WO2012135996A1 - Slotted access for wireless communication devices and control thereof - Google Patents

Slotted access for wireless communication devices and control thereof Download PDF

Info

Publication number
WO2012135996A1
WO2012135996A1 PCT/CN2011/072436 CN2011072436W WO2012135996A1 WO 2012135996 A1 WO2012135996 A1 WO 2012135996A1 CN 2011072436 W CN2011072436 W CN 2011072436W WO 2012135996 A1 WO2012135996 A1 WO 2012135996A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
wireless communication
time intervals
preamble
communication device
Prior art date
Application number
PCT/CN2011/072436
Other languages
French (fr)
Inventor
Jialin Zou
Sudeep Palat
Yu Chen
Original Assignee
Alcatel Lucent
Alcatel-Lucent Shanghai Bell Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel Lucent, Alcatel-Lucent Shanghai Bell Co., Ltd. filed Critical Alcatel Lucent
Priority to KR1020137028159A priority Critical patent/KR101583499B1/en
Priority to PCT/CN2011/072436 priority patent/WO2012135996A1/en
Priority to JP2014502971A priority patent/JP5837180B2/en
Priority to EP11863239.7A priority patent/EP2695469B1/en
Priority to CN201180069568.3A priority patent/CN103477697B/en
Priority to US14/009,422 priority patent/US9380606B2/en
Publication of WO2012135996A1 publication Critical patent/WO2012135996A1/en
Priority to US15/145,524 priority patent/US20160249387A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • H04W74/0841Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure with collision treatment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/02Selection of wireless resources by user or terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/18Negotiating wireless communication parameters

