![]() NETWORK ACCESS METHOD AND SYSTEM FOR MACHINE TYPE COMMUNICATIONS
专利摘要:
network access method and system for machine type communications. the present invention relates to a network access method and a machine-type communication (mtc) system, in which the method comprises the following steps: a mtc device sends a preamble to a base station, the base sends a random access response (rar) to the mtc device; if the rar does not contain a temporary access resource assignment indication, the mtc device sends a layer 2 / layer 3 message to the base station, otherwise the mtc device tries to access the network, the base station sends a contention resolution message to the mtc device, network access is complete; if the contention resolution message contains the indication of assigning the access resource originally used again. according to the present invention, it is enabled to dynamically and quickly perform assignment and release mtc access resources based on real access resource collisions, which thus avoids wasting uplink resources in a semi-static configuration, reduces the collision possibility and protects normal non-mtc device access. 公开号:BR112012020135B1 申请号:R112012020135-2 申请日:2010-02-12 公开日:2021-04-13 发明作者:Qun Zhao;Wu Zheng;Jimin Liu 申请人:Gemalto Sa; IPC主号:
专利说明:
FIELD OF THE INVENTION [001] Modalities of the present invention relate to communication technology, and specifically refer to a method of accessing the network and a system for MTC Machine Type Communication. BACKGROUND OF THE INVENTION [002] Machine-to-machine communication is a form of data communication that involves one or more entities that do not necessarily need human interaction. Machine-type Communication Services (MTC) have introduced a plurality of new features that are different, for example, from the services provided by the current mobile communications network. For example, the MTC service has an explosion feature and can involve a potentially large number of communication terminals, resulting in a dramatic increase in communication connections within a short period of time. In the MTC service, the potentially large number of communication terminals can almost simultaneously attempt to connect to an access network or activate a connection. For example, consider a typical application - bridge monitoring with a mass of sensors. Hundreds or even thousands of sensors can simultaneously initiate access to the network when a vehicle passes over the bridge. Or, consider another typical application - measurement. Thousands of meters of buildings can start reporting their measurements or reading results at almost the same predetermined time, said to be 12 hours (generally, an accurate reporting time will not be programmed for each meter). Apparently, such an explosion of access attempts is highly possible to collide with each other on the access channels of the access network, and even to collide with the normal access attempts of other non-MTC devices served by the access network. This causes congestion in the access channels (for example, random access channels) of the access network that is originally designed for attempts to access human-to-human communication, and therefore suppression, for example, of normal communications between communication equipment. conventional users, who have more stringent requirements on guaranteed transmission quality. The typical common RACH (PRACH) load on 3GPP LTE is about 128 attempts per second at 10MHz. However, the PRACH load caused by a magnitude of MTC devices can go much further. [003] In addition, the present study on machine-to-machine communications also highlights the possibility of carrying out MTC over a mobile network. However, in order to provide the mobile network with competitiveness in Machine Type Applications, there is a need for optimization in order to support the characteristics of MTC. [004] In 3GPP LTE, a variety of available RACH time-frequency resource configurations are specified for different bandwidth systems and different cell numbers for each base station (or eNB reinforced base station). It should be understood that more RACH time-frequency resources can be configured in advance to accommodate a potential explosion of MTC device accesses, that is, configuring a system's RACH video resources based on the number of MTC access attempts during an explosion of activity. However, the configuration of semi-static resources can waste many of the uplink resources, due to the explosion feature of MTC device access. In addition, even if the base station is configured to provide more access time-frequency capabilities, considering the considerable number of MTC devices and simultaneous access operations, the uplink capabilities to accommodate the explosion of accesses from MTC devices it may not be sufficient, especially for a system with a high system bandwidth or in the case of multiple cells under each base station. Because for such a system and such a case, the number of access time-frequency resources for accessing non-MTC devices has been considerable, it would be difficult to reserve sufficient time-frequency resources for MTC devices without affecting access from non-MTC devices. [005] Therefore, there is a need for a network access method for MTC, such that, even when a considerable number of MTC devices attempt to access simultaneously, it can still guarantee that the access of non-MTC devices is not affected . Meanwhile, the method can support such characteristics of MTC services as explosion, a considerable number of access requests, etc., in order to dynamically allocate the necessary access time-frequency resources, according to the requirements, to solve the problem. congestion on the RACH channels, and avoid wasting uplink resources. SUMMARY OF THE INVENTION [006] In view of the above problems, the present invention provides a network access method for Machine Type Communication (MTC), comprising the following steps: a. send a preamble by an MTC device in a cell to a cell base station, in order to attempt to access the network; B. sending an access response from the base station to the MTC device after receiving the preamble; ç. after receiving the access response, if the access response does not contain an indication of temporary access resource allocation, send a layer 2 / layer 3 message by the MTC device to the base station, and if the access response contains the indication of allocation of temporary access resources, return to step a and send the preamble through the MTC device using the temporary access resource assigned based on the indication in order to re-attempt to access the network; d. send a contention resolution message through the base station to the MTC device after receiving the layer 2 / layer 3 message; and. after receiving the contention resolution message, if the contention resolution message contains a self-identification contained in the layer 2 / layer 3 message sent by the MTC device in step c, complete access to the network by the MTC device; if the containment resolution message contains the indication of assigning