![]() NEIGHBORING RELATIONSHIP INFORMATION MANAGEMENT
专利摘要:
NEIGHBORING RELATIONSHIP INFORMATION MANAGEMENT. Neighbor relationship information management involves, for example: acquiring, reporting and exchanging neighbor relationship information. In some cases, neighbor relationship information is acquired and/or reported in a way that does not significantly impact other functionalities of the access terminal. For example, an access terminal may be configured to acquire and/or report neighbor relationship information only during one or more defined radio states. In some cases, the acquisition of neighbor relationship information is based on a neighbor relationship threshold. In some cases, an access terminal does not immediately report the measured neighbor relationship information and instead stores the information for later reporting. In some cases, a transmitted indication is used to facilitate the retrieval of neighbor relationship information from an access terminal. In some cases, neighbor relationship information acquired from an access terminal is exchanged through a direct interface between access points. 公开号:BR112012027586B1 申请号:R112012027586-0 申请日:2011-04-28 公开日:2022-01-11 发明作者:Andrei Dragos Radulescu;Dino Flore;Osok Song 申请人:Qualcomm Incorporated; IPC主号:
专利说明:
Reference to Related Orders [001] This application claims the benefit and priority for US provisional patent application No. 61/328,856, owned by the assignee thereof, filed on April 28, 2010 and bearer of Attorney Protocol No. 101359P1, the description of which is hereby incorporated by reference. Field of Invention [002] This request relates generally to wireless communications and more specifically, but not exclusively, to the management of neighbor relationship information. Prior Art Description [003] A wireless communications network can be arranged within a geographic area to provide various types of service (such as voice, data, multimedia services, etc.) to users within that geographic area. In one implementation, access points (associated with one or more cells, for example) are distributed throughout a network to provide wireless connectivity to access terminals (cellular phones, for example) that operate within the geographic area served by the network. [004] In general, at a given point in time, an access terminal may be served by one of these access points. As the access terminal roams throughout this geographic area, the access terminal may move away from one serving cell and move closer to another cell. Furthermore, signal conditions within a given cell may change over time, so that an access terminal may ultimately be better served by another cell. In order to maintain access terminal connectivity under these circumstances, the access terminal may be handover from one serving cell to another cell. [005] To facilitate these handovers and other operations, access points on a network can keep an eye on their neighboring access points (which could be potential targets for handovers, for example). In conjunction with a handover to a neighboring access point, for example, a server access point can send context information to that neighboring access point. To allow for this context transfer, the server access point can maintain neighbor relationship information that identifies its neighbor access points and provides other information about these access points (e.g. information about the associated cell(s)). with a given access point). [006] Neighbor relationship information maintained at each access point can be managed by a centralized network management entity. Based on measurements performed by system components and/or so-called “trigger tests”, for example, a system administrator may attempt to identify cells in the vicinity of a given cell and, based on this information, update the relationship information. of neighbors held in that cell. In practice, however, such centralized and/or human-based schemes may not always identify all neighboring cells of a given cell. Furthermore, such schemes can involve relatively high implementation costs and operational complexity. Therefore, there is a need for improved techniques to manage neighbor relationship information. Summary of the Invention [007] The following is a summary of several exemplary aspects of the description. This summary is provided for the convenience of the reader and does not fully define the scope of the description. For convenience, the term "some aspects" is used herein as referring to a single aspect or multiple aspects of the description. [008] The description refers, in some ways, to the management of neighbor relationship information. For example, various techniques are described for acquiring neighbor relationship information at an access terminal, reporting this acquired neighbor relationship information, and exchanging neighbor relationship information between network entities. In some respects, the present teachings can be used in automatic neighbor relationship (ANR) operations, whereby entities can autonomously (without the action of a human operator or network operator, for example) acquire, report, exchange or update neighbor relationship information. [009] The description refers, in some respects, to the acquisition of neighbor relationship information in an access terminal in a way that mitigates the impact that the acquisition of this information has on other functionalities of the access terminal. For example, an access terminal may record neighbor relationship information in a way that does not impact alerting, or other mobility behavior, of the access terminal. [0010] In some implementations, an access terminal acquires neighbor relationship information during one or more radio states (IDLE state, CELL_PCH state, CELL_PCH state with DRX intervals, URA_PCH state or CELL_FACH state). For example, acquiring neighbor relationship information may comprise: determining that an access terminal is in a defined radio state; and performing a measurement for neighbor relationship information as a result of determining that the access terminal is in the defined radio state. [0011] The description refers, in some ways, to the acquisition of neighbor relation information based on a neighbor relation threshold. For example, an access terminal can be configured to measure only neighbor ratio