Definitions

  • This invention relates generally to communication systems, and, more particularly, to wireless communication systems.
  • a machine type communication (MTC) device differs from traditional human-to-human (H2H) communication devices because a MTC device typically involves communication between entities that do not necessarily need human interaction.
  • MTC device can be wireless user equipment configured to gather measurement information and report this information to a central server at a particular time interval.
  • MTC devices can be used in a wide variety of contexts such as remote meter reading for water and power companies, wireless burglar and/or fire alarm monitoring, weather monitoring, vehicle tracking, medical monitoring, and the like.
  • MTC devices have operational characteristics that differ markedly from the operational characteristics of conventional human-to-human (H2H) wireless communication devices.
  • Conventional H2H communication usually requires allocating resources for substantially continuous duplex communication between users for intervals as long as several minutes or even hours.
  • MTC devices typically transmit relatively small amounts of information in bursts separated by relatively long and sometimes irregular intervals.
  • a MTC device for remotely reading a water meter may only transmit a burst of information indicating water usage on a monthly basis.
  • a burglar alarm monitor may only transmit bursts of information when the alarm is triggered. Consequently, MTC devices are also typically significantly more delay tolerant than conventional H2H devices since voice communication requires delays of less than 100 ms or better.
  • a MTC device that reads and reports water usage may be able to tolerate transmission delays of days or even weeks.
  • MTC devices are often fixed to particular locations and so the mobility of these devices may be significantly lower than the expected mobility of a H2H device.
  • the distribution of MTC devices is expected to be significantly different than the distribution of handheld wireless communication devices.
  • Current generations (2G/3G) of wireless communication systems have been designed to accommodate capacities on the order of 100 users per cell based on expected densities of H2H devices.
  • the number of MTC devices in each cell is expected to be at least an order of magnitude higher and each cell may have to support thousands of MTC devices.
  • Randomly transmitted access signals from such a large number of MTC devices such as access signals transmitted over a random access channel, will almost certainly lead to a very large number of collisions.
  • transmissions from some kinds of MTC devices tend to be strongly correlated in time.
  • an office building may have a very large number of remotely-monitored fire alarms. Under normal conditions the fire alarms generate virtually no traffic except perhaps a periodic "I'm alive" pulse to verify they are operating. However, if a fire breaks out all of the alarms may begin to concurrently transmit large bursts of information. Correlated bursts of information from large numbers of MTC devices in a cell can generate overload conditions, congestion, and collisions between access signals.
  • One proposal for flattening the time distribution of access signals from machine type devices is to allow a central entity to schedule the access signals using a polling scheme.
  • the polling based scheme requires a central entity in the network (such as the E-UTRAN) to page each device at a predetermined reporting time to determine whether the device has information to transmit.
  • a central entity in the network such as the E-UTRAN
  • this approach introduces much signaling overhead, particularly over the forward link.
  • the efficiency gains from flattening the access transmission distribution are not thought to justify the high cost in overhead and complexity introduced by this method.
  • the disclosed subject matter is directed to addressing the effects of one or more of the problems set forth above.
  • the following presents a simplified summary of the disclosed subject matter in order to provide a basic understanding of some aspects of the disclosed subject matter. This summary is not an exhaustive overview of the disclosed subject matter. It is not intended to identify key or critical elements of the disclosed subject matter or to delineate the scope of the disclosed subject matter. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is discussed later.
  • a method includes selecting, at a wireless communication device, one of a plurality of time intervals in a periodically repeating access cycle for transmission of an access signal, the selection being performed based on an identification number identifying the wireless communication device; negotiating, at the wireless communication device, a preamble assignment for the selected one of the plurality of time intervals; and transmitting, at the wireless communication device, the access signal over an access channel in the selected one of the plurality of time intervals using a preamble corresponding to the preamble assignment.
  • the IDs of the communication devices are pre-arranged or assigned to minimize the number of the devices sharing a specific time interval.
  • negotiating the preamble includes requesting the preamble assignment for the selected one of the plurality of time intervals from a network node and receiving the preamble assignment for the selected one of the plurality of time intervals from the network node.
  • the preamble assignment for the selected one of the plurality of time intervals may be unique to the wireless communication device.
  • the method also includes receiving a blocking signal indicating at least a first time interval of the plurality of time intervals in which access should be prevented and blocking transmission of the access signal over an access channel in the selected one of the plurality of time intervals using a preamble corresponding to the preamble assignment based on the blocking signal.
  • the method also includes defining the plurality of time intervals in the access cycle based on synchronization information broadcast over an air interface to the wireless communication device so that the wireless communication device is synchronized with other wireless communication devices on the same access cycle with the same numbering of the time intervals.
  • the plurality of time intervals are a plurality of time slots in the periodically repeating access cycle, and selecting one of the plurality of time intervals includes selecting one of the plurality of time slots based on a slot numbering comprising system frame number associated with the selected one of the slots and broadcast over the air interface.
  • selecting one of the plurality of time slots may include selecting a time slot associated with a system frame number when the system frame number is equal to the identification number modulo a period of the access cycle.
  • selecting one of the plurality of time slots includes selecting a time slot associated with a system frame number when the system frame number is equal to a selected portion or permutation of the identification number.
  • selecting one of the plurality of time slots comprises selecting a time slot associated with a system frame number when the system frame number is equal to a hash of the identification number.
  • a period of the access cycle is equal to a period of a paging cycle for the wireless communication device
  • selecting said one of the plurality of time intervals for the access signal comprises selecting a time interval immediately following a time interval assigned for paging the wireless communication device. Selecting said one of the plurality of time intervals may include selecting one of the plurality of time intervals in an access cycle determined by a reporting interval for the wireless communication device.
  • a method comprises constraining a wireless communication device to transmit access signals over an access channel corresponding to a negotiated preamble assignment during one of a plurality of time slots that make up a periodically repeating access cycle.
  • constraining the wireless communication device to transmit the access signals over the access channel corresponding to the negotiated preamble assignment during the one of a. plurality of time slots may include constraining the wireless communication device to transmit in the one of the plurality of time slots associated with a system frame number when the system frame number is equal to the identification number modulo a period of the access cycle.
  • constraining the wireless communication device to transmit the access signals over the access channel corresponding to the negotiated preamble assignment during the one of a plurality of time slots may include constraining the wireless communication device to transmit on the access channel corresponding to the negotiated preamble assignment received from a network node for the one of the plurality of time intervals.
  • the preamble assignment for the one of the plurality of time intervals is unique to the wireless communication device.
  • the method also includes receiving a blocking signal indicating at least a first time interval of the plurality of time intervals in which access signals should be prevented and constraining the wireless communication device from transmitting in the one of the plurality of time intervals when the first time interval corresponds to the first time interval of the plurality of time intervals.
  • constraining the wireless communication device to transmit in said one of the plurality of time slots may include constraining the wireless communication device to transmit in a time slot associated with a system frame number when the system frame number is equal to a selected portion of the identification number, when the system frame number is equal to a hash of the identification number, or when the system frame number is pre-assigned by the base station.
  • a period of the access cycle is equal to a period of a paging cycle for the wireless communication device, and wherein constraining the wireless communication device to transmit in said one of the plurality of time intervals comprises constraining the wireless communication device to transmit in a time interval immediately following or at a time interval assigned for paging the wireless communication device.
  • the method includes transmitting the access signal from the wireless communication device in said one of the plurality of time intervals during an access cycle determined by a reporting interval for the wireless communication device.
  • a method comprises, in response to receipt of a request from a wireless communication device for a preamble assignment for one of a plurality of time intervals that make up a periodically repeating access cycle: determining by a network node a unique preamble assignment for the wireless communication device for the one of the plurality of time interval, and providing, from a network node, the unique preamble assignment for the one of the plurality of time intervals to the wireless communication device.
  • the method further includes broadcasting, from the network node, information defining a plurality of time slots that make up a periodically repeating access cycle for a random access channel, wherein each wireless communication device served by the base station is constrained to transmit access signal signals over the access channel during a selected one of a plurality of time slots.
  • the method includes detecting a collision between an MTC device and a human to human device, and sending the response with the ID of the human to human device.
  • the method includes assigning IDs to MTC wireless communication devices such that the devices are evenly distributed over all the time slots in an access cycle.
  • IDs are assigned to MTC wireless communication devices based on a priority of the MTC wireless communication devices such that first (e.g., low) priority devices are assigned to first (e.g., low) priority slots and second (e.g., high) priority devices are assigned to the second (e.g., high) priority slots.
  • Figure 1 conceptually illustrates one example embodiment of a wireless communication system
  • Figure 2 conceptually illustrates one example embodiment of a timing diagram for a random access channel
  • Figure 3 conceptually illustrates one example embodiment of a method of transmitting access requests
  • Figure 4 conceptually illustrates one example embodiment of a method of monitoring access requests
  • Figure 5 conceptually illustrates one example embodiment of an access cycle with access slots and preambles being assigned of wireless communication devices
  • Figure 6 conceptually illustrates one example embodiment of method of assigning a preamble to a MTC device
  • Figure 7 conceptually illustrates one example embodiment of a blocking of a plurality of access slots due to system congestion.
  • Figure 1 conceptually illustrates one example embodiment of a wireless communication system 100.
  • the wireless communication system 100 includes a base station 105 that provides wireless connectivity within a geographic region or cell 110.
  • the cell 110 is depicted as a perfect hexagon in Figure 1.
  • the base station 105 may be configured to provide wireless connectivity within portions or sectors of the cell 110, e.g., using multiple antennas or arrays of antennas.
  • Wireless connectivity can be provided using well known standards and/or protocols and in the interest of clarity only those aspects of the standards and/or protocols that are relevant to the claimed subject matter are discussed herein.
  • wireless connectivity in the system 100 may be provided according to wireless standards and/or protocols including TDMA, FDMA, CDMA, UMTS, LTE, WiMAX and the like.
  • H2H wireless communication devices 115 may be located within the cell 110.
  • the H2H devices 115 may use a wireless connection to the base station 105 to communicate with each other or other devices.
  • Exemplary H2H devices 115 may include cellular phones, smart phones, notebook computers, laptop computers, and the like.
  • Machine type wireless communication (MTC) devices 120 may also be distributed throughout the cell 110. In the interest of clarity, only one of the MTC devices is specifically indicated with the numeral "120.” The number of MTC devices 120 shown in Figure 1 is intended to be illustrative. Persons of ordinary skill in the art having benefit of the present disclosure should appreciate that an actual deployment of MTC devices 120 may include hundreds or thousands of MTC devices 120 within the cell 110.
  • some of the MTC devices 120 are parts of groups 125(1-2).
  • the MTC devices 120 in. the group 125(1) may be fire alarms or smoke detectors within a particular building.
  • the MTC devices 120 in the group 125(2) may be wireless detectors that form part of a security system for a building such as open-door detectors, glass break detectors, motion sensors, and the like.
  • the MTC devices 120 in a group 125 do not necessarily need to be physically proximate to each other.
  • a group 125 of MTC devices 120 may be deployed in taxicabs and used to provide periodic location reports to a dispatcher.
  • the MTC devices 120 implement one or more MTC applications that provide reports over the air interface to the base station 105 at particular intervals.
  • an application operating on the MTC devices 120 may support periodic short data reporting.
  • the application may provide data in response to a request from received from the base station 105 or in response to the occurrence of some condition or criteria.
  • the reporting interval can vary significantly depending on the type of application and may range from less than one minute to more than one month.
  • the MTC device 120 may remain in the active mode and skip the access process, thereby reducing or avoiding the access collision issue in these circumstances.
  • the precise transmission time can vary within a tolerance that can be a fairly large percentage of the overall reporting interval, e.g., around 1-10% of the interval, although the exact tolerance may be different for different applications.
  • the reported data may include values of measurements such as time-of-day, temperatures, locations, test conditions/results, environmental conditions, and the like. The measurements may be performed using sensors incorporated within the MTC devices 120 or may be provided to the MTC devices 120 via external devices for transmission over the air interface.
  • the large number of MTC devices 120 within the cell 110 could potentially lead to collisions between reverse link access transmissions from the MTC devices 120.
  • large numbers of access request signals over random access channels could lead to a relatively large number of collisions.
  • MTC devices 120 could share the same random access channels as the H2H devices 115 in which case the access signals from the MTC devices 120 may also collide with access signals from the H2H devices 1 15.
  • the MTC devices 120 and the H2H devices 115 could utilize different channels to prevent collisions between transmissions by the two types of devices.
  • access signal by MTC devices 120 within the groups 125 can be strongly correlated in time and space.
  • Access requests/signals by the different MTC devices 120 can be coordinated to attempt to reduce collisions between reverse link traffic.
  • the temporal structure of the reverse link can be divided into a series of periodically repeating access cycles that are subdivided into time intervals such as time slots of the reverse link channel.
  • the MTC devices 120 may attempt to reduce the incidence of access request collisions by selecting one of the time intervals in each access cycle for transmission of access requests.
  • the MTC device may then negotiate a preamble assignment for the selected one of the plurality of time intervals. After the preamble assignment is negotiated, the MTC device may transmit an access signal over an access channel in the selected one of the plurality of time intervals using a preamble corresponding to the preamble assignment.
  • each MTC device 120 may select a time slot in the access cycle by comparing system frame numbers (SFNs) of the slots to their internal identifiers, as discussed herein. After negotiating a preamble assignment for the selected slot, access requests can then be transmitted over the access channel corresponding to the preamble of the preamble assignment in the selected time intervals.
  • SFNs system frame numbers
  • the MTC devices 120 can be constrained in other ways to transmit access signals over an access channel corresponding to the preamble of the preamble assignment during one of the time intervals that make up a periodically repeating access cycle.
  • the MTC device 120 may be constrained to transmit access signals in selected slot based using a preamble that is based on a preamble identifier pre-assigned to the MTC device 120 during for example, manufacture or installation of the MTC device.
  • FIG 2 conceptually illustrates one example embodiment of a timing diagram 200 for a random access channel 205.
  • the timing diagram 200 depicts events that may occur in one embodiment of a slotted access method used by MTC devices such as the MTC devices 120 depicted in Figure 1.
  • MTC devices such as the MTC devices 120 depicted in Figure 1.
  • two MTC devices transmit access request signals in accordance with their reporting cycles.
  • Each MTC device is constrained so that it is only allowed to transmit the access request in its own access slot within an access cycle and using its own assigned preamble. Constraining access signal transmission in this way can reduce or minimize the chance of access collision by making the MTC devices transmit access signals in a pre-scheduled fashion.
  • the access slots may be selected by and/or for each MTC device using identifying information that is available to both the MTC device and the network and similarly the assigned preamble may be based on information available to the MTC and/or network.
  • the access timing may therefore be predictable at both the network and the MTC device.
  • the random access channel 205 is temporally divided into periodically repeating access cycles 210.
  • Each access cycle has a length of K time intervals.
  • the period of the access cycle 210 is about 41 s.
  • K can be different for different cells and different deployment configurations.
  • the network could determine the value of K for a cell based on an estimate or an expectation of the total number of MTC devices that maiy be deployed in the cell.
  • Cells that handle smaller numbers of MTC devices could set K to a lower value, e.g.1024, and cells that handle even larger numbers of MTC devices could have larger values of K.