temporary access resources, go back to step a and send the preamble through the MTC device using the temporary access resource assigned based on the indication, in order to re-attempt access to the network, otherwise, go back to step a and send the preamble through the MTC device again using the access feature originally used, in order to re-attempt to access the network. [007] In this way, the allocation of temporary access resources for MTC devices is activated quickly based on the severity of the actual collision, thus avoiding congestion in the access channels. [008] Preferably, the following steps are further comprised between step a and step b / between step d and step e: f. perform collision detection by the base station based on the preamble / Layer 2 / layer 3 message; g. if the collision is detected in step f, determine the severity of the collision by the base station; H. if it is determined in step g that the severity of the collision exceeds a first collision threshold, assign a temporary access resource and include the indication of temporary access resource assignment in the response response / access contention message sent by the base station . [009] Preferably, the method further comprises the step: i. after the temporary access resource is assigned, if the severity of the collision falls below a second collision threshold, stop the temporary access resource assignment by the base station. In step i, the base station still releases the assigned temporary access feature or a part of it after the MTC device completes access to the network using the temporary access feature. [010] In this way, it is activated to dynamically release the allocated resources and avoid wasting the resources of the uplink. [011] Preferably, when the MTC device performs an access attempt using a non-temporary access feature, in step a, the preamble sent by the MTC device is selected from a subset of preambles, the subset of preambles comprising a part of all available cell preambles. The MTC device can know the subset of preambles by listening to the system's transmission information sent by the base station. [012] In this way, the likelihood of collisions between MTC devices and non-MTC devices will be further reduced, and normal access for non-MTC devices will be protected. [013] The present invention also provides a network access system for Machine Type Communications (MTC), comprising: one or more MTC devices in a cell; a cell base station; wherein the MTC device is adapted to: send a preamble to the base station in order to attempt to access the network; after receiving an access response from the base station, if the access response does not contain an indication of temporary access resource allocation, send a layer 2 / layer 3 message to the base station, if the access response contains the indication of allocation of temporary access resources, send the preamble using the temporary access resource assigned based on the indication in order to re-attempt to access the network; after receiving a contention resolution message from the base station, if the contention resolution message contains a self-identification contained in the layer 2 / layer 3 message sent by the MTC device, complete access to the network; if the containment resolution message contains the indication of temporary access resource assignment, the MTC device sends the preamble using the temporary access resource assigned based on the indication in order to re-attempt to access the network, otherwise, the MTC device sends the preamble using the access feature originally used again, in order to attempt to access the network. [014] The present invention has the following advantages: first, it considers the explosion characteristic of the MTC access device, dynamically allocates (and releases) temporary access resources and saves a considerable number of uplink resources, second, it protects network access from non-MTC devices very well and prevents it from influencing the MTC device access explosion, thirdly, it quickly allocates new access resources and resolves congestion on the original access channels, whereas in the prior art it is not possible to allocate more resources from the highest setting. BRIEF DESCRIPTION OF THE DRAWINGS [015] The above and other objectives, characteristics and advantages of the present invention will become more evident through the following description of the preferred embodiments of the present invention with reference to the accompanying drawings, in which: Figure 1 illustrates an example of an application environment of the present invention, in which MTC devices, non-MTC devices, and a base station in a cell are schematically illustrated; figure 2 schematically illustrates a network access procedure for TCM in the present invention, and figure 3 schematically illustrates the allocation of temporary access resources in the present invention. DETAILED DESCRIPTION OF MODALITIES [016] The present invention adopts a scheme of dynamic allocation of temporary access resources that with respect to the characteristics of an MTC network, such as explosion and a considerable amount of accesses, such that when the severity of a collision caused by access the network of MTC devices in a cell is severe, for example, resulting in congestion in the access channel (eg, RACH) of a non-MTC device and affects its normal access operation, the temporary access features that can be used for MTC devices are assigned, and when the severity of the collision falls below an acceptable level, all or part of the temporary access resources are released. In addition, in an embodiment of the present invention, a subset of preambles used by the MTC device is also provided, wherein the subset is composed of a part of all available preambles of the cell. MTC devices can only select the subset preamble to send network access attempts. In this way, collisions between access to the network of MTC devices and access to the network of non-MTC devices will be further reduced. [017] In the present invention, non-MTC devices can include any devices other than MTC devices, for example, conventional user equipment (UE), a terminal device operated by a user to perform access and communication. A non-MTC type communication or access can be any communication or access, except for MTC type communication or access, for example, it can be communication between user equipment such as terminals or the communication between a terminal and a base station. In the following description, a 3GPP LTE wireless communication application environment is taken as an example. It should be noted that the modalities of the present invention are not limited to these applications, but adapted to other more relevant communication application environments, for example, an application environment comprising MTC devices. [018] The inventors of the present application noted that the functions of current network services, mobile network services in particular, are designed primarily for non-MTC services, regardless of the characteristics of MTC services, such as