493B2 (en) * 2011-11-15 2016-03-09 京セラ株式会社 Node detection in cellular communication networks
US10004022B2 (en) 2011-11-15 2018-06-19 Kyocera Corporation Handover signaling using an MBSFN channel in a cellular communication system
US9872275B2 (en) 2011-11-15 2018-01-16 Kyocera Corporation Inter-cell messaging using MBSFN Subframe
GB2496611B (en) * 2011-11-15 2014-11-26 Broadcom Corp Apparatus and method for wireless device
WO2013093192A1 (en) * 2011-12-19 2013-06-27 Nokia Corporation Deterministic user equipment barring
US9820210B2 (en) * 2011-12-22 2017-11-14 Nec Corporation Base station, communication system, and control method for base station
CN103188663B (en) * 2011-12-27 2016-08-03 华为技术有限公司 The safe communication method of carrier aggregation and equipment between base station
US8526389B2 (en) 2012-01-25 2013-09-03 Ofinno Technologies, Llc Power scaling in multicarrier wireless device
US9237537B2 (en) 2012-01-25 2016-01-12 Ofinno Technologies, Llc Random access process in a multicarrier base station and wireless device
EP3937551A3 (en) 2012-01-25 2022-02-09 Comcast Cable Communications, LLC Random access channel in multicarrier wireless communications with timing advance groups
EP2813023A1 (en) * 2012-02-10 2014-12-17 Nokia Solutions and Networks Oy Inter-site carrier aggregation
US20130259008A1 (en) 2012-04-01 2013-10-03 Esmael Hejazi Dinan Random Access Response Process in a Wireless Communications
EP2835023B1 (en) 2012-04-01 2021-09-01 Comcast Cable Communications, LLC Cell group configuration in a wireless device and base station with timing advance groups
US11943813B2 (en) 2012-04-01 2024-03-26 Comcast Cable Communications, Llc Cell grouping for wireless communications
US8989128B2 (en) 2012-04-20 2015-03-24 Ofinno Technologies, Llc Cell timing in a wireless device and base station
US11825419B2 (en) 2012-04-16 2023-11-21 Comcast Cable Communications, Llc Cell timing in a wireless device and base station
US11252679B2 (en) 2012-04-16 2022-02-15 Comcast Cable Communications, Llc Signal transmission power adjustment in a wireless device
US8958342B2 (en) 2012-04-17 2015-02-17 Ofinno Technologies, Llc Uplink transmission power in a multicarrier wireless device
US8964593B2 (en) 2012-04-16 2015-02-24 Ofinno Technologies, Llc Wireless device transmission power
EP3337079A1 (en) 2012-04-16 2018-06-20 Comcast Cable Communications, LLC Cell group configuration for uplink transmission in a multicarrier wireless device and base station with timing advance groups
US11582704B2 (en) 2012-04-16 2023-02-14 Comcast Cable Communications, Llc Signal transmission power adjustment in a wireless device
US9179425B2 (en) 2012-04-17 2015-11-03 Ofinno Technologies, Llc Transmit power control in multicarrier communications
US9510387B2 (en) * 2012-05-04 2016-11-29 Nokia Technologies Oy Recovering connection in LTE local area network for EPS and local services
WO2013169006A1 (en) * 2012-05-08 2013-11-14 Lg Electronics Inc. Method and apparatus for transmitting message in wireless communication system
EP2850875A4 (en) * 2012-05-11 2016-01-20 Ericsson Telefon Ab L M Method and apparatus for energy saving
WO2013173957A1 (en) * 2012-05-21 2013-11-28 Nokia Corporation Method and apparatus for managing radio bearer for user equipment
US8824411B2 (en) 2012-05-24 2014-09-02 Apple Inc. Tune-away detection based adaptive link adaptation for hybrid transceivers
EP2861020B1 (en) * 2012-06-08 2017-04-05 Huawei Technologies Co., Ltd. Signalling plane of a target base station carried out by another base station
KR101410995B1 (en) 2012-06-15 2014-07-01 주식회사 케이티 Mobile communication system for providing carrier aggregation between digital units and method for processing signal in the same
US9210619B2 (en) 2012-06-20 2015-12-08 Ofinno Technologies, Llc Signalling mechanisms for wireless device handover
US9107206B2 (en) 2012-06-18 2015-08-11 Ofinne Technologies, LLC Carrier grouping in multicarrier wireless networks
US8971298B2 (en) 2012-06-18 2015-03-03 Ofinno Technologies, Llc Wireless device connection to an application server
US9179457B2 (en) 2012-06-20 2015-11-03 Ofinno Technologies, Llc Carrier configuration in wireless networks
US9113387B2 (en) * 2012-06-20 2015-08-18 Ofinno Technologies, Llc Handover signalling in wireless networks
US9084228B2 (en) 2012-06-20 2015-07-14 Ofinno Technologies, Llc Automobile communication device
US11882560B2 (en) 2012-06-18 2024-01-23 Comcast Cable Communications, Llc Carrier grouping in multicarrier wireless networks
US11622372B2 (en) 2012-06-18 2023-04-04 Comcast Cable Communications, Llc Communication device
KR102000567B1 (en) * 2012-07-11 2019-10-01 삼성전자주식회사 Apparatus and method for configuring a wireless backhaul link automatically in a wireless communication system
CN103581942B (en) * 2012-07-31 2017-08-11 电信科学技术研究院 A kind of processing method of Radio Link Failure, apparatus and system
WO2014047772A1 (en) 2012-09-25 2014-04-03 华为技术有限公司 Method, small cell, and mobile communication system for processing radio link failure
JP6023530B2 (en) * 2012-09-25 2016-11-09 株式会社Nttドコモ Mobile communication method
CN103716813B (en) * 2012-09-28 2017-12-05 华为技术有限公司 Link quality information processing method and base station
CN103716885B (en) * 2012-09-28 2017-09-29 电信科学技术研究院 A kind of local load bearing management method and equipment
IN2015DN02602A (en) * 2012-10-19 2015-09-18 Ericsson Telefon Ab L M
US9119182B2 (en) 2012-10-19 2015-08-25 Qualcomm Incorporated Methods and apparatus for expression use during D2D communications in a LTE based WWAN
WO2014065580A1 (en) * 2012-10-26 2014-05-01 Lg Electronics Inc. Method for configuring state of cell at user equipment in wireless communication system and an apparatus therefor
CN103813375B (en) * 2012-11-14 2017-11-21 华为技术有限公司 Measurement processing method and terminal, small base station
US9596636B2 (en) * 2012-12-03 2017-03-14 Telefonaktiebolaget Lm Ericsson (Publ) Method performed by a network node, network node and computer program for supporting cell selection of user equipments in a wireless communication network
KR20140074649A (en) * 2012-12-10 2014-06-18 삼성전자주식회사 Apparatus and method for managing mobility of a terminal in a communication system
CN104012137B (en) * 2012-12-21 2019-01-15 华为技术有限公司 Minimize drive test measurement method, user equipment and the network equipment
