专利摘要:
admission control and resource management for non-members of a closed subscriber group in native radio access networks. systems and methodologies are described which facilitate resource management and admission control with respect to non-members of a closed subscriber group associated with femto access points. a parameter set may have provisions for a femto access point, where the parameter set specifies an access mode, a maximum number of concurrent non-members, and/or a maximum amount of resources allocated to non-members. the access point femto can implement resource scheduling decisions and/or access control decisions according to the set of parameters.
公开号:BR112012009666B1
申请号:R112012009666-4
申请日:2010-10-28
公开日:2021-06-15
发明作者:Amer Catovic;Gavin Bernard Horn
申请人:Qualcomm Incorporated;
IPC主号:
专利说明:

Priority Claim under 35 U.S.C. § 119
[0001] The present patent application claims priority from provisional patent application US 61/255,694, filed October 28, 2009, entitled "Network Controlled Resource Allocation To Non-CSG Members In Home Radio Access Networks", and 61/256,118 , filed October 29, 2009, entitled "Network Controlled Resource Allocation To Non-CSG Members In Home Radio Access Networks". The aforementioned provisional US patent application is assigned to the assignee of the present application and expressly incorporated herein by reference in its entirety. Field of Invention
[0002] The following description refers in general to wireless communication systems, and more particularly to admission control and resource management for femto access points. Description of Prior Art
[0003] Wireless communication systems are widely developed to provide various types of communication content, such as voice and data. Typical wireless communication systems may be multiple access systems capable of supporting communication with multiple users by sharing available system resources (eg, bandwidth, time, transmission power, etc.). Examples of such multiple access systems may include code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA) systems, time division multiple access systems. orthogonal frequency division (OFDMA), and the like. Additionally, systems can conform to specifications such as third-generation partner design (3GPP), 3GPP2, High Speed Packet Access (HSPA), High Speed Downlink Packet Access (HSDPA), Access to High Speed Uplink Packet (HSUPA), long term evolution 3GPP (LTE), Advanced LTE (LTE-A), etc.
[0004] Generally, wireless multiple access communication systems can simultaneously support communication to multiple mobile devices. Each mobile device can communicate with one or more base stations through forward and reverse link transmissions. The forward link (or downlink) refers to the communication link from the base stations to the mobile devices, and the reverse link (or uplink) refers to the communication link from the mobile devices to the base stations. Wireless communication systems can be configured to include a series of wireless access points, which can provide coverage for respective locations within the system. Such a network structure is generally referred to as a cellular network structure, and the access points and/or locations they serve respectively in the network are generally referred to as cells.
[0005] In addition to currently available mobile phone networks, a new class of small base stations has emerged that can be installed in a user's home and provide indoor wireless coverage for mobile units using existing broadband Internet connections. Such personal miniature base stations are generally known as access point base stations, or, alternatively, home NodeB (HNB), home eNodeB (HeNB), or femto cells. Typically, such miniature base stations are connected to the Internet and a mobile operator's network through a Digital Subscriber Line (DSL) router, cable modem, or similar.
[0006] A femto cell can be associated with a closed subscriber group (CSG) so that only mobile devices within the CSG can access and/or obtain service from the femto cell. However, nevertheless, a femto cell can be configured to operate in an open mode, a closed mode, or a hybrid mode. In an open mode, the femto cell is configured to allow access to any mobile devices capable of accessing the femto cell. In a closed mode, the femto cell only serves mobile devices included in the CSG. In a hybrid mode, the femto cell provides service to member mobile devices (eg mobiles within the CSG) and non-member mobile devices. Typically, the femto cell gives priority to member mobile devices over non-member mobile devices while operating in a hybrid mode. Invention Summary
[0007] The following is a simplified summary of one or more modalities in order to provide a basic understanding of such modalities. This summary is not an extensive overview of all of the modalities contemplated, and is not intended to identify key or critical elements of all modalities or delineate the scope of any or all modalities. Its sole purpose is to present some concepts of one or more modalities in a simplified form as an introduction to the more detailed description that will be presented later.
[0008] According to one or more modalities and corresponding description thereof, various aspects are described with respect to facilitating admission control and resource management with respect to non-members of a closed subscriber group associated with the domestic access points . A parameter set may have provisions for a home access point, where the parameter set specifies an access mode, a maximum number of concurrent non-members, and/or a maximum amount of resources allocated to non-members. The home access point can implement resource scheduling and/or access control in view of the parameter set.
[0009] According to a first aspect, a resource scheduling method for a home base station operating in a hybrid access mode is provided. The method may include identifying whether a mobile device, connected with the home base station, is a member or non-member of a closed subscriber group associated with the home base station. Additionally, the method may include allocating resources for data transmission to the mobile device according to a parameter when the mobile device is not a member, wherein the parameter indicates a level of resources to provide to non-members of the closed subscriber group.
[0010] Another aspect relates to a wireless communication apparatus. The wireless communication apparatus may include at least one processor configured to identify whether a mobile device, connected to the wireless communication apparatus, is a member or non-member of a closed subscriber group. Additionally, at least one processor is also configured to allocate resources for data transmission to the mobile device according to a parameter when the mobile device is not a member, wherein the parameter indicates a level of resources to provide to non-members of the closed subscriber group.
[0011] Another aspect refers to an apparatus that may include mechanisms to identify whether a mobile device, connected to the apparatus, is a member or non-member of a closed subscriber group. Additionally, the apparatus may also include mechanisms for assigning resources for transmitting data to the mobile device according to a parameter when the mobile device is not a member, wherein the parameter indicates a level of resources to provide to non-members of the group. subscribers closed.
[0012] Another aspect relates to a computer program product comprising a computer-readable medium. The computer-readable medium may include codes to cause at least one computer to identify whether a mobile device, connected to a home base station, is a member or non-member of a closed subscriber group associated with the home base station. In addition, the computer-readable medium may include codes to cause at least one computer to allocate resources for transmitting data to the mobile device according to a parameter when the device is a non-member, where the parameter indicates a level of resources to provide to non-members of the closed subscriber group.
[0013] According to another aspect, an apparatus is described. The apparatus may include an identification module that determines whether a mobile device is one of a member or non-member of a closed subscriber group. The device may also include a scheduler that assigns resources to the mobile device. Additionally, the apparatus may include a resource control module which restricts the amount of resources assigned to the mobile device, according to a parameter, when the mobile device is a non-member of the closed subscriber group.
[0014] According to another aspect, a method for managing access to a home base station is described. The method may include receiving a request from a mobile device to establish a connection. The method may also include identifying whether the mobile device is one of a member or non-member of a closed subscriber group associated with the home base station. Additionally, the method may include determining whether to admit or deny the mobile device based at least in part on a parameter, where the parameter specifies a maximum number of concurrent non-member users.
[0015] Another aspect relates to a wireless communication apparatus. The wireless communication apparatus may include at least one processor configured to receive a request from a mobile device to establish a connection. The at least one processor may also be configured to identify whether the mobile device is one of a member or non-member of a closed subscriber group associated with the wireless communication apparatus. Additionally, at least one processor can be configured to determine whether to admit or deny the mobile device based at least in part on a parameter, where the parameter specifies a maximum number of concurrent non-member users.
[0016] Another aspect concerns an apparatus that may include mechanisms to receive a request, from a mobile device, to establish a connection. The apparatus may also include mechanisms for identifying whether the mobile device is one of a member or a non-member of a closed subscriber group associated with the apparatus. Additionally, the apparatus may include mechanisms for determining whether to admit or deny the mobile device based at least in part on a parameter, where the parameter specifies a maximum number of concurrent non-member users.
[0017] Another additional aspect relates to a computer program product comprising a computer-readable medium. The computer-readable medium may include codes to cause at least one computer to receive a request from a mobile device to establish a connection. The computer-readable medium may include codes to cause at least one computer to identify whether the mobile device is one of a member or non-member of a closed subscriber group associated with a home base station. Additionally, the computer-readable medium may include codes to cause at least one computer to determine whether to admit or deny the mobile device based at least in part on a parameter, wherein the parameter specifies a maximum number of simultaneous non-member users.
[0018] According to another aspect, an apparatus is described. The apparatus may include an identification module that determines whether a mobile device is one of a member or non-member of a closed subscriber group. Additionally, the apparatus may include an access control module that determines whether to establish a connection with the mobile device based on a parameter, when the mobile device is a non-member of the closed subscriber group.
[0019] To accomplish these and other related purposes, one or more modalities comprise the characteristics fully described below and particularly pointed out in the claims. The following description and the accompanying drawings present in detail certain illustrative aspects of one or more embodiments. These aspects are indicative, however, of only a few of the many ways in which the principles of various modalities can be employed and the modalities described must include all aspects and their equivalents. Brief Description of Figures
[0020] Figure 1 - illustrates an exemplary wireless communication system that facilitates serving members and non-member elements of a closed subscriber group (CSG) simultaneously during hybrid mode operations in accordance with various aspects.
[0021] Figure 2 - is an illustration of an exemplary data model that can be employed by a femto access point according to various aspects.
[0022] Figure 3 - is an illustration of an exemplary system that facilitates the identification of a UE as a member or non-member of a closed subscriber group according to various aspects.
[0023] Figure 4 - illustrates an exemplary system that facilitates the restriction of access to non-members of a CSG according to several aspects.
[0024] Figure 5 - illustrates an exemplary system that facilitates resource management for non-members of a CSG according to several aspects.
[0025] Figure 6 - is an illustration of an exemplary methodology for managing resources according to a member group status.
[0026] Figure 7 - is an illustration of an exemplary methodology for programming a group of users who are not members of a closed subscriber group.
[0027] Figure 8 - is an illustration of an exemplary methodology for handling a programming request from a mobile device that is not included in a CSG.