explosion, a considerable amount of access, and so on. Thus, based on current network services, if an MTC service is added directly, it is very likely to cause channel congestion and affect normal communication, for example, between conventional user equipment. In order to accommodate such a Machine-Type Application, optimization is required to support the characteristics of TCM. [019] In the modalities of the present invention, small modifications are made to the access response and containment resolution message in the existing standards, in order to accommodate the access actions of MTC devices. According to an embodiment of the present invention, after an MTC device receives an access response from a base station, if the access response does not contain an indication of temporary access resource allocation, the MTC device sends a layer 2 message / layer 3 for the base station; if the access response contains the indication of assigning temporary access resources, the MTC device resends the preamble using the temporary access resource assigned based on the indication, in order to attempt to access the network. In addition, after the MTC device receives a containment resolution message from the base station, if the containment resolution message contains a self-identification contained in the layer 2 / layer 3 message sent by the MTC device, access to the network is completed, if the containment resolution message contains the indication of temporary access resource assignment, the MTC device resends the preamble using the temporary access resource assigned based on that indication, in order to re-attempt to access the network , otherwise, the preamble is resent using the access feature originally used again to re-attempt to access the network. For the base station, in addition to collision detection with respect to access resources, it also determines the severity of a collision and determines whether to assign the temporary access resource as such. If determined to do the assignment, the temporary assignment resource assignment indication is included in the access response / containment resolution message sent so that the MTC device can perform network access using the assigned temporary access feature with based on the indication. Hereinafter, an exemplary network access procedure is described with reference to figure 1 and figure 2. [020] Figure 1 illustrates an example of the application environment of the present invention, in which MTC devices, non-MTC devices and a base station (which is an eNB-enhanced base station in the 3GPP LTE wireless application environment) ) in a cell are schematically illustrated. Figure 1 merely illustrates a cell under eNB coverage, which is for clarity only, and the present invention is also applicable to a circumstance where each base station has a plurality of cells. The cell can have one or more non-MTC devices and one or more MTC devices. Hereinafter, the procedure for accessing the network of MTC devices is described mainly, while the procedure for accessing the network of non-MTC devices may adopt the procedure or approach well known to those skilled in the art. In addition, during the description, unnecessary details and functions for the present invention and those details and functions well known to those skilled in the art are omitted in order to avoid obscuring the understanding of the present invention. Figure 2 schematically illustrates a network access procedure for MTC according to an embodiment of the present invention, in which a random access approach is taken as an example. Those skilled in the art will appreciate that the present invention is not limited to the particular random access approach, but is applicable to a plurality of network access approaches. Hereinafter, the preferred embodiments of the present invention will be described with reference to figures 1 and 2. [021] In figure 1, when one or more MTC 20 devices prepare to perform network access through a random access procedure, the MTC 20 device receives information from the cell system in order to obtain synchronization with the cell. In step 201, the MTC device 20 sends a preamble in order to initiate a random access attempt. In step 203, eNB 10 sends a random access response (RAR) to the MTC device 20 after receiving the preamble. In step 205, the MTC device 20 sends a layer 2 / layer 3 message to eNB 10 after receiving the Random Access Response. In step 207, eNB 10 sends a containment resolution message to the MTC 20 device after receiving the layer 2 / layer 3 message. Before eNB 10 sends the RAR, and before eNB 10 sends the CRM, ENB 10 would perform collision detection. If no collision is detected, the MTC 20 device random access procedure is substantially the same as the random access procedure steps for a non-MTC device in existing standards (for example, 3GPP LTE), in which the RAR, the message Layer 2 / Layer 3 and CRM can also adopt the corresponding messages in the existing standards. The access of the MTC 20 device is successful after step 207, and then the access procedure ends. [022] If eNB 10 detects a collision before step 203, specifically, detecting that the MTC 20 device and one or more other MTC or non-MTC devices send the same preamble simultaneously on the same time-frequency resource, the above procedure would be A little different. In an existing method for non-MTC devices, if eNB 10 detects a collision before step 203, the RAR will not be sent, so that non-MTC devices can know about the collision and wait for a certain period of time, for example, a time window, before attempting random access. According to an embodiment of the present invention, when eNB 10 detects a collision based on the preamble, at this point, ENB 10 further detects the severity of the collision, for example, determining whether the severity of the collision exceeds a collision threshold. Here, the severity of a collision and the collision threshold can be determined as a function of frequency, probability of collisions incurred by the random access of MTC devices, or the number of devices that cause collisions within a predetermined period of time (for example, within a certain number of frames), or it can also be configured to meet the needs of the system or application. The collision threshold can be a predetermined value that represents the severity of a collision. Preferably, the collision threshold value is variable. For example, the collision threshold value may vary with the assignment of the temporary access feature. For example, when the temporary access feature has not yet been assigned, however, the collision threshold may be a higher value in order to reduce the likelihood of error determination for an access explosion, while when the occurrence of a access explosion has been determined and the temporary access feature has been assigned, the collision threshold may be a lower value, in order to effectively reduce the probability of collision on the original access channel. [023] If the severity of the collision exceeds the collision threshold, this indicates