information when the signal received from one or more cells crosses a threshold. Thus, acquiring neighbor relationship information may comprise: maintaining a threshold for neighbor relationship measurements; receive a signal; comparing the received signal with the threshold; and determining, based on the comparison, whether a measurement of the neighbor relationship information will be conducted. [0012] The description refers, in some aspects, to the use of an indication to facilitate the retrieval of information on the relationship of neighbors of an access terminal. For example, a communication method may comprise: acquiring neighbor relationship information at an access terminal; and sending a message indicating that the neighbor relationship information is available for retrieval from the access terminal. As another example, a method of communication may comprise: receiving a first message from an access terminal, wherein the first message indicates that neighbor relationship information is available for retrieval from the access terminal; and sending a second message to the access terminal as a result of receiving the first message, wherein the second message requests the access terminal's neighbor relationship information. [0013] The description refers, in some ways, to the reporting of neighbor relationship information in a way that mitigates the impact that this reporting has on the energy consumption of the access terminal (and, consequently, on the time of reservation) and other functionalities of the access terminal. For example, an access terminal may report neighbor relationship information during one or more radio states (CELL_DCH state or CELL_FACH state, for example). Thus, an example of providing neighbor relationship information may comprise: determining that an access terminal is in a defined radio state; and sending a message to report neighbor relationship information as a result of determining that the access terminal is in the transmitted radio state. [0014] The description refers, in some respects, to a neighbor relationship scheme where an access terminal determines when to report neighbor relationship information. For example, an access terminal may choose not to immediately report measured neighbor relationship information and instead store the information for later reporting. Thus, a method for providing neighbor relationship information may comprise, for example: acquiring neighbor relationship information at an access terminal; determining that neighbor relationship information will not be reported immediately to a network entity; and storing the neighbor relationship information, as a result of determining that the neighbor relationship information will not be reported immediately. [0015] The description refers, in some ways, to the exchange of neighbor relationship information through a direct interface between access points. For example, a method of communicating neighbor relationship information may comprise: establishing a direct interface between a first access point and a second access point; receiving a neighbor report report from an access terminal at the first access point; generating a neighbor relationship message that includes neighbor relationship information from the neighbor relationship report; and sending the neighbor list message to the second access point through the direct interface. Brief Description of Drawings [0016] These and other sample aspects of the description will be described in the detailed description of the invention and in the appended claims that follow and in the accompanying drawings, in which: [0017] Figure 1 is a simplified block diagram of several sample aspects of a communication system adapted to manage neighbor relationship information; [0018] Figures 2 and 3 are a flowchart of various aspects of sample operations that can be performed to manage neighbor relationship information; [0019] Figure 4 is a flowchart of various aspects of sample operations that can be performed in conjunction with performing a measurement for neighbor relationship information; [0020] Figure 5 is a flowchart of various aspects of sample operations that can be performed in conjunction with determining whether to conduct a measurement of neighbor relationship information. [0021] Figure 6 is a flowchart of several sample aspects of operations that can be performed in a scheme in which network relationship information is not immediately reported; [0022] Figure 7 is a flowchart of various aspects of sample operations that can be performed in conjunction with providing an indication of what neighbor relationship information is available for retrieval; [0023] Figure 8 is a flowchart of several sample aspects of operations that can be performed in conjunction with requesting neighbor relationship information in response to receiving an indication that neighbor relationship information is available for retrieval. ; [0024] Figure 9 is a flowchart of several aspects of sample operations that can be performed in conjunction with reporting neighbor relationship information; [0025] Figure 10 is a flowchart of several aspects of sample operations that can be performed in conjunction with the exchange of neighbor relationship information; [0026] Figure 11 is a simplified block diagram that shows several examples of how neighbor relationship information can be exchanged in a network; [0027] Figure 12 is a simplified block diagram that shows several examples of how neighbor relationship information can be exchanged in a network; [0028] Figure 13 is a simplified block diagram of various aspects of sample components that can be used in communication nodes; [0029] Figure 14 is a simplified block diagram of various sample aspects of communication components; and [0030] Figures 15-21 are simplified block diagrams of various aspects of sample devices configured to manage neighbor relationship information, as taught here. [0031] In accordance with common practice, the various features shown in the drawings may not be drawn to scale. Therefore, the dimensions of the various features can be arbitrarily expanded or reduced for clarity. In addition, some of the drawings may be simplified for clarity. Thus, drawings may not show all components of a given apparatus (device, for example) or method. Finally, the same