[0028] Figure 9 - is an illustration of an exemplary methodology for handling a connection request, from a mobile device that is not a member of a CSG, based on a resource management parameter.
[0029] Figure 10 - is an illustration of an exemplary methodology for employing handovers to facilitate resource management.
[0030] Figure 11 - is an illustration of an exemplary admission control methodology for a home base station operating in a hybrid mode.
[0031] Figure 12 - is an illustration of an exemplary apparatus that facilitates resource management for a home base station operating in a hybrid access mode according to various aspects.
[0032] Figure 13 - is an illustration of an exemplary apparatus that facilitates admission control for a home base station operating in a hybrid access mode according to various aspects.
[0033] Figures 14 and 15 - are block diagrams of respective wireless communication devices that can be used to implement the various aspects of the functionality described here.
[0034] Figure 16 - illustrates an exemplary wireless communication system according to various aspects.
[0035] Figure 17 - illustrates an exemplary system to enable the development of access point base stations within a wireless network environment.
[0036] Figure 18 - illustrates an exemplary coverage map that includes tracking areas.
[0037] Figure 19 - is an illustration of a wireless communication system according to the various aspects presented here.
[0038] Figure 20 - is a block diagram illustrating an exemplary wireless communication system in which the various aspects described here can function. Detailed Description of the Invention
[0039] Various embodiments are now described with reference to the drawings, in which the same reference numbers are used to refer to the same elements throughout the report. In the following description, for purposes of explanation, a number of specific details are presented in order to provide a complete understanding of one or more modalities. It may be evident, however, that such modalities can be practiced without these specific details. In other cases, well-known structures and devices are illustrated in block diagram form in order to facilitate the description of one or more modalities.
[0040] As used in this application, the terms "component", "module", "system", and the like shall refer to computer-related entities such as: hardware, firmware, a combination of hardware and software, software, or software running. For example, a component can be, but is not limited to, a process running on a processor, a processor, an object, an executable, a chain of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or chain of execution and a component can be located on one computer and/or distributed among two or more computers. Additionally, these components can be run from various computer readable media having various data structures stored on them. Components can communicate through local and/or remote processes such as, according to a signal, having one or more data packets (for example, data from one component interacting with another component in a local system, distributed system, and /or over a network such as the Internet with other systems via signal).
[0041] Additionally, various aspects are described here with respect to a wireless terminal and/or a base station. A wireless terminal can refer to a device that provides voice and/or data connectivity to a user. A wireless terminal can be connected to a computing device such as a laptop computer or a desktop computer, or it can be a standalone device such as a personal digital assistant (PDA). A wireless terminal may also be called a system, subscriber unit, subscriber station, mobile station, mobile, remote station, access point, remote terminal, access terminal, user terminal, user agent, user device, or user equipment (UE). A wireless terminal can be a subscriber station, a wireless device, a cell phone, a PCS phone, a conventional cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local circuit station ( WLL), a personal digital assistant (PDA), a handheld device having wireless capability, or other processing device connected to a wireless modem. A base station (eg, access point, Node B, or evolved Node B (eNB)) can refer to a device in an access network that communicates over the air interface, across one or more sectors, with the terminals wireless. The base station can act as a router between the wireless terminal and the rest of the access network, which can include an Internet Protocol (IP) network, by converting received air interface frames into IP packets. The base station also coordinates attribute management for the air interface.
[0042] Computing devices typically include a variety of media, which may include computer readable storage media and/or communication media, two terms that are used here differently from each other as set out below. Computer-readable storage media can be any available storage media that can be accessed by the computer and includes both volatile and non-volatile, removable and non-removable media. By way of example, and not limitation, computer-readable storage media may be implemented with respect to any method or technology for storing information, such as computer-readable instructions, program modules, structured data, or unstructured data. Computer readable storage media may include, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cassettes, tape magnetic, magnetic disk storage or other magnetic storage devices, or other tangible and/or non-transient media that can be used to store the desired information. Computer-readable storage media can be accessed by one or more local or remote computing devices, for example, through access requests, queries or other data retrieval protocols, for a variety of operations with respect to the information stored by the quite.
[0043] Communication media typically incorporate computer readable instructions, data structures, program modules or other structured or unstructured data in a data signal, such as a modulated data signal, for example, a carrier wave or other transport mechanism, and includes any means of transporting or delivering information. The term "modulated data signal" or signals refers to a signal that has one or more of its characteristics determined or altered in such a way as to encode information into one or more signals. By way of example, and not limitation, communication media includes wired media, such as a wired network or direct wired connection, and wireless media such as acoustic, RF, infrared, and other wireless media.
[0044] Various techniques described here can be used for various wireless communication systems, such as Code Division Multiple Access (CDMA) systems, Time Division Multiple Access (TDMA) systems, Division Multiple Access systems Frequency Division (FDMA), Orthogonal Frequency Division Multiple Access (OFDMA) systems, single-carrier FDMA systems (SC-FDMA), and other similar systems. The terms "system" and "network" are often used interchangeably here. A CDMA system may implement a radio technology such as Universal Terrestrial Radio Access (UTRA), CDMA2000, High Speed Packet Access (HSPA), High Speed Downlink Packet Access (HSDPA), Packet Access High Speed Uplink (HSUPA), etc. UTRA includes Broadband CDMA (W-CDMA) and other variations of CDMA. Additionally, CDMA2000 covers IS-2000, IS-95 and IS-856 standards. A TDMA system can implement a radio technology such as a Global System for Mobile Communications (GSM). An OFDMA system can implement a radio technology such as Evolved UTRA (E-UTRA), Ultra Mobile Broadband (UMB), IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, Flash-OFDM®, etc. UTRA and E-UTRA are part of the Universal Mobile Telecommunications System (UMTS). Long Term Evolution (LTE) 3GPP is a future version that uses E-UTRA, which employs OFDMA on the downlink and SC-FDMA on the uplink. HSPA, HSDPA, HSUPA, UTRA, E-UTRA, UMTS, LTE, LTE-A, SAE, EPC, and GSM are described in the documents of an organization called the "3rd Generation Partner Project" (3GPP). Additionally, CDMA2000 and UMB are described in the documents of an organization called the "2nd 3rd Generation Partner Project" (3GPP2). Additionally, such wireless communication systems may include point-to-point ad hoc networking systems (eg, mobile to mobile) often using unlicensed and unpaired spectrum, wireless LAN 802.xx, BLUETOOTH, and any other communication techniques. short or long range wireless communication. For the sake of clarity, terminology associated with WCDMA, HSPA, HSDPA and HSUPA are employed in the description below. However, it should be appreciated that the appended claims should not be limited to WCDMA, HSPA, HSDPA and HSUPA unless explicitly stated.
[0045] Furthermore, the term "or" shall mean an inclusive "or" rather than an exclusive "or". That is, unless otherwise specified, or clear from the context, the phrase "X employs A or B" must mean any of the natural inclusive permutations. That is, the phrase "X employs A or B" is satisfied by either of the following cases: X employs A; X employs B; or X employs A and B. Additionally, the articles "a" and "an" as used in this application and in the appended claims shall generally be considered to mean "one or more" unless otherwise specified or clear the context is directed to a singular form.
[0046] Several aspects will be presented in terms of systems that may include a number of devices, components, modules and the like. It should be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or not include all devices, components, modules, etc. discussed in relation to the figures. A combination of these approaches can also be used.
[0047] Referring now to the drawings, Figure 1 illustrates an exemplary wireless communication system 100 that facilitates serving members and non-members of a closed subscriber group (CSG) simultaneously during hybrid mode operations of a femto cell. Wireless communication system 100 includes a base station 110, a first user equipment or member UE 120, and a second non-member UE or UE 130. The base station 110 can wirelessly communicate with the UEs 120 and 130 through channels respective uplink and/or downlink. While, for ease of explanation, only one base station (e.g., base station 110) and two UEs (e.g., UEs 120 and 130) are illustrated in Figure 1, it should be appreciated that system 100 can include any number. of UEs and/or base stations.
[0048] The base station 110, in one aspect, may be an access point, an access node, a Node B (NB), an evolved Node B (eNB), a home Node B (HNB), or an eNodeB home (HeNB) and/or referred to interchangeably as an access point, an access node, a home access point, a home access node, a home base station, etc. Additionally, base station 110 may be a base station having one of a variety of power classes. For example, base station 110 may be a macro base station, a femto base station, a pico base station, etc. In one example, macro base stations generally operate to cover a larger geographic area such as a neighborhood, city, region, etc. For example, a macro base station can be associated with a macro cell ranging from one kilometer in size up to 100 kilometers. Femto base stations and/or pico base stations may provide wireless communication services over a smaller area (e.g., a femto cell, or pico cell) such as a building, a house, etc.
[0049] Additionally, the UEs 120 and UE 130 may be referred to as a mobile device, a mobile terminal, a mobile station, a station, a wireless terminal, or the like. Additionally, it should be appreciated that system 100 can operate on an LTE 3GPP or LTE-A wireless network, a WCDMA wireless network, an OFDMA wireless network, a CDMA network, a CDMA2000 3GPP2 network, an EV-DO network , a WiMAX network, an HSPA network, etc. While the aspects described below are explained with LTE terminology in relation to an LTE network and/or an LTE radio access technology, it should be appreciated that the techniques described here can be used within the above networks as well as other wireless networks and/or radio access technologies.
[0050] In accordance with one aspect of the present description, the base station 110 may be associated with a femto cell (e.g., base station 110 comprises a HeNB, HNB, home base station, or other small-scale access point (femto) )). Base station 110 may implement a standard femto access point data model to facilitate efficient configuration and deployment of base station 110. The data model organizes and categorizes a plurality of control and configuration parameters that dictate the operation of the points. femto access. A mobile operator, which provides base station 110, can provide parameters according to the data model through a management system, such as an HNB management system (HMS).
