专利摘要:
circuit-switched backoff procedure a cs backoff procedure handles the conflict that can arise when transfer operations occur during cs backoff. if the cs backoff is initiated for an access terminal and the transfer from that access terminal is then started before the cs backoff has been completed, the target for the transfer is informed from the cs backoff so that the target can perform the proper indentation operations cs.
公开号:BR112012009834B1
申请号:R112012009834-9
申请日:2010-10-29
公开日:2021-07-20
发明作者:Osok Song;Fatih Ulupinar;Shyamal Ramachandran
申请人:Qualcomm Incorporated;
IPC主号:
专利说明:

Priority Claim
[0001] This application claims the benefits and priority of provisional U.S. Patent Application No. 61/256,479, co-owned, filed October 30, 2009, and designated no. 100219P1, and U.S. Provisional Patent Application No. 61/259,013, filed November 6, 2009, and designated as no. of document 100219P2, the description of which is incorporated herein by reference. Background Field
[0002] This order generally refers to wireless communication and more specifically, but not exclusively, to circuit-switched backoff procedures. Introduction
[0003] A wireless communication network can be developed across a defined geographic area to provide various types of services (eg voice, data, multimedia services, etc.) to users within that geographic area. In a typical implementation, access points (eg, corresponding to different cells) are distributed across a network to provide wireless connectivity to access terminals (eg, cell phones) that are operating within the geographic area served by the network.
[0004] In general, at a given time, an access terminal will be served by a certain access point. As the access terminal roams within a given cell associated with a current serving access point, signal conditions at the access terminal may change, where the access terminal may be better served by another access point. Consequently, the access terminal can be transferred from that serving access point to another access point to maintain the mobility of the access terminal.
[0005] Additionally, in some cases an access terminal in a packet switched network (PC) may need to be transferred or redirected to a circuit switched network (CS). For example, some types of wireless networks are exclusively packet-switched networks, where all traffic is routed through the core network through packets (for example, Internet Protocol (IP) packets). However, some types of access terminals may support packet-switched connectivity (for example, for multimedia data) and circuit-switched connectivity (for example, for voice calls and Short Message Service (SMS) communication). Accordingly, a packet-switched network can support the transfer or redirection of an access terminal to CS radio access technology (RAT). As a specific example, the 3GPP Evolved Packet System (EPS) supports a CS backoff procedure (CSFB) that allows the provision of voice and other CS domain services (eg SMS) by reusing the CS infrastructure for a terminal. access served by the Evolved UMTS Terrestrial Radio Access Network (E-UTRAN). In this way, a CS backoff-enabled terminal initially connected to E-UTRAN can use a CS backoff procedure to access a CS domain (for example, a 2G or 3G network) through the EDGE GSM Radio Access Network (GERAN), UTRAN, cdma2000 RAN or some other RAT.
[0006] Under certain circumstances, the transfer of an access terminal can be invoked during a CS backoff procedure. Accordingly, there is a need to create effective techniques for handling CS indentation under these and other circumstances. summary
[0007] A summary of several illustrative aspects of the description follows. The summary is provided for the reader's convenience and does not fully define the scope of the description. For convenience, the term some aspects may be used here to refer to a single aspect or multiple aspects of the description.
[0008] The description refers in some respects to a robust CS indentation procedure that effectively handles the conflict that can arise when the transfer and CS indentation procedures are invoked simultaneously. For example, if CS backoff is initiated for an access terminal and the transfer from that access terminal is then initiated before CS backoff is completed, the target for the transfer is informed about the CS backoff so that the target can complete the CS indentation.
[0009] The description refers in some respects to operations that can be performed by an entity such as a mobility manager to facilitate CS indentation. These operations initially involve sending a message comprising a CS backoff indicator to a server access point for an access terminal. Then, upon determination that the transfer of the access terminal from a source access point to a target access point has been initiated, the message comprising the CS feedback indicator is sent back to the target access point. Brief Description of Drawings
[0010] These and other illustrative aspects of the description will be described in the detailed description and in the attached claims that follow, and in the attached drawings, where:
[0011] Figure 1 is a simplified block diagram of various illustrative aspects of a communication system adapted to support CS backoff as taught herein;
[0012] Figure 2 is a flowchart of various aspects illustrating the operations that can be performed to provide CS indentation as taught here;
[0013] Figure 3 is a simplified diagram of the illustrative call flow for CS indentation as taught here;
[0014] Figure 4 is a flowchart of various aspects illustrating the operations that can be performed to facilitate CS indentation during X2 transfer (for example, transfer through a direct interface between eNodeBs) or S1 transfer (for example, transfer through from an eNodeB to MME interface);
[0015] Figure 5 is a simplified block diagram of various illustrative aspects of an adapter communication system to support the sending of CS backoff information between mobility managers;
[0016] Figure 6 is a flowchart of several illustrative aspects of the operations that can be performed in conjunction with the blocking of a transfer procedure that occurs during the CS backoff;
[0017] Figure 7 is a flowchart of several illustrative aspects of the operations that can be performed in conjunction with the transfer of CS backoff information during the transfer;
[0018] Figure 8 is a flowchart of several illustrative aspects of the operations that can be performed in conjunction with an access terminal transitioning to RAT CS if transfer is indicated;
[0019] Figure 9 is a simplified block diagram of several illustrative aspects of the components that can be used in communication nodes;
[0020] Figure 10 is a simplified block diagram of several illustrative aspects of the communication components; and
[0021] Figure 11 is a simplified block diagram of various illustrative aspects of an apparatus configured to provide CS indentation as taught herein.
[0022] According to common practice the various features illustrated in the drawings may not be drawn to scale. Accordingly, the dimensions of the various features may be arbitrarily expanded or reduced for reasons of clarity. Additionally, some of the drawings can be simplified for reasons of clarity. Therefore, drawings may not show all the components of a particular apparatus (eg device) or method. Finally, similar numerical references can be used to denote similar features throughout the specification and figures. Detailed Description
[0023] Several aspects of the description are described below. It should be apparent that the teachings presented here can be embodied in a wide variety of forms and that any specific structure, function, or both being described here are merely illustrative. Based on the teachings presented herein, those skilled in the art should appreciate that an aspect described herein can be implemented independently of any other aspects and that two or more of those aspects can be combined in various ways. For example, an apparatus can be implemented or a method can be practiced using any number of aspects presented here. Additionally, such apparatus may be implemented or such method may be practiced using another structure, functionality, or structure and functionality in addition to or in addition to one or more of the aspects presented herein. Additionally, an aspect may comprise at least one element of a claim.
[0024] Figure 1 illustrates several nodes of an illustrative communication system 100 (e.g., a part of at least one communication network). For illustrative purposes, various aspects of the description will be described in the context of one or more access terminals, access points, and network entities that communicate with each other. It should be appreciated, however, that the teachings presented herein may be applicable to other types of apparatus or other similar apparatus that are referred to using other terminology. For example, in various implementations access points can be referred to or implemented as base stations, NodeBs, eNodeBs, and so on, while access terminals can be referred to or implemented as user equipment (UE), mobile stations, and so on.