  • the two MTC devices implement applications that have reporting intervals of T ⁇ and T 2 , respectively.
  • the application in the first MTC device initiates transmission of an access request at the times indicated by the solid arrows 220 and the application of the second MTC device initiates transmission of access requests that the times indicated by the dashed arrows 225.
  • the MTC device In response to initiation of the access request by the application, the MTC device first selects an access slot in the next access cycle to use to transmit the access request.
  • the two MTC devices may determine to initiate transmission of access requests during the same access cycle. Access requests transmitted by either of the MTC devices may also potentially collide with transmissions by other devices during the same access cycle.
  • Access slots 215 can be identified using the value of the system frame number modulo the number of slots in the access cycle (SFN mod K).
  • the SFN can be broadcast from cell or base stations in a master information block (MIB) that may also include information indicating the LTE downlink bandwidth (DL BW), number of transmit antennas, PHICH duration, its gap, and possibly other information.
  • MIB master information block
  • DL BW LTE downlink bandwidth
  • PHICH duration PHICH duration
  • the MTC devices may be synchronized with the same access cycle and the access slots.
  • IMSI international mobile subscriber identity
  • the slots could be chosen based upon the most significant bits of the IMSI, the least significant bits of the IMSI, a pseudorandom number generated by hashing the IMSI, a unique number assigned to each MTC and the like.
  • the SFN cycle broadcast by the system may be selected to be long enough to support the synchronization of a long enough access cycle.
  • 4 MSBs of SFN could be added to the MIB to ensure that the MTC access cycle and paging cycle are long enough.
  • power can be saved by the MTC devices by aligning the MTC access cycle with the paging cycle.
  • the MTC device wakes up at its paging slot to see if any pages are being sent by the network. Selecting the access slot of the MTC device to be the slot after the paging slot allows the MTC device to remain in the active state for an additional slot as opposed to having to cycle through the sleeping and waking-up processes between paging slots and access slots.
  • a longer DRX/paging cycle may be defined for MTC devices in some embodiments to accommodate the large number of MTC devices when paging is supported for MTC devices.
  • the access slot may be selected to be the same slot as the paging slot of a MTC device as long as the system implements a mechanism to prevent conflicts or duplication between the paging driven access and automated access.
  • the MTC device negotiates with the base station or other radio access network node for an assigned preamble in the selected slot.
  • the base station maintains a list of the slot and preamble assigned for a respective MTC device and assigns a unique preamble for each MTC device that will access the base station in any particular slot.
  • the base station assigns a non-unique (i.e., already assigned) preamble to a MTC device.
  • the MTC device may proceed according to a number of alternative embodiments. In a first of these embodiments, the MTC device follows existing retry procedures (e.g. a random back-off) and then attempts to perform the access again. However, there may be an increased chance of access collision because the retry attempt is a random access.
  • the MTC device backs off to the next access cycle and then the retries at its selected access slot in the next access cycle.
  • This approach has very low chance of collision and the procedures are easier to implement than conventional random access procedures with access barring.
  • the drawback of this option may be the back-off delay that results from the MTC device having to wait till next access cycle to perform access.
  • the access cycle delay may be tolerable. For example, a delay that is approximately as long as the access cycle of 4096 frames would be approximately 41s, which is not significant when compared to a much longer data reporting cycle e.g. 30 min.
  • the network schedules the retry attempt.
  • the network can determine which access slot a MTC device can use to transmit an access request signal. If the access request is not received, the network may poll that MTC device.
  • the merit of this approach is that the retry delay and retry collision may be reduced.
  • the complexity of the network functionality used to support MTC devices may be increased significantly.
  • FIG. 3 conceptually illustrates one example embodiment of a method 300 of transmitting access requests.
  • the MTC device negotiates (at 302) a preamble for the pre-selected slot of the random access channel.
  • the base station will assign a preamble uniquely different from the preambles of the other MTC devices sharing the same slot.
  • an MTC device detects (at 305) a reporting time based on a reporting time interval. For example, an application running on the MTC device may determine that the reporting time interval has elapsed since the last report and so may signal the MTC device to access the network to provide the report.
  • the MTC device may identify its next available access slot for access.
  • the MTC device may monitor (at 310) system frame numbers of the slots of the next available access cycle to determine SFNs of the slots and select or identify its time slot by comparing the SFNs to an identifying number such as the MTC device's IMSI.
  • the MTC device can use other criteria for selecting (at 315) a slot to transmit an access request.
  • the MTC device transmits (at 320) the access request with the assigned preamble in the pre-selected slot of the random access channel.
  • FIG. 4 conceptually illustrates one example embodiment of a method 400 of monitoring access requests.
  • the method 400 may be implemented in a base station, a base station router, access point, or any other device or devices that are used to provide wireless connectivity to MTC devices and/or H2H user equipment.
  • An access cycle is determined for the MTC devices and then broadcast (at 405) over the air interface into the cell and/or a sector associated with the base station.
  • the access cycle defines the temporal structure of the reverse link by dividing transmission intervals into a series of periodically repeating access cycles that are subdivided into time intervals such as time slots of the reverse link channel.
  • the period of the access cycle (K) can be determined by the base station or may be provided to the base station by some other entity.
  • the MTC devices monitor and track the broadcast access slot numbers (SFN) and the access cycle. They may therefore be synchronized with the same access slot number and cycle.
  • SFN broadcast access slot numbers
  • the base station determines or monitors (at 410) the information identifying the MTC devices (or other user equipment) located within the cell.
  • each MTC device and other mobile unit is assigned an international mobile subscriber identifier (IMSI) that can be communicated to the base station.
  • IMSI international mobile subscriber identifier
  • the base station can determine (at 415) whether the information used by different MTC devices to access slots is the same and whether a particular MTC has been assigned a preamble for use with an access slot. For example, the base station can determine (at 415) based on IMSI1 mod K the slot in which a wireless communication device will transit an access signal and whether the wireless communication device has been assigned a preamble.
  • IMSI1 mod K IMSI2 mod K for devices having IMSI values of IMSI 1 and IMSI2 and these modulo values are the same, the two devices will utilize the same slot of the access cycle and thus, the chance of a collision between these two devices on the access channel may be increased.
  • the base station assigns a unique preamble for the wireless communication device to utilize for transmitting an access signal over the access channel.
  • the base station therefore assigns (at 420) a unique preamble for use by the wireless communication device in the slot so that the two devices assigned to the same slot in the access cycle will utilize different preamble.
  • the base station can page one of the MTC devices and notify (at 423) the MTC device of the slot offset. Then the MTC device can perform access at the slot with the slot number equal to the number based on IMSI and using the assigned preamble. In this way the MTC device can be guided to an access slot/preamble combination not occupied in this cell.
  • This process may be repeated until all of the MTC devices and/or user equipment within the cell have unique values of the information used to select slot and preamble in the access cycle. However, in some embodiments, some overlap between the identifying information may be tolerable, e.g., if devices sharing the same information are not expected to collide frequently.
  • the base station of the cell could assign a dedicated access slot number and dedicated preamble for the slot to the MTC device through signaling. For example, the base station could transmit a dedicated access slot number and preamble to the MTC device when the MTC device is first deployed in the cell or sector served by the base station.
  • the dedicated access slot numbers and preambles to be drawn from a pool of available access slot number and preamble combinations to avoid collisions with MTC devices that were previously assigned other dedicated access slot numbers and preambles from the pool. This embodiment can reduce or eliminate collisions between MTC devices within a particular cell at the cost of more signaling overhead and complexity when the MTC devices are first deployed.
  • MTC devices are fixed or have very limited mobility and so they are not expected to leave their initial cell frequently. Some MTC devices are expected to remain in their initial cell for their entire operational lifetime. The additional cost of allowing the base station to select the dedicated access slot numbers and preambles and transmit them to the MTC devices may therefore be relatively small when averaged over the life of the MTC device.
  • the base station can use the identifying information to predict and monitor (at 425) the access slot and access channel preamble pairs used by the MTC devices and/or other user equipment.
  • the base station receives (at 430) information from the MTC devices and/or user equipment in the predicted slots and channels, then it can continue to monitor the access slot and access channel preamble pairs.
  • an error may have occurred if no information is successfully received from the MTC devices and/or other user equipment access requests are in the assigned access channel preamble for the predicted slots.
  • the wireless communication device may fail to transmit the access request in the selected access slot on the assigned channel.
  • the wireless communication device may transmit the access request but the base station may fail to properly decode the received transmission.
  • the base station may therefore page (at 435) the MTC device and/or other user equipment that was expected to transmit in the monitored access slot. The page can be used to determine whether the MTC device (or other user equipment) is operating correctly within the cell.
  • FIG. 5 conceptually illustrates one example embodiment of an access cycle with access slots and preambles being assigned to wireless communication devices of a particular sector.
  • a stationary or low mobility MTC device is associated with the particular time slot of an access cycle and assigned a particular preamble to utilize that time.
  • pre-assigning device ID's and preambles to the MTC devices at a per sector basis an MTC device will occupy one access slot and with a unique preamble different from the other MTC devices sharing the same slot.
  • assignment of unique preamble for a slot associated with a MTC device will assist with the avoidance of collisions.
  • a large number of devices e.g., 50000
  • Pre-assignment of device ID's can also assist in the even distribution of MTC devices into slots of the access cycle. Further, pre-assignment of device ID's may be utilized to group MTC devices having a similar priority (e.g., a group or type of MTC devices being assigned a particular set or range of device ID's) in order that sets of MTC devices are mapped to the same time interval in the access cycle for transmission of access requests using an assigned preamble. In this manner, additional control may be provided to constrain access request transmissions of a particular group or type of MTC devices by preventing transmission in a particular time slot.
  • a similar priority e.g., a group or type of MTC devices being assigned a particular set or range of device ID's
  • Figure 6 conceptually illustrates one example embodiment of method of assigning a preamble to a MTC device.
  • a stationary/low mobility MTC device indicates this characteristic via an indication in a message and also indicates its ID.
  • the eNodeB based on its knowledge of all the devices in its coverage, identifies the number of MTC devices in a specific slot and make a preamble assignment for the MTC device.
  • the eNodeB provides (at 515) the unique preamble assignment to the MTC device for future use.
  • a human-to-human mobile device may move into the cell and use a preamble the same as an MTC device, which may cause a collision.
  • FIG. 7 conceptually illustrates one example embodiment of a blocking of a plurality of access slots due to system congestion.
  • MTC device may be assigned IDs that correspond to a priority level such that low priority slots are assigned to low numbered slots in the access cycle. For example, the IDs assigned to low priority MTCs may hash into low numbered slots.
  • the eNodeB may block a select percentage (e.g., half, 50%, 25%) of the slots in an access cycle based on the level of congestion in order to the reduce congestion.
  • the blocking may be performed based on priority; that is slots for the lowest priority MTC traffic may be blocked first. Identification of the slots to be blocked may be communicated to wireless communication devices associated with a particular slot in order that the wireless communication devices will be constrained from transmitting on an access channel in one or more time intervals of the access cycle.
  • priority could be defined to associate with the slots from low to high.
  • the network equipment forwards (e.g., broadcasts) a message with a mask indicating to the UE/s which slots are to be blocked. If a UE sees its assigned slots are to be blocked, the UE shall not perform the access (i.e., shall be constrained from performing the access). If the priority associated slots are defined, the mask will start from the slots with low priority. If the priority is not defined, the mask could be randomly shifted periodically or from time to time to ensure a level of fairness to all the MTC devices.
  • a MTC device may receive a blocking signal indicating at least a first time interval of the plurality of time intervals in which access should be prevented. Thereafter, MTC device/s will block transmission of the access signal over an access channel in the selected one of the plurality of time intervals using a preamble corresponding to the preamble assignment based on the blocking signal.
  • the IDs assigned low priority numbers may hash into high numbered slots and thus, high number slots would be blocked first during congestion.
  • MTC device IDs and the associated priority of the MTC devices correspond to slots in a disjoint manner.
  • lowest priority MTC devices may map to a set of slots include a number of low numbered slots and a number of high numbered slots.
  • a blocking mask may be applied to some low number slots and some high number slots when a congestion event occurs with the particular slots to be blocked communicated to appropriate MTC devices.
  • MTC devices may be randomly assigned an ID.
  • a device When the MTC device ID is randomly assigned, a device will be randomly assigned an access slot.
  • the device also randomly picks a preamble.
  • additional enhancements such as dynamically adjusting the Random access response (RAR) detection window and backoff may further improve the access performance.
  • RAR Random access response
  • msgl being an access request
  • msg2 being a random access response
  • msg3 being a mobile acknowledge
  • RAR window size it is assumed that the system has the resource to allocate at most three (3) preambles in each subframe. With a RAR window size of five (5) there could be at most fifteen (15) preambles allocated. This is not sufficient for large amount of MTC access.
  • Another bottleneck is msg3 transmission. In collision, the collided preambles usually can not be discovered by the eNB, so the eNB sends back the RAR message, and all the collided UE will receive the same RAR message. This causes the collision of msg3 until the retransmission limit is reached.
  • the eNB can estimate the access intensity of the UE according to the number of the received preambles.
  • the estimation can be simplified by linear estimation.
  • the number of msgl transmitted may be approximately linear to the required RAR window size. So, for example, if the window size in use is five (5), the number of msgl 's transmitted should be controlled to below thirty (30). And furthermore, below this, all the UE can access without any restriction.
  • the eNB knows this, it can estimate the collision probability and indicate to the UE the current access intensity, collision probability and the tuned access parameters, for example, to configure new access slot length.
  • a step granularity may be utilized, for example a 10% step, i.e. increase or decrease the slot length by 10%.
  • the UE After the msg3 collision probability estimation is obtained, the UE will not access the system if the estimated msg3 collision probability is larger than a predefined threshold. It will check back after a back off time (e.g., back-off Slot_K_system).
  • a back off time e.g., back-off Slot_K_system
  • the UE applies the new access distributing parameter to choose the access occasion, with the consideration of the number of preamble attempts tried (e.g., number_preamble_tx).
  • the value for the access slot for the UE may be determined as:
  • Slot_k number_preamble_tx * (msgl_detection_prob) * Slot_K_system Because during collision, the UE may fail after a maximum number of preamble attempts are tried (e.g., MAX_preamble_tx), assumed to be ten (10) by 3GPP, after a a number of attempts (e.g., a few attempts), the UE should make sure this limit should not be exceeded. So, the UE should wait for a longer time when the surge of MTC device access may end or decay.
  • MAX_preamble_tx maximum number of preamble attempts are tried
  • a number of attempts e.g., a few attempts
  • Slot_K_system is the slot length parameter indicated by the system.
  • the eNB may update the access information discussed above periodically and broadcast this information to the UE in the cell.
  • Embodiments of the techniques described herein have a number of advantages over conventional approaches. For example, constraining each MTC device to transmit access requests a particular slot of an access cycle using a particular preamble can reduce or minimize the chance of access collisions with other MTC devices and/or other H2H devices. Reducing collisions allows the radio resources to be used more efficiently, e.g., by reducing the signaling overhead required to schedule access requests and by reducing the number of retransmissions that results from collisions and subsequent back-off transmissions.
  • the reporting time of a MTC device is more predictable (relative to random access) at the network because the network already knows the information that is used to select the access slot and the preamble to be utilized in the access slot, e.g., the SFN and the IMSI of the MTC device.
  • Forward link overhead and/or congestion in the access slot selection approach is smaller than in the polling approach for the same level of collision performance.
  • the impact to the existing mechanism is small.
  • the software implemented aspects of the disclosed subject matter are typically encoded on some form of program storage medium or implemented over some type of transmission medium.
  • the program storage medium may be magnetic (e.g., a floppy disk or a hard drive) or optical (e.g., a compact disk read only memory, or "CD ROM"), and may be read only or random access.
  • the transmission medium may be twisted wire pairs, coaxial cable, optical fiber, or some other suitable transmission medium known to the art. The disclosed subject matter is not limited by these aspects of any given implementation.