CN114449603A (en) 2012-12-24 2022-05-06 北京三星通信技术研究有限公司 Base station in wireless communication system and method performed by the same
CN103906152B (en) * 2012-12-24 2022-02-25 北京三星通信技术研究有限公司 Method for supporting UE quick recovery
CN110493776B (en) 2012-12-28 2023-05-16 北京三星通信技术研究有限公司 Method for synchronizing encryption information between secondary cell and UE
US9973986B2 (en) * 2013-01-17 2018-05-15 Intel IP Corporation Systems and methods for mobility optimization in a heterogeneous network
US9930581B2 (en) * 2013-01-22 2018-03-27 Avago Technologies General Ip (Singapore) Pte. Ltd. Addressing communication failure in multiple connection systems
US10645621B2 (en) * 2013-04-04 2020-05-05 Nokia Technologies Oy Small cell offloading command
CN105309007B (en) * 2013-04-05 2019-04-26 诺基亚技术有限公司 Key mismatch is avoided in the safe handling for multiband
US9549350B2 (en) 2013-04-15 2017-01-17 Nokia Solutions And Networks Oy Methods and apparatus for handover management
CN104105221B (en) * 2013-04-15 2019-05-21 中兴通讯股份有限公司 A kind of implementation method of dual link and base station
GB2513313A (en) * 2013-04-22 2014-10-29 Sony Corp Infrastructure equipment, mobile communications network and method
US20140335861A1 (en) * 2013-05-08 2014-11-13 Nokia Siemens Networks Oy Methods and Apparatus for Handover Management
WO2014182233A2 (en) * 2013-05-08 2014-11-13 Telefonaktiebolaget L M Ericsson (Publ) Packet data transfer re-establishment
CN104284357B (en) * 2013-07-02 2018-10-19 华为技术有限公司 A kind of processing method and system of data transmission exception, macro base station
US9838158B2 (en) 2013-07-17 2017-12-05 Lg Electronics Inc. Method for reporting a radio link control re-transmission failure and a device therefor
CN111132251B (en) * 2013-08-02 2022-05-13 三星电子株式会社 Terminal in communication system and method thereof
WO2015018028A1 (en) 2013-08-08 2015-02-12 Nokia Corporation A method and apparatus for proxy algorithm identity selection
KR102078866B1 (en) 2013-08-09 2020-02-19 삼성전자주식회사 SCHEME FOR Security key management for PDCP distribution in dual connectivity
US9301331B2 (en) * 2013-09-13 2016-03-29 Intel IP Corporation Mobile radio communication devices, mobile radio communication networks, and methods for controlling the same
US10542435B2 (en) 2013-09-24 2020-01-21 Qualcomm Incorporated Carrier sense adaptive transmission (CSAT) in unlicensed spectrum
US10356623B2 (en) 2013-09-24 2019-07-16 Qualcomm Incorporated Techniques for performing carrier sense adaptive transmission in unlicensed spectrum
US9775048B2 (en) 2013-09-24 2017-09-26 Qualcomm Incorporated Performance of a user equipment (UE) in unlicensed spectrum
CN104581698B (en) * 2013-10-14 2018-01-30 普天信息技术有限公司 Dual link user identifies determination method and macro cell base station and small-cell base station
US10419989B2 (en) * 2013-10-16 2019-09-17 Taiwan Semiconductor Manufacturing Company, Ltd. Direct link mode for small cells of cellular wireless communication networks
CN104936169B (en) * 2014-03-18 2018-09-04 中国移动通信集团公司 A kind of safety verification processing method, device, terminal and base station
RU2634704C1 (en) 2014-07-11 2017-11-03 Хуавей Текнолоджиз Ко., Лтд. Method for transmisting service between cells, base station and system
CN105307220A (en) * 2014-07-15 2016-02-03 中兴通讯股份有限公司 D2D service switch implementation method and device
US10070364B2 (en) * 2014-07-21 2018-09-04 Intel IP Corporation Neighbor cell system information provisioning
WO2016061783A1 (en) * 2014-10-23 2016-04-28 Nokia Solutions And Networks Oy Method, apparatus and system
US11395157B2 (en) * 2014-11-07 2022-07-19 Telefonaktiebolaget Lm Ericsson (Publ) Optimized detection of unnecessary inter-RAT handover
JP6804986B2 (en) * 2015-01-30 2020-12-23 京セラ株式会社 User terminal and base station
US20160316373A1 (en) * 2015-04-27 2016-10-27 Qualcomm Incorporated Techniques for managing security mode command (smc) integrity failures at a user equipment (ue)
CN107211328B (en) 2015-05-29 2020-01-31 华为技术有限公司 System information acquisition method under cell clusters and related equipment and system
PT3335501T (en) 2015-08-14 2020-10-09 Ericsson Telefon Ab L M First communication device and methods therein, for sending one or more control signals to a second communication device
JP6208296B1 (en) * 2015-11-05 2017-10-04 株式会社Nttドコモ User apparatus, base station, and connection establishment method
WO2017171466A1 (en) * 2016-04-01 2017-10-05 Samsung Electronics Co., Ltd. Method and apparatus supportive of recovering ue context between base stations
KR102502279B1 (en) * 2016-07-08 2023-02-21 삼성전자 주식회사 Method and apparatus for performing a handover in a wireless communication system
WO2018010126A1 (en) * 2016-07-13 2018-01-18 广东欧珀移动通信有限公司 System information transmission method and apparatus
JP2019525640A (en) * 2016-08-12 2019-09-05 華為技術有限公司Huawei Technologies Co.,Ltd. Data processing method and related device
CN109792615A (en) * 2016-10-04 2019-05-21 瑞典爱立信有限公司 The detection of potential system reference conflict
EP3547787B1 (en) * 2016-12-30 2021-11-03 Huawei Technologies Co., Ltd. Methods, device and system for link re-establishment
WO2018170890A1 (en) * 2017-03-24 2018-09-27 富士通株式会社 System information indication method and apparatus, and communication system
WO2018227480A1 (en) 2017-06-15 2018-12-20 Qualcomm Incorporated Refreshing security keys in 5g wireless systems
CN113301596B (en) 2017-11-24 2023-06-06 北京禾怡管理咨询有限公司 Wireless communication method and device
WO2019227446A1 (en) * 2018-05-31 2019-12-05 北京小米移动软件有限公司 Ac barring method and device
US11032750B2 (en) * 2018-07-10 2021-06-08 Qualcomm Incorporated Enhanced make-before-break (MBB) handover failure
JP7265633B2 (en) * 2019-01-04 2023-04-26 鴻穎創新有限公司 Method and apparatus for PLMN selection and cell (re)selection
CN111586769B (en) * 2019-02-15 2021-10-15 华为技术有限公司 Switching method, device and system in wireless communication system
US11425616B2 (en) 2019-10-17 2022-08-23 Samsung Electronics Co., Ltd. Method and apparatus for updating security key in wireless communication system
CN112135299A (en) * 2020-09-25 2020-12-25 大连市共进科技有限公司 5G physical cell identifier configuration method and device and terminal equipment
WO2024073748A1 (en) * 2022-09-29 2024-04-04 Google Llc Managing communication failures in a user equipment