[0025] Access points in system 100 provide one or more services (eg, network connectivity) to one or more wireless terminals (eg, access terminal 102) that can be installed within or that can roam through. a coverage area of system 100. For example, at various times the access terminal 102 may connect to an access point 104, an access point 106, an access point 108, or some other access point in system 100 ( not illustrated). Each of these access points can communicate with one or more network entities (represented, for convenience, by network entities 110 and 112) to facilitate wide area network connectivity.
These network entities can take various forms such as, for example, one or more core and/or radio network entities. Thus, in many implementations network entities can represent functionality such as at least one of: network management (eg through an operation, administration, management and provisioning entity), call control, session management, mobility management, access circuit functions, interworking functions, or some other suitable network functionality. In some respects, mobility management refers to: keeping track of the current location of access terminals through the use of tracking areas, location areas, routing areas or some other suitable technique; paging control for access terminals; and providing access control for access terminals. Furthermore, two or more such network entities can be co-located and/or two or more such network entities can be distributed across a network.
[0027] The system 100 is adapted to provide a robust CS setback procedure even when a transfer occurs during the setback procedure. In the example of Fig. 1, the access point 104 is initially the serving access point for the access terminal 102. The access terminal 102 initiates the CS backoff by sending a message (as represented by the corresponding dashed lines) to the network. In the example in Figure 1, this message is sent to a mobility manager 114 such as a Mobility Management Entity (MME). In response to that message, mobility manager 114 initially sends a message that includes a CS backoff indicator (as represented by the corresponding dashed line) to the current serving access point to access terminal 102. server access can initiate the appropriate CS backoff procedures for the access terminal 102.
[0028] Under certain circumstances, access point 104 may determine (or assist in determining) that access terminal 102 should be transferred to another access point. In the example of Fig. 1, the access point 104 is the source access point for the handover and the access point 106 is the target access point for the handover. Accordingly, the access point 104 initiates this handover as represented by the functional block 116.
[0029] In some cases, the transfer to the access terminal is initiated after the mobility manager 114 receives the message that initiated the CS backoff procedure. In a conventional system, when the access terminal moves to the target access point 106, the previous CS backoff procedure through the source access point 104 is lost. This results in a very poor user experience. For example, an initiated CS call may be interrupted and/or the access terminal 102 may fail to receive an incoming CS call.
[0030] To solve such problem, the mobility manager 114 is configured to determine if the transfer of the access terminal 102 occurs during a CS backoff procedure (as represented by the function block 118). When this condition is identified, the mobility manager 114 again sends a message with the CS backoff indicator to the target access point 106 (as represented by function block 120 and the corresponding dashed line). In this way, the target access point 106 can continue with the CS backoff procedure (as represented by function block 122). Consequently, the target access point 106 may transfer or redirect the access terminal 102 to a RAT CS (e.g., to the access point 108).
[0031] The illustrative operations that can be performed to provide the CS indentation as taught here will now be described in greater detail in conjunction with the flowchart of Figure 2. For convenience, the operations of Figure 2 (or any other operation discussed or taught here) can be described as being realized by specific components (eg, components of figure 1, figure 5 and figure 9). It should be appreciated, however, that these operations can be performed by other types of components and can be performed using a different number of components. It should also be appreciated that one or more of the operations described here may not be watered in a given implementation.
[0032] Some types of access terminals support both CS connectivity and PS connectivity. Consequently, such access terminal can gain access to the network via RAT CS or RAT PS. Additionally, some of the PS networks can only support CS backoff for access terminals. For example, the PS network can provide an interface for communicating with a Mobile Exchange Center (MSC) on the CS network. As a specific example, in Long Term Evolution (LTE) 3GPP, an MME can support an SGs interface to an MSC.
[0033] When an access terminal with CS and PS capability registers with a PS network only (for example, it registers with an MME of an LTE network), the access terminal may indicate that it also wants to register with a CS network. In this case, the PS network (eg MME) registers the access terminal with MSC. In this way, when the access terminal is in the PS network, a mechanism is provided to allow the access terminal to fall back to the CS domain if necessary.
[0034] At the same time an access terminal in RAT PS can, in this way, determine that it needs to access RAT CS. For example, an access terminal currently communicating over an LTE network may determine that it needs communication with a CS network (eg, GERAN, UTRAN, or cdma2000) for voice communication, SMS communication, or some other type of CS communication. . In some cases, the access terminal determines that it needs CS access as a result of an access terminal user initiating a call or SMS message (for example, by triggering a user input device on the access terminal). In some cases, the access terminal determines that it needs CS access as a result of receiving a page, where the page indicates that it is for a CS domain. For example, when an incoming call (or SMS message) arrives at the MSC, the MSC sends a page to the MME, which then sends a page to the access terminal over the LTE network.
[0035] As represented by block 202 of Figure 2, upon determining that it needs access to a CS network, the access terminal sends a message to its current server network to inform the network of the need to switch to the CS domain . For example, in an LTE network, the access terminal (ie UE) can send an Extended Service Request message to an MME network entity that manages mobility for that access terminal. In this case, the Extended Service Request message includes an indication that the endpoint wants the CS backoff.
[0036] The network then receives the message from the access terminal as represented by block 204. For example, in an LTE network, the current MME for the access terminal receives the message through the eNodeB server for the access terminal.
[0037] Upon receipt of this message, the network takes the action of providing the CS indentation to the access terminal. As represented by block 206, a network entity (e.g., MME) sends a message including a CS backoff indicator to the server access point to inform the server access point that the access terminal is to be transferred or redirected to a RAT CS. For example, in a case where the access terminal was in idle mode before the CS fallback procedure began, the MME might send an Initial Context Configuration Request that includes a CS fallback indicator to the server access point. As another example, in a case where the access terminal was in active mode before the CS fallback procedure started, the MME may send a UE Context Change Request that includes a CS backoff indicator to the serving access point .
[0038] Under certain circumstances, the transfer of the access terminal may start during the CS backoff procedure. For example, based on the AP metering reports, the access point server can determine that the AP would be better served by another AP. In that case, the server access point can initiate the transfer (eg transfer X1 or S1) from the access terminal. Accordingly, as represented by block 208, the network entity (e.g., MME) may thereby determine that the handover from the access terminal to a target access point has been initiated (e.g., the network entity determines that the access terminal is being transferred to a target access point during the CS backoff procedure).
[0039] The network entity can determine that the handover has been initiated in a number of ways. In some cases, the network entity receives a message that indicates that the transfer is in progress or that the transfer has completed. For example, for an S1 transfer, the network entity may receive a transfer notification message (eg transfer requested) from the serving access point. As another example, for an X2 handoff, the network entity may receive a path switching request message from the target access point.
[0040] The network entity can determine that the handover is occurring during CS backoff in several ways. For example, this may involve determining that a transfer indicative message is received after the network entity has sent the message in block 206. Here, it should be appreciated that the transfer may have been initiated (eg, the indicative message may have been sent) before the network entity has sent the message in block 206.
[0041] In some cases, the transfer occurring during CS backoff is indicated when the network entity receives a message indicative of the transfer instead of a response to the message sent in block 206. For example, in case an MME has sent an Initial Context Configuration Request including a CS backoff indicator, receipt of a transfer notification or path switch request message in the MME instead of an Initial Context Configuration Response indicates that the transfer occurred during CS backoff . Similarly, in case an MME has sent a UE Context Change Request including a CS backoff indicator, the receipt of a handover notification or path switch request message in the MME rather than a Change Response UE context indicates that the transfer occurred during the CS backoff.