[0051] Figure 2 illustrates an exemplary data model 200 that may be used by base station 110 in accordance with an aspect. Data model 200 is an example and it should be appreciated that base station 110 may employ alternative data models. As shown in Figure 2, multiple top-level groups (eg Capabilities, FapControl, CellConfig, Transport, etc.) can be loosely associated into divisions. For example, the Capabilities, FapControl, and AccessManagement groups are associated with the Control and CellConfig groups and the Transport groups are associated with the Configuration group. In one example, a top-level group can include a plurality of subgroups, and in addition, each subgroup can include additional levels. While Figure 2 presents some groups and subgroups of data model 200 to highlight the hierarchical nature of the data model, it should be appreciated that additional levels can be incorporated into data model 200. In another example, data model 200 can accommodate parameters corresponding to different radio interface technologies. For example, data model 200 can include different subgroups or subsections to separately organize unique parameters for a particular radio interface technology, when necessary due to the difference in technologies. As shown in Figure 2, several top-level groups include a UMTS subgroup and an LTE subgroup, where the groups respectively include the parameters corresponding to UMTS and LTE. It should be appreciated that data model 200 can extend beyond what is shown in Figure 2.
[0052] Returning to Figure 1, the base station 110, like the femto base station, can be configured to operate in a variety of access modes such as, but not limited to, an open mode, a closed mode, or a hybrid mode. In open mode, base station 110 does not impose access restrictions based on the CSG member group. Accordingly, the member UE 120, which is a member of the CSG associated with the base station 110, and the non-member UE 130, which is not a member of the CSG, can both access the base station 110. In closed mode, the station base 110 operates as a closed cell so that only UEs that are members of the CSG are allowed access. In hybrid mode, the CSG member group is guaranteed, however non-member UEs are allowed access.
[0053] While operating in hybrid mode, base station 110 may restrict access to a relatively small number of non-CSG users and/or limit an amount of resources granted to non-CSG users. In one aspect, base station 110 may include an access control module 112 that manages UE access. According to an example, the access control module 112 may grant or deny an access request from a UE based on the status of the UE's member group and/or a current number of non-member UEs connected to the base station 110. For example, base station 110 may receive an access request (e.g., random access attempt, registration request, schedule request, etc.) from member UE 120. As member UE 120 is included in the CSG associated with the base station 110, the access control module 112 grants access. The base station 110 may also receive an access request from the non-member UE 130. Since the non-member UE 130 is not included in the CSG, the access control module 112 may determine to deny the non-member 130 access. In this aspect, the access control module 112 refuses access to the non-member UE 130 when a current number of connected non-member UEs is at the maximum.
[0054] In another aspect, the base station 110 may include a resource control module 114 that manages resource allocations for non-CSG users. In one example, the non-member UE 130 and the member UE 120 are connected to the base station 110. The UEs may have data to be received (e.g., downlink data transmitted by base station 110) and/or data to be transmitted (by example, uplink data to be received by base station 110). Base station 110 schedules the UEs in downlink and uplink according to a scheduling algorithm implemented by a scheduler (not shown). For the member UE 120, the base station 110 can allocate resources without additional restrictions beyond those that occur in a typical wireless communication system (e.g., system bandwidth, quality of service, available resources, amount of data, etc. .). For the non-member UE 130, additional restrictions may be placed on the scheduling resources while the base station 110 operates in a hybrid access mode. For example, resource control module 114 can guarantee scheduling restrictions so that non-members (e.g. UE 130) are allocated resources within pre-set limits.
[0055] According to a further aspect, the base station 110 includes a set of parameters 116. The set of parameters 116 may comprise parameters that control access to the base station 110 by non-CSG members and control a level of service provided for non-members. Parameter set 116 may be a part or a subset of parameters included in data model 200. For example, parameter set 116 may include parameters included in the AccessManagement group of data model 200. In particular, parameter set 116 can include an access mode parameter (for example, AccessMode in data model 200), a maximum concurrent CSG user parameter (for example, MaxConcurrentCSGUsers), a maximum concurrent non-CSG users parameter (for example, MaxNonCSGUSers), a maximum resource level parameter for non-CSG users (for example, MaxResourceNonCSGUsers), and the like. Access control mode 112 and resource control module 114 can influence access decisions and/or scheduling decisions, as described above, based on parameter set 116.
[0056] As also illustrated in system 100, base station 110 may include a processor 117 and/or memory 119, which may be used to implement some or all of the functionality of access control module 112, resource control module 114 , and/or other functionality or module of base station 110 described above. Additionally, memory 119 may hold parameter set 116 and/or data template 200.
[0057] Returning to Figure 3, a system 300 is illustrated that facilitates the identification of a UE as a member or non-member of a closed subscriber group (CSG). System 300 may include base station 110, member UE 120, and non-member UE 130 as described above with respect to the preceding figures.
According to another aspect, member UE 120 and non-member UE 130 may include respective identities, i.e. identity 322 and identity 332. Identities 322 and 332 may be encoded into unique identifiers respectively associated with the UE member 120 and the non-member UE 130. The unique identifiers carrying the identities 322 and 332 may be assigned or provisioned by a network operator and/or a manufacturer. It is appreciated that unique identifiers can take one of a variety of forms. By way of example, each unique identifier may be a network access identifier (NAI) or a mobile station integrated services digital network number (MS ISDN). Additionally, the unique identifier may be a subscriber identity such as an international mobile subscriber identity (IMSI) stored in a subscriber identity module (SIM). However, it should be appreciated that unique identifiers can adhere to any framework provided for the unique identifiers that can be employed to distinguish mobile devices. Additional identities 322 and 332 may be unique within a network associated with base station 110, unique within a particular geographic area, and/or unique globally.
[0059] As part of the acquisition and registration with base station 110, UEs 120 and 130 may carry identities 322 and 332, respectively. Base station 110 may include an identification module 312 that determines whether UEs 120 and 130 are members of the CSG based at least in part on identities 322 and 332. Identification module 312 obtains identities 322 and 332 transmitted as unique identifiers of the UEs 120 and 130, respectively. Identification module 312 may employ an access list 314 to identify UEs as members of the CSG. Access list 314 enumerates the identities of UEs within the CSG associated with base station 110. Identification module 312 may query access list 314 to determine whether a particular identity is included in the list and therefore the associated UE with it is a member of the CSG.
[0060] For example, member UE 120 may transmit a registration message to base station 110, where the registration message includes a unique identifier encoding identity 322. Identification module 312 may obtain or derive identity 322 from unique identifier and/or the registration message, and employing the obtained identity 322 to query access list 314. If a match occurs (for example, identity 322 is included in access list 314), the identification module 312 determines that EU member 120 is a member of the CSG. In another example, non-member UE 130 may transmit a registration message to base station 110, wherein the registration message includes a unique identifier transport identity 332. Identification module 312 may obtain identity 332 from the unique identifier and/or the transmitted log message. Subsequently, identification module 312 may query identity 332 in access list 314 to determine whether or not access list 314 lists identity 332. When identification module 312 determines that identity 332 is not in access list 314 , the identification module 312 determines that the UE 130 is not a member of the CSG.
[0061] As shown in Figure 3, system 300 may include an access control module 112, a resource control module 114, a parameter set 116, processor 117, and memory 119 described above. In one aspect, the access control module 112 and the resource control module 114 can implement access control and resource management based on the set of parameters 116 and member group determinations provided by the identification module 312. It will be appreciated that memory 119 may be configured to hold access list 314 and processor 117 may be configured to implement the functionality of identification module 312.
[0062] Figure 4 illustrates a wireless communication system 400 that facilitates restricting access to non-members of a CSG according to several aspects. System 400 may include components and apparatus introduced in the preceding figures, such as a UE member 120, non-member 130, access control module 112, parameter set 116, identification module 312, and access list 314.
[0063] According to an aspect, the set of parameters 116 may include a parameter 402 that specifies a maximum number of non-member users. While operating in hybrid access mode, base station 110 can admit UEs, which are not members of the associated CSG, provided that, by admitting UEs, a total number of non-member UEs does not exceed parameter 402. A non-member UE is a UE (e.g., non-member UE 130) whose associated identity (e.g., identity 332) is not included in access list 314 enumerating the members of the CSG.
[0064] The base station 110 may include a monitor module 404 that monitors connections between the UEs and the base station 110 that are currently active. In one aspect, the monitor module 404 maintains a current user list 406 that lists all active and connected UEs. The current user list 406 may include identities of connected UEs as well as indications of whether or not each connected UE is a member of the CSG, as determined by the identification module 312. The monitor module 404 may update the current user list 406 as appropriate. that the UE connects, disconnects, handsoffs to other base stations, etc.
[0065] According to an example, the access control module 112, upon receiving an access request from a UE, queries the identification module 312 to identify the UE as a member or non-member. For example, upon receiving an access request from the non-member UE 130, the access control module 112 may be notified by the identification module 312 that the UE is not a member of the CSG. Access control module 112 analyzes the current user list 406 to determine a number of simultaneous non-members connected to base station 110. Access control module 112 can compare the number of simultaneous non-members with parameter 402 which specifies a maximum number of concurrent non-members allowed. When the number of concurrent non-members associates with or exceeds the maximum number of concurrent non-members, the access control module 112 can deny the access request of the non-member UE 130. However, when the number of concurrent non-members is below of the maximum number specified by parameter 402, the access control module 112 may elect to admit the non-member UE 130.