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6505058B1 (en) * 1998-12-04 2003-01-07 Motorola, Inc. Method for determining whether to wake up a mobile station
JP2001103531A (en) * 1999-09-30 2001-04-13 Nec Corp Radio lan base station selecting device
US7050793B1 (en) * 2001-04-04 2006-05-23 Nortel Networks Limited Context transfer systems and methods in support of mobility
US7206579B2 (en) * 2001-12-21 2007-04-17 Ntt Docomo, Inc. Adaptive IP handoff triggering and iterative tuning of IP handoff trigger timing
AU2003271881A1 (en) * 2002-10-04 2004-04-23 M-Stack Limited Access stratum manager
US8218530B2 (en) * 2006-01-05 2012-07-10 Qualcomm Incorporated Seamless handoff between access networks with saved session information
GB0602402D0 (en) * 2006-02-07 2006-03-15 Lucent Technologies Inc Interworking between communication systems
EP2113157B1 (en) * 2007-02-20 2016-09-07 Telefonaktiebolaget LM Ericsson (publ) Handover from a macro cell back to a femto cell
US8700043B2 (en) 2007-08-08 2014-04-15 Samsung Electronics Co., Ltd Apparatus and method for connecting radio link in wireless communication system having private network cell
EP2028890B1 (en) * 2007-08-12 2019-01-02 LG Electronics Inc. Handover method with link failure recovery, wireless device and base station for implementing such method
JP5167769B2 (en) 2007-11-09 2013-03-21 富士通株式会社 Communication control device
EP3261372B1 (en) * 2007-12-06 2020-03-18 Telefonaktiebolaget LM Ericsson (publ) Method and arrangement in a telecommunication system
WO2009096883A1 (en) * 2008-01-18 2009-08-06 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for radio link failure recovery in a telecommunication system
US8699450B2 (en) 2008-05-11 2014-04-15 Qualcomm Incorporated Systems and methods for multimode wireless communication handoff
JP5133127B2 (en) 2008-05-15 2013-01-30 京セラ株式会社 Wireless communication system, wireless base station, and wireless communication method
JP4394730B1 (en) * 2008-06-27 2010-01-06 株式会社エヌ・ティ・ティ・ドコモ Mobile communication method and mobile station
US8909236B2 (en) 2008-08-22 2014-12-09 Qualcomm Incorporated Provisioning femtocell deployment information
KR20100037262A (en) 2008-10-01 2010-04-09 삼성전자주식회사 Method for initiating handover in femto cell and system thereof
KR101572885B1 (en) * 2008-10-30 2015-11-30 엘지전자 주식회사 Method of handover and base station information transmission in wireless communication system
KR20100048350A (en) * 2008-10-31 2010-05-11 삼성전자주식회사 Apparatus and method for operate small cell in wireless communication system
US20100113027A1 (en) * 2008-11-01 2010-05-06 Broadband Wireless Technology Corp Apparatus, Method, And Tangible Machine-Readable Medium Thereof For CallBack HandOver Procedure In A FemTo-Network
US20110007719A1 (en) * 2008-11-26 2011-01-13 Chi-Chen Lee Method for setting transmission timing of wireless communication apparatus
CN101466125A (en) 2008-12-10 2009-06-24 上海华为技术有限公司 Switch processing method, household base station gateway and network system
CN102804850B (en) * 2009-06-26 2015-06-10 Lg电子株式会社 Method of logging measurement result at handover failure in wireless communication system
EP2514262A1 (en) * 2009-12-16 2012-10-24 Nokia Siemens Networks Oy Apparatus and method