reference numbers can be used to denote the same characteristics throughout the report and in the figures. Detailed Description of the Invention [0032] Several aspects of the description are described below. It should be understood that the present teachings may be embodied in a wide variety of ways and that any specific structure, function, or both, which are described herein, are merely representative. Based on the present teachings, those skilled in the art should understand that an aspect described herein can be implemented independently of any other aspects and that two or more of these aspects can be combined in various ways. For example, an apparatus may be implemented or a method may be practiced using any number of the aspects presented herein. Furthermore, such apparatus may be implemented or such method may be put into practice using another structure, functionality, or structure and functionality in addition to or except for one or more of the aspects presented herein. Furthermore, an aspect may comprise at least one element of a claim. [0033] Figure 1 shows several nodes of a sample communication system 100 (a part of a communications network, for example). For purposes of illustration, various aspects of the description to be described in the context of one or more access terminals, access points and network entities that communicate with each other. It should be understood, however, that the present teachings may be applicable to other types of apparatus or to other similar apparatus which are referred to using other terminology. In various implementations, for example, access points can be referred to or implemented as radio access networks (RANs), radio network controllers (RNCs), base stations, NodesB, NodesB+, eNodesB, base station controllers (BSCs). ), base station transceivers (BSTs), and so on, while access terminals can be referred to or implemented as user handsets (UEs), mobile stations, and so on. [0034] Access points in system 100 provide access to one or more services (network connectivity, for example) to one or more wireless terminals (an access terminal 102, for example) that can be installed within, or that can roam throughout the coverage area of the system 100. For example, at various points in time the access terminal 102 may connect to an access point 104, an access point 106, or some access on system 100 (not shown). Each of these access points may communicate with one or more other network entities (represented, for convenience, by network entity 108) to facilitate wide area network connectivity. [0035] These other network entities can take various forms, such as, for example, one or more radio network entities (i.e. entities that provide radio connectivity to the network) and/or core network entities (i.e. that is, entities that provide management and/or provision of network resources). Thus, in some implementations network entities may represent functionality, such as one or more of: network management (for example, through an operations, administration and management (OAM) entity, a global OAM entity, a server Minimization of Triggering Tests (MDT), etc.), call control, session management, mobility management, gateway functions, interoperability functions, or some other suitable network functionality. At a minimum, OAM entities (and global OAM entities, if applicable) are responsible for configuring access points on the network. In some ways, mobility management refers to: keeping an eye on the current location of access endpoints through the use of tracking areas, location areas, routing areas or some other suitable technique; control alert for access terminals; and provide access control for access terminals. Two or more of these network entities may be co-located and/or two or more of these network entities may be distributed throughout a network. [0036] In the example of Figure 1, the access point 104 includes a pair of cells 1A and 1B, while the access point 106 includes a pair of cells 2A and 2B. Each of these cells broadcasts signals (represented by dashed lines 110 and 112) that provide information about that cell. For example, a cell may broadcast reference signals (pilot signals, for example) that indicate the primary scrambling code (PSC) used by that cell. In addition, a cell can broadcast messages (which include system information, for example) that include one or more cell identifiers and other information about the cell. [0037] In accordance with the present teachings, access terminals are configured to receive signals from nearby cells to acquire neighbor relationship information and provide this neighbor relationship information associated with access points. In this way, access points can acquire information about their neighboring access points. In the example of Figure 1, the neighbor ratio measurement component 114 of the access terminal 102 processes the signals transmitted by cells 1A, 1B, 2A, and 2B (and any other nearby cells not shown) to acquire ratio information. neighbors. The neighbor relationship reporting component 116 of the access terminal 102 sends the acquired neighbor relationship information to the access point 104, as represented by the dashed line 118. The access point 104 is thus able to autonomously update its table neighbor relationship 120 based on this information. [0038] These measurement and reporting operations may utilize one or more of the techniques taught here to provide more effective and accurate neighbor relationship information to system entities 100. For example, measurements may be performed in one way (in certain conditions, for example) that mitigates the impact on other functions of the access terminal 102. As another example, reports can be made in a way (under certain conditions, for example) that mitigate the impact that this report has on the consumption of access terminal 102. In addition, access terminal 102 may use a signal threshold in order to ensure the reliability of measurements of neighbor relationship information. In some implementations, the access terminal 102 decides whether or not to conduct a measurement and/or how (when, for example) it will report neighbor relationship information. For example, access terminal 102 may not immediately report its acquired neighbor relationship information. In addition, it can use an