[0042] As represented by block 210, as a result of the determination of block 208, the network entity again sends a message including the CS backoff indicator to the target access point. For example, an MME can send an Initial Context Configuration Request that includes a CS backoff indicator or a UE Context Modification Request that includes a CS backoff indicator to the target access point after the transfer is complete. Here, the completion of the handover may be indicated, for example, by receiving a handover completion message, a handover notification message, a route switch request message, or some other suitable message in the MME.
[0043] As represented by block 212, some implementations may support the transfer of context information between different network entities (for example, MMEs) associated with the source and target access points. For example, the source access point can be managed by a first MME and the target access point can be managed by a second MME. In that case, when the first MME determines that a transfer involving an MME change is taking place during the CS backoff, the first MME may send an indication of the CS backoff to the access terminal for the second MME. For example, the first MME may include a CS indentation indicator in the context information sent to the second MME. In this way, the second MME can resume the CS backoff procedure after the transfer is complete.
[0044] As represented by block 214, after receiving a message with the CS backoff indicator, the target access point continues the CS backoff procedure to the access terminal. For example, the target access point can transfer the access terminal to the RAT CS (eg via PS transfer or Network Assisted Cell Switching (NACC)) by sending a transfer message to the access terminal and sending the context information to a suitable CS access point. Alternatively, the target access point can redirect the access terminal to the RAT CS (for example, sending a Radio Resource Control (RCC) release message to the access terminal). In the latter case, the access terminal can simply appear in the RAT CS and provide context information to gain access. Once the access terminal moves to RAT CS (eg 2G or 3G), the access terminal can perform a CS call setup procedure or other applicable CS setup procedure.
[0045] To further illustrate how and when a network entity should forward a CS backoff indication, reference is made to Figure 3 which illustrates an example call flow for a CS backoff procedure. In this example, CS indentation for GERAN or UTRAN is provided over an LTE network.
[0046] In step 1a, at some point after the access terminal (AT) connects to the E-UTRAN network, the access terminal (for example, which may be referred to as a UE or mobile station) sends a Service Request Extended to MME. As discussed here, the Extended Service Request indicates that the access terminal wants to be sent to another RAT that supports CS.
[0047] In step 1b, the MME sends an S1-AP message including a CS backoff indicator to the source eNodeB to inform the source eNodeB that the access terminal needs the CS backoff service. As discussed above, the S1-AP message may comprise an Initial Context Configuration Request or a UE Context Modification Request.
[0048] As discussed here, the source eNodeB can initiate a transfer procedure to a target eNodeB during the CS backoff procedure. Accordingly, the MME may receive an indication of the handover (e.g., from the source eNodeB or target eNodeB) after it sends the message in step 1b.
[0049] Consequently, as represented by step 1c, the MME forwards an S1-AP message including a CS backoff indicator to the target eNodeB to cause the target eNodeB to send the access terminal to the CS domain (e.g., 2G or 3G). Again, the S1-AP message may comprise an Initial Context Setup Request or a UE Context Change Request. In the first case, the target eNodeB can respond with an Initial Context Configuration Response and then send the access terminal to the CS domain (eg 2G or 3G). In the latter case, the target eNodeB can respond with a UE Context Modification Response and then send the access terminal to the CS domain.
[0050] Steps 2 to 7 describe illustrative operations that can be performed in an implementation where the access terminal is transferred to GERAN or UTRAN for CS backoff. In the first case, the access terminal is transferred to a Base Station Subsystem (BSS), while in the latter case, the access terminal is transferred to the Radio Network Subsystem (RNS).
[0051] Step 2 is an optional step that can be employed, for example, in case the access terminal is within the coverage of multiple CS cells. In that case, the measurement report information provided by the access terminal can be used to select the best BSS cell or RNS cell for CS backoff. Alternatively, in a case where there is a single known CS cell in the area, the target eNodeB can simply send the access terminal to that CS cell.
[0052] Steps 3 to 7 refer to the termination of the CS call. In step 3, the target eNodeB sends context information to the access terminal for the BSS or RNS. In step 4, the access terminal initiates a Connection Management (CM) Service Request. The dashed block represents a situation in which the MSC is changed. In this case, the MSC sends a CM Service Reject in step 5, and a combined Location Area Update or Target Area/Location Area (RA/LA) is performed. In step 6, the CS call establishment procedures are performed, and the transfer is completed in step 7.
[0053] It should be appreciated that the specific operations and the ordering of operations in Figure 3 are merely representative. In other cases, some of the operations described may be carried out by other entities. For example, the source eNodeB might start some of the CS backoff operations before deciding that the access terminal needs to be transferred to the target access point. Also, in some cases, the MME may determine that the transfer is in progress after the MME receives the message in step 1a, but before the MME sends the message in step 1b.
[0054] In some implementations, a network entity may determine that the transfer is taking place during CS backoff based on receipt of a reject message from the source eNodeB. Figure 4 depicts an example of the operations that can be performed by a network entity in such a case. For illustration purposes, the example of an MME and UE is used here. These operations can be employed in a case involving X2 transfer or S1 transfer.
[0055] As represented by block 402, the MME receives an Extended Service Request Message from a UE. As discussed here, the message indicates that CS indentation must be provided to the access terminal.
[0056] As represented by block 404, the MME sends a message including a CS backoff indicator to the source eNodeB to the access terminal. For example, the MME may perform an S1 interface procedure where a UE Context Change Request is sent to the source eNodeB.
[0057] Since the source eNodeB initiated the transfer in that case, the source eNodeB sends back a reject in response to receiving the message sent in block 404. For example, the source eNodeB may send a message comprising an indication that the transfer (eg transfer X2 or transfer S1) of the access terminal is in progress. Accordingly, the MME receives this rejection as represented by block 406.
[0058] As represented by block 408, the MME again sends a message including the CS backoff indicator to the target eNodeB. For example, if the handover is completed, the MME can retry the S1 interface procedure by sending a UE Context Change Request to the target eNodeB.
[0059] As mentioned above, in some cases a source access point and a target access point are managed by different network entities (eg different MMEs). Figure 5 illustrates an example of such a situation. Here, an access terminal 502 is initially served by an access point 504. The access point 504, in turn, is managed by a mobility manager 506. During a CS backoff procedure, a decision is made to transfer the access terminal 502 to an access point 508. However, the access point 508 is managed by a mobility manager 510. Accordingly, to facilitate the CS backoff procedure at the access point 508, the mobility manager 506 sends a CS backoff indication to mobility manager 510 (for example, along with context information to access terminal 502). Mobility manager 510 may then inform access point 508 (e.g., by sending a message including a CS backoff indicator) that access terminal 502 has requested CS backoff service. Access point 508 may then transfer or direct access terminal 502 to an access point 512 associated with the RAT CS. For this purpose, mobility manager 510 may have an interface (eg, an SGs interface) with a network entity 514 (eg, an MSC) of the CS network to which the access point 512 is connected.
[0060] Figures 6 to 8 describe other techniques that can be employed to solve the transfer during CS backoff.