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
"3GPP DRAFT; R1 -090856 TP FOR TR FOR MOBILITY STUDIES, 3rd GENERATION PARTNERSHIP PROJECT (3GPP", 3 February 2009, MOBILE COMPETENCE CENTRE, article "3rd Generation Partnership Project;Technical Specification Group Radio Access Network;E-UTRAN Mobility Evaluation and Enhancement;(Release 9"
"3GPP DRAFT; R1-090857 POSSIBLE SOLUTIONS TO IMPROVE MOBILITY PERFORMANCE, 3RD GENERATION PARTNERSHIP PROJECT (3GPP", vol. RAN WG1, 3 February 2009, MOBILE COMPETENCE CENTRE, article "Possible solutions to improve mobility performance"
"3GPP DRAFT; R2-083292 TEXT PROPOSAL TO 36.331 [REL-8] ON CORRECTION TO RB SUSPENSION VI, 3RD GENERATION PARTNERSHIP PROJECT (3GPP", vol. RAN WG2, 24 June 2008, MOBILE COMPETENCE CENTRE, article "TP on Correction to RB Suspension"
"3GPP DRAFT; R3-091786, 3RD GENERATION PARTNERSHIP PROJECT (3GPP", 20 August 2009, MOBILE COMPETENCE CENTRE, article "Early handover detection"
"3GPP DRAFT; Rl-091446 FURTHER EVALUATIONS OF MOBILITY PERFORMANCE IN LTE, 3RD GENERATION PARTNERSHIP PROJECT (3GPP", vol. RAN WG1, 28 March 2009, MOBILE COMPETENCE CENTRE, article "Further evaluation of mobility performance in LTE"
See also references of EP2578018A4