indication to allow access terminal 102 and access point 104 to efficiently determine when an exchange of neighbor relationship information will begin. [0039] Also in accordance with the present teachings, neighbor relationship information can be sent directly from one network entity to another to facilitate more efficient ANR. For example, access point 104 and access point 106 can establish a direct interface 122 and then exchange neighbor relationship information through direct interface 120. Thus, access point 104 can send neighbor relationship information from the its neighbor relationship table 120 (the neighbor relationship information received from access terminal 102, for example) to access point 106 so that access point 106 can therefore update its neighbor relationship table 124. Conversely, access point 106 can send neighbor relationship information from its neighbor relationship table 124 to access point 104 so that access point 104 can therefore update its neighbor relationship table. 120. Here, the term interface refers to a logical communication channel that is established between entities to allow entities to communicate. Furthermore, the term direct interface refers to an interface that is terminated by the endpoint entities and not by any intervening entities. [0040] Access points 104 and 106 may exchange neighbor relationship information with other network entities in the system 100. For example, access points 104 and 106 may send neighbor relationship information from their respective neighbor relationship tables. neighbors 120 and 124 to the network entity 108 so that the network entity 108 can therefore update its neighbor relationship table 126. Conversely, the network entity 108 can send neighbor relationship information from its neighbor relationship table. neighbor relationship 126 to access points 104 and 106 so that these access points can therefore update their respective neighbor relationship tables 120 and 124. [0041] In view of the above, it can be seen that the neighbor relationship information held by a given network entity can be acquired by that network entity in several ways. A network entity may receive neighbor relationship information from an access terminal from another network entity, or the network entity may acquire neighbor relationship information on its own. As an example of the latter case, a network entity may incorporate radio technology that is capable of acquiring cell-transmitted signals (an access point may include a network listening module, for example). [0042] As discussed in more detail below in conjunction with Figures 11 and 12, a network entity can exchange neighbor relationship information with many different types of network entity. For example, a network entity (a radio network entity or a core network entity, for example) can exchange neighbor relationship information with an access point, an OAM, a global OAM, an MDT server, an entity core network and so on through corresponding interfaces. In some cases, neighbor relationship information is sent to a target network entity through another network entity (an OAM or core network entity, for example). Thus, neighbor relationship information can be sent through various interfaces. In some cases, neighbor relationship information is sent to a destination network entity associated with a different radio access technology (an inter-RAT neighbor information exchange). [0043] Using these interfaces, entities can autonomously exchange information on the relationship of neighbors (without human or operator action, for example). Thus, entities in a network can use the present teachings to implement ANR functionality that efficiently maintains accurate neighbor relationship information on each entity. [0044] Neighbor relationship information can take different forms, depending on the types of information that are available in a given implementation. For example, neighbor relationship information may comprise one or more of: neighbor cell identity, e.g. UMTS cell identity (UTRAN), LTE or GSM cell global identifier (CGI), closed subscriber group (CSG) in LTE; access rights information, eg CSG information; route loss information; indication of received signal quality, e.g., common pilot channel chip power density-to-interference ratio (Ec/Io) (CPICH), signal-to-noise ratio (SNR), etc.; broadcast power information; list of neighbors of the cell whose broadcast information is acquired; cell load information, in terms of transfer and/or number of connections, relative or absolute; amount, number or proportion of dropped calls/UEs or in poor condition due to coverage issues; amount, number or proportion of calls/UEs transferred undesirably, for example to femto cell macro network; or degree of ping pong movement observed. [0045] Sample neighbor relationship operations will now be described in more detail in conjunction with the flowcharts in Figures 2-10. For convenience, the operations of Figures 2-10 (or any other operations discussed or taught herein) can be described as being performed by specific components (the components of Figure 1, Figure 11, Figure 12, Figure 13, and so on). It should be understood, however, that these operations may be performed by other types of component and may be performed using a different number of components. It should also be understood that one or more of the operations described herein may not be used in a given implementation. [0046] With reference initially to Figures 2 and 3, this flowchart describes several sample operations that can be performed in conjunction with collecting access terminal, neighbor relationship information and reporting this information to an access point. In this example, the access terminal is assumed to have established some form of association with the access point. For example, the access terminal may have registered with the access point, the access point may currently be serving the access terminal, and so on. [0047] An access terminal can be configured to perform neighbor relationship functions of various media. For example, an access terminal may be configured by an associated management entity (an MDT server, for example) to provide certain neighbor relationship functionality. As another example, the access terminal can be configured to provide certain neighbor relationship