[0061] Figure 6 describes a scheme in which a network entity (for example, MME) blocks the transfer of the access terminal during a CS backoff procedure. This scheme can be employed, for example, in an implementation where transfer messages from the access points are sent to the network entity (for example, for transfer S1).
[0062] As represented by block 602, the network entity receives a message initiating a CS backoff procedure for an access terminal. For example, an MME may receive an Extended Service Request from an access terminal.
[0063] As represented by block 604, the network entity then receives a handover related message to the access terminal. For example, an MME may receive a transfer notification message (eg, transfer requested) from a source access point. Consequently, as represented by block 606, the network entity determines that the handover is taking place during the CS backoff procedure.
[0064] As a result of the determination of block 606, the network entity blocks the transfer procedure (as represented by block 608). For example, an MME can interrupt transfer message exchange between source and target access points.
[0065] While blocking the transfer procedure, the network entity may continue with the CS backoff procedure as represented by block 610. For example, the MME may send a UE Context Change Request (or other suitable message) including a CS indent indicator for the source hotspot. Here, the source access point can be configured so that CS backoff has a higher priority than transfer. This way, the source access point will abort the transfer and proceed with the CS backoff.
[0066] Figure 7 depicts a scheme where a source access point transfers context information related to CS backoff to a target access point in case the transfer has been initiated during CS backoff.
[0067] As represented by block 702, the serving access point for an access terminal determines that CS backoff has been initiated for the access terminal. For example, the serving access point may receive a message (e.g., from the access terminal or a network entity) that includes a CS backoff indicator.
[0068] As represented by block 704, the serving access point determines that the access terminal is to be transferred to another access point (e.g., based on the current signal condition at the access terminal).
[0069] As represented by block 706, as a result of determining that the CS transfer and backoff procedures are taking place simultaneously, the server access point transfers CS backoff related context information (e.g., including an indication (such as an indicator) of the CS backoff procedure in progress) and neighbor metering information for the target access point together with the transfer from the access terminal to the target access point. For an X2 transfer, this CS backoff-related information can be communicated directly between the access points during a transfer preparation procedure. For an S1 transfer, this information can be included in a source access point to an access point's transparent container.
[0070] As represented in block 708, as a result of receiving the information related to the CS backoff, the target access can continue with the CS backoff procedure to the access terminal. For example, the target access point can resume the CS backoff procedure from the point where the source access point paused the CS backoff procedure due to the transfer.
[0071] In some cases, the scheme of Figure 7 may involve requesting the access terminal to perform the pilot measurements again. In that case, the access terminal can provide new measurement report information after performing a new measurement, or the access terminal can simply send the measurement report information that was stored after a previous measurement.
[0072] Figure 8 describes a scheme where an access terminal treats a transfer initiated during CS backoff as a failure. As represented by block 802, the access terminal initiates CS backoff (for example, as discussed above). As represented by block 804, the access terminal receives a handover message directing the access terminal to transition to a target access point. As represented by block 806, since CS backoff was invoked for the access terminal, the access terminal considers the transfer a failure. Here, this decision can be based, for example, on decision criteria (eg an indicator) which is hardcoded at the access terminal or which is provided at the access terminal (eg by an operator through a network entity ). As represented by block 808, as a result of considering the transfer as a failure, the access terminal autonomously transitions to a CS-capable RAT (eg, GERAN, UTRAN, cdma2000) to perform CS call setup or other operations CS configuration settings.
[0073] In some cases, an access terminal can be configured to invoke the operations of figure 8 only for intra access point transfer. Here, in case the access terminal determines that a handover is intra access point (for example, by comparing the global cell identifiers of the source and target cells), the access terminal can remain in the target cell waiting for backoff procedures Additional CS from the network.
[0074] Figure 9 illustrates various illustrative components that can be incorporated into nodes such as a network entity 902 (e.g. corresponding to mobility manager 114) to support CS backoff operations as taught here. The described components can be incorporated into other nodes in a communication system. For example, other nodes in a system may include components similar to those described for network entity 902 to provide similar functionality. Furthermore, a given node can contain one or more of the described components.
[0075] The network entity 902 includes a network interface 904 to communicate with other nodes (eg, other nodes on the network). For example, network interface 904 can be configured to communicate with one or more network nodes via a wired or wireless backhaul channel. In some aspects, network interface 904 can be implemented as a transceiver configured to support wired or wireless communication. To that end, the network interface 904 is shown to include a transmitter component 906 (for example, for sending messages and indications) and a receiver component 908 (for example, for receiving messages and indications).
[0076] The network entity 902 also includes other components that can be used in conjunction with the CS indentation operations as taught here. For example, the network entity 902 includes a CS backoff controller 910 for performing CS backoff related procedures (e.g. sending a message including a CS backoff indicator, forwarding a message including a CS backoff indicator as a result of determining that the transfer of an access terminal has been initiated, sending a CS backoff indication to a mobility management entity) and for providing other related functionality as taught here. Additionally, network entity 902 includes a handover controller 912 for performing handoff related procedures (e.g., determining that the handover of an access terminal has been initiated) and for providing other related functionality as taught herein.
[0077] In some implementations the components of Figure 9 may be implemented in one or more processors (for example, each of which uses and/or incorporates data memory for storing information or code by the processor to provide this functionality). For example, part of the functionality of block 904 and part or all of the functionality of blocks 910 and 912 may be implemented by a processor or processors of a network entity and data memory of the network entity (e.g., by executing code and/or the proper configuration of the processor components).
[0078] In addition, related functionality can be provided at access terminals and access points in a system. For example, an access terminal and an access point may include respective transceivers for communicating with each other and with other nodes (e.g., network entities). Each transceiver includes a transmitter for sending signals (e.g., messages and indications) and a receiver 308 for receiving such signals. Additionally, the access terminals and access points may include CS backoff controllers for performing the CS backoff related procedures and transfer controllers for performing the transfer related procedures as taught herein. Additionally, the components of these access terminals and access points may be implemented on one or more processors (for example, each of which uses and/or incorporates data memory for storing information or code used by the processor to provide that functionality ).
[0079] The teachings presented here can be employed in a wireless multiple access communication system that simultaneously supports communication to multiple wireless access terminals. Here, each terminal can communicate with one or more access points via transmissions on forward and reverse links. The forward link (or downlink) refers to the communication link from the access points to the terminals, and the reverse link (or uplink) refers to the communication link from the terminals to the access points. This communication link can be established through a single-entry, single-exit system, a multiple-entry, multiple-output (MIMO) system, or some other type of system.
[0080] A MIMO system employs multiple (NT) transmit antennas and multiple (NR) receive antennas for data transmission. A MIMO channel formed by NT transmitting antennas and NR receiving antennas can be decomposed into NS independent channels, which are also referred to as spatial channels, where Ns <min {NT, NR}. Each of the independent NS channels corresponds to a dimension. The MIMO system can provide improved performance (eg, greater throughput and/or greater reliability) if the additional dimensions created by multiple transmit and receive antennas are used.
[0081] A MIMO system can support time division duplexing (TDD), and frequency division duplexing (FDD). In a TDD system, forward and reverse link transmissions are in the same frequency region so that the principle of reciprocity allows estimation of the forward link channel from the reverse link channel. This allows the access point to extract the transmit beamforming gain on the forward link when multiple antennas are available at the access point.