Abstract

An example method provides a method of determining access times and channels for a wireless communication device. One embodiment includes selecting, at a wireless communication device, one of a plurality of time intervals in a periodically repeating access cycle for transmission of an access signal based on an identification number identifying the wireless communication device, negotiating a preamble assignment for the selected one of the plurality of time intervals, and transmitting the access signal over an access channel in the selected one of the plurality of time intervals using a preamble corresponding to the preamble assignment.

Description

SLOTTED ACCESS FOR WIRELESS COMMUNICATION DEVICES
AND CONTROL THEREOF
FIELD OF THE INVENTION
This invention relates generally to communication systems, and, more particularly, to wireless communication systems.
BACKGROUND
Service providers are beginning to develop, offer, and deploy wireless communication devices referred to as machine-type communication device. A machine type communication (MTC) device differs from traditional human-to-human (H2H) communication devices because a MTC device typically involves communication between entities that do not necessarily need human interaction. For example, a MTC device can be wireless user equipment configured to gather measurement information and report this information to a central server at a particular time interval. MTC devices can be used in a wide variety of contexts such as remote meter reading for water and power companies, wireless burglar and/or fire alarm monitoring, weather monitoring, vehicle tracking, medical monitoring, and the like.
MTC devices have operational characteristics that differ markedly from the operational characteristics of conventional human-to-human (H2H) wireless communication devices. Conventional H2H communication usually requires allocating resources for substantially continuous duplex communication between users for intervals as long as several minutes or even hours. In contrast, MTC devices typically transmit relatively small amounts of information in bursts separated by relatively long and sometimes irregular intervals. For example, a MTC device for remotely reading a water meter may only transmit a burst of information indicating water usage on a monthly basis. For another example, a burglar alarm monitor may only transmit bursts of information when the alarm is triggered. Consequently, MTC devices are also typically significantly more delay tolerant than conventional H2H devices since voice communication requires delays of less than 100 ms or better. A MTC device that reads and reports water usage may be able to tolerate transmission delays of days or even weeks. Moreover, MTC devices are often fixed to particular locations and so the mobility of these devices may be significantly lower than the expected mobility of a H2H device. The distribution of MTC devices is expected to be significantly different than the distribution of handheld wireless communication devices. Current generations (2G/3G) of wireless communication systems have been designed to accommodate capacities on the order of 100 users per cell based on expected densities of H2H devices. However, the number of MTC devices in each cell is expected to be at least an order of magnitude higher and each cell may have to support thousands of MTC devices. Randomly transmitted access signals from such a large number of MTC devices, such as access signals transmitted over a random access channel, will almost certainly lead to a very large number of collisions. Furthermore, transmissions from some kinds of MTC devices tend to be strongly correlated in time. For example, an office building may have a very large number of remotely-monitored fire alarms. Under normal conditions the fire alarms generate virtually no traffic except perhaps a periodic "I'm alive" pulse to verify they are operating. However, if a fire breaks out all of the alarms may begin to concurrently transmit large bursts of information. Correlated bursts of information from large numbers of MTC devices in a cell can generate overload conditions, congestion, and collisions between access signals.
One proposal for flattening the time distribution of access signals from machine type devices is to allow a central entity to schedule the access signals using a polling scheme. The polling based scheme requires a central entity in the network (such as the E-UTRAN) to page each device at a predetermined reporting time to determine whether the device has information to transmit. Although one-by-one paging of the devices by the E-UTRAN scheduler could avoid collisions, this approach introduces much signaling overhead, particularly over the forward link. The efficiency gains from flattening the access transmission distribution are not thought to justify the high cost in overhead and complexity introduced by this method.
An alternative proposal is to apply the conventional random access method with access barring mechanisms such as using random back-offs to resolve collisions between the random access signals (access probes). Although this approach can flatten the time distribution of the access signals , the overhead costs would be considerable. For example, a large number of access collisions may be generated if a large number of MTC devices send random access request signals at the same time. Backing off some of the request signals would flatten the distribution but may still lead to additional collisions between retransmissions when the number of requesting devices is large. The efficiency of the system is therefore reduced (and the reverse link signaling overhead increased) by using back-offs and retransmissions to resolve the collisions. The retransmissions may also introduce more delay of reports from the MTC devices and create more uncertainty on the actual reporting time. SUMMARY
The disclosed subject matter is directed to addressing the effects of one or more of the problems set forth above. The following presents a simplified summary of the disclosed subject matter in order to provide a basic understanding of some aspects of the disclosed subject matter. This summary is not an exhaustive overview of the disclosed subject matter. It is not intended to identify key or critical elements of the disclosed subject matter or to delineate the scope of the disclosed subject matter. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is discussed later.
In one embodiment a method includes selecting, at a wireless communication device, one of a plurality of time intervals in a periodically repeating access cycle for transmission of an access signal, the selection being performed based on an identification number identifying the wireless communication device; negotiating, at the wireless communication device, a preamble assignment for the selected one of the plurality of time intervals; and transmitting, at the wireless communication device, the access signal over an access channel in the selected one of the plurality of time intervals using a preamble corresponding to the preamble assignment.
In one embodiment, the IDs of the communication devices are pre-arranged or assigned to minimize the number of the devices sharing a specific time interval.
In another embodiment, negotiating the preamble includes requesting the preamble assignment for the selected one of the plurality of time intervals from a network node and receiving the preamble assignment for the selected one of the plurality of time intervals from the network node. The preamble assignment for the selected one of the plurality of time intervals may be unique to the wireless communication device.
In one embodiment, the method also includes receiving a blocking signal indicating at least a first time interval of the plurality of time intervals in which access should be prevented and blocking transmission of the access signal over an access channel in the selected one of the plurality of time intervals using a preamble corresponding to the preamble assignment based on the blocking signal. In one embodiment, the method also includes defining the plurality of time intervals in the access cycle based on synchronization information broadcast over an air interface to the wireless communication device so that the wireless communication device is synchronized with other wireless communication devices on the same access cycle with the same numbering of the time intervals.
In one embodiment, the plurality of time intervals are a plurality of time slots in the periodically repeating access cycle, and selecting one of the plurality of time intervals includes selecting one of the plurality of time slots based on a slot numbering comprising system frame number associated with the selected one of the slots and broadcast over the air interface. In one embodiment, selecting one of the plurality of time slots may include selecting a time slot associated with a system frame number when the system frame number is equal to the identification number modulo a period of the access cycle. In another embodiment, selecting one of the plurality of time slots includes selecting a time slot associated with a system frame number when the system frame number is equal to a selected portion or permutation of the identification number. In yet another embodiment, selecting one of the plurality of time slots comprises selecting a time slot associated with a system frame number when the system frame number is equal to a hash of the identification number.
In one embodiment, a period of the access cycle is equal to a period of a paging cycle for the wireless communication device, and selecting said one of the plurality of time intervals for the access signal comprises selecting a time interval immediately following a time interval assigned for paging the wireless communication device. Selecting said one of the plurality of time intervals may include selecting one of the plurality of time intervals in an access cycle determined by a reporting interval for the wireless communication device.
In one embodiment, a method comprises constraining a wireless communication device to transmit access signals over an access channel corresponding to a negotiated preamble assignment during one of a plurality of time slots that make up a periodically repeating access cycle. In one embodiment, constraining the wireless communication device to transmit the access signals over the access channel corresponding to the negotiated preamble assignment during the one of a. plurality of time slots may include constraining the wireless communication device to transmit in the one of the plurality of time slots associated with a system frame number when the system frame number is equal to the identification number modulo a period of the access cycle. In another embodiment, constraining the wireless communication device to transmit the access signals over the access channel corresponding to the negotiated preamble assignment during the one of a plurality of time slots may include constraining the wireless communication device to transmit on the access channel corresponding to the negotiated preamble assignment received from a network node for the one of the plurality of time intervals. In yet another embodiment, the preamble assignment for the one of the plurality of time intervals is unique to the wireless communication device.
In one embodiment, the method also includes receiving a blocking signal indicating at least a first time interval of the plurality of time intervals in which access signals should be prevented and constraining the wireless communication device from transmitting in the one of the plurality of time intervals when the first time interval corresponds to the first time interval of the plurality of time intervals. In one embodiment, constraining the wireless communication device to transmit in said one of the plurality of time slots may include constraining the wireless communication device to transmit in a time slot associated with a system frame number when the system frame number is equal to a selected portion of the identification number, when the system frame number is equal to a hash of the identification number, or when the system frame number is pre-assigned by the base station.
In one embodiment, a period of the access cycle is equal to a period of a paging cycle for the wireless communication device, and wherein constraining the wireless communication device to transmit in said one of the plurality of time intervals comprises constraining the wireless communication device to transmit in a time interval immediately following or at a time interval assigned for paging the wireless communication device.
In yet another embodiment, the method includes transmitting the access signal from the wireless communication device in said one of the plurality of time intervals during an access cycle determined by a reporting interval for the wireless communication device.
In one embodiment, a method comprises, in response to receipt of a request from a wireless communication device for a preamble assignment for one of a plurality of time intervals that make up a periodically repeating access cycle: determining by a network node a unique preamble assignment for the wireless communication device for the one of the plurality of time interval, and providing, from a network node, the unique preamble assignment for the one of the plurality of time intervals to the wireless communication device.
In one embodiment, the method further includes broadcasting, from the network node, information defining a plurality of time slots that make up a periodically repeating access cycle for a random access channel, wherein each wireless communication device served by the base station is constrained to transmit access signal signals over the access channel during a selected one of a plurality of time slots.
In one embodiment, the method includes detecting a collision between an MTC device and a human to human device, and sending the response with the ID of the human to human device. In one embodiment, the method includes assigning IDs to MTC wireless communication devices such that the devices are evenly distributed over all the time slots in an access cycle. In one embodiment, IDs are assigned to MTC wireless communication devices based on a priority of the MTC wireless communication devices such that first (e.g., low) priority devices are assigned to first (e.g., low) priority slots and second (e.g., high) priority devices are assigned to the second (e.g., high) priority slots.
BRIEF DESCRIPTION OF THE DRA WINGS
The disclosed subject matter may be understood by reference to the following description taken in conjunction with the accompanying drawings, in which like reference numerals identify like elements, and in which:
Figure 1 conceptually illustrates one example embodiment of a wireless communication system;
Figure 2 conceptually illustrates one example embodiment of a timing diagram for a random access channel;
Figure 3 conceptually illustrates one example embodiment of a method of transmitting access requests; and
Figure 4 conceptually illustrates one example embodiment of a method of monitoring access requests;
Figure 5 conceptually illustrates one example embodiment of an access cycle with access slots and preambles being assigned of wireless communication devices;
Figure 6 conceptually illustrates one example embodiment of method of assigning a preamble to a MTC device; and
Figure 7 conceptually illustrates one example embodiment of a blocking of a plurality of access slots due to system congestion.
While the disclosed subject matter is susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the disclosed subject matter to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the scope of the appended claims.
DETAILED DESCRIPTION
Illustrative embodiments are described below. In the interest of clarity, not all features of an actual implementation are described in this specification. It will of course be appreciated that in the development of any such actual embodiment, numerous implementation-specific decisions should be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which will vary from one implementation to another. Moreover, it will be appreciated that such a development effort might be complex and time-consuming, but would nevertheless be a routine undertaking for those of ordinary skill in the art having the benefit of this disclosure.
The disclosed subject matter will now be described with reference to the attached figures. Various structures, systems and devices are schematically depicted in the drawings for purposes of explanation only and so as to not obscure the present invention with details that are well known to those skilled in the art. Nevertheless, the attached drawings are included to describe and explain illustrative examples of the disclosed subject matter. The words and phrases used herein should be understood and interpreted to have a meaning consistent with the understanding of those words and phrases by those skilled in the relevant art. No special definition of a term or phrase, i.e., a definition that is different from the ordinary and customary meaning as understood by those skilled in the art, is intended to be implied by consistent usage of the term or phrase herein. To the extent that a term or phrase is intended to have a special meaning, i.e., a meaning other than that understood by skilled artisans, such a special definition will be expressly set forth in the specification in a defini- tional manner that directly and unequivocally provides the special definition for the term or phrase.