that access from the MTC 20 device can cause uplink congestion and has a greater chance of affecting access from non-MTC devices and is therefore it is necessary to assign a temporary access resource for the random access of the MTC device 20. Therefore, eNB 10 assigns the temporary random access resource and includes an indication of the allocation of temporary temporary access resources in the RAR to be sent later. The indication for assigning temporary random access resources may contain indications about the size and location of the random access resource. A plurality of solutions can be adopted to adjust the size and location. Preferably, the size of the temporary random access feature can be determined based on the severity of the collision. For example, the size can be an integer multiple of a resource unit of the random access facility in the cell configuration. Preferably, the assigned temporary random access feature does not overlap the cell's original random access feature, and its location can be next to the original random access feature in each frame or within a subframe in each frame that it originally does not contain the random access feature, as shown in figure 3. When eNB 10 assigned the temporary random access feature, the temporary random access feature appears in each next frame, until it is released. For the MTC 20 device that performs random access using the temporary random access feature, eNB 10 will generate a temporary Random Access Radio Network Identifier (temp-RA-RNTI) corresponding to the temporary random access feature, and includes the temp-RA-RNTI generated in the RAR that will be sent later. Temp-RA-RNTI is used in combination with the random access preamble as used in access to identify the target device of the RAR message. According to an embodiment of the present invention, as there is no overlap between the temporary random access feature and the original random access feature, the Temporary Random Access Radio Network Identifier can be generated using the same method as the generation method of RA-RNTI in the existing standards, that is, the temp-RA-RNTI corresponds to the assigned temporary random access feature. For example, if the current frame includes 10 subframes, temp-RA-RNTI can be generated according to the following equation: temp-RA-RNTI = t_t_id +10 * t_f_id +1, where, t_t_id is the index of the first subframe of the assigned temporary random access resource, 0 <t_t_id <10, t_f_id is the index of the temporary random access resource assigned in the first subframe, and they are arranged in ascending order in the frequency domain. [024] After receiving the RAR, including the indication of temporary access resource assignment, the MTC 20 device initiates, in step 209, a new random access attempt using the temporary random access resource assigned based on the indications for the assignment of temporary random access resources on it. The random access procedure using the temporary random access feature may be similar to the access procedure for non-MTC devices using the original random access feature. For example, the MTC device 20 sends a preamble in order to initiate a random access attempt. After eNB 10 receives the preamble, ENB 10 sends the RAR to the MTC 20 device. The MTC 20 device sends a layer 2 / layer 3 message to eNB 10 after receiving the random access response. ENB 10 sends a containment resolution message to the MTC 20 device after receiving the layer 2 / Layer 3 message. The MTC 20 device receives the containment resolution message. If a collision occurs, the MTC 20 device reselects the preamble and sends the reselected preamble with the temporary random access feature to initiate a new random access attempt. [025] On the other hand, if the severity of the collision is determined to be less than the collision threshold, eNB 10 does not assign the temporary random access feature. Unlike the non-MTC device, the MTC 20 device performs random access using the access feature as originally used to send the preamble in step 201 again. [026] Similar to collision detection in existing standards, after eNB 10 receives the layer 2 / layer 3 message sent by the MTC 20 device, it will also perform collision detection. Similar to the description above, when eNB 10 detects a collision based on the layer 2 / layer 3 message at this point, eNB 10 will still continue to detect the severity of the collision; if it is determined that the severity of the collision exceeds the collision threshold, ENB 10 assigns a temporary random access resource and includes an indication of temporary random access resource allocation in the containment resolution (CRM) message that will be sent later. As mentioned above, upon receipt of the CMR, the MTC device 20 initiates a new random access attempt using the assigned random access feature based on the indication of temporary random access resource assignment in step 209. [027] The procedure for accessing MTC devices that performs network access with the random access approach has been described with reference to figure 2. However, the present invention is not limited to the specific flow of the above specific example, and the verses in the art they will notice that the basic idea of the present invention can be applied to another network access involving MTC. [028] Based on the severity of the collision caused by the MTC 20 device's network access and / or uplink congestion, eNB 10 can continue to assign the temporary access feature for a new MTC device network access attempt. For two different preambles or time-frequency resource units that collide, the same or different temporary access resources can be allocated. As mentioned above, once a temporary access feature is assigned, the temporary access feature will appear in each next frame until they are released. For example, eNB 10 can maintain a list of all temporary access resources allocated and allocate those resources for new attempts to access the network and MTC devices that cause collisions. [029] Considering the explosion characteristic of the MTC, such a considerable number of attempts to access the network of MTC devices can only be maintained for a period of time. After the burst of access to the MTC device network passes, or when the severity of the collision caused by the MTC device falls below a certain level, for example, it becomes less than a certain threshold, eNB 10 may stop transmitting the indication of a temporary access resource in the RAR or CRM, and, thus, stop assigning the temporary access resource for a new attempt to access the MTC network. In addition, when the severity of the collision caused by the MTC device becomes less than the collision threshold and after the MTC 20 device completes access to the network using the assigned temporary access feature, eNB 10 can flexibly release all or part of the temporary access resources allocated. Therefore, it is possible to dynamically allocate and release dedicated access resources for MTC devices and avoid wasting uplink resources. The threshold here can employ the above collision