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9008660B2 (en) 2012-03-01 2015-04-14 Nokia Solutions And Networks Oy Method to improve reestablishment success rate in LTE system-at source ENB during ping pongs
WO2013127565A1 (en) * 2012-03-01 2013-09-06 Nokia Siemens Networks Oy Method to improve reestablishment success rate in lte system – at source enb during ping pongs
EP2871911A4 (en) * 2012-07-05 2016-07-20 Kddi Corp Wireless communication terminal, base station, wireless communication method, communication method, wireless communication program, communication program, and wireless communication system
CN104620668A (en) * 2012-07-05 2015-05-13 Kddi株式会社 Wireless communication terminal, base station, wireless communication method, communication method, wireless communication program, communication program, and wireless communication system
CN104620668B (en) * 2012-07-05 2019-09-20 Kddi株式会社 Wireless communication terminal, base station, wireless communications method, communication means, radio communication program, signal procedure and wireless communication system
US9980311B2 (en) 2012-07-05 2018-05-22 Kddi Corporation Apparatus and method of resuming wireless communication via interterminal communication between wireless communication terminals
US9872208B2 (en) 2012-08-15 2018-01-16 China Academy Of Telecommunications Technology Data forwarding method and device
EP2887735A4 (en) * 2012-08-15 2015-09-09 China Academy Of Telecomm Tech Data forwarding method and device
WO2014026830A1 (en) * 2012-08-16 2014-02-20 Ip.Access Limited Network elements, cellular communication system and methods therefor
GB2504978A (en) * 2012-08-16 2014-02-19 Ip Access Ltd Enabling system information values to be exchanged between cells which are attached to different base station controllers
GB2504978B (en) * 2012-08-16 2014-11-12 Ip Access Ltd Network elements, cellular communication system and methods therefor
EP2903338A4 (en) * 2012-09-25 2016-06-22 Ntt Docomo Inc Mobile communication method
EP3442270A1 (en) * 2012-09-25 2019-02-13 Ntt Docomo, Inc. Mobile communication method for dual connectivity
JP2019205207A (en) * 2012-10-30 2019-11-28 ソニー株式会社 User device, base station, and method thereof
US11606733B2 (en) 2012-12-28 2023-03-14 Nec Corporation Radio communication system, base station, mobile station, communication control method, and computer readable medium
JPWO2014103097A1 (en) * 2012-12-28 2017-01-12 日本電気株式会社 Wireless communication system, base station, mobile station, communication control method, and program
JPWO2014103098A1 (en) * 2012-12-28 2017-01-12 日本電気株式会社 Wireless communication system, base station, mobile station, communication control method, and program
US11356924B2 (en) 2012-12-28 2022-06-07 Nec Corporation Radio communication system, base station, mobile station, communication control method, and computer readable medium
US10440630B2 (en) 2012-12-28 2019-10-08 Nec Corporation Radio communication system, base station, mobile station, communication control method, and computer readable medium
US10575228B2 (en) 2012-12-28 2020-02-25 Nec Corporation Radio communication system, base station, mobile station, communication control method, and computer readable medium
US9832702B2 (en) 2013-08-05 2017-11-28 Fujitsu Limited Base station device, mobile terminal, and radio communication system
EP3032876A4 (en) * 2013-08-05 2016-07-20 Fujitsu Ltd Base station apparatus, mobile terminal, and wireless communication system
EP2897413A1 (en) * 2013-10-04 2015-07-22 Humax Holdings Co., Ltd. Method for transceiving handover message during connection of plural LTE base stations
US10219158B2 (en) 2014-02-21 2019-02-26 Telefonaktiebolaget Lm Ericsson (Publ) Method and devices for protection of control plane functionality
WO2015126293A1 (en) * 2014-02-21 2015-08-27 Telefonaktiebolaget L M Ericsson (Publ) Method and devices for protection of control plane functionality
GB2600088A (en) * 2020-10-07 2022-04-27 British Telecomm A method of operating user equipment in a telecommunications network
GB2600088B (en) * 2020-10-07 2023-06-14 British Telecomm A method of operating user equipment in a telecommunications network