[0066] In another example, the access control module 112 can observe when the number of concurrent non-members, as indicated by the current user list 406, is at or near the maximum number. In such cases, when the number of non-members reaches the maximum, the access control module 112 can initiate the handover procedures for one or more non-member UEs. Initiating transfers from non-member UEs may allow the base station 110 to maintain a storage of the maximum number of simultaneous non-members and/or allow an incoming access request to be fulfilled while not exceeding the maximum.
[0067] Returning to Figure 5, a system 500 is illustrated to facilitate resource management for non-members of a CSG according to various aspects. System 500 may include components and apparatus introduced in the preceding figures, such as base station 110, UE member 120, non-member 130, resource control module 114, parameter set 116, identification module 312, and access list 314. Additionally, base station 110 may include a scheduler 504 that generates a resource schedule 506.
[0068] According to an aspect, the set of parameters 116 may include a parameter 502 that specifies a maximum amount of resources allowed to be allocated to non-member users. While operating in hybrid access mode, base station 110 can serve UEs, which are not members of the associated CSG, as long as the resources allocated to non-member UEs do not exceed a level specified by parameter 502.
[0069] The base station 110 may include a scheduler 504 that schedules UEs in downlink and/or uplink. For downlink scheduling, scheduler 504 may allocate one or more resource blocks (e.g., a portion of time and frequency resources) on a downlink channel (such as a physical downlink shared channel (PDSCH)) from a subframe to a UE. For uplink scheduling, scheduler 504 allocates one or more resource blocks on an uplink channel (such as a physical uplink shared channel (PUSCH)) of a subframe. Scheduler 504 may allocate downlink resources whenever a UE has downlink data queued for transmission. Similarly, scheduler 504 may allocate uplink resources in response to a scheduling request from a UE. Current resource assignments in addition to past assignments can be written to the 506 schedule to facilitate resource management during hybrid mode operations.
[0070] Parameter 502 indicates a maximum level of resources that can be allocated to non-CSG members. For example, scheduler 504 can allocate resources to member UE 120 without restrictions other than limitations due to system bandwidth, effective resource utilization, data store sizes, etc. Scheduler 504, however, is also restricted when allocating resources to non-member UE. For example, the 504 programmer must not exceed the level specified by parameter 502.
[0071] Parameter 502 can have a maximum percentage of physical resource blocks attributable to non-CSG members. When expressed as a percentage, the actual amount of assignable resources becomes dependent on system bandwidth. For example, a greater system bandwidth equals a greater number of resource blocks for a certain percentage expressed by parameter 502. In another aspect, parameter 502 can express a current maximum number of physical resource blocks that can be allocated to non-members. In such a way, the maximum assignable resources are not dependent on the system bandwidth.
[0072] The resource control module 114 may interact with the 504 scheduler and/or 504 control scheduler to ensure that the generated 506 schedule does not violate the restriction presented by parameter 502. In one aspect, the resource control module 114 can guarantee parameter 502 on an instantaneous timescale (eg across a single scheduling period such as a single subframe) or on a larger timescale (eg an average across the plurality of subframes). According to an example, the resource control module 114 ensures that the scheduler 504, within a single subframe, does not allocate a quantity of resources to non-members, such as a non-member UE 130, that exceeds a level specified by the parameter. 502. In another example, resource control module 114 may allow the programmer to exceed the level specified by parameter 502 in a particular subframe. However, for a subsequent subframe or subframes, the resource control module 114 can grant excessive restrictions on resource assignments to non-members to balance the previous deficit. In this regard, the resource control module 114 guarantees the maximum amount of resources assigned to non-members on average over time.
[0073] With reference to Figures 6 to 11, the methodologies are described with respect to facilitating access control and resource management of domestic base stations operating in a hybrid access mode. The methodologies can be implemented by the 100, 300, 400 and/or 500 systems described above. While, for the sake of simplicity of explanation, methodologies are illustrated and described as a series of acts, it should be understood and appreciated that methodologies are not limited by the order of acts, as some acts may, according to one or more modalities, occur in different orders and/or simultaneously with other acts from what is illustrated and described here. For example, those skilled in the art will understand and appreciate that a methodology may alternatively be represented as a series of interrelated states or events, such as in the state diagram. Furthermore, not all illustrated acts may be necessary to implement a methodology according to one or more modalities.
[0074] Returning to Figure 6, a method 600 for managing resources according to member group status is illustrated. In reference numeral 602, a mobile device may be identified as a member or non-member of a closed subscriber group (CSG) associated with a home base station (e.g., a femto cell, a femto access point, a home Node B , a domestic eNob, etc.). At reference number 604, method 600 can branch based on the status of the mobile device's member group. If the mobile device is not a member, then method 600 may proceed to reference numeral 606, where resources are assigned to the mobile device according to a parameter. The parameter can indicate a level of resources to provide to non-CSG members. In one aspect, the parameter can include a percentage, where the percentage indicates a portion of the total resources allocated to non-members. If the mobile device is a member of the CSG, method 600 may proceed to reference numeral 608 where the mobile device receives resources regardless of the parameter.
[0075] Referring now to Figure 7, a method 700 for programming a group of users who are not members of a CSG is illustrated. In reference numeral 702, a set of non-members connected to a home base station is identified. In reference number 704, the non-member pool can be programmed so that an amount of resources assigned to the pool remains below an amount specified by a parameter that indicates a maximum amount of resources available for assignment to non-members. In one example, a resource part of a subframe can be assigned to the non-member set as long as the resource part does not exceed the maximum amount. In another example, the amount of resources assigned to the pool can be controlled so that, on average over time, the amount does not exceed the maximum.
[0076] Figure 8 illustrates a method 800 for controlling a scheduling request from a mobile device that is not included in a CSG. At reference number 802, a programming request is received. Scheduling request can be requested for uplink resources. In reference number 804, a quantity of resources required to grant the scheduling request is identified. In reference number 806, an amount of available resources assigned to non-CSG members is determined. In one example, the amount of available resources can be determined based on a parameter that specifies a maximum amount of resources assigned to non-members and a current amount of resources assigned to non-members. In numerical reference 808, the comparison is made between the amount of resources needed and the amount of resources available. When the amount of resources needed is greater than or equal to the amount of available resources needed, method 800 can proceed to reference number 810 where the request is granted. When the amount of resources available is less than the amount of resources required, method 800 can proceed to reference number 812 where the request is denied.
[0077] Figure 9 illustrates a method 900 for controlling a connection request, from a mobile device that is not a member of a CSG, based on a resource management parameter. At reference number 902, a connection request is received. In numeric reference 904, it is identified whether the request is from a member or non-member of the CSG. If, at reference number 906, the request comes from a member, method 900 may proceed to reference number 908 where a connection is established. If, in reference number 906, the request comes from a non-member, method 900 may proceed to reference number 910, where an amount of available resources assigned to non-members is determined. In reference number 912, a check on the amount of available resources is made. If, in reference number 912, the amount of available resources is greater than zero, method 900 proceeds to reference number 908 where a connection is established. If the amount of available resources is less than or equal to zero, method 900 proceeds to reference number 914 where the request is denied.
[0078] Figure 10 illustrates a method for employing transfers to facilitate resource management. In reference number 1002, a current amount of resources assigned to non-members of a closed subscriber group is monitored. In reference number 1004, a check is made that the current amount of resources is close to the peak defined by a parameter specifying a maximum amount of resources assigned to non-CSG members. If the current amount of resources is not near the peak, monitoring the amount continues. However, if the current amount of resources is close to peaking, method 1000 can proceed to reference number 1006 where a transfer of at least one non-member is initiated.
[0079] Figure 11 illustrates a method 1100 for admission control for a home base station operating in a hybrid mode. At reference number 1002, a request to establish a connection is received. At reference numeral 1104, it can be identified whether the mobile device issuing the request is a member or non-member of a closed subscriber group associated with the home base station. In reference numeral 1106, it is determined whether or not to admit the mobile device based on a parameter and the status of the mobile device's member group. In one example, the parameter can specify a maximum number of concurrent non-member users allowed. The request can be denied when a current number of non-members is greater than or equal to the maximum number. The request can be granted when the current number is less than the maximum.
[0080] It will be appreciated that, according to one or more aspects described here, inferences can be made regarding the estimation of available resources, estimating the resource needed, determining whether to initiate the transfer, and the like. As used herein, the term "inferring" or "inference" refers in general to the process of rationalizing about or inferring system, environment, and/or user states from a set of observations captured through events and/or data. Inference can be used to identify a specific context or action, or it can generate, for example, a probability distribution across states. Inference can be probabilistic—that is, computing a probability distribution across states of interest based on a consideration of data and events. Inference can also refer to techniques employed to compose higher-level events from a set of events and/or data. Such inference results in the construction of new events or actions from a set of observed events and/or stored event data, whether or not the events are correlated in temporal proximity, and whether the events and data come from one or multiple sources of events or data.
[0081] Referring below to Figure 12, an apparatus 1200 for facilitating resource management for a home base station operating in a hybrid access mode is illustrated. It should be appreciated that apparatus 1200 is represented as including functional blocks, which may be functional blocks that represent functions implemented by a processor, software, or combination thereof (e.g., firmware). Apparatus 1200 may be implemented by a base station (e.g., base station 110) and/or any other suitable network entity. Apparatus 1200 may include a module 1202 for identifying whether a mobile device is a member or non-member of a closed subscriber group, and a module 1204 for allocating resources to the mobile device according to a parameter when the mobile device is a non-member. Additionally, apparatus 1200 may include an option module 1206 for receiving a scheduling request, an option module 1208 for identifying a quantity of resources necessary to grant a scheduling request, an option module 1210 for determining an amount of resources available for assignment to non-members, an option module 1212 to grant a schedule request, and an option module 1214 to deny a schedule request. In addition, apparatus 1200 may include an option module 1216 for receiving a connection request, an option module 1218 for granting a connection request, and an option module 1220 for denying a connection request. Additionally, apparatus 1200 may include a memory 1222 that holds instructions for performing functions associated with modules 1202-1220.