Figure 1 conceptually illustrates one example embodiment of a wireless communication system 100. In the illustrated embodiment, the wireless communication system 100 includes a base station 105 that provides wireless connectivity within a geographic region or cell 110. The cell 110 is depicted as a perfect hexagon in Figure 1. However, persons of ordinary skill in the art having benefit of the present disclosure should appreciate that this is an idealization and actual cells may have irregular and/or time varying boundaries. Furthermore, in alternative embodiments, the base station 105 may be configured to provide wireless connectivity within portions or sectors of the cell 110, e.g., using multiple antennas or arrays of antennas. Wireless connectivity can be provided using well known standards and/or protocols and in the interest of clarity only those aspects of the standards and/or protocols that are relevant to the claimed subject matter are discussed herein. For example, wireless connectivity in the system 100 may be provided according to wireless standards and/or protocols including TDMA, FDMA, CDMA, UMTS, LTE, WiMAX and the like.
One or more human-to-human (H2H) wireless communication devices 115(1-2) may be located within the cell 110. The H2H devices 115 may use a wireless connection to the base station 105 to communicate with each other or other devices. Exemplary H2H devices 115 may include cellular phones, smart phones, notebook computers, laptop computers, and the like. Machine type wireless communication (MTC) devices 120 may also be distributed throughout the cell 110. In the interest of clarity, only one of the MTC devices is specifically indicated with the numeral "120." The number of MTC devices 120 shown in Figure 1 is intended to be illustrative. Persons of ordinary skill in the art having benefit of the present disclosure should appreciate that an actual deployment of MTC devices 120 may include hundreds or thousands of MTC devices 120 within the cell 110.
In some embodiments, some of the MTC devices 120 are parts of groups 125(1-2). For example, the MTC devices 120 in. the group 125(1) may be fire alarms or smoke detectors within a particular building. For another example, the MTC devices 120 in the group 125(2) may be wireless detectors that form part of a security system for a building such as open-door detectors, glass break detectors, motion sensors, and the like. The MTC devices 120 in a group 125 do not necessarily need to be physically proximate to each other. For example, a group 125 of MTC devices 120 may be deployed in taxicabs and used to provide periodic location reports to a dispatcher.
The MTC devices 120 implement one or more MTC applications that provide reports over the air interface to the base station 105 at particular intervals. In one embodiment, an application operating on the MTC devices 120 may support periodic short data reporting. Alternatively, the application may provide data in response to a request from received from the base station 105 or in response to the occurrence of some condition or criteria. The reporting interval can vary significantly depending on the type of application and may range from less than one minute to more than one month. In some embodiments that allow the MTC device 120 to report very frequently, e.g. at intervals much shorter than a minute, the MTC device 120 may remain in the active mode and skip the access process, thereby reducing or avoiding the access collision issue in these circumstances. Moreover, the precise transmission time can vary within a tolerance that can be a fairly large percentage of the overall reporting interval, e.g., around 1-10% of the interval, although the exact tolerance may be different for different applications. The reported data may include values of measurements such as time-of-day, temperatures, locations, test conditions/results, environmental conditions, and the like. The measurements may be performed using sensors incorporated within the MTC devices 120 or may be provided to the MTC devices 120 via external devices for transmission over the air interface.
The large number of MTC devices 120 within the cell 110 could potentially lead to collisions between reverse link access transmissions from the MTC devices 120. For example, large numbers of access request signals over random access channels could lead to a relatively large number of collisions. MTC devices 120 could share the same random access channels as the H2H devices 115 in which case the access signals from the MTC devices 120 may also collide with access signals from the H2H devices 1 15. Alternatively, the MTC devices 120 and the H2H devices 115 could utilize different channels to prevent collisions between transmissions by the two types of devices. Moreover, access signal by MTC devices 120 within the groups 125 can be strongly correlated in time and space. For example, if a fire breaks out in the building that contains the MTC devices 125(1), it is likely that many if not all of these devices 125(1) may transmit access signals concurrently or even simultaneously. Such a large number of concurrent access signals can lead to a correspondingly large number of collisions between these access signals.
Access requests/signals by the different MTC devices 120 can be coordinated to attempt to reduce collisions between reverse link traffic. In one embodiment, the temporal structure of the reverse link can be divided into a series of periodically repeating access cycles that are subdivided into time intervals such as time slots of the reverse link channel. The MTC devices 120 may attempt to reduce the incidence of access request collisions by selecting one of the time intervals in each access cycle for transmission of access requests. The MTC device may then negotiate a preamble assignment for the selected one of the plurality of time intervals. After the preamble assignment is negotiated, the MTC device may transmit an access signal over an access channel in the selected one of the plurality of time intervals using a preamble corresponding to the preamble assignment. For example in a LTE system, each MTC device 120 may select a time slot in the access cycle by comparing system frame numbers (SFNs) of the slots to their internal identifiers, as discussed herein. After negotiating a preamble assignment for the selected slot, access requests can then be transmitted over the access channel corresponding to the preamble of the preamble assignment in the selected time intervals. In other embodiments, the MTC devices 120 can be constrained in other ways to transmit access signals over an access channel corresponding to the preamble of the preamble assignment during one of the time intervals that make up a periodically repeating access cycle. For example, the MTC device 120 may be constrained to transmit access signals in selected slot based using a preamble that is based on a preamble identifier pre-assigned to the MTC device 120 during for example, manufacture or installation of the MTC device.
Figure 2 conceptually illustrates one example embodiment of a timing diagram 200 for a random access channel 205. The timing diagram 200 depicts events that may occur in one embodiment of a slotted access method used by MTC devices such as the MTC devices 120 depicted in Figure 1. In the illustrated embodiment, two MTC devices transmit access request signals in accordance with their reporting cycles. Each MTC device is constrained so that it is only allowed to transmit the access request in its own access slot within an access cycle and using its own assigned preamble. Constraining access signal transmission in this way can reduce or minimize the chance of access collision by making the MTC devices transmit access signals in a pre-scheduled fashion. The access slots may be selected by and/or for each MTC device using identifying information that is available to both the MTC device and the network and similarly the assigned preamble may be based on information available to the MTC and/or network. The access timing may therefore be predictable at both the network and the MTC device.
The random access channel 205 is temporally divided into periodically repeating access cycles 210. Each access cycle has a length of K time intervals. In one embodiment, the unit of the access cycle 210 is the system frame and the boundaries of the access cycle 210 are aligned with the system frames. For example if K= 4096, then each access cycle 210 has 4096 access slots 215 with a slot duration that is equal to one system frame duration (e.g., 10ms). The period of the access cycle 210 is about 41 s. However, persons of ordinary skill in the art having benefit of the present disclosure should appreciate that the value of K can be different for different cells and different deployment configurations. In one embodiment, the network could determine the value of K for a cell based on an estimate or an expectation of the total number of MTC devices that maiy be deployed in the cell. Cells that handle smaller numbers of MTC devices could set K to a lower value, e.g.1024, and cells that handle even larger numbers of MTC devices could have larger values of K.
The two MTC devices implement applications that have reporting intervals of T\ and T2, respectively. The application in the first MTC device initiates transmission of an access request at the times indicated by the solid arrows 220 and the application of the second MTC device initiates transmission of access requests that the times indicated by the dashed arrows 225. In response to initiation of the access request by the application, the MTC device first selects an access slot in the next access cycle to use to transmit the access request.
In some cases, the two MTC devices may determine to initiate transmission of access requests during the same access cycle. Access requests transmitted by either of the MTC devices may also potentially collide with transmissions by other devices during the same access cycle.
Collisions can be avoided by selecting an access slot 215 in the access cycle 210 based upon information associated with and/or identifying the different MTC devices. In the illustrated embodiment taking LTE as an example, access slots 215 can be identified using the value of the system frame number modulo the number of slots in the access cycle (SFN mod K). The SFN can be broadcast from cell or base stations in a master information block (MIB) that may also include information indicating the LTE downlink bandwidth (DL BW), number of transmit antennas, PHICH duration, its gap, and possibly other information. By tracking the broadcast SFN information, the MTC devices may be synchronized with the same access cycle and the access slots. Each MTC device is allowed to access slots that are selected based on a comparison of the SFN and information identifying the MTC device. For example, each MTC device can use its international mobile subscriber identity (IMSI) to select the slot whose SFN mod K = (IMSI + 1) mod K. However, persons of ordinary skill in the art having benefit of the present disclosure should appreciate that other techniques can be used to choose slots. For example, the slots could be chosen based upon the most significant bits of the IMSI, the least significant bits of the IMSI, a pseudorandom number generated by hashing the IMSI, a unique number assigned to each MTC and the like. In order to minimize the chance of collision between MTC device access and paging, the SFN cycle broadcast by the system may be selected to be long enough to support the synchronization of a long enough access cycle. For example in current LTE standard, 4 MSBs of SFN could be added to the MIB to ensure that the MTC access cycle and paging cycle are long enough. For example, if K= 4096, there will be 4096 unique MTC device IDs that could be supported in a cell. Thousands of MTC devices could therefore be accommodated in an access cycle without collision.
In one embodiment, power can be saved by the MTC devices by aligning the MTC access cycle with the paging cycle. The MTC device wakes up at its paging slot to see if any pages are being sent by the network. Selecting the access slot of the MTC device to be the slot after the paging slot allows the MTC device to remain in the active state for an additional slot as opposed to having to cycle through the sleeping and waking-up processes between paging slots and access slots. A longer DRX/paging cycle may be defined for MTC devices in some embodiments to accommodate the large number of MTC devices when paging is supported for MTC devices. For example, the paging cycle and access cycle could be configured so that the paging cycle = access cycle >= DRX cycle. Setting the paging cycle to be smaller than the DRX cycle would therefore not be allowed for MTC devices in this embodiment. Considering certain low cost MTC devices may not support paging and/or data polling, when data reporting is triggered by application, these devices may be able to acquire synchronization for access in the next access slot when they wake up at their paging slot. In one embodiment, the access slot may be selected to be the same slot as the paging slot of a MTC device as long as the system implements a mechanism to prevent conflicts or duplication between the paging driven access and automated access.
Collisions or other access failures could still occur even when the slot selection techniques described are employed especially in embodiments in which there are numerous MTC devices and/or the MTC devices share the same access channel with the H2H user equipment. Accordingly, to avoid collisions, the MTC device negotiates with the base station or other radio access network node for an assigned preamble in the selected slot. In one embodiment, the base station maintains a list of the slot and preamble assigned for a respective MTC device and assigns a unique preamble for each MTC device that will access the base station in any particular slot. In another embodiment, after assigning all possible unique preambles to MTC devices requesting an preamble assignment for a particular slot, the base station assigns a non-unique (i.e., already assigned) preamble to a MTC device. In this embodiment, when the initial access attempt by a MTC fails, the MTC device may proceed according to a number of alternative embodiments. In a first of these embodiments, the MTC device follows existing retry procedures (e.g. a random back-off) and then attempts to perform the access again. However, there may be an increased chance of access collision because the retry attempt is a random access. In a second of these embodiments, the MTC device backs off to the next access cycle and then the retries at its selected access slot in the next access cycle. This approach has very low chance of collision and the procedures are easier to implement than conventional random access procedures with access barring. The drawback of this option may be the back-off delay that results from the MTC device having to wait till next access cycle to perform access. However, for MTC devices the access cycle delay may be tolerable. For example, a delay that is approximately as long as the access cycle of 4096 frames would be approximately 41s, which is not significant when compared to a much longer data reporting cycle e.g. 30 min. In a third of these embodiments, the network schedules the retry attempt. For example, the network can determine which access slot a MTC device can use to transmit an access request signal. If the access request is not received, the network may poll that MTC device. The merit of this approach is that the retry delay and retry collision may be reduced. However the complexity of the network functionality used to support MTC devices may be increased significantly.
Figure 3 conceptually illustrates one example embodiment of a method 300 of transmitting access requests. At the power-up initialization stage, the MTC device negotiates (at 302) a preamble for the pre-selected slot of the random access channel. The base station will assign a preamble uniquely different from the preambles of the other MTC devices sharing the same slot. In the illustrated embodiment, an MTC device detects (at 305) a reporting time based on a reporting time interval. For example, an application running on the MTC device may determine that the reporting time interval has elapsed since the last report and so may signal the MTC device to access the network to provide the report. The MTC device may identify its next available access slot for access. If its access slot has already passed in this access cycle, the MTC device may monitor (at 310) system frame numbers of the slots of the next available access cycle to determine SFNs of the slots and select or identify its time slot by comparing the SFNs to an identifying number such as the MTC device's IMSI. In the illustrated embodiment, the access cycle includes K slots and the MTC device selects the slot that has a SFN that satisfies the condition (at 315) that SFN mod K = ID mod K. However, as discussed herein, the MTC device can use other criteria for selecting (at 315) a slot to transmit an access request. After identifying its own access slot, the MTC device transmits (at 320) the access request with the assigned preamble in the pre-selected slot of the random access channel. Figure 4 conceptually illustrates one example embodiment of a method 400 of monitoring access requests. In the illustrated embodiment, the method 400 may be implemented in a base station, a base station router, access point, or any other device or devices that are used to provide wireless connectivity to MTC devices and/or H2H user equipment. An access cycle is determined for the MTC devices and then broadcast (at 405) over the air interface into the cell and/or a sector associated with the base station. As discussed herein, the access cycle defines the temporal structure of the reverse link by dividing transmission intervals into a series of periodically repeating access cycles that are subdivided into time intervals such as time slots of the reverse link channel. The period of the access cycle (K) can be determined by the base station or may be provided to the base station by some other entity. The MTC devices monitor and track the broadcast access slot numbers (SFN) and the access cycle. They may therefore be synchronized with the same access slot number and cycle.