threshold, and its value varies with the number of MTC devices initiating attempts to access the network and the allocation of temporary access resources and other factors. For example, after the interruption of assigning the temporary access feature for a new attempt to access the MTC network, a timer can be set in eNB 10 based on the characteristics of a specific MTC device; if the timer expires, it can be determined that all access attempts using the temporary access features complete their network access procedures. At this point, eNB 10 can release temporary access resources, in order to save uplink resources. ENB 10 can also only release part of the temporary access resources. When determined to release a portion of the temporary access resources, eNB 10 may continue to allocate the remaining portion of the temporary access resources for further attempts to access the MTC device network causing a collision. [030] The MTC 20 device network access procedure has been described above mainly considering the collision caused by the MTC device 20. For non-MTC devices, they can use the existing network access procedure to access the network. As described above, according to an embodiment of the present invention, if the eNB10 detects a collision before step 203, the RAR is yet to be sent, in which an indication of a temporary access facility can be included. If a non-MTC device receives this RAR, it can ignore this indication directly and prepare for the next access attempt. Another solution is that the non-MTC device can also use the temporary access features to perform subsequent access attempts. Which solution will be selected may depend on the capacity and preference of the non-MTC device. [031] In accordance with the preferred embodiments of the present invention, in order to further reduce the impact of MTC 20 device access on non-MTC device access, a dedicated subset of preambles can be created for the MTC 20 device, in that the subset can include a portion of all available preambles of the cell. For example, a subset of preambles dedicated to the MTC 20 device can be constituted by selecting a number of preambles (for example, 10) from all available preambles (for example, 64) of the cell based on the load of the devices not MTC in the cell. For the heavier load of non-MTC devices, a subset including fewer preambles can be configured to reduce the possibility of collision. The subset of preambles can be transferred to the MTC device 20 via system information. For example, the MTC device can know the subset of preambles by listening to the system transmission information transmitted by the base station. In this way, the MTC device 20 can merely adopt the preamble in that subset to initiate an attempt to access the network, in step 201. Preferably, when the MTC device 20 performs the access attempt using a non-temporary access feature (ie , the original access feature), the MTC 20 device can select a preamble from the subset of preambles for transmission, in order to reduce the possibility of collision. However, when the MTC 20 device attempts to access using the temporary access feature, the preamble, which can be selected is not limited to the subset of preambles, but can be selected from all available preambles of the cell, because performing the access attempt using the temporary access feature can already reduce the possibility of collision. [032] Exemplary embodiments of the present invention have been described above. According to the modalities of the present invention, when the collision of access resource caused by the MTC device is severe enough, a temporary dedicated access resource for the MTC device is assigned, and when the severity of the collision drops to a certain level, the allocated temporary access resource is released, thus being able to dynamically allocate and release MTC access resources based on the collision of real access resources, which avoids wasting uplink resources in a semi-static configuration, and when the MTC device causes congestion in the access channel, a new access feature can be quickly assigned. In addition, defining a dedicated subset of preambles for the MTC device limits the preambles available for the MTC device, which further reduces the possibility of collision and protects normal access from non-MTC devices. In the meantime, good backwards compatibility is provided by simply making minor modifications to the existing access procedure, for example, slightly modifying the RAR and CRM messages, and for a non-MTC device, it is not even necessary to change your access procedure. the net. [033] In the description above, a plurality of modalities are listed for respective stages. Although the inventors tried their best to list instances associated with each other, this does not mean that these instances must have a matching relationship according to corresponding reference numbers. While there is no contradiction between the conditions given by the selected examples, corresponding technical solutions can be constituted by selecting instances without corresponding numbers in different steps, and such technical solutions must be considered to be included within the scope of the present invention. [034] Those skilled in the art should easily recognize that the different steps of the method above can be implemented using a programmed computer. Here, some modalities also include a machine-readable or computer-readable program storage device (for example, a digital data storage medium) and encoding of machine-executable or computer-executable program instructions, in which the instructions perform some or all of the steps in the method above. For example, the program storage device can be a digital memory, a magnetic storage medium (for example, magnetic disk or tape), hardware or an optically readable digital data storage medium. The modalities also include the computer programmed by performing the steps of the method mentioned above. [035] It should be noted that the above description merely illustrates the technical solution of the present invention by way of example, but this does not mean that the present invention is limited to the above steps and unitary structure. In possible scenarios, the steps and the unit structure can be adjusted, selected or abandoned as required. Thus, some steps and units are not necessary elements to implement the general inventive concept of the present invention. Thus, the technical characteristics necessary for the present invention are merely limited to the minimum requirements for implementing the general inventive concept of the present invention, but not limited by the specific examples above. [036] By far, the present invention has been described in combination with preferred embodiments. It should be understood that those skilled in the art can make various other changes, substitutions, and additions without departing from the spirit and scope of the present invention. Thus, the scope of the present invention is not limited to the particular embodiments above, but must be limited by the appended claims.