[0082] Figure 13 illustrates an apparatus 1300 to facilitate admission control for a home base station operating in a hybrid access mode. It should be appreciated that apparatus 1300 is represented as including functional blocks, which may be functional blocks that represent functions implemented by a processor, software, or combinations thereof (e.g., firmware). Apparatus 1300 may be implemented by a base station (e.g., base station 110) and/or any other suitable network entity. Apparatus 1300 may include a module 1302 for receiving a request to establish a connection, a module 1304 for identifying whether or not a mobile device is a member of a closed subscriber group, and a module 1306 for determining whether to accept or deny the request. . Additionally, apparatus 1300 may include an optional module 1308 for receiving a schedule request, an optional module 1208 for identifying a number of resources necessary to grant a schedule request, an optional module 1210 for determining a current number of connected non-members, an option module 1310 to compare a current number of non-members with a parameter, an option module 1312 to deny the request, and an option module 1314 to grant the request. Additionally, apparatus 1300 may include a memory 1316 that holds instructions for performing functions associated with modules 13021314.
[0083] Figure 14 is a block diagram of another system 1400 that can be used to implement the various aspects of the functionality described here. In one example, system 1400 includes mobile device 1402. As illustrated, mobile device 1402 can receive signals from one or more base stations 1404 and transmit to one or more base stations 1404 through one or more antennas 1408. mobile device 1402 may comprise a receiver 1410 that receives information from antennas 1408. In one example, receiver 1410 may be operatively associated with a demodulator (Demod) 1412 that demodulates the received information. The demodulated symbols can then be analyzed by a processor 1414. Processor 1414 can be coupled to memory 1416 that can store data and/or program codes related to mobile device 1402. Mobile device 1402 can also include a modulator 1418 that can multiplexing a signal for transmission by a transmitter 1420 through antennas 1408.
[0084] Figure 15 is a diagram of a system 1500 that can be used to implement the various aspects of the functionality described here. In one example, system 1500 includes a base station or base station 1502. As illustrated, base station 1502 can receive signals from one or more UEs 1504 through one or more receiving antennas (Rx) 1506 and transmit to one or more UEs. 1504 via one or more transmit antennas (Tx) 1508. Additionally, base station 1502 may comprise a receiver 1510 that receives information from receiving antennas 1506. In one example, receiver 1510 may be operatively associated with a demodulator (Demod) 1512 which demodulates the information received. The demodulated symbols can then be analyzed by a processor 1514. Processor 1514 can be coupled to memory 1516, which can store information relating to code clusters, access terminal assignments, related lookup tables, scrambling sequences. , and/or other suitable types of information. Base station 1502 may also include a modulator 1518 that can multiplex a signal for transmission by a transmitter 1520 via transmitter antennas 1508.
[0085] In some respects the teachings presented here can be employed in a network that includes macro-scale coverage (for example, a wide area cellular network such as 3G networks, typically referred to as a macro cellular network) and smaller-scale coverage (for example, a home-based or building-based network environment). As an access terminal (AT) moves through such a network, the access terminal can be served at certain locations by access nodes (ANs) that provide macro coverage while the access terminal can be served at other locations by the nodes. that provide coverage on a smaller scale. In some respects, smaller coverage nodes can be used to provide increased capacity growth, in-building coverage, and different services (eg for a more robust user experience). In the discussion here, a node that provides coverage across a relatively large area may be referred to as a macro node. A node that provides coverage across a relatively small area (eg, a residence) may be referred to as a femto node. A node that provides coverage across an area that is smaller than a macro area and larger than a femto area may be referred to as a pico node (eg, providing coverage inside a commercial building).
[0086] A cell associated with a macro node, a femto node, or a pico node may be referred to as a macro cell, a femto cell, or a pico cell, respectively. In some implementations, each cell may also be associated with (for example, divided into) one or more sectors.
[0087] In various applications, other terminology can be used to refer to a macro node, a femto node, or a pico node. For example, a macro node can be configured or referenced as an access node, base station, access point, eNodeB, macro cell, and so on. In addition, a femto node can be configured or referenced as a home NodeB, home eNodeB, access point base station, femto cell, and so on.
[0088] Figure 16 illustrates a wireless communication system 1600, configured to support multiple users, where the teachings presented here can be implemented. System 1600 provides communication for multiple cells 1602, such as, for example, macro cells 1602A - 1602G, with each cell being served by a corresponding access node 1604 (e.g., access nodes 1604A to 1604G). As illustrated in Figure 16, access terminals 1606 (e.g., access terminals 1606A - 1606L) can be dispersed in various locations throughout the system over time. Each access terminal 1606 can communicate with one or more access nodes 1604 on the forward link (FL) and/or reverse link (RL) at a given time, depending on whether the access terminal 1606 is active and whether it is in soft forwarding (soft handoff), for example. The 1600 wireless communication system can provide service across a large geographic region. For example, macro cells 1602A through 1602G can cover a few blocks in a neighborhood.
[0089] Figure 17 illustrates an illustrative communication system 1700 where one or more femto nodes are developed within a network environment. Specifically, the 1700 system includes multiple 1710 femto nodes (for example, 1710A and 1710B femto nodes) installed in a relatively small-scale network environment (for example, in one or more 1730 user homes). Each 1710 femto node can be coupled to a 1740 wide area network (eg, the Internet) and a 1750 mobile operator core network through a DSL router, cable modem, wireless link, or other connectivity devices. (not illustrated). As will be discussed below, each femto node 1710 may be configured to serve associated access terminals 1720 (eg, access terminal 1720A) and, optionally, external access terminals 1720 (eg, access terminal 1720B). In other words, access to femto nodes 1710 can be restricted, so a given access terminal 1720 can be served by a set of designated (eg domestic) femto nodes 1710, but cannot be served by any femto nodes unassigned 1710 (eg, a neighboring femto node 1710).
[0090] Figure 18 illustrates an example of an 1800 coverage map where multiple 1802 tracking areas (or targeting areas or location areas) are defined, each of which includes multiple 1804 macro coverage areas. The coverage areas associated with the 1802A, 1802B, and 1802C tracking areas are delineated by the broad lines and the 1804 macro coverage areas are represented by hexagons. The 1802 tracking areas also include 1806 femto coverage areas. In this example, each of the 1806 femto coverage areas (for example, 1806C femto coverage area) is presented within an 1804 macro coverage area (for example, area of macro coverage 1804B). It should be appreciated, however, that an 1806 femto coverage area may not lie entirely within an 1804 macro coverage area. In practice, a large number of femto 106 coverage areas may be defined with a given tracking area 1802 or a macro coverage area 1804. In addition, one or more peak coverage areas (not shown) may be defined within a given tracking area 1802 or macro coverage area 1804.
[0091] Referring again to Figure 17, the owner of a femto node 1710 may subscribe to a mobile service, such as, for example, 3G mobile service, offered through the mobile operator's core network 1750. Additionally, an access terminal 1720 it may be able to operate in both macro environment and smaller scale network environments (eg residential). In other words, depending on the current location of the access terminal 1720, the access terminal 1720 may be served by an access node 1760 of the macro cell mobile network 1750 or by any one of a set of femto nodes 1710 (for example, femto nodes 1710A and 1710B residing within a corresponding user residence 1730). For example, when a subscriber is away from home it is served by a standard macro access node (eg node 1760) and when the subscriber is home it is served by a femto node (eg node 1710A ). Here, it should be appreciated that a 1710 femto node may be backward compatible with existing 1720 access terminals.
[0092] A femto node 1710 can be developed on a single frequency or, alternatively, on multiple frequencies. Depending on the particular configuration, the single frequency or one or more of the multiple frequencies may overlap with one or more frequencies used by a macro node (eg node 1760).
[0093] In some aspects, an access terminal 1720 may be configured to connect to a preferred femto node (eg, the home femto node of access terminal 1720) whenever such connectivity is possible. For example, whenever access terminal 1720 is within user's home 1730, it may be desirable for access terminal 1720 to communicate only with femto home node 1710.
[0094] In some respects, if the 1720 access terminal operates within the 1750 macrocellular network, but is not residing in its most preferred network (for example, as defined in a preferred roaming list), the 1720 access terminal may continue to search for the most preferred network (eg, preferred femto node 1710) using a Best System Reselection (BSR), which may involve a periodic scan of available systems to determine if the best systems are currently available, and efforts to associate with such preferred systems. With the acquisition input, the 1720 access terminal can limit the search by specific band and channel. For example, the search for the most preferred system can be repeated periodically. Upon discovery of a preferred 1710 femto node, the 1720 access terminal selects the 1710 femto node to camp within its coverage area.
[0095] A femto node can be restricted in some respects. For example, a certain femto node can only provide certain services to certain access terminals. In developments with so-called restricted (or closed) association, a given access terminal can only be served by the macrocellular mobile network and a defined set of femto nodes (for example, the femto nodes 1710 that reside within the corresponding user's residence 1730 ). In some implementations, a node may be restricted so as not to provide, for at least one node, at least one of: signaling, data access, logging, alerting, or service.
[0096] In some aspects, a restricted femto node (which may also be referred to as a Closed Subscriber Group Domestic Node B) is one that provides service to a restricted provisioned set of access terminals. This set can be extended temporarily or permanently as needed. In some respects, a Closed Subscriber Group (CSG) can be defined as the set of access nodes (eg femto nodes) that share a common access control list of access terminals. A channel on which all femto nodes (or all restricted femto nodes) in a region operate can be referred to as a femto channel.