functionality once the access terminal associates with (eg, registers with) a given access point. In some implementations, upon implementation of the access terminal by a network operator, the access terminal can be configured to provide certain neighbor relationship functionality. In this case, the access endpoint may also be configured (eg to start reporting) by another entity at a later point in time. [0048] As represented by block 202 of Figure 2, at some point in time a network entity sends a message to an access terminal to enable neighbor relationship operations. For example, an MDT server or an access point can send a command to the access point to instruct the access point if it can start measurements and/or reports related to neighbor relations. Such a message may also specify how the access terminal will carry out measurements and/or reports related to neighbor relations. For example, the message may include measurement criteria and/or neighbor relationship reporting that specify the timing of measurements and/or reports (for example, specifying the times or time periods during which the access terminal will measure and/or or report). The message may include neighbor ratio measurement criteria that specify a threshold to be used in conjunction with the measurements. The message may include one or more specific neighbor relationship parameters that the access terminal will use in conjunction with measurements and/or reports. The message can specify the type of information to be measured and/or reported. The message may include measurement and/or neighbor relationship reporting criteria that specify information about potential cells to be monitored for neighbor relationship information (e.g. identifiers, locations, area codes, CSGs, RAT types, and PLMN). [0049] Block 202 message can be sent in several ways. For example, an access point can broadcast a unicast message directly to the access point, or the access point can broadcast a message. As another example, an MDT server can send a message to the access endpoint using an open mobile alliance device management (OMA DM) protocol. [0050] As represented by block 204, the access terminal receives the message sent in block 202 through its server cell. Depending on how the access terminal is configured, the access can act on the received message immediately or at some other time. [0051] As represented by block 206, based on the received message (and optionally on other configuration operations), the access terminal is configured with respect to: whether the access terminal will perform a measurement of neighbor relationship information and/or how (when, for example) the access terminal will carry out a measurement of the neighbor relationship information. For example, the access terminal can determine whether and/or how (when, for example) it will perform a measurement based on neighbor ratio measurement criteria included in the received message. In some cases, the access terminal is configured to measure at specified times. In some cases, the access terminal is configured to measure under specified conditions. For example, the access terminal can be configured to measure only when it is operating in a specified radio state (or any of a set of specified radio states). In some cases, the access terminal is configured to use certain measurement criteria (a threshold, for example) when taking a measurement. In some cases, the access terminal checks its current operating environment to determine whether a measurement will be taken. For example, the access terminal can determine whether measurement opportunities have been configured for the access terminal, whether the access terminal has sufficient resources (antennas and reception chains, for example) available for measurements, or whether measurements can be performed. so that incremental energy consumption can be reduced. In some cases, a measurement of neighbor relationship information may be conditionally permitted (subject to other conditions, for example) if the access terminal determines that a nearby cell is reporting one or more of: an identifier, an area code, a CSG, a RAT type, or a PLMN type specified by neighbor ratio measurement criteria. [0052] As represented by block 208, based on the received message (and optionally other configuration operations), the access terminal is configured with respect to: whether or not the access terminal will report neighbor relationship information and/or or how the access terminal will report neighbor relationship information. For example, the access terminal may determine whether and/or how to report based on neighbor ratio measurement criteria included in the received message. In some cases, the access endpoint is configured to report at specified times. In some cases, the access endpoint is configured to report under specified conditions. For example, the access terminal can be configured to report only when it is operating in a specified radio state (or any of a set of specified radio states). In some cases, the access endpoint is configured to use certain reporting criteria (eg an indication will be sent if neighbor relationship information is available for retrieval). [0053] As represented by block 210, at some point in time (based on the configuration of block 206) the access terminal starts measuring neighbor relationship information. As discussed below in conjunction with Figure 4, in some implementations measurements are started if the access terminal is in a defined radio state. As discussed below in conjunction with Figure 5, in some implementations measurements are started if certain signals received by the access terminal are greater than or equal to a specific neighbor ratio threshold. [0054] As represented by block 212, the access terminal uses its receiver(s) to receive signals from nearby cells. Here, the access terminal may perform intra-frequency measurements, inter-frequency measurements, or inter-RAT measurements in an attempt to acquire signals from any cells in the area. [0055] As mentioned above, the access terminal can measure different types of signal in different implementations. In a typical scenario, the access terminal tries to detect reference signals (pilot signals, for example) and system information transmitted by cells. In addition, the access terminal