权利要求:
Claims (14) [0001] 1. Network access method for MTC Machine Type Communications, characterized by the fact that it comprises the following steps: a) send a preamble through an MTC device (20) in a cell to a base station (10) of the cell, in order to try to access the network; b) sending an access response from the base station (10) to the MTC device (20) after receiving the preamble; c) after receiving the access response, if the access response does not contain an indication of the allocation of temporary access resources, send a Layer 2 / Layer 3 message by the MTC device (20) to the base station (10); and if the access response contains the indication of temporary access resource assignment, go back to step a) and resend the preamble by the MTC device (20) using a temporary access resource assigned based on the indication in order to try to perform the network access; d) send a containment resolution message through the base station to the MTC device (20) after receiving the Layer 2 / Layer 3 message, and e) after receiving the containment resolution message, if the containment resolution message contains a self-identification contained in the Layer 2 / Layer 3 message sent by the MTC device (20) in step c), complete access to the network by the MTC device (20); and if the containment resolution message contains the indication of allocation of temporary access resources, go back to step a) and send the preamble through the MTC device (20) using the temporary access resource assigned based on the indication in order to retain perform network access; otherwise, go back to step a) and send the preamble through the MTC device (20) using an access feature originally used again, in order to attempt to access the network. [0002] 2. Method, according to claim 1, characterized by the fact that it also comprises the following steps between step a) and step b) / between step d) and step e): f) perform collision detection by the base station based on the preamble / Layer 2 / Layer 3 message; g) if the collision is detected in step f), determine the severity of the collision by the base station, and h) if it is determined in step g) that the severity of the collision exceeds a first collision threshold, assign a temporary access feature and include the indication of temporary access resource assignment in the access response / containment resolution message sent by the base station. [0003] 3. Method, according to claim 2, characterized by the fact that it also comprises the following stage: 1) after the temporary access feature is assigned, if the severity of the collision falls below a second collision threshold, stop the assignment of the temporary access feature by the base station. [0004] 4. Method, according to claim 3, characterized by the fact that in step i), after the MTC device completes access to the network using the temporary access feature, still release the assigned temporary access feature or a part of it the base station. [0005] 5. Method, according to claim 1, characterized by the fact that the base station maintains a list of temporary access resources assigned in order to assign them to new MTC devices trying to access the network. [0006] 6. Method, according to claim 1, characterized by the fact that the assigned temporary access resource is not overlapping an original cell random access resource. [0007] 7. Method according to claim 2, characterized by the fact that the severity of the collision and the first and second collision thresholds are determined depending on the probability of collisions incurred by accessing the MTC device network within a predetermined period of time or a number of devices in the cell. [0008] 8. Method, according to claim 1, characterized by the fact that in step a), if the MTC device initiates an attempt to access the network using an original access resource, the preamble sent by the MTC device is selected from a subset of preambles, the subset of preambles comprising a portion of all available preambles of the cell; and if the MTC device initiates the attempt to access the network using a temporary access feature, the preamble sent by the MTC device is selected from all available preambles of the cell. [0009] 9. Method according to claim 8, characterized by the fact that the subset of preambles is indicated to the MTC device via a system message from the cell. [0010] 10. Method according to claim 8, characterized in that the size of the subset of preambles is defined according to the access load of non-MTC devices in the cell. [0011] 11. Method, according to claim 2, characterized by the fact that when assigning the temporary access resource, the base station determines the size of the temporary access resource based on the severity of the collision. [0012] 12. Method, according to claim 2, characterized by the fact that, when the base station assigns the temporary access feature in step h), it still generates a temporary temporary access radio network identifier (temp-RA -RNTI) corresponding to the assigned temporary access resource, and includes the temp-RA-RNTI generated in the access response / contention resolution message to be sent. [0013] 13. Network access system for Machine Type Communications, characterized by the fact that it comprises: one or more MTC devices (20) in a cell; a cell base station (10); wherein the MTC device (20) is adapted to: send a preamble to the base station (10) in order to attempt to access the network; after receiving an access response from the base station (10), if the access response does not contain a temporary access resource assignment indication, send a Layer 2 / Layer 3 message to the base station (10), and if the access response contains the indication of temporary access resource assignment, resend the preamble using a temporary access resource assigned based on the indication in order to attempt to access the network, and after receiving a containment resolution message from the base station (10), if the containment resolution message contains a self-identification contained in the Layer 2 / Layer 3 message sent by the MTC device (20), complete access to the network; and if the containment resolution message contains the indication of temporary access resource assignment, the MTC device (20) sends the preamble using the temporary access resource assigned based on the indication in order to attempt to access the network; otherwise, the MTC device (20) sends the preamble using an access resource originally used again, in order to attempt to access the network, where the base station (10) is adapted to: send the access response to the MTC device (20) after receiving the preamble from the MTC device (20); and sending the containment resolution message to the MTC device (20) after receiving the Layer 2 / Layer 3 message from the MTC device (20). [0014] 14. System, according to claim 13, characterized by the fact that the base station is also adapted to: perform collision detection based on the preamble / Layer 2 / Layer 3 message of the MTC device; determine the severity of a collision if the collision is detected, and if the severity of the collision is determined to exceed a first collision threshold, assign a temporary access resource, and include the indication of temporary access resource assignment in the resolution message response / access contention sent.