[0097] Several relationships can exist between a given femto node and a given access terminal. For example, from the perspective of an access terminal, an open femto node can refer to a femto node without any strict association. A restricted femto node can refer to a femto node that is restricted in some way (for example, restricted for membership and/or registration). A domestic femto node can refer to a femto node that the access terminal is authorized to operate or access. A femto guest node can refer to a femto node that an access terminal is temporarily authorized to operate or access. An external femto node can refer to a femto node that the access terminal is not authorized to operate or access, except perhaps in emergency situations (for example, 911 calls).
[0098] From a restricted femto node perspective, a domestic access terminal can refer to an access terminal that has authorized access to the restricted femto node. A guest access terminal can refer to an access terminal with temporary access to the restricted femto node. An external access terminal can refer to an access terminal that is not allowed to access the restricted femto node, except perhaps in emergency situations, for example, 911 calls (eg an access terminal that does not have the credentials or permission to register with the restricted femto node).
[0099] For reasons of convenience, the description here describes various features in the context of a femto node. It should be appreciated, however, that a peak node can provide the same or similar functionality for a larger coverage area. For example, a pico node can be restricted, a pico home node can be defined for a particular access terminal, and so on.
[00100] Referring now to Figure 19, a wireless communication system 1900 is illustrated in accordance with the various embodiments presented here. System 1900 comprises a base station (e.g., an access point) 1902 that may include multiple groups of antennas. For example, one group of antennas may include antennas 1904 and 1906, another group may comprise antennas 1908 and 1910, and an additional group may include antennas 1912 and 1914. Two antennas are illustrated for each antenna group; however, more or less antennas can be used for each group. Base station 1902 may further include a transmitter chain and a receiver chain, each of which may, in turn, comprise a plurality of components associated with the transmission and reception of signals (e.g., processors, modulators, multiplexers, demodulators, demultiplexers, antennas, etc.), as will be appreciated by those skilled in the art.
Base station 1902 may communicate with one or more UEs such as UE 1916 and UE 1922; however, it should be appreciated that base station 1902 can communicate with substantially any number of UEs similar to UEs 1916 and 1922. UEs 1916 and 1922 may be, for example, cellular phones, smart phones, laptops, portable communication devices , handheld computing devices, satellite radios, global positioning systems, PDAs, and/or any other device suitable for communication via the 1900 wireless communication system. As shown, the 1916 UE is in communication with the 1912 and 1914 antennas, where antennas 1912 and 1914 transmit information to UE 1916 over a 1918 downlink and receive information from UE 1916 over an uplink 1920. In addition, UE 1922 is in communication with antennas 1904 and 1906, where antennas 1904 and 1906 transmit information to the UE 1922 over a downlink 1924 and receive information from the UE 1922 over an uplink 1926. In a split duplex system In frequency operation (FDD), downlink 1918 may use a different frequency band than uplink 1920, and downlink 1924 may use a different frequency band than uplink 1926, for example. Additionally, in a time division duplex (TDD) system, downlink 1918 and uplink 1920 can use a common frequency band, and downlink 1924 and uplink 1926 can use a common frequency band.
[00102] Each antenna group and/or the area in which they are designated to communicate can be referenced as a sector of base station 1902. For example, antenna groups can be designated to communicate with UEs in a sector of areas covered by base station 1902. In communication over downlinks 1918 and 1924, base station transmit antennas 1902 can use beamforming to improve the signal-to-noise ratio of downlinks 1918 and 1924 for UEs 1916 and 1922. Furthermore, while base station 1902 uses beamforming to transmit to UEs 1916 and 1922 randomly spread over an associated coverage, UEs in neighboring cells may experience less interference compared to a base station transmitting through a single antenna for all your UEs. Furthermore, UEs 1916 and 1922 can communicate directly with each other using an ad hoc or peer-to-peer technology (not shown).
[00103] According to an example, system 1900 may be a multiple input, multiple output (MIMO) communication system. Additionally, system 1900 can use substantially any type of duplexing technique to divide the communication channels (e.g., downlink, uplink, etc.) such as FDD, FDM, TDD, TDM, CDM, and the like. Additionally, communication channels can be orthogonalized to allow simultaneous communication with multiple devices or UEs across the channels; in an example, OFDM can be used for this purpose. In this way, channels can be divided into frequency parts for a period of time. In addition, frames can be defined as frequency parts over a collection of time periods; in that way, for example, a frame can comprise several OFDM symbols. Base station 1902 can communicate with UEs 1916 and 1922 through channels, which can be created for various types of data. For example, channels can be created to communicate various types of general communication data, control data (eg, quality information for other channels, confirmation indicators for data received through the channels, interference information, reference signals, etc.) and/or similar.
[00104] A wireless multiple access communication system can simultaneously support communication to multiple wireless access terminals. As mentioned above, each terminal can communicate with one or more base stations through transmissions on the forward and reverse links. The forward link (or downlink) refers to the communication link from the base stations to the terminals, and the reverse link (or uplink) refers to the communication link from the terminals to the base stations. This communication link can be established through a single-entry, single-exit system, a multiple-entry, multiple-output (MIMO) system, or some other type of system.
[00105] A MIMO system employs multiple transmit antennas (NT) and multiple receive antennas (NR) for data transmission. A MIMO channel formed by NT transmitting antennas and NR receiving antennas can be decomposed into NS independent channels, which are also referred to as spatial channels, where Ns<min {NT, NR} . Each of the independent NS channels corresponds to a dimension. The MIMO system can provide improved performance (eg, higher throughput and/or greater reliability) if the additional dimensionality created by multiple transmitting and receiving antennas is used.
[00106] A MIMO system can support time division duplex (TDD) and frequency division duplex (FDD). In a TDD system, forward and reverse link transmissions are in the same frequency region so that the principle of reciprocity allows estimation of the forward link channel from the reverse link channel. This allows the access point to extract the transmit beamforming gain on the forward link when multiple antennas are available at the access point.
[00107] Figure 20 illustrates an illustrative wireless communication system 2000. The wireless communication system 2000 features a base station 2010 and an access terminal 2050 for brevity. However, it should be appreciated that system 2000 may include more than one base station and/or more than one access terminal, where additional base stations and/or access terminals may be substantially similar or different from base station 2010 and illustrative access terminal 2050 described below. Additionally, it should be appreciated that base station 2010 and/or access terminal 2050 may employ the systems (Figures 1, 3, 4, 5, 12 and 13) and/or the method (Figures 6 to 11) described here to facilitate wireless communication between them.
[00108] At base station 2010, traffic data for multiple data streams is provided from a 2012 data source to a 2014 transmission data processor (TX). According to an example, each data stream can be transmitted through a respective antenna. The TX 2014 data processor formats, encodes, and interleaves the traffic data stream based on a particular encoding scheme selected for this data stream to provide encoded data.
[00109] The encoded data for each data stream can be multiplexed with pilot data using orthogonal frequency division multiplexing (OFDM) techniques. Additionally or alternatively, the pilot symbols may be frequency division multiplexed (FDM), time division multiplexed (TDM), or code division multiplexed (CDM). The pilot data is typically a known data pattern that is processed in a known manner and can be used in access terminal 2050 to estimate the channel response. The coded and multiplexed pilot data for each data stream can be modulated (eg, symbol-mapped) based on a particular modulation scheme (eg, binary phase shift modulation (BPSK), phase shift modulation in quadrature (QPSK), M key shift modulation (M-PSK), quadrature M amplitude modulation (M-QAM), etc.) selected for this data stream to provide modulation symbols. The data rate, encoding, and modulation for each data stream can be determined by instructions performed or provided by the 2030 processor.
[00110] The modulation symbols for the data streams can be provided to a MIMO TX 2020 processor, which can also process the modulation symbols (for example, for OFDM). The MIMO TX 2020 processor then provides NT modulation symbol streams for Nt transmitters (TMTR) 2022a to 2022t. In various embodiments, the MIMO TX 2020 processor applies beamforming weights to the symbols of the data streams and to the antenna from which the symbol is being transmitted.
[00111] Each transmitter 2022 receives and processes a respective symbol stream to provide one or more analog signals, and also conditions (e.g., amplifies, filters, and upconverts) the analog signals to provide a modulated signal suitable for transmission across the MIMO channel. Additionally, NT modulated signals from transmitters 2022a to 2022t are transmitted from NT antennas 2024a to 2024t, respectively.
[00112] At the access terminal 2050, the transmitted modulated signals are received by NR antennas 2052a to 2052r and the received signal from each antenna 2052 is provided to a respective receiver (RCVR) 2054a to 2054r. Each receiver 2054 conditions (e.g., filters, amplifies, and downconverts) a respective signal, digitizes the conditioned signal to provide samples, and further processes the samples to provide a corresponding "received" symbol stream.
[00113] An RX data processor 2060 can receive and process NR received symbol streams from NR 2054 receivers based on a particular receiver processing technique to provide NT "detected" symbol streams. RX data processor 2060 can demodulate, deinterleave, and decode each detected symbol stream to retrieve traffic data for the data stream. The processing by the RX 2060 data processor is complementary to that performed by the MIMO TX 2020 processor and the TX 2014 data processor in the 2010 base station.
[00114] A 2070 processor may periodically determine which available technology to use as discussed above. Additionally, processor 2070 can formulate a reverse link message comprising an array index part and a rank value part.
[00115] The reverse link message can comprise various types of information regarding the communication link and/or the received data stream. The reverse link message can be processed by a TX 2038 data processor, which also receives traffic data for multiple data streams from a 2036 data source, modulated by a 2080 modulator, conditioned by transmitters 2054a to 2054r, and broadcast back to base station 2010.