can derive (e.g., extract) various types of information from the received signals (as specified by the configuration of block 206, for example). [0056] As represented by block 214 of Figure 3, the access terminal may choose to store the acquired neighbor relationship information in some cases. For example, the access terminal will store this information in cases where the access terminal does not immediately report the acquired neighbor relationship information. [0057] As represented by block 216, in some implementations the access terminal sends an indication that it has neighbor relationship information available for retrieval. This information can be sent, for example, to an entity that requested the access terminal to report neighbor relationship information (in block 202, for example). These operations are described in more detail below together with Figure 7. [0058] As represented by block 218, in implementations in which the access terminal sends an indication in block 216, a network entity receiving the indication may then send the access terminal a request for the neighbor relationship information. These operations are described in more detail below together with Figure 8. [0059] As represented by block 220, at some point in time the access terminal starts reporting neighbor relationship information. This report can be triggered by receiving the request described in block 218 and/or based on the configuration of block 208. As an example of the latter case, in some implementations the report is started if the access terminal is in a defined radio state, as discussed in more detail below in conjunction with Figure 9. [0060] As represented by block 222, the access terminal uses its transmitter to send one or more messages that include neighbor relationship information. Such a message can be sent to the entity that requested a report with neighbor information and, optionally, to some other entity. Typically, the access terminal will send its neighbor relationship information to an associated access point to allow the access point to learn from its neighbors. [0061] Here, the access terminal can identify neighbor relationship information that corresponds to a specific access point by identifying the neighbor relationship information that the access terminal was able to securely acquire from nearby cells while the terminal access point was within the coverage of that particular access point. Here, the determination of whether the access terminal is able to reliably acquire information from a nearby cell and/or whether the access terminal is within coverage of the access point can be based on specified signal acquisition criteria (e.g. , signal decoding error rate and/or minimum received signal strength). Thus, in other words measuring neighbor ratio information may comprise processing signals transmitted by at least one cell that the access terminal is capable of receiving while the access terminal is within the coverage of a serving cell. [0062] The access point receives the neighbor relationship message from the access terminal, as represented by block 224. Upon receiving this information, the access point updates its neighbor relationship table. [0063] As represented by block 226, the access point may exchange its neighbor relationship information with another network entity (or with other network entities). For example, as discussed in more detail below in conjunction with Figure 10, the access point can exchange neighbor relationship information with another access point via a direct interface (e.g., an Iur UTRAN interface or an X2 interface). E-UTRAN). [0064] Figure 4 shows sample operations that can be performed in conjunction with performing a measurement of neighbor relationship information. Advantageously, the techniques of Figure 4 allow an access terminal to perform neighbor ratio measurements without impacting other access terminal functions (e.g., other measurements, traffic, or higher priority functions), while at the same time mitigating the impact of energy consumption due to these measurements. Thus, these operations or other similar operations can be used in situations where it is only necessary for an access terminal (a UE, for example) to make the “best effort” for ANR operations. For example, the access endpoint can use the techniques in Figure 4 to read system information blocks (to acquire Layer 2 information) from a target detected cell in a way that impacts mobility behavior or endpoint alerting. of access. Therefore, in some respects a defined radio state may comprise a state during which the measurement of neighbor relationship information will not obstruct at least one specified operation of the access terminal (e.g., a measurement other than a neighbor relationship measurement). or an operation in which the access terminal sends traffic or receives traffic). [0065] As represented by block 402, the access terminal is configured to perform neighbor ratio measurements (as discussed here, for example). As represented by block 404, at some point in time after the access terminal is configured to perform neighbor ratio measurements, the access terminal determines that it is in a radio state that has been defined as one in which such measurements can be performed. made. In a UMTS implementation, for example, an access terminal can be configured to only measure neighbor relationship information when the access terminal is in any one of a set of UMTS radio states (i.e., control states). radio resources) that includes one or more of: IDLE state, CELL_PCH state, CELL_PCH state with DRX intervals, URA_PCH state, or CELL_FACH state. [0066] As represented by block 406, as a result of the determination of block 404, the access terminal performs one or more measurements of neighbor relationship information. Thus, based on the signals received from a given cell, the access terminal can acquire, for example, one or more of: a cell identifier, a CGI, a PLMN identifier, a tracking area code (TAC), a location area code (LAC), a routing area code (RAC), reference signal information (an identifier associated with a pilot signal, for example), a signal quality measure (Ec/Io, RSCP , for example) or other information. The access terminal may continue to take measurements until it receives an indication that the access terminal