[0082] Figure 10 illustrates a wireless device 1010 (eg an access point) and a wireless device 1050 (eg an access terminal) of an illustrative MIMO system 1000. In device 1010, the data of traffic for several data streams is provided from a data source 1012 to a transmit data processor (TX) 1014. Each data stream may then be transmitted via a respective transmit antenna.
[0083] The TX data processor 1014 formats, encodes and interleaves the traffic data for each data stream based on a particular encoding scheme selected for that data stream to provide encoded data. The encoded data for each data stream can be multiplexed with pilot data using OFDM techniques. Pilot data is typically a known data pattern that is processed in a known manner and can be used in the receiving system to estimate channel response. The coded and multiplexed pilot data for each data sequence is then modulated (ie, symbol-mapped) based on a particular modulation scheme (eg, BPSK, QSPK, M-PSK or M-QAM) selected for that sequence. to provide modulation symbols. The data rate, encoding, and modulation for each data sequence can be determined by instructions performed by a processor 1030. A data memory 1032 can store program code, data, and other information used by processor 1030 or other components of device 1010. .
[0084] The modulation symbols for all data sequences are then provided to a MIMO TX 1020 processor, which can further process the modulation symbols (eg OFDM). The MIMO TX processor 1020 then provides NT modulation symbol sequences for NT transceivers (XCVR) 1022a to 1022t. In some aspects, the MIMO TX processor 1020 applies the beamforming weights to the data stream symbols and the antenna from which the symbol is being transmitted.
[0085] Each transceiver 1022 receives and processes a respective symbol sequence to provide one or more analog signals, and further conditions (e.g., amplifies, filters, and upconverts) the analog signals to provide a modulated signal suitable for transmission over the channel. PIM. NT modulated signals from transceivers 1022a to 1022t are then transmitted from NT antennas 1024a to 1024t, respectively.
[0086] In device 1050, the transmitted modulated signals are received by NR antennas 1052a to 1052r and the signal received from each antenna 1052 is provided to a respective XCVR 1054a to 1054r. Each transceiver 1054 conditions (e.g., filters, amplifies, and downconverts) a respective received signal, digitizes the conditioned signal to provide samples, and further processes the samples to provide a corresponding "received" symbol sequence.
[0087] An RX data processor 1060 then receives and processes the NR symbol sequences received from NR transceivers 1054 based on a particular receiver processing technique to provide NT "detected" symbol sequences. RX data processor 1060 then demodulates, deinterleaves, and decodes each detected symbol sequence to retrieve traffic data for the data sequence. The processing by the RX 1060 data processor is complementary to that performed by the MIMO TX 1020 processor and TX 1014 data processor in the 1010 device.
[0088] A 1070 processor periodically determines which precoding array to use (discussed below). Processor 1070 formulates a reverse link message comprising an array index part and a rank value part. A data memory 1072 can store program code, data, and other information used by processor 1070 or other components of device 1050.
[0089] The reverse link message can comprise various types of information regarding the communication link and/or the received data stream. The reverse link message is then processed by a TX 1038 data processor, which also receives traffic data for various data streams from a 1036 data source, modulated by a 1080 modulator, conditioned by transceivers 1054a to 1054r, and transmitted back to the 1010 device.
[0090] In device 1010, the modulated signals from device 1050 are received by antennas 1024, conditioned by transceivers 1022, demodulated by a demodulator (DEMOD) 1040, and processed by an RX data processor 1042 to extract the transmitted reverse link message by device 1050. Processor 1030 then determines which precoding matrix to use to determine the beamforming weights and then processes the extracted message.
[0091] Figure 10 also illustrates that the communication components may include one or more components that perform the CS backoff control operations as taught here. For example, a CS backoff control component 1090 may cooperate with processor 1030 and/or other components of device 1010 to assist in a CS backoff procedure to another device (e.g., device 1050) as taught herein. Similarly, a CS backoff control component 1092 may cooperate with processor 1070 and/or other components of device 1050 to initiate and/or perform CS backoff with another device (e.g., device 1010). It should be appreciated that, for each device 1010 and 1050, the functionality of two or more of the described components may be provided by a single component. For example, a single processing component can provide the CS 1090 recoil control component functionality and the 1030 processor, and a single processing component can provide the CS 1092 kickback control component functionality and the 1070 processor.
[0092] The teachings presented here can be incorporated into various types of communication systems and/or system components. In some respects, the teachings presented here can be employed in a multiple access system capable of supporting communication with multiple users by sharing available system resources (for example, by specifying one or more of bandwidth, transmission power ; encoding, interleaving, and so on). For example, the teachings presented here can be applied to any one or combination of the following technologies: Code Division Multiple Access (CDMA), Multi-Carrier CDMA (MCCDMA), Wideband CDMA (W-CDMA), High Speed Packet Access systems (HSPA, HSPA+), Time Division Multiple Access (TDMA) systems, Frequency Division Multiple Access (FDMA), Single-Carrier FDMA (SC-FDMA) systems. Orthogonal Frequency Division Multiple Access (OFDMA), or other multiple access techniques. A wireless communication system employing the teachings presented herein can be designed to implement one or more standards, such as the IS-95, cdma2000, IS-856, W-CDMA, TDSCDMA or other standards. A CDMA network can implement a radio technology such as UTRA, cdma2000, or some other technology. UTRA includes W-CDMA and Low Chip Rate (LCR). cdma2000 technology covers IS-2000, IS-95 and IS-856 standards. A TDMA network can implement a radio technology such as the Global System for Mobile Communications (GSM). An OFDMA network can implement a radio technology such as Evolved UTRA (E-UTRA), IEEE 802.11, IEEE 802.16, IEEE 802.20, Flash-OFDM, etc. UTRA, E-UTRA and GSM are part of the Universal Mobile Communication System (UMTS). The teachings presented here can be implemented in a 3GPP LTE system, an Ultra Mobile Broadband (UMB) system, and other types of systems. LTE is a version of UMTS that uses E-UTRA. UTRA, E-UTRA, GSM, UMTS and LTE are described in documents from an organization called the "3rd Generation Partnership Project" (3GPP), while cdma2000 is described in documents from an organization called the "3rd Generation Partnership Project" . Generation 2" (3GPP2). Although certain aspects of the description may be described using 3GPP terminology, it should be understood that the teachings presented herein can be applied to 3GPP technology (eg, Rel99, Rel5, Rel6, Rel7) in addition to 3GPP2 technology (eg. , 1xRTT, 1xEV-DO Rel0, RevA, RevB) and other technologies.
[0093] The teachings presented here can be incorporated (eg implemented or performed by) to a variety of devices (eg, nodes). In some aspects, a node (e.g., a wireless node) implemented in accordance with the teachings presented herein may comprise an access point or an access terminal.
[0094] For example, an access terminal may comprise, be implemented as, or known as, user equipment, subscriber station, subscriber unit, mobile station, mobile, mobile node, remote station, remote terminal, user terminal, user agent, user device, or some other terminology. In some implementations an access terminal may comprise a cellular telephone, a cordless telephone, a session initiation protocol (SIP) telephone, a wireless local circuit station (WLL), a personal digital assistant (PDA), a handheld device having wireless capability, or some other suitable processing device connected to a wireless modem. Accordingly, one or more aspects taught here may be incorporated into a telephone (eg a cell phone or smart phone), a computer (eg a laptop), a portable communication device, a portable computing device (eg. , a personal data assistant), an entertainment device (for example, a music device, a video device, or a satellite radio), a global positioning system device, or any other suitable device that is configured to communicate over a wireless medium.