类似技术:
公开号 | 公开日 | 专利标题 BR112012020135B1|2021-04-13|NETWORK ACCESS METHOD AND SYSTEM FOR MACHINE TYPE COMMUNICATIONS EP3316651B1|2020-01-29|Random access method and corresponding device ES2702473T3|2019-03-01|Telecommunications apparatus and methods JP6112116B2|2017-04-12|Method for controlling machine type communication | in a wireless communication network ES2747827T3|2020-03-11|Conditional use of uplink radio resources in a cellular network JP5837180B2|2015-12-24|Slotted access and control of wireless communication devices ES2690209T3|2018-11-19|Network node, user equipment and associated methods for random access management TWI435632B|2014-04-21|Prioritized random access method ES2836278T3|2021-06-24|Method and apparatus for sending and receiving downlink control information US9215645B2|2015-12-15|Controlling network accesses by radio terminals associated with access classes BRPI0822120B1|2020-08-04|ALLOCATION OF RESOURCES FOR IMPROVED UPLINK USING AN ACQUISITION INDICATOR CHANNEL PT2745602E|2016-03-24|Controlling random access failure on a secondary cell BR112015020577B1|2019-05-14|RADIO OPTIMIZATION METHOD LOCATION AND ACCESS NETWORK Node BR112012010175A2|2020-08-18|method and apparatus for managing machine-to-machine communication resources BRPI0714763B1|2020-01-07|METHOD AND HANDOFF ACCESS DEVICE BASED ON RANDOM ACCESS CHANNEL BR112019006472A2|2019-09-10|random access method, device, system, terminal, and base station US20190045573A1|2019-02-07|System and method for flexible user equipment identification Weerasinghe et al.2019|Preamble reservation based access for grouped mMTC devices with URLLC requirements BR112012010536B1|2021-07-20|METHOD TO PROVIDE A MOBILITY MANAGEMENT POLICY, NETWORK ENTITY AND METHOD TO IMPLEMENT MOBILITY MANAGEMENT WO2018171527A1|2018-09-27|Data transmission in rrc inactive state US20150382349A1|2015-12-31|Sector Individual Control of Access to a Cell of a Mobile Network BR112019023137A2|2020-05-26|USER EQUIPMENT, RADIO BASE STATION, METHOD IMPLEMENTED BY A USER EQUIPMENT, INTEGRATED CIRCUIT, METHOD IMPLEMENTED BY A RADIO BASE STATION AND INTEGRATED CIRCUIT WO2019154106A1|2019-08-15|Grant-based uplink transmission US20130252582A1|2013-09-26|Radio access network apparatus, controlling method, mobile communication system, and non-transitory computer readable medium embodying instructions for controlling a device EP3668146A1|2020-06-17|Information transmission method and apparatus
同族专利:
公开号 | 公开日 EP2536242A1|2012-12-19| JP5450838B2|2014-03-26| KR101382161B1|2014-04-07| EP2536242B1|2016-10-12| CN102668683B|2014-07-09| US8953538B2|2015-02-10| KR20120127643A|2012-11-22| EP2536242A4|2015-08-19| BR112012020135A2|2020-08-18| CN102668683A|2012-09-12| WO2011097767A1|2011-08-18| US20120307774A1|2012-12-06| JP2013520041A|2013-05-30|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 JP2002539694A|1999-03-08|2002-11-19|ノキアネットワークスオサケユキチュア|Method for establishing communication between a user equipment and a wireless network| US6917602B2|2002-05-29|2005-07-12|Nokia Corporation|System and method for random access channel capture with automatic retransmission request| KR100938102B1|2006-08-18|2010-01-21|삼성전자주식회사|Method and apparatus for rach signal transmission/reception| KR100902897B1|2006-10-30|2009-06-15|엘지전자 주식회사|Method for random access| US8526986B2|2007-02-07|2013-09-03|Lg Electronics Inc.|Optimized random access channel access| KR101112145B1|2007-02-09|2012-02-22|삼성전자주식회사|A method and apparatus for detecting contention at random access procedure in a wireless communications system| TW200931868A|2008-01-04|2009-07-16|Interdigital Patent Holdings|Method and apparatus for performing an enhanced random access channel procedure in a Cell_FACH state| MX2010011764A|2008-04-28|2011-02-24|Fujitsu Ltd|Method for processing connection in wireless communication system, wireless base station, and wireless terminal.| US8259659B2|2008-07-03|2012-09-04|Apple Inc.|Apparatus and methods for managing access and update requests in a wireless network| CN102804882B|2009-12-22|2015-12-16|交互数字专利控股公司|Based on the machine to machine communication of group|BR112012023489A2|2010-03-19|2016-05-24|Alcatel Lucent|machine-type communication system and method and cell search method.| WO2012135996A1|2011-04-02|2012-10-11|Alcatel Lucent|Slotted access for wireless communication devices and control thereof| CN103037530B|2011-09-30|2017-08-25|中兴通讯股份有限公司|A kind of accidental access method and system| EP2761955B1|2011-09-30|2017-07-26|Interdigital Patent Holdings, Inc.