The base station determines or monitors (at 410) the information identifying the MTC devices (or other user equipment) located within the cell. In the illustrated embodiment, each MTC device and other mobile unit is assigned an international mobile subscriber identifier (IMSI) that can be communicated to the base station. The base station can determine (at 415) whether the information used by different MTC devices to access slots is the same and whether a particular MTC has been assigned a preamble for use with an access slot. For example, the base station can determine (at 415) based on IMSI1 mod K the slot in which a wireless communication device will transit an access signal and whether the wireless communication device has been assigned a preamble. For example, when IMSI1 mod K = IMSI2 mod K for devices having IMSI values of IMSI 1 and IMSI2 and these modulo values are the same, the two devices will utilize the same slot of the access cycle and thus, the chance of a collision between these two devices on the access channel may be increased.
Accordingly, the first time the IMSI for a wireless communication device is provided to a base station, the base station assigns a unique preamble for the wireless communication device to utilize for transmitting an access signal over the access channel. The base station therefore assigns (at 420) a unique preamble for use by the wireless communication device in the slot so that the two devices assigned to the same slot in the access cycle will utilize different preamble. The base station can page one of the MTC devices and notify (at 423) the MTC device of the slot offset. Then the MTC device can perform access at the slot with the slot number equal to the number based on IMSI and using the assigned preamble. In this way the MTC device can be guided to an access slot/preamble combination not occupied in this cell. This process may be repeated until all of the MTC devices and/or user equipment within the cell have unique values of the information used to select slot and preamble in the access cycle. However, in some embodiments, some overlap between the identifying information may be tolerable, e.g., if devices sharing the same information are not expected to collide frequently.
In another embodiment, instead of a MTC device determining its access slot by itself based on the device ID, the base station of the cell could assign a dedicated access slot number and dedicated preamble for the slot to the MTC device through signaling. For example, the base station could transmit a dedicated access slot number and preamble to the MTC device when the MTC device is first deployed in the cell or sector served by the base station. The dedicated access slot numbers and preambles to be drawn from a pool of available access slot number and preamble combinations to avoid collisions with MTC devices that were previously assigned other dedicated access slot numbers and preambles from the pool. This embodiment can reduce or eliminate collisions between MTC devices within a particular cell at the cost of more signaling overhead and complexity when the MTC devices are first deployed. However, many MTC devices are fixed or have very limited mobility and so they are not expected to leave their initial cell frequently. Some MTC devices are expected to remain in their initial cell for their entire operational lifetime. The additional cost of allowing the base station to select the dedicated access slot numbers and preambles and transmit them to the MTC devices may therefore be relatively small when averaged over the life of the MTC device.
The base station can use the identifying information to predict and monitor (at 425) the access slot and access channel preamble pairs used by the MTC devices and/or other user equipment. When the base station receives (at 430) information from the MTC devices and/or user equipment in the predicted slots and channels, then it can continue to monitor the access slot and access channel preamble pairs. However, an error may have occurred if no information is successfully received from the MTC devices and/or other user equipment access requests are in the assigned access channel preamble for the predicted slots. For example, the wireless communication device may fail to transmit the access request in the selected access slot on the assigned channel. For another example, the wireless communication device may transmit the access request but the base station may fail to properly decode the received transmission. The base station may therefore page (at 435) the MTC device and/or other user equipment that was expected to transmit in the monitored access slot. The page can be used to determine whether the MTC device (or other user equipment) is operating correctly within the cell.
Figure 5 conceptually illustrates one example embodiment of an access cycle with access slots and preambles being assigned to wireless communication devices of a particular sector. As shown in Figure 5, a stationary or low mobility MTC device is associated with the particular time slot of an access cycle and assigned a particular preamble to utilize that time. With pre-assigning device ID's and preambles to the MTC devices at a per sector basis, an MTC device will occupy one access slot and with a unique preamble different from the other MTC devices sharing the same slot. Even with random assignment of device ID's, assignment of unique preamble for a slot associated with a MTC device will assist with the avoidance of collisions. Thus, a large number of devices (e.g., 50000) could be arranged in a sector without access collision in an access cycle.
Pre-assignment of device ID's can also assist in the even distribution of MTC devices into slots of the access cycle. Further, pre-assignment of device ID's may be utilized to group MTC devices having a similar priority (e.g., a group or type of MTC devices being assigned a particular set or range of device ID's) in order that sets of MTC devices are mapped to the same time interval in the access cycle for transmission of access requests using an assigned preamble. In this manner, additional control may be provided to constrain access request transmissions of a particular group or type of MTC devices by preventing transmission in a particular time slot.
Figure 6 conceptually illustrates one example embodiment of method of assigning a preamble to a MTC device. At initial power up, (at 505) a stationary/low mobility MTC device indicates this characteristic via an indication in a message and also indicates its ID. In response to receipt of the MTC device ID, the eNodeB, based on its knowledge of all the devices in its coverage, identifies the number of MTC devices in a specific slot and make a preamble assignment for the MTC device. The eNodeB provides (at 515) the unique preamble assignment to the MTC device for future use. However, a human-to-human mobile device may move into the cell and use a preamble the same as an MTC device, which may cause a collision. Therefore, in one embodiment, when the wireless network detects a collision, the network will respond with higher priority to the human to human (H2H) device with the ID of the H2H devices in the response message. Figure 7 conceptually illustrates one example embodiment of a blocking of a plurality of access slots due to system congestion. MTC device may be assigned IDs that correspond to a priority level such that low priority slots are assigned to low numbered slots in the access cycle. For example, the IDs assigned to low priority MTCs may hash into low numbered slots. In response to detecting system congestion, the eNodeB may block a select percentage (e.g., half, 50%, 25%) of the slots in an access cycle based on the level of congestion in order to the reduce congestion. The blocking may be performed based on priority; that is slots for the lowest priority MTC traffic may be blocked first. Identification of the slots to be blocked may be communicated to wireless communication devices associated with a particular slot in order that the wireless communication devices will be constrained from transmitting on an access channel in one or more time intervals of the access cycle.
For example, priority could be defined to associate with the slots from low to high. The network equipment forwards (e.g., broadcasts) a message with a mask indicating to the UE/s which slots are to be blocked. If a UE sees its assigned slots are to be blocked, the UE shall not perform the access (i.e., shall be constrained from performing the access). If the priority associated slots are defined, the mask will start from the slots with low priority. If the priority is not defined, the mask could be randomly shifted periodically or from time to time to ensure a level of fairness to all the MTC devices. Thus, a MTC device may receive a blocking signal indicating at least a first time interval of the plurality of time intervals in which access should be prevented. Thereafter, MTC device/s will block transmission of the access signal over an access channel in the selected one of the plurality of time intervals using a preamble corresponding to the preamble assignment based on the blocking signal.
Note that though the correspondence described is between low priority and low numbered slots, the IDs assigned low priority numbers may hash into high numbered slots and thus, high number slots would be blocked first during congestion. It may also be that the MTC device IDs and the associated priority of the MTC devices correspond to slots in a disjoint manner. For example, lowest priority MTC devices may map to a set of slots include a number of low numbered slots and a number of high numbered slots. In that, in that case, a blocking mask may be applied to some low number slots and some high number slots when a congestion event occurs with the particular slots to be blocked communicated to appropriate MTC devices.
As mentioned above, in one embodiment, MTC devices may be randomly assigned an ID. When the MTC device ID is randomly assigned, a device will be randomly assigned an access slot. In addition, in one embodiment, the device also randomly picks a preamble. In this embodiment, additional enhancements such as dynamically adjusting the Random access response (RAR) detection window and backoff may further improve the access performance.
There are two bottlenecks in random access: RAR window size and msg3
transmission (in sequence: msgl being an access request; msg2 being a random access response; and msg3 being a mobile acknowledge). First, for RAR window size, it is assumed that the system has the resource to allocate at most three (3) preambles in each subframe. With a RAR window size of five (5) there could be at most fifteen (15) preambles allocated. This is not sufficient for large amount of MTC access. Another bottleneck is msg3 transmission. In collision, the collided preambles usually can not be discovered by the eNB, so the eNB sends back the RAR message, and all the collided UE will receive the same RAR message. This causes the collision of msg3 until the retransmission limit is reached.
Retransmission of msg3 causes much delay and wastes system resources.
One solution for the first bottleneck is to optimize the RAR window size according to the access loading. The eNB can estimate the access intensity of the UE according to the number of the received preambles. The estimation can be simplified by linear estimation. The number of msgl transmitted may be approximately linear to the required RAR window size. So, for example, if the window size in use is five (5), the number of msgl 's transmitted should be controlled to below thirty (30). And furthermore, below this, all the UE can access without any restriction. When the eNB knows this, it can estimate the collision probability and indicate to the UE the current access intensity, collision probability and the tuned access parameters, for example, to configure new access slot length. A step granularity may be utilized, for example a 10% step, i.e. increase or decrease the slot length by 10%.
The msg3 collision probability can be modeled as a second degree polynomial and expressed by the collision probability, x, of msgl . (Y=axA2 + bx + c).
After the msg3 collision probability estimation is obtained, the UE will not access the system if the estimated msg3 collision probability is larger than a predefined threshold. It will check back after a back off time (e.g., back-off Slot_K_system).
If the msg3 collision probability is less than the threshold, the UE applies the new access distributing parameter to choose the access occasion, with the consideration of the number of preamble attempts tried (e.g., number_preamble_tx). In one embodiment, the value for the access slot for the UE may be determined as:
Slot_k = number_preamble_tx * (msgl_detection_prob) * Slot_K_system Because during collision, the UE may fail after a maximum number of preamble attempts are tried (e.g., MAX_preamble_tx), assumed to be ten (10) by 3GPP, after a a number of attempts (e.g., a few attempts), the UE should make sure this limit should not be exceeded. So, the UE should wait for a longer time when the surge of MTC device access may end or decay.
Note that Slot_K_system is the slot length parameter indicated by the system.
Also note that the msgl_detection_prob is given by
Figure imgf000020_0001
where i indicates the i-th preamble transmission. The eNB may update the access information discussed above periodically and broadcast this information to the UE in the cell.
Embodiments of the techniques described herein have a number of advantages over conventional approaches. For example, constraining each MTC device to transmit access requests a particular slot of an access cycle using a particular preamble can reduce or minimize the chance of access collisions with other MTC devices and/or other H2H devices. Reducing collisions allows the radio resources to be used more efficiently, e.g., by reducing the signaling overhead required to schedule access requests and by reducing the number of retransmissions that results from collisions and subsequent back-off transmissions. For another example, the reporting time of a MTC device is more predictable (relative to random access) at the network because the network already knows the information that is used to select the access slot and the preamble to be utilized in the access slot, e.g., the SFN and the IMSI of the MTC device. Forward link overhead and/or congestion in the access slot selection approach is smaller than in the polling approach for the same level of collision performance. Moreover, the impact to the existing mechanism is small.
Portions of the disclosed subject matter and corresponding detailed description are presented in terms of software, or algorithms and symbolic representations of operations on data bits within a computer memory. These descriptions and representations are the ones by which those of ordinary skill in the art effectively convey the substance of their work to others of ordinary skill in the art. An algorithm, as the term is used here, and as it is used generally, is conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of optical, electrical, or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise, or as is apparent from the discussion, terms such as "processing" or "computing" or "calculating" or "determining" or "displaying" or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical, electronic quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
Note also that the software implemented aspects of the disclosed subject matter are typically encoded on some form of program storage medium or implemented over some type of transmission medium. The program storage medium may be magnetic (e.g., a floppy disk or a hard drive) or optical (e.g., a compact disk read only memory, or "CD ROM"), and may be read only or random access. Similarly, the transmission medium may be twisted wire pairs, coaxial cable, optical fiber, or some other suitable transmission medium known to the art. The disclosed subject matter is not limited by these aspects of any given implementation.
The particular embodiments disclosed above are illustrative only, as the disclosed subject matter may be modified and practiced in different but equivalent manners apparent to those skilled in the art having the benefit of the teachings herein. Furthermore, no limitations are intended to the details of construction or design herein shown, other than as described in the claims below. It is therefore evident that the particular embodiments disclosed above may be altered or modified and all such variations are considered within the scope of the disclosed subject matter. Accordingly, the protection sought herein is as set forth in the claims below.