[0095] An access point may comprise, be implemented as, or known as, NodeB, eNodeB, radio network controller (RNC), base station (BS), radio base station (RBS) base station controller (BSC) , base transceiver station (BTS), transceiver function (TF), radio transceiver, radio router, basic service set (BSS), extended service set (ESS), macro cell, macro node, Home Node B (HeNB ), femto cell, femto node, pico node, or some other similar terminology.
[0096] In some aspects a node (eg an access point) may comprise an access node for a communication system. Such an access node can provide, for example, connectivity to a network (for example, a wide area network such as the Internet or a cellular network) via a wired or wireless communication link with the network. Accordingly, an access node may allow another node (eg, an access terminal) to access a network or some other functionality. Additionally, it should be appreciated that one or both nodes may be portable, or, in some cases, relatively non-portable.
[0097] In addition, it should be appreciated that a wireless node may be capable of transmitting and/or receiving information in a wired manner (eg via a wired connection). Thus, a receiver and a transmitter as discussed here may include suitable communication interface components (eg electrical or optical interface components) to communicate over a non-wireless medium.
[0098] A wireless node may communicate over one or more wireless communication links that are based on or otherwise support any suitable wireless communication technology. For example, in some respects a wireless node can associate itself with a network. In some aspects the network can comprise a local area network or a wide area network. A wireless device may support or otherwise utilize one or more of a variety of wireless communication technologies, protocols, or standards such as those discussed here (eg, CDMA, TDMA, OFDM, OFDMA, WiMAX, Wi-Fi , and so on). Similarly, a wireless node may support or otherwise utilize one or more of a variety of corresponding modulation or multiplexing schemes. A wireless node may thus include suitable components (eg, air interfaces) to establish and communicate over one or more wireless communication links using the above or other wireless communication technologies. For example, a wireless node can comprise a wireless transceiver with associated transmitter and receiver components that can include various components (eg, signal generators and signal processors) that facilitate communication over a wireless medium.
[0099] The functionality described here (for example, with respect to one or more of the attached figures) may correspond in some respects to the "means to" functionality similarly designated in the appended claims. With reference to Figure 11, an apparatus 1100 is shown as a series of interrelated functional modules. Here, a message sending module 1102 may correspond in at least some respects to, for example, a circuit-switched backoff controller as discussed here. An access terminal handover initiated by determining module 1104 may correspond in at least some respects to, for example, a handover controller as discussed herein. A message forwarding module 1106 may correspond in at least some respects to, for example, a circuit-switched backoff controller as discussed herein. An indication sending module 1108 may correspond in at least some respects to, for example, a circuit-switched backoff controller as discussed herein.
[0100] The functionality of the modules of Figure 11 can be implemented in several ways consistent with the teachings presented here. In some respects, the functionality of these modules can be implemented as one or more electrical components. In some respects the functionality of these blocks can be implemented as a processing system including one or more processor components. In some respects the functionality of these modules can be implemented using, for example, at least a part of one or more integrated circuits (for example, an ASIC). As discussed here, an integrated circuit can include a processor, software, other related components, or some combination thereof. The functionality of these modules can also be implemented in some other way as taught here. In some respects one or more of the dashed blocks of Figure 11 are optional.
[0101] It should be understood that any reference to an element herein using a designation such as "first", "second" and so forth does not generally limit the quantity or order of those elements. Instead, these designations can be used here as a convenient method of distinguishing between two or more elements or cases of an element. Thus, a reference to first and second elements does not mean that only two elements can be used here or that the first element must somehow precede the second element. Also, unless otherwise noted, a set of elements can comprise one or more elements. Additionally, terminology of the form "at least one of: A, B or C" used in this description or in the claims means "A or B or C or any combination of these elements".
[0102] Those skilled in the art will understand that information and signals can be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols and chips that may be referred to throughout the above description may be represented by voltages, currents, electromagnetic waves, particles or magnetic fields, particles or optical fields, or any combination of them.
[0103] Those skilled in the art will further appreciate that any logic blocks, modules, processors, media, circuits, and illustrative algorithm steps described with respect to the aspects described herein can be implemented as electronic hardware (e.g., a digital implementation, an analog implementation , or a combination of the two, which may be designated using source coding or some other technique), various forms of program or instructions incorporating design code (which may be referred to here for convenience as "software" or a "software module") or combinations of both. To clearly illustrate this interchangeability between hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality will be implemented as hardware or software depends on the particular application and design constraints imposed on the system as a whole. Those skilled in the art can implement the described functionality in various ways for each particular application, but such implementation decisions should not be construed as detracting from the scope of the present description.
[0104] The various illustrative logic blocks, modules, and circuits described with respect to the aspects described herein may be implemented within or realized by an integrated circuit (IC), an access terminal, or an access point. The IC may comprise a general purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field-programmable gate assembly (FPGA), or other programmable logic device, discrete gate or logic transistors, discrete hardware components, electrical components, optical components, mechanical components, or any combination thereof designed to perform the functions described here, and may execute codes or instructions that reside inside the IC, outside the IC, or both. A general purpose processor can be a microprocessor, but in the alternative, the processor can be any conventional processor, controller, microcontroller, or state machine. A processor can also be implemented as a combination of computing devices, for example, a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors together with a DSP core, or any other similar configuration.
[0105] It is understood that any specific order or hierarchy of steps in any process described is an example of an illustrative approach. Based on design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged while remaining within the scope of the present description. The attached method claims present elements of several steps in an illustrative order, and should not be limited to the specific order or hierarchy presented.
[0106] In one or more illustrative modalities, the described functions can be implemented in hardware, software, firmware or any combination thereof. If implemented in software, functions can be stored in or transmitted as one or more instructions or code in a computer-readable medium. Computer readable medium includes both computer storage media and communication media including any medium that facilitates the transfer of a computer program from one place to another. A storage medium can be any available medium that can be accessed by a computer. By way of example, and not limitation, such computer-readable medium may comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that may be used to carry or store the desired program code in the form of instructions or data structures that can be accessed by a computer. Also, any connection is properly called a computer-readable medium. For example, if the software is transmitted from a web site, server, or other remote source using coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or such wireless technologies such as infrared, radio and microwave, then coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio and microwave are included in the definition of medium. Floppy disk and disk, as used herein, include compact disk (CD), laser disk, optical disk, digital versatile disk (DVD), floppy disk, and blu-ray disk where floppy disks normally reproduce data magnetically, while disks reproduce data optically. with lasers. Combinations of the above should also be included in the scope of computer readable media. It should be appreciated that a computer readable medium can be implemented in any suitable computer program product.
[0107] The foregoing description of the aspects described is provided to allow any person skilled in the art to create or make use of the present description. Various modifications to these aspects will be readily apparent to those skilled in the art, and the general principles defined here can be applied to other aspects without departing from the scope of the description. As such, the present description should not be limited to the aspects illustrated here, but the broader scope consistent with the novelty principles and characteristics described here should be agreed.