[00116] At base station 2010, the modulated signals from access terminal 2050 are received by antennas 2024, conditioned by 2022 receivers, demodulated by a 2040 demodulator, and processed by a 2042 RX data processor to extract the transmitted reverse link message by access terminal 2050. Additionally, processor 2030 may process the extracted message to determine which precoding matrix to use to determine the beamforming weights.
[00117] The 2030 and 2070 processors can direct (for example, control, coordinate, manage, etc.) the operation at base station 2010 and at access terminal 2050, respectively. Respective processors 2030 and 2070 can be associated with memory 2032 and 2072 that store program codes and data. Processors 2030 and 2070 may also perform computations to derive pulse and frequency response estimates for the uplink and downlink, respectively.
[00118] In one aspect, logical channels are classified into Control Channels and Traffic Channels. Logical Control Channels may include a Broadcast Control Channel (BCCH), which is a DL channel for broadcasting system control information. Additionally, Logical Control Channels may include an Alert Control Channel (PCCH), which is a DL channel that transfers alert information. In addition, Logical Control Channels may comprise a Multicast Control Channel (MCCH), which is a point-to-multipoint DL channel used for transmission of Multicast Multicast Service (MBMS) scheduling and control information for one or several MTCHs. Generally, after establishing a Radio Resource Control (RRC) connection, this channel is only used by UEs that receive MBMS (eg old MCCH + MSCH). Additionally, Logical Control Channels can include a Dedicated Control Channel (DCCH), which is a point-to-point bidirectional channel that transmits dedicated control information and can be used by UEs having an RRC connection. In one aspect, the Logical Traffic Channels may comprise a Dedicated Traffic Channel (DTCH), which is a point-to-point bidirectional channel dedicated to a UE for the transfer of user information. In addition, Logical Traffic Channels may include a Multicast Traffic Channel (MTCH) for point-to-multiple point DL channel for transmitting traffic data.
[00119] In one aspect, Transport Channels are classified into DL and UL. DL Transport Channels comprise a Broadcast Channel (BCH), a Downlink Shared Data Channel (DL-SDCH) and an Alert Channel (PCH). The PCH can support UE power saving (eg Discontinuous Reception (DRX) cycle can be indicated by the network to the UE) by being broadcast across the entire cell and being mapped to the Physical Layer (PHY) resources that can be used for other control/traffic channels. UL Transport Channels may comprise a Random Access Channel (RACH), a Request Channel (REQCH), an Uplink Shared Data Channel (ULS-SDCH) and a plurality of PHY channels.
[00120] PHY channels can include a set of DL channels and UL channels. For example, PHY DL channels can include: Common Pilot Channel (CPICH); Synchronization Channel (SCH); Common Control Channel (CCCH); Shared DL Control Channel (SDCCH); Multicast Control Channel (MCCH); UL Shared Assignment Channel (SUACH); Acknowledgment Channel (ACKCH); DL Physical Shared Data Channel (DL-PSDCH); UL Power Control Channel (UPCCH); Alert Indicator Channel (PICH); and/or Load Indicator Channel (LICH). By way of additional illustration, PHY UL Channels may include: Physical Random Access Channel (PRACH); Channel Quality Indicator Channel (CQICH); Acknowledgment Channel (ACKCH); Antenna Subset Indicator Channel (ASICH); Shared Request Channel (SREQCH); UL Physical Shared Data Channel (UL-PSDCH); and/or Broadband Pilot Channel (BPICH).
[00121] The various illustrative logics, logic blocks, modules, and circuits described with respect to the modalities described here can be implemented or realized with a general purpose processor, a digital signal processor (DSP), an application-specific integrated circuit ( ASIC), a set of field-programmable gates (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor can be a microprocessor, but alternatively the processor can be any conventional processor, controller, microcontroller, or state machine. A processor can also be implemented as a combination of computing devices, for example, a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors together with a DSP core, or any other similar configuration. Additionally, at least one processor may comprise one or more modules that operate to perform one or more of the steps and/or actions described above.
[00122] Additionally, the steps and/or actions of a method or algorithm described with respect to the aspects described here can be incorporated directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, removable disk, CD-ROM, or any other form of storage medium known in the art. An illustrative storage medium may be coupled to the processor so that the processor can read information from and write information to the storage medium. Alternatively, the storage medium can be integrated with the processor. Additionally, in some respects, the processor and storage medium may reside on an ASIC. Additionally, the ASIC can reside on a user terminal. Alternatively, the processor and storage medium can reside as discrete components on a user terminal. Additionally, in some aspects, the steps and/or actions of a method or algorithm may reside as one or any combination or set of codes and/or instructions on a machine-readable medium and/or a computer-readable medium, which can be incorporated to a computer program product.
[00123] When modalities are implemented in software, firmware, middleware or microcode, program code or code segments, they may be stored on a machine-readable medium, such as a storage component. A code segment can represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or instructions. program. A code segment can be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters or memory contents. Information, arguments, parameters, data, etc. can be passed, sent, or transmitted using any suitable means including memory sharing, message passing, token passing, network transmission, etc.
[00124] For a software implementation, the techniques described here can be implemented with modules (for example, procedures, functions, and so on) that perform the functions described here. Software codes can be stored in memory units and executed by processors. The memory unit can be implemented inside the processor or outside the processor, in which case it can be communicatively coupled with the processor through various means as is known in the art.
[00125] The foregoing includes examples of one or more modalities. It is, of course, impossible to describe every conceivable combination of components or methodologies for purposes of describing the above embodiments, but those skilled in the art can recognize that many additional combinations and permutations of various embodiments are possible. Accordingly, the described modalities must encompass all such changes, modifications and variations that are within the inventive concept and scope of the appended claims. Additionally, to the extent that the term "includes" is used in the detailed description or claims, such term shall be inclusive in a manner similar to the term "comprising" since "comprising" is interpreted when used as a transitional word in a claim . Additionally, the term "or" as used in the detailed description or in the claims shall be "non-exclusive or non-exclusive".
权利要求:
Claims (15)
[0001]
1. A method for scheduling resources for a home base station operating in a hybrid access mode, comprising:- identifying (602) whether a mobile device, connected to the home base station, is a member or non-member of an associated closed subscriber group with the home base station; - assign (606) resources for data transmission to the mobile device according to a parameter when the mobile device is not a member, where the parameter indicates a level of resources to provide to non-members of the group of closed subscribers; the method characterized by further comprising:- monitoring (1002) a current amount of resources allocated to non-members of the closed subscriber group; and - initiate (1006) a handoff for at least one non-member user connected to the home base station when the current amount of resources assigned to non-members is near the peak as defined by the parameter.
[0002]
Method according to claim 1, characterized by the parameter specifying a maximum amount of available resources to allocate to non-members of the closed subscriber group.
[0003]
Method, according to claim 1, characterized in that it further comprises: - identifying (706) a set of non-member mobile devices connected to the home base station; and - schedule (704) the set of non-member mobile devices so that an amount of resources assigned to the set of non-member mobile devices remains below the parameter.
[0004]
Method according to claim 3, characterized by scheduling (704) further comprising assigning a portion of the resources of a subframe to the set of non-member mobile devices so that the portion of the resources does not exceed the parameter.
[0005]
Method according to claim 3, characterized in that the amount of resources allocated to the set of non-member mobile devices, on average over time, does not exceed the parameter.
[0006]
Method, according to claim 1, characterized in that the parameter includes a percentage, where the percentage indicates a part of the total resources allocated to non-members of the closed subscriber group.
[0007]
Method according to claim 1, further comprising: - receiving (802) a scheduling request from the mobile device, where the scheduling request is a request for uplink resources; - identifying (804) an amount of resources required to grant the schedule request; - determine (806) an amount of available resources that is assigned to non-members based at least in part on the parameter and a current amount of resources assigned to non-members of the subscriber group closed; - grant (810) the scheduling request when the amount of available resources is greater than or equal to the amount of resources needed; and - deny (812) the scheduling request when the amount of resources available is less than the amount of resources required.
[0008]
Method according to claim 1, characterized in that it further comprises: - receiving (902) a request to establish a connection from a second mobile device; - identifying (904) whether the second mobile device is included in the closed subscriber group ;- determine (910) an amount of available resources that is assigned to non-members based at least in part on the parameter and a current amount of resources assigned to non-members of the closed subscriber group; - deny (914) the request to establish a connection when the amount of available resources equals zero and the second mobile device is a non-member of the closed subscriber group; and - establishing (908) a connection with the second mobile device when at least an amount of available resources is greater than zero or the second mobile device is a member of the closed subscriber group.
[0009]
9. Apparatus, comprising: - mechanisms for identifying (1202) whether a mobile device, connected with the apparatus, is a member or not of a closed subscriber group; - mechanisms for allocating (1204) resources for transmitting data to the device mobile according to a parameter when the mobile device is not a member, where the parameter indicates a level of resources to provide for non-members of the closed subscriber group; the apparatus characterized by further comprising:- mechanisms for monitoring a current amount of resources allocated to non-members of the closed subscriber group; and - mechanisms to initiate a transfer for at least one non-member user connected to the device when the current amount of resources assigned to non-members is near the peak as defined by the parameter.
[0010]
Apparatus, according to claim 9, characterized by the parameter specifying a maximum amount of available resources to allocate to non-members of the closed subscriber group.
[0011]
Apparatus, according to claim 9, characterized in that it further comprises:- mechanisms for identifying a set of non-member mobile devices connected to the apparatus; and - mechanisms to schedule the set of non-member mobile devices so that an amount of resources assigned to the set of non-member mobile devices remains below the parameter.
[0012]
Apparatus according to claim 11, further comprising mechanisms for allocating a resource share of a subframe to the set of non-member mobile devices so that the resource share does not exceed the parameter.