is no longer in the defined radio state, unless measurements are terminated earlier for some other reason (e.g. some other condition is not is more satisfied or measurements are complete). [0067] Figure 5 shows sample operations that can be performed in conjunction with using a threshold to perform a neighbor relationship information measurement. For example, an access terminal (a UE, for example) may be allowed to register detected cells if a threshold for registering relations between neighbors is satisfied (and other conditions are satisfied, if applicable). [0068] As represented by block 502, an access terminal maintains at least one threshold for neighbor ratio measurements. In some cases, the access endpoint is configured with the threshold. For example, a network entity (an access point or MDT server, for example) can send the boundary information to the access terminal. In some cases, the boundary is an internal boundary of the access endpoint. [0069] As represented by block 504, in some cases an access terminal maintains a different threshold for handover measurements. Consequently, it should be understood that a threshold for handover-related measurements may be similar to a threshold for neighbor-relation-related measurements (eg, both thresholds may correspond to the same type of measurement). In fact, in some cases the threshold value can be the same, so a single threshold can be used in both operations. Typically, however, these operations will use thresholds with different values, and the thresholds may correspond to different measures of signal quality or strength (eg, Ec/Io versus some other measure of signal quality). [0070] As represented by block 506, at some point in time the access terminal receives a signal from at least one cell nearby. For example, the access terminal may receive a reference signal from a cell, or the access terminal may receive a signal that carries system information to the cell. As represented by block 508, the access terminal compares this received signal with the threshold. [0071] As represented by block 510, based on the comparison of block 508, the access terminal determines whether to perform a neighbor relationship information measurement. For example, if the magnitude of the received signal is greater than or equal to the threshold, the access terminal may record the system information received from the cell or cells that generated the signal from block 506. [0072] Figure 6 shows sample operations that can be performed in case an access terminal does not immediately report neighbor relationship information. For example, the access terminal (eg a UE) can store any records that have not been retrieved by a network entity (an MDT server or an access point, for example). [0073] As represented by block 602, at some point in time, the access terminal acquires neighbor relationship information. As discussed herein, for example, the access terminal receives signals from nearby cells and extracts appropriate neighbor information (such as identifiers, etc.) from those signals. [0074] As represented by block 604, under certain conditions the access terminal determines that the neighbor relationship information will not be reported immediately to a network entity. For example, the access terminal can delay the report until a certain condition is satisfied (as in Figure 4, for example) or the access terminal can keep the information until the network entity requests the information (as in Figures 7 and 8, for example). [0075] As represented by block 606, the access terminal stores the neighbor relationship information as a result of the determination of block 604. For example, the access terminal may keep the information in a memory component (which comprises a memory device). memory, such as RAM or FLASH memory, for example) for retrieval at a later point in time. [0076] As represented by block 608, the access terminal identifies a condition that triggers the reporting of stored neighbor relationship information. Such a reporting condition may be specified, for example, by a command received from a network entity (the MDT server or access point referred to above). As mentioned above, this trigger can correspond to a specified condition (as in Figure 4, for example) or to a request for information (as in Figures 7 and 8, for example). As represented by block 610, upon identifying the condition of block 608, the access terminal sends a message to report the stored neighbor relationship information (to the MDT server or access point, for example). In some cases, this message indicates at least once that the access terminal acquired the neighbor relationship information. In some cases, the message indicates that a part of the neighbor relationship information is not valid. [0077] Figures 7 and 8 show sample operations that can be performed in an implementation in which the access terminal provides an indication that it has neighbor relationship information available for retrieval. For example, an access terminal (a UE, for example) can indicate the availability of a neighbor relation register by including a one-bit indicator in a message sent by the access terminal (e.g., COMPLETE_RRC_CONNECTION, CELL UPDATE, UPDATE OF URA or MEASUREMENT REPORT). The network (e.g. an MDT server or access point) can then determine whether to retrieve the neighbor relationship record based on this indicator (e.g. when the UE is in the CELL_DCH state or the CELL_FAC state). [0078] Figure 7 describes sample operations that can be performed on an access terminal. As represented by block 702, the access terminal acquires neighbor relationship information and stores the information as described herein. [0079] As represented by block 702, the access terminal sends a message indicating that neighbor relationship information is available for retrieval. For example, the access terminal may send an explicit indication of this condition to its server access point. The block 704 message may comprise a dedicated message (i.e., a message that is only used to send the indication) or a non-dedicated message (a message that is used to send other information as well as the indication). The message can take many forms, such as, for example, a radio resource control (RRC) message. [0080] In some cases, the access terminal may determine