权利要求:
Claims (15)
[0001]
1. A method of communication, characterized in that it comprises: sending a message to a first access point (104, 504), wherein the message includes a circuit switched backoff indicator associated with a circuit switched backoff procedure for an access terminal (102, 502); determine, after the message is sent to the first access point (104, 504), that the transfer of the access terminal (102, 502) from the first access point (104, 504) to a second access point access (106, 508) was initiated during the circuit-switched backoff procedure at the first access point (102, 502); and sending a message to the second access point (106, 508) as a result of the determination, wherein the message sent to the second access point (106, 508) includes the circuit-switched backoff indicator associated with the procedure. circuit switched backoff for the access terminal (102, 502) allowing the second access point (106, 508) to continue the circuit switched backoff procedure.
[0002]
2. Method according to claim 1, characterized in that the message sent to the first access point (104, 504) comprises a UE Context Modification Request or an Initial Context Configuration Request.
[0003]
3. Method according to claim 1, characterized in that the determination comprises the receipt of another message that is indicative of the transfer of the access terminal (102, 502).
[0004]
4. Method according to claim 3, characterized in that the other message comprises a handover notification message or a route switching request message.
[0005]
5. Method according to claim 1, characterized in that the messages sent to the first access point (104, 504) and the second access point (106, 508) comprise UE Context Modification Requests that include circuit-switched setback indicator.
[0006]
6. Method according to claim 1, characterized in that sending the message to the second access point (106, 508) comprises sending the message to the second access point (106, 508) if the transfer of the access terminal (102, 502) is completed.
[0007]
7. Method according to claim 1, characterized in that determining that the transfer has been initiated comprises determining that the transfer is complete based on the receipt of a transfer notification message.
[0008]
8. Method according to claim 1, characterized in that determining that the handover has started comprises determining that the handover is complete based on the receipt of a path switching request message.
[0009]
9. Method according to claim 1, characterized in that it further comprises sending, as a result of the determination, an indication of the circuit-switched backoff to the access terminal (102, 502) from a first management entity of mobility (506) associated with the first access point (104, 504) to a second mobility management entity (510) associated with the second access point (106, 508).
[0010]
10. Method according to claim 9, characterized in that the indication is included in the context information sent from the first mobility management entity (506) to the second mobility management entity (510).
[0011]
11. Method according to claim 1, characterized in that: the determination comprises receiving a rejection for the message sent to the first access point (104, 504); and rejection comprises an indication that the transfer is in progress.
[0012]
12. Method according to claim 1, characterized in that: sending the message to the first access point (104, 504) comprises an interface procedure S1; and the determination comprises receiving a rejection for the S1 interface procedure; and rejection comprises an indication that the transfer is in progress.
[0013]
13. Method according to claim 12, characterized in that sending the message to the second access point (106, 508) comprises retrying the S1 interface procedure with the second access point (106, 508 ) if the transfer is complete.
[0014]
14. Apparatus for communication, characterized in that it comprises: means for sending (1102) a message to a first access point (104, 504), wherein the message includes a circuit-switched backoff indicator associated with a circuit-switched backoff to an access terminal (102, 502); means for determining (1104), after a message is sent to the first access point (104, 504), that the transfer of the access terminal (102, 502) from the first access point (104, 504) to a second access point (106, 508) was initiated during the circuit-switched backoff procedure at the first access point (104, 504); and means for sending (1106) a message to the second access point (106, 508) as a result of the determination, wherein the message sent to the second access point (106, 508) includes the associated circuit-switched backoff indicator. with the circuit-switched back-off procedure for the access terminal (102, 502) allowing the second access point (106, 508) to continue the circuit-switched back-off procedure.
[0015]
15. Computer readable memory characterized in that it comprises instructions for causing a computer to perform a method as defined in any one of claims 1 to 13.
类似技术:
公开号 | 公开日 | 专利标题
BR112012009834B1|2021-07-20|COMMUNICATION METHOD AND APPARATUS, AND COMPUTER-READABLE MEMORY
JP6864126B2|2021-04-28|Select Internet Protocol Traffic Offload Packet Data Network Tuning Changes
ES2774185T3|2020-07-17|Mobility management based on radio link failure report
US9516553B2|2016-12-06|Handover control based on closed subscriber group subscription information
CN107079375B|2020-10-20|Selected IP flow ultra-low delay
RU2527205C2|2014-08-27|Systems, methods and devices for facilitating selection of radio access technology
EP2497285B1|2019-01-09|Methods and mechanisms for managing priority calls in a cell
BRPI0921095B1|2020-11-10|reports on radio link failures
KR101780706B1|2017-09-21|Methods and systems for avoiding transitions between radio access technologies when packet data networks are inaccessible
JP2014502096A|2014-01-23|System and method for improving circuit switched fallback performance
EP2664212B1|2018-08-08|Bearer release before handover
BRPI0712983A2|2012-04-10|domain handover and domain selection during registration for voice call continuity | feature in wireless communication
JP5881841B2|2016-03-09|Extended indication of SRVCC and / or voice over IMS network support for user equipment in EPS network
RU2518686C2|2014-06-10|Domain selection for mobile object-initiated message service
KR20120117880A|2012-10-24|Mobile communication system, network device, and mobile communication method
US20170289880A1|2017-10-05|Communication system
CN104521317A|2015-04-15|Notification of break of SCTP association between X2 routing proxy and eNB
BR112021004810A2|2021-06-01|method initiated by a user equipment being in an inactive state of radio resource control, user equipment for communication within a telecommunications network, and related method and base station
WO2016086409A1|2016-06-09|Access method, apparatus and system
WO2016106722A1|2016-07-07|Access method, apparatus and system
RU2673696C2|2018-11-29|Processing of ambiguity of sending command of hs-scch channel in b node
同族专利:
公开号 | 公开日
US8934331B2|2015-01-13|
JP2013509831A|2013-03-14|
CN102598775B|2015-11-25|
CN102598775A|2012-07-18|
US20110216645A1|2011-09-08|
KR101491616B1|2015-02-09|
TW201138502A|2011-11-01|