Claims

1. A method comprising:
selecting, at a wireless communication device, one of a plurality of time intervals in a periodically repeating access cycle for transmission of an access signal, the selection being performed based on an identification number identifying the wireless communication device; negotiating, at the wireless communication device, a preamble assignment for the selected one of the plurality of time intervals; and
transmitting, at the wireless communication device, the access signal over an access channel in the selected one of the plurality of time intervals using a preamble corresponding to the preamble assignment.
2. The method of claim 1 wherein negotiating the preamble comprises:
requesting the preamble assignment for the selected one of the plurality of time intervals from a network node; and
receiving the preamble assignment for the selected one of the plurality of time intervals from the network node.
3. The method of claim 1 wherein the preamble assignment for the selected one of the plurality of time intervals is unique to the wireless communication device.
4. The method of claim 1 further comprises:
receiving a blocking signal indicating at least a first time interval of the plurality of time intervals in which access should be prevented; and
blocking transmission of the access signal over an access channel in the selected one of the plurality of time intervals using a preamble corresponding to the preamble assignment based on the blocking signal.
5. The method of claim 1 further comprising defining the plurality of time intervals in the access cycle based on synchronization information broadcast over an air interface to the wireless communication device so that the wireless communication device is synchronized with other wireless communication devices on the same access cycle with the same numbering of the time intervals.
6. The method of claim 5 wherein the plurality of time intervals are a plurality of time slots in the periodically repeating access cycle, and wherein selecting one of the plurality of time intervals comprises selecting one of the plurality of time slots based on a slot numbering comprising system frame number associated with the selected one of the slots and broadcast over the air interface.
7. The method of claim 6 wherein selecting one of the plurality of time slots comprises selecting a time slot associated with a system frame number when the system frame number is equal to the identification number modulo a period of the access cycle.
8. The method of claim 6 wherein selecting one of the plurality of time slots comprises selecting a time slot associated with a system frame number when the system frame number is equal to a selected portion or permutation of the identification number.
9. The method of claim 6 wherein selecting one of the plurality of time slots comprises selecting a time slot associated with a system frame number when the system frame number is equal to a hash of the identification number.
10. The method of claim 1 wherein a period of the access cycle is equal to a period of a paging cycle for the wireless communication device, and wherein selecting said one of the plurality of time intervals for the access signal comprises selecting a time interval immediately following a time interval assigned for paging the wireless communication device.
11. The method of claim 1 wherein selecting said one of the plurality of time intervals comprises selecting one of the plurality of time intervals in an access cycle determined by a reporting interval for the wireless communication device.
PCT/CN2011/072436 2011-04-02 2011-04-02 Slotted access for wireless communication devices and control thereof WO2012135996A1 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
KR1020137028159A KR101583499B1 (en) 2011-04-02 2011-04-02 Slotted access for wireless communication devices and control thereof
PCT/CN2011/072436 WO2012135996A1 (en) 2011-04-02 2011-04-02 Slotted access for wireless communication devices and control thereof
JP2014502971A JP5837180B2 (en) 2011-04-02 2011-04-02 Slotted access and control of wireless communication devices
EP11863239.7A EP2695469B1 (en) 2011-04-02 2011-04-02 Slotted access for wireless communication devices and control thereof
CN201180069568.3A CN103477697B (en) 2011-04-02 2011-04-02 Time-division slot access and its control for Wireless Telecom Equipment
US14/009,422 US9380606B2 (en) 2011-04-02 2011-04-02 Slotted access for wireless communication devices and control thereof
US15/145,524 US20160249387A1 (en) 2011-04-02 2016-05-03 Slotted Access For Wireless Communication Devices And Control Thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2011/072436 WO2012135996A1 (en) 2011-04-02 2011-04-02 Slotted access for wireless communication devices and control thereof

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US14/009,422 A-371-Of-International US9380606B2 (en) 2011-04-02 2011-04-02 Slotted access for wireless communication devices and control thereof
US15/145,524 Continuation US20160249387A1 (en) 2011-04-02 2016-05-03 Slotted Access For Wireless Communication Devices And Control Thereof

Publications (1)

Publication Number Publication Date
WO2012135996A1 true WO2012135996A1 (en) 2012-10-11

Family

ID=46968528

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/072436 WO2012135996A1 (en) 2011-04-02 2011-04-02 Slotted access for wireless communication devices and control thereof

Country Status (6)

Country Link
US (2) US9380606B2 (en)
EP (1) EP2695469B1 (en)
JP (1) JP5837180B2 (en)
KR (1) KR101583499B1 (en)
CN (1) CN103477697B (en)
WO (1) WO2012135996A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2733966A1 (en) * 2012-11-15 2014-05-21 Deutsche Telekom (UK) Limited Method for enhancing machine type communication between a mobile communication network and a machine type communication device
WO2015015136A1 (en) * 2013-08-01 2015-02-05 Toshiba Research Europe Limited Ran overload control for m2m communications in lte networks
JP2015033022A (en) * 2013-08-02 2015-02-16 ホーチキ株式会社 Notice broadcast system
CN104735159A (en) * 2015-04-02 2015-06-24 东南大学 Vehicle-mounted network access method based on self-adaptive time slot allocation
US10660033B2 (en) 2014-10-09 2020-05-19 Qualcomm Incorporated Regularly scheduled sessions in a cellular internet of things system
CN112469137A (en) * 2020-10-15 2021-03-09 北京航空航天大学杭州创新研究院 Collision-free multiple access method, device and system for Internet of vehicles safety application
CN114337952A (en) * 2020-09-30 2022-04-12 烽火通信科技股份有限公司 Method and system for communication link negotiation