[0013]
Apparatus, according to claim 11, characterized in that the amount of resources allocated to the set of non-member mobile devices, on average over time, does not exceed the parameter.
[0014]
Apparatus, according to claim 9, characterized in that the parameter includes a percentage, where the percentage indicates a part of the total resources allocated to non-members of the closed subscriber group.
[0015]
15. Memory characterized by comprising instructions for causing at least one computer to perform the method as defined in any one of claims 1 to 8.
类似技术:
公开号 | 公开日 | 专利标题
BR112012009666B1|2021-06-15|ADMISSION CONTROL AND RESOURCE MANAGEMENT FOR NON-MEMBERS OF A SUBSCRIBER GROUP CLOSED ON DOMESTIC RADIO ACCESS NETWORKS
US9402193B2|2016-07-26|Systems, apparatus and methods for interference management in wireless networks
KR101212603B1|2012-12-14|Classifying Access points using Pilot Identifiers
EP2220896B1|2018-01-24|Favoring access points in wireless communications
US8599701B2|2013-12-03|Systems, methods and devices to enable management of wireless network resources
JP5529149B2|2014-06-25|Optimized signaling of primary scrambling codes and frequency lists in wireless communications
BRPI0909136B1|2020-10-20|cell selection and re-selection in deployments with native b-nodes
JP2011527878A|2011-11-04|Dominant interferer indication in access probe
BRPI0820192B1|2020-03-31|METHOD FOR ESTABLISHING CONNECTION, COMPUTER-READABLE MEMORY AND WIRELESS COMMUNICATION EQUIPMENT
BRPI0819808B1|2020-03-31|METHOD FOR DETERMINING CELL INFORMATION IN A MOBILE STATION, COMPUTER-READABLE MEMORY AND MOBILE STATION FOR COMMUNICATION WITH A FEMALE ACCESS POINT IN A WIRELESS NETWORK
EP2433462A2|2012-03-28|Systems, apparatus and methods for interference management on downlink channels in wireless communication systems
JP2011526458A|2011-10-06|Utilizing a system access sequence to request resources for GCI reports in a wireless network
JP2013504985A|2013-02-07|ID management for closed subscriber group | base stations
US8681719B2|2014-03-25|Systems, apparatus and methods for facilitating frequency reuse for downlink control channels
US20100329198A1|2010-12-30|Systems, apparatus and methods for configuration of scheduling policy to facilitate distributed scheduling
TWI694735B|2020-05-21|Identification and use of resource sets associated with different restriction levels for resource usage in a radio frequency spectrum band
TWI756420B|2022-03-01|Sounding reference signal configuration and transport block size scaling in low latency systems
同族专利:
公开号 | 公开日
KR101398185B1|2014-06-27|
CN104244365B|2019-04-23|
US8942746B2|2015-01-27|
KR20120093995A|2012-08-23|
EP2494831A1|2012-09-05|
CN102598817A|2012-07-18|
JP5479607B2|2014-04-23|
EP2494831B1|2018-09-26|
CN104244365A|2014-12-24|
JP2013509823A|2013-03-14|
CN102598817B|2016-02-17|
BR112012009666A2|2016-05-17|
WO2011059764A1|2011-05-19|
US20110218004A1|2011-09-08|
TWI510120B|2015-11-21|
TW201134274A|2011-10-01|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

US6901259B2|2001-02-15|2005-05-31|Motorola, Inc.|Communication system that provides adjustable communication service availability to subscribers|
JP4543842B2|2004-09-09|2010-09-15|日本電気株式会社|Radio base station apparatus and resource management method|
JPWO2006088082A1|2005-02-18|2008-07-03|三菱電機株式会社|Multiband wireless communication method and base station|
JP2008079192A|2006-09-25|2008-04-03|Hitachi Kokusai Electric Inc|Radio base station device|
US8165590B2|2007-08-13|2012-04-24|Telefonaktiebolaget Lm Ericsson |Neighbor cell relation list initialization|
RU2502221C2|2007-09-10|2013-12-20|Нокиа Сименс Нетворкс Ой|Managing access for closed subscriber groups|
EP2086186A1|2008-02-01|2009-08-05|Alcatel Lucent|Traffic control device, packet-based network and method for controlling traffic in a packet-based network|
US20100029282A1|2008-07-31|2010-02-04|Qualcomm Incorporated|Resource partitioning in heterogeneous access point networks|
US8599701B2|2009-04-16|2013-12-03|Qualcomm Incorporated|Systems, methods and devices to enable management of wireless network resources|
US9338811B2|2009-03-06|2016-05-10|Apple Inc.|Methods and apparatus for providing selective access to wireless network resources using detailed information|
US8903413B2|2009-03-20|2014-12-02|Qualcomm Incorporated|Hybrid cell management in wireless networks|
EP2244515A1|2009-04-23|2010-10-27|Panasonic Corporation|Logical channel prioritization procedure for generating multiple uplink transport blocks|
EP2282575A1|2009-08-04|2011-02-09|Panasonic Corporation|Channel quality reporting in a mobile communications system|
US20120184242A1|2009-10-01|2012-07-19|Rambus Inc.|Methods and Systems for Enhancing Wireless Coverage|US9204365B2|2009-02-02|2015-12-01|Qualcomm Incorporated|Controlling whether a network entity performs access control based on an indication from an access point|
US9148786B2|2009-02-02|2015-09-29|Qualcomm Incorporated|Inclusion/exclusion messaging scheme for indicating whether a network entity performs access control|
EP2299767B1|2009-09-18|2013-11-13|Institute for Imformation Industry|Femtocell and resource allocation method thereof|
KR101086540B1|2009-11-03|2011-11-23|주식회사 팬택|Terminal for entering Compact Base Station, Network Apparatus and Method for operating thereof|
KR101164725B1|2009-12-21|2012-07-12|한국전자통신연구원|Apparatus and method for controlling multimedia broadcast and multicast service according to user location|
EP2563070B1|2010-04-22|2017-11-15|Huawei Technologies Co., Ltd.|Method and apparatus for controlling jam/overload|
US8787304B2|2010-06-22|2014-07-22|Acer Incorporated|Method for reference signal pattern allocation and related communication device|
GB2482869B|2010-08-16|2013-11-06|Picochip Designs Ltd|Femtocell access control|
KR20120069235A|2010-12-20|2012-06-28|한국전자통신연구원|Method for dynamic change of operation mode in wireless communication system|
JP5410410B2|2010-12-24|2014-02-05|株式会社Nttドコモ|Base station, radio communication system, and communication method|
JP5955514B2|2011-06-27|2016-07-20|シャープ株式会社|CSG type base station, control program, and integrated circuit|
US8934913B2|2011-09-28|2015-01-13|Telefonaktiebolaget L M Ericsson |Enhanced mobility to home base station cells|
JP5772526B2|2011-11-14|2015-09-02|富士通株式会社|Base station, radio communication system, and radio communication method|
EP2790444A4|2011-12-09|2015-10-14|Fujitsu Ltd|Wireless communication system, mobile terminal, base station, and storage device for mobile terminal|
WO2014113964A1|2013-01-25|2014-07-31|Telefonaktiebolaget L M Ericsson |Method and device for capacity management|
CN104349396B|2013-08-09|2017-11-24|华为技术有限公司|A kind of data packet forwarding method, apparatus and system|
KR102166623B1|2013-09-10|2020-10-16|에스케이텔레콤 주식회사|Call access control apparatus and control method thereof|
EP2890214A1|2013-12-26|2015-07-01|Telefonica Digital España, S.L.U.|A method for providing wireless data connectivity between user computing devices in a given area and computing device|
EP3133892A4|2014-04-17|2017-05-03|Huawei Technologies Co., Ltd.|Method for controlling user equipment access, and base station|
US9681349B1|2014-09-05|2017-06-13|Sprint Spectrum L.P.|Method and system for managing traffic offload in a wireless communication network based on closed access mode conditions|
US9894553B2|2014-11-20|2018-02-13|Intel Corporation|Evolved node-B, user equipment and methods for mission-critical machine type communication|
US11038810B2|2015-03-13|2021-06-15|Telefonaktiebolaget Lm Ericsson |Active subscriber count based charging and policy control|
US10268604B2|2015-07-09|2019-04-23|Oracle International Corporation|Adaptive resource management in a pipelined arbiter|
EP3627926B1|2017-08-18|2021-09-01|Guangdong Oppo Mobile Telecommunications Corp., Ltd.|A method, terminal device and network device for scheduling resources|
EP3756402A4|2018-07-24|2021-03-10|Samsung Electronics Co., Ltd.|Method and base station for csg aware scheduling in wireless network|
法律状态:
2019-01-08| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]|
2020-01-14| B15K| Others concerning applications: alteration of classification|Free format text: A CLASSIFICACAO ANTERIOR ERA: H04W 72/00 Ipc: H04W 48/02 (2009.01), H04W 4/08 (2009.01), H04W 72 |
2020-01-14| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]|
2021-04-06| B09A| Decision: intention to grant [chapter 9.1 patent gazette]|
2021-06-15| B16A| Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 28/10/2010, OBSERVADAS AS CONDICOES LEGAIS. PATENTE CONCEDIDA CONFORME ADI 5.529/DF |
优先权:
申请号 | 申请日 | 专利标题
US25611809P| true| 2009-10-29|2009-10-29|
US61/256,118|2009-10-29|
US12/875,779|US8942746B2|2009-10-29|2010-09-03|Resource management and admission control for non-members of a closed subscriber group in home radio access networks|
US12/875,779|2010-09-03|
PCT/US2010/054555|WO2011059764A1|2009-10-29|2010-10-28|Resource management and admission control for non-members of a closed subscriber group in home radio access networks|
[返回顶部]