EP2494818B1|2018-10-03|
EP2494818A2|2012-09-05|
WO2011053849A3|2011-06-23|
ES2703251T3|2019-03-07|
BR112012009834A2|2020-10-27|
TWI507060B|2015-11-01|
WO2011053849A8|2011-07-21|
HUE039561T2|2019-01-28|
KR20120101045A|2012-09-12|
JP5628334B2|2014-11-19|
WO2011053849A2|2011-05-05|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

CN101370283B|2007-08-13|2011-03-30|华为技术有限公司|Method and apparatus for processing non-access layer message in switching course of evolution network|
JP5104260B2|2007-12-04|2012-12-19|富士通株式会社|Mobile communication system|
EP2250855B1|2008-01-31|2017-04-12|Telefonaktiebolaget LM Ericsson |Circuit switched fallback for mobile terminated calls|
EP2637441A3|2008-03-21|2014-05-14|Interdigital Patent Holdings, Inc.|Method and apparatus to enable fallback to circuit switched domain from packet switched domain|
CN101572864B|2008-05-04|2011-09-21|电信科学技术研究院|Method, system and device for notifying user information|
KR101521886B1|2009-01-23|2015-05-28|삼성전자주식회사|Apparatus and method for processing gtp in mobile communication system|
US8867362B2|2010-01-15|2014-10-21|Telefonaktiebolaget Lm Ericsson |Congestion control for interworking between networks|US8705445B2|2009-10-30|2014-04-22|Interdigital Patent Holdings, Inc.|Method and apparatus for efficient signaling and usage of resources for wireless communications supporting circuit switched and packet switched sessions|
JP4800427B2|2010-02-09|2011-10-26|株式会社エヌ・ティ・ティ・ドコモ|Mobile communication method, radio access network apparatus, and mobile station|
JP4841675B2|2010-02-09|2011-12-21|株式会社エヌ・ティ・ティ・ドコモ|Mobile communication system, network device, and mobile communication method|
JP5607816B2|2010-04-14|2014-10-15|▲ホア▼▲ウェイ▼技術有限公司|Method, apparatus and system for handling enhanced multimedia priority services in a circuit switched fallback mechanism|
EP2625921B1|2010-10-05|2017-08-09|Telefonaktiebolaget LM Ericsson |Technique for connection attempt handling in a circuit switched fallback situation|
BR112013016504A2|2011-02-07|2016-09-27|Ericsson Telefon Ab L M|method and device in a telecommunications system|
US8914034B2|2011-05-26|2014-12-16|At&T Mobility Ii Llc|Long-term evolution circuit switched fall back enhancements|
JP2013009169A|2011-06-24|2013-01-10|Kyocera Corp|Radio terminal device and communication control method|
US8995959B2|2011-09-20|2015-03-31|Alcatel Lucent|Prevention of mismatch of authentication parameter in hybrid communication system|
US9961591B2|2011-10-18|2018-05-01|Qualcomm Incorported|Optimizations to circuit-switched fallbackprocedure|
DE102011085785A1|2011-11-04|2013-05-08|Vodafone Holding Gmbh|Registration of radio network changes due to a CS fallback mechanism|
GB2497090B|2011-11-29|2014-12-03|Broadcom Corp|Mobile communication networks|
US20130143555A1|2011-12-02|2013-06-06|Qualcomm Incorporated|Managing access terminal handover in view of access point physical layer identifier confusion|
CN102523571B|2011-12-23|2015-11-25|华为终端有限公司|A kind of method of single-card double-standby user equipment residing network and subscriber equipment|
GB2499673A|2012-02-27|2013-08-28|Renesas Mobile Corp|Indicating circuit switched fallbacksupport for voice calls|
EP2836015A4|2012-04-03|2016-01-27|Lg Electronics Inc|Method and device for handover of packet switched service in wireless communication system|
US20150036611A1|2012-04-03|2015-02-05|Lg Electronics Inc.|Method and apparatus for handover of packet-switched service in wireless communication systems|
WO2013151333A1|2012-04-03|2013-10-10|엘지전자 주식회사|Method and device for handover of packet switched service in wireless communication system|
US8862090B2|2012-05-21|2014-10-14|At&T Intellectual Property I, L.P.|Intelligent long term evolution circuit switched fallback management|
US8902732B2|2012-09-24|2014-12-02|Silver Spring Networks, Inc.|System and method for managing access point failover within a wireless mesh network|
US20140140270A1|2012-11-16|2014-05-22|At&T Intellectual Property I, Lp|Long Term Evolution RAN Component Selection Based on Message Type|
EP2925081B1|2012-12-28|2017-09-06|Huawei Technologies Co., Ltd.|Circuit switched fall back switching method, device and base station|
WO2014111617A1|2013-01-16|2014-07-24|Nokia Corporation|Method and apparatus for managing network devices|
WO2014198045A1|2013-06-13|2014-12-18|华为技术有限公司|Method, device, and system for network handover|
BR112015031135A8|2013-06-13|2020-03-24|Huawei Tech Co Ltd|network transfer method, msc, eu, and network transfer system|
CN103476048A|2013-07-22|2013-12-25|北京中创信测科技股份有限公司|Method and device for CSFB performance statistics|
US9730152B2|2013-09-27|2017-08-08|Mediatek Inc.|UE enhancement in FDD-TDD joint operation networks|
EP3054723B1|2013-11-01|2019-09-04|Huawei Technologies Co., Ltd.|Network switching method, device and system|
US9629034B1|2013-11-25|2017-04-18|Sprint Spectrum L.P.|Dynamic setup of fallback communications during handover|
EP3189680B1|2014-09-05|2021-08-11|Panasonic Intellectual Property Corporation of America|Band usage information generating and reporting method, charging method, enodeb, and mme|
EP3222080A1|2014-09-26|2017-09-27|Telefonaktiebolaget LM Ericsson |Method in communication device for starting a circuit switched fallback in wireless communication system.|
US20160119849A1|2014-10-24|2016-04-28|Qualcomm Incorporated|Reducing latency of redirection during a concurrently triggered reselection|
MX367551B|2014-12-17|2019-08-27|Ericsson Telefon Ab L M|Method and apparatus for mobility management.|
US10321372B2|2015-04-03|2019-06-11|General Motors Llc|Modified cellular protocol selection|
CN106304187A|2015-05-20|2017-01-04|中兴通讯股份有限公司|A kind for the treatment of method and apparatus of mobile communication system Program|
US9674761B2|2015-10-29|2017-06-06|Qualcomm Incorporated|Techniques and apparatuses for improved cell transfer during call setup procedure|
KR20170115888A|2016-04-08|2017-10-18|삼성전자주식회사|Method and Device for providing circuit switching service in wireless communication system|
WO2017176071A1|2016-04-08|2017-10-12|Samsung Electronics Co., Ltd.|Circuit switched fallback method and device|
CN107277868A|2016-04-08|2017-10-20|北京三星通信技术研究有限公司|A kind of circuit domain backing method and equipment|
WO2019071496A1|2017-10-11|2019-04-18|Oppo广东移动通信有限公司|Post-network handover return method, access network device and core network device|
法律状态:
2020-11-10| B15K| Others concerning applications: alteration of classification|Free format text: A CLASSIFICACAO ANTERIOR ERA: H04W 36/00 Ipc: H04W 36/08 (2009.01) |
2020-11-10| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]|
2021-05-11| B09A| Decision: intention to grant [chapter 9.1 patent gazette]|
2021-07-20| B16A| Patent or certificate of addition of invention granted|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 29/10/2010, OBSERVADAS AS CONDICOES LEGAIS. PATENTE CONCEDIDA CONFORME ADI 5.529/DF, QUE DETERMINA A ALTERACAO DO PRAZO DE CONCESSAO. |
优先权:
申请号 | 申请日 | 专利标题
US25647909P| true| 2009-10-30|2009-10-30|
US61/256,479|2009-10-30|
US25901309P| true| 2009-11-06|2009-11-06|
US61/259,013|2009-11-06|
US12/876,347|US8934331B2|2009-10-30|2010-09-07|Circuit switched fallback procedure|
US12/876,347|2010-09-07|
PCT/US2010/054839|WO2011053849A2|2009-10-30|2010-10-29|Circuit switched fallback procedure|
[返回顶部]