that not all neighbor relationship information can be sent in a single report message. Accordingly, the access terminal may send another message indicating that additional neighbor relationship information is available for retrieval. This other message may be a message dedicated to this purpose or another type of message (another RRC message, for example) that includes an explicit indication that additional neighbor relationship information is available for retrieval. [0081] As represented by block 706, the access terminal receives a request for neighbor relationship information in response to the message from block 704. For example, the access terminal may receive a message that includes the request from its access point server. As represented by block 708, the access terminal sends the neighbor relationship information (to the server access point, for example) upon receipt of the request from block 706. Thus, the access terminal can report, for example, a or more of: a cell identifier, a CGI, a PLMN identifier, a tracking area code (TAC), a location area code (LAC), a routing area code (RAC), a measurement of signal quality or other information. [0082] Figure 8 describes sample operations that can be performed on a network entity (an MDT server or an access point, for example). As represented by block 802, the network entity receives a message indicating that neighbor relationship information is available for retrieval from an access terminal. As represented by block 804, upon receipt of the message from block 802, the network entity sends a message (an RRC message, for example) that requests neighbor relationship information. In some cases, this message may only request the part of the neighbor relationship information that is available for retrieval. As represented by block 806, the network entity receives the neighbor relationship information in response to the block 804 message (via an RRC message, for example). [0083] As mentioned above, in some cases not all neighbor relationship information acquired by the access terminal can be sent in a single report message. Consequently, the network entity may receive another message indicating that additional neighbor relationship information is available for retrieval. Consequently, the network entity may send another request for additional neighbor relationship information as a result of receiving this additional message. [0084] Figure 9 shows sample operations that can be performed in conjunction with reporting neighbor relationship information. Advantageously, the techniques of Figure 9 allow an access terminal to send neighbor reaction reports without impacting other access terminal functions (e.g. other reports, traffic, measurements or higher priority functions), while mitigating time the impact on energy consumption due to these reports. Thus, these operations or other similar operations can be used in situations where it is only necessary for an access terminal (a UE, for example) to make the “best effort” for ANR operations. For example, the access terminal can use the techniques of Figure 9 to report neighbor relationship information in a way that does not impact mobility behavior or the access terminal alert. [0085] As represented by block 902, the access terminal acquires neighbor relationship information that will be reported. As represented by block 904, at some point in time after the acquisition of neighbor relationship information, the access terminal determines that it is in a defined radio state for which reporting of neighbor relationship information is permitted. For example, the access terminal may be allowed to report only during a radio state in which the access terminal is configured to send other signals (eg, signaling) on an uplink channel. As a specific example, in a UMTS implementation, an access terminal can be configured to report neighbor relationship information when the access terminal is in a CELL_DCH state or in a CELL_FACH state, but not when the access terminal is in a state IDLE, in a CELL_PCH state or in a URA_PCH state. Advantageously, the transmission of a neighbor report report during such a state can result in only a small incremental increase in the energy consumption of the access terminal since the radio (transmitter, for example) of the access terminal can already be tuned during the CELL_DCH state or the CELL_FACH state. In contrast, if the report was sent instead during an IDLE state, a CELL_PCH state, or a URA_PCH state, the reports would result in higher power consumption associated with tuning the radio (transmitter, for example). [0086] As represented by block 906, as a result of the determination of block 904, the access terminal sends a message to report neighbor relationship information. In some implementations, the access terminal schedules the transmission of this message so that it does not occur simultaneously with at least one other operation of the access terminal. Here, the access terminal can identify the time during which the reporting of neighbor relationship information will not obstruct at least one specified operation of the access terminal and then schedule the sending of the message according to the identified time. The access terminal may continue reporting operations until it receives an indication that the access terminal is no longer in the defined radio state, unless reporting is terminated earlier for some other reason (e.g., some other condition is not is more satisfied or the report is complete). [0087] Figure 10 shows sample operations that can be performed in conjunction with the exchange of neighbor relationship information through a direct interface between two access points. As represented by block 1002, at some point in time a first access point establishes a direct interface (e.g., an Iur UTRAN interface or an X2 E-UTRAN interface) with a second access point. For example, network technicians can configure the access points (for example, by triggering the corresponding controllers of the access points) to establish an Iur interface or an X2 interface. In some cases, access points can dynamically establish an X2 interface between them (it is unlikely, however, that an Iur interface would be established in this way). [0088] As represented by block 1004, the first access point receives a neighbor report report