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012085011A (en) * 2010-10-07 2012-04-26 Sony Corp Base station, radio communication method, and radio communication system
JP5490323B2 (en) * 2011-07-22 2014-05-14 アルカテル−ルーセント Machine-type communication in wireless networks
US9100941B2 (en) * 2012-05-24 2015-08-04 Nokia Solutions And Networks Oy Using unique preambles for D2D communications in LTE
CN105210317A (en) * 2014-04-23 2015-12-30 华为技术有限公司 Data transmission method and apparatus
JP6414452B2 (en) * 2014-12-05 2018-10-31 株式会社オートネットワーク技術研究所 In-vehicle communication system and in-vehicle device
CN105307282B (en) * 2015-07-23 2016-11-09 山东德昶安防科技有限公司 A kind of method and device preventing multiple users access interference
WO2017035698A1 (en) * 2015-08-28 2017-03-09 华为技术有限公司 Method, device and system for sending prach preamble
AU2015416504B2 (en) * 2015-12-11 2019-09-12 Motorola Solutions, Inc. Method and apparatus for server-based scheduling of network traffic to a mobile device
WO2017171322A2 (en) * 2016-03-29 2017-10-05 엘지전자 주식회사 Method for performing random access procedure in next generation wireless communication system and apparatus therefor
US9986446B2 (en) 2016-05-31 2018-05-29 Apple Inc. Providing special radio provisions to link budget limited user equipment at activation
CN106530808B (en) * 2016-11-10 2019-03-12 浙江工业大学 According to the quick-adjustsing parking space information method for reporting of parking stall current availability
KR101880523B1 (en) 2016-12-01 2018-07-20 한국전자통신연구원 Method for random access in wireless communication system and apparatus for the same
CN108347415A (en) * 2017-01-24 2018-07-31 上海乐相科技有限公司 A kind of wireless communications method and equipment based on virtual reality system
CN107613525B (en) * 2017-09-21 2021-06-08 新智数字科技有限公司 Peak-staggering reporting method and device based on meter and electronic equipment
CN109001668B (en) * 2018-04-10 2022-11-18 四川中电昆辰科技有限公司 Positioning tag response method and system in positioning period set
US11770740B2 (en) * 2019-07-02 2023-09-26 Cisco Technology, Inc. Automatic classification and enforcement of low-bandwidth internet of things (IoT) devices
US11438837B2 (en) 2019-10-31 2022-09-06 Itron, Inc. Downlink event allocation in a network
US11363532B2 (en) 2019-10-31 2022-06-14 Itron, Inc. Downlink event allocation in a network
CA3156407A1 (en) * 2019-10-31 2021-05-06 Itron, Inc. Downlink event allocation in a network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217808A (en) * 2008-01-17 2008-07-09 中兴通讯股份有限公司 Transmitting method of random accessed signal in the wireless communication system
WO2010002306A1 (en) * 2008-07-01 2010-01-07 Telefonaktiebolaget L M Ericsson (Publ) Methods and apparatuses for performing preamble assignment for random access in a telecommunications system
US20100113053A1 (en) * 2008-10-31 2010-05-06 Maik Bienas Method of accessing a physical random access channel, method of signalling access information for accessing a physical random access channel, mobile communication terminal and base station
CN101883314A (en) * 2009-05-08 2010-11-10 富士通株式会社 Media access method and equipment for wireless communication system
CN101990310A (en) * 2009-07-30 2011-03-23 华为技术有限公司 Random access method and device thereof

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2433677A (en) * 2005-10-31 2007-06-27 Israel Aircraft Ind Ltd Medium access control (MAC) method and system for dynamic time slot allocation and QoS priority access in a mobile ad hoc network (MANET)
CN101690380B (en) * 2007-08-10 2013-07-24 富士通株式会社 Radio base station and mobile station
US8432812B2 (en) * 2007-10-29 2013-04-30 Lg Electronics Inc. Method of performing random access procedure in wireless communication system
CN101686544A (en) * 2008-09-22 2010-03-31 中兴通讯股份有限公司 Method for distributing special random access resource and base station
US8428015B2 (en) * 2009-06-29 2013-04-23 Intel Mobile Communications GmbH Permanent dedicated random access preambles for femtocell
WO2011036507A1 (en) * 2009-09-28 2011-03-31 Nokia Corporation Random access process reusing for d2d probing in cellular-aided d2d networks
BR112012020135B1 (en) 2010-02-12 2021-04-13 Gemalto Sa NETWORK ACCESS METHOD AND SYSTEM FOR MACHINE TYPE COMMUNICATIONS
KR101810260B1 (en) * 2010-02-12 2017-12-18 인터디지탈 패튼 홀딩스, 인크 Method and apparatus for optimizing uplink random access channel transmission
US20110199905A1 (en) 2010-02-12 2011-08-18 Interdigital Patent Holdings, Inc. Access control and congestion control in machine-to-machine communication
EP2369890A1 (en) 2010-03-26 2011-09-28 Panasonic Corporation Connection peak avoidance for machine-type-communication (MTC) devices
US20110310854A1 (en) * 2010-06-17 2011-12-22 Jialin Zou Method of determining access times for wireless communication devices
US20120033613A1 (en) * 2010-08-04 2012-02-09 National Taiwan University Enhanced rach design for machine-type communications
CN102355734B (en) * 2010-09-30 2015-01-07 开曼群岛威睿电通股份有限公司 System and method for allocating channel resource

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217808A (en) * 2008-01-17 2008-07-09 中兴通讯股份有限公司 Transmitting method of random accessed signal in the wireless communication system
WO2010002306A1 (en) * 2008-07-01 2010-01-07 Telefonaktiebolaget L M Ericsson (Publ) Methods and apparatuses for performing preamble assignment for random access in a telecommunications system
US20100113053A1 (en) * 2008-10-31 2010-05-06 Maik Bienas Method of accessing a physical random access channel, method of signalling access information for accessing a physical random access channel, mobile communication terminal and base station
CN101883314A (en) * 2009-05-08 2010-11-10 富士通株式会社 Media access method and equipment for wireless communication system
CN101990310A (en) * 2009-07-30 2011-03-23 华为技术有限公司 Random access method and device thereof

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
3GPP TSG-RAN WG2 MEETING #71 BIS; R2-105437, 11 October 2010 (2010-10-11)
GPP TSG-RAN WG2 MEETING #71; R2-104501, 23 August 2010 (2010-08-23)
See also references of EP2695469A4

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2733966A1 (en) * 2012-11-15 2014-05-21 Deutsche Telekom (UK) Limited Method for enhancing machine type communication between a mobile communication network and a machine type communication device
US9226095B2 (en) 2012-11-15 2015-12-29 Deutsche Telekom (Uk) Limited Method for enhancing machine type communication between a mobile communication network and a machine type communication device
GB2531221B (en) * 2013-08-01 2020-04-15 Toshiba Res Europe Limited RAN overload control for M2M communications in LTE networks
WO2015015136A1 (en) * 2013-08-01 2015-02-05 Toshiba Research Europe Limited Ran overload control for m2m communications in lte networks
GB2531221A (en) * 2013-08-01 2016-04-13 Toshiba Res Europe Ltd RAN overload control for M2M communications in LTE networks
US10034121B2 (en) 2013-08-01 2018-07-24 Kabushiki Kaisha Toshiba RAN overload control for M2M communications in LTE networks
JP2015033022A (en) * 2013-08-02 2015-02-16 ホーチキ株式会社 Notice broadcast system
US10660033B2 (en) 2014-10-09 2020-05-19 Qualcomm Incorporated Regularly scheduled sessions in a cellular internet of things system
CN104735159A (en) * 2015-04-02 2015-06-24 东南大学 Vehicle-mounted network access method based on self-adaptive time slot allocation
CN104735159B (en) * 2015-04-02 2018-04-24 东南大学 A kind of vehicle-mounted network access method based on self-adapting time slot distribution
CN114337952A (en) * 2020-09-30 2022-04-12 烽火通信科技股份有限公司 Method and system for communication link negotiation
CN114337952B (en) * 2020-09-30 2023-06-09 烽火通信科技股份有限公司 Method and system for negotiating communication link
CN112469137A (en) * 2020-10-15 2021-03-09 北京航空航天大学杭州创新研究院 Collision-free multiple access method, device and system for Internet of vehicles safety application

Also Published As

Publication number Publication date
US20140016624A1 (en) 2014-01-16
CN103477697A (en) 2013-12-25
CN103477697B (en) 2017-09-05
EP2695469B1 (en) 2017-07-05
JP5837180B2 (en) 2015-12-24
KR101583499B1 (en) 2016-01-08
US9380606B2 (en) 2016-06-28
EP2695469A4 (en) 2014-09-10
US20160249387A1 (en) 2016-08-25
EP2695469A1 (en) 2014-02-12
KR20130137687A (en) 2013-12-17
JP2014510495A (en) 2014-04-24

Similar Documents

Publication Publication Date Title
US9380606B2 (en) Slotted access for wireless communication devices and control thereof
US20110310854A1 (en) Method of determining access times for wireless communication devices
EP3818768B1 (en) Method and user equipment for performing random access channel procedure for unlicensed operation
KR101382161B1 (en) Network access method and system for machine type communications
JP6112116B2 (en) Method for controlling machine type communication (MTC) in a wireless communication network
EP2966924B1 (en) Service data transmission processing, transmission method and device
EP2719242B1 (en) Unscheduled messages
TWI435632B (en) Prioritized random access method
KR101366263B1 (en) A Method of Random Access and a method of transforting information in Broadband Wireless Access system
TW201826815A (en) On-demand system information delivery procedure
US20170048802A1 (en) Coverage Extension in Wireless Communication
EP3932139B1 (en) Technology neutral coexistence and high priority traffic in unlicensed frequency bands
CN107295567B (en) Wireless resource conflict detection method based on frame structure
CN114846824A (en) Counting of devices
CN108990150B (en) Paging processing method
EP3673698B1 (en) Methods and nodes for communication on multiple channels
US20230397225A1 (en) Methods and apparatuses for small data transmission in random access
RU2777838C2 (en) Device, system, and method for reception of system information as needed
US20230337273A1 (en) Methods and apparatuses for random access
Tan et al. A Novel Random Access Mechanism based on Real-time Access Intensity Detection
KR20230077006A (en) System of Multiple Access Protocol Wireless Network Based on Time Division Multiple Access Using Random Access Period Unused Time Slot
CN113016206A (en) Uplink data resource pre-configuration
CN111557116A (en) Improved scheduled transmission

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11863239

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2014502971

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 14009422

Country of ref document: US

REEP Request for entry into the european phase

Ref document number: 2011863239

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2011863239

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20137028159

Country of ref document: KR

Kind code of ref document: A