|Device communication using a reduced channel bandwidth| US9166754B2|2011-11-08|2015-10-20|Industrial Technology Research Institute|Method of handling shortened resource block for machine type communication device and related communication device| US9131468B2|2011-11-08|2015-09-08|Industrial Technology Research Institute|Method of handling resource allocation for MTC and related communication device| JP5821668B2|2012-02-01|2015-11-24|富士通株式会社|Base station, radio communication system, and radio communication method| CN103313419A|2012-03-09|2013-09-18|上海贝尔股份有限公司|Random access method and device| US10154483B2|2012-09-12|2018-12-11|Qualcomm Incorporated|Coverage enhancement techniques for machine type communication devices in a wireless network| WO2014052412A2|2012-09-26|2014-04-03|Interdigital Patent Holdings, Inc.|Methods, systems and apparatuses for operation in long-term evolutionsystems| WO2014067048A1|2012-10-29|2014-05-08|华为技术有限公司|Method for determining resources, base station and user equipment| KR102046111B1|2013-03-29|2019-11-18|삼성전자주식회사|Method and apparatus for device-to-device communication| JP6199490B2|2013-07-16|2017-09-20|エルジー エレクトロニクス インコーポレイティド|Signal transmission method for MTC and apparatus therefor| GB2531221B|2013-08-01|2020-04-15|Toshiba Res Europe Limited|RAN overload control for M2M communications in LTE networks| US9716988B2|2013-09-26|2017-07-25|Sierra Wireless, Inc.|Method and apparatus for communicating with LTE terminals having restricted capabilities| WO2015066873A1|2013-11-07|2015-05-14|华为技术有限公司|Method for measuring service transmission condition of user terminal, and serving station| US10306482B2|2013-12-05|2019-05-28|Lg Electronics Inc.|Method and MTC device for performing random access procedure for coverage enhancement| CN104780617B|2014-01-09|2019-09-17|中兴通讯股份有限公司|A kind of non-competing accidental access method, node device and system| US10103805B2|2014-09-21|2018-10-16|Lg Electronics Inc.|Method and apparatus for requesting transmission of synchronization signals in wireless communication system| CN105516214B|2014-09-22|2020-05-15|电信科学技术研究院|Information reporting and resource allocation method and device in Internet of vehicles system| JP6451249B2|2014-11-18|2019-01-16|富士通株式会社|Management device, communication system, and communication control method| EP3258728B1|2015-03-03|2019-06-05|Huawei Technologies Co., Ltd.|Uplink data transmission method and device| CN106162923A|2015-04-10|2016-11-23|中兴通讯股份有限公司|Random access signaling resend method and device| CN107852757B|2015-07-27|2021-08-06|苹果公司|Enhanced RACHdesign for 5G CIOT | US10425973B2|2015-11-25|2019-09-24|Qualcomm Incorporated|Random access channel signaling on a shared communication medium| CN107743315B|2016-08-11|2022-01-11|上海诺基亚贝尔股份有限公司|Method and apparatus for contention-based transmission| CN107770733B|2016-08-22|2021-08-13|华为技术有限公司|Data communication method, device and system| CN108243510B|2016-12-27|2020-12-04|大唐移动通信设备有限公司|Method and device for allocating context resources to terminal| CN107040875B|2017-03-28|2019-12-17|南京邮电大学|Preamble resource allocation method for low power consumption in machine type communication system| CN107094281B|2017-03-31|2021-05-18|全球能源互联网研究院|Access method and system for M2M equipment to access base station| WO2019024130A1|2017-08-02|2019-02-07|Qualcomm Incorporated|Configurations for transmitting random access preamble messages| EP3685616A4|2017-09-19|2021-04-07|Nokia Solutions and Networks Oy|Modulation and coding schemecorrection when sharing radio resources between mtc and non-mtc|
法律状态:
2020-09-08| B15K| Others concerning applications: alteration of classification|Free format text: A CLASSIFICACAO ANTERIOR ERA: H04W 74/08 Ipc: H04W 74/08 (2009.01), H04W 74/00 (2009.01) | 2020-09-08| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]| 2020-09-29| B25G| Requested change of headquarter approved|Owner name: ALCATEL LUCENT (FR) | 2020-10-20| B25A| Requested transfer of rights approved|Owner name: GEMALTO SA (FR) | 2021-02-09| B09A| Decision: intention to grant [chapter 9.1 patent gazette]| 2021-04-13| B16A| Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]|Free format text: PRAZO DE VALIDADE: 10 (DEZ) ANOS CONTADOS A PARTIR DE 13/04/2021, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 PCT/CN2010/000207|WO2011097767A1|2010-02-12|2010-02-12|Network access method and system for machine type communications| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|