Also Published As

Publication number Publication date
EP2578018B1 (en) 2020-04-22
US20110294508A1 (en) 2011-12-01
EP2578018A2 (en) 2013-04-10
CN103026753B (en) 2017-06-09
WO2011149316A3 (en) 2012-02-23
JP5622930B2 (en) 2014-11-12
EP2578018A4 (en) 2017-01-11
KR101724371B1 (en) 2017-04-10
KR20110130782A (en) 2011-12-06
CN103026753A (en) 2013-04-03
US10237907B2 (en) 2019-03-19
JP2013526239A (en) 2013-06-20

Similar Documents

Publication Publication Date Title
WO2011149316A2 (en) Apparatus and method for supporting mobility in a heterogeneous wireless communication system
WO2014104705A1 (en) Method and system for supporting fast recovery of user equipment
WO2015167261A1 (en) Method and apparatus for transmitting a handover report and an rlf report
WO2011139096A2 (en) Method and apparatus for performing handover
WO2015020449A1 (en) Security key generation and management method of pdcp distributed structure for supporting dual connectivity
WO2013112021A1 (en) Method and apparatus for transmitting and receiving data by using plurality of carriers in mobile communication systems
WO2014017838A1 (en) Handover method and apparatus thereof
WO2014058139A1 (en) Method and apparatus for mobility management
WO2015115814A1 (en) Efficient session management method and apparatus guaranteeing terminal mobility
WO2018143713A1 (en) Operation method and apparatus of network and terminal for supporting mobility of terminal in wireless communication system
WO2011139112A2 (en) Method and apparatus for establishing connection between enb
WO2019160281A1 (en) Method and apparatus for performing dc based handover
WO2015069005A1 (en) Device and method for connection reconfiguration in mobile communication system
WO2019194649A1 (en) Method for performing cell reselection and device supporting the same
WO2014168450A1 (en) Resource management method and apparatus for use in wireless communication system
WO2019031827A1 (en) Method and apparatus for keeping dc configuration
WO2015012631A1 (en) Method for resolving security issues using nh and ncc pairs in mobile communication system
WO2014142487A1 (en) Method for managing information about on/off small cells in radio access system and apparatus for supporting same
WO2013005992A2 (en) Method for avoiding handover failure
WO2014065636A1 (en) Mobile terminal preparation
WO2011149309A2 (en) Method for performing handover in broadband wireless access system
WO2022075626A1 (en) Method and apparatus for managing link in wireless communication
WO2019074297A1 (en) Method and apparatus for changing pdcp version
WO2012148206A2 (en) Method and device for providing continuity in mbms service
WO2016043369A1 (en) Handover method between heterogeneous wireless communication techniques and device for same

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201180035667.X

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11786948

Country of ref document: EP

Kind code of ref document: A2

ENP Entry into the national phase

Ref document number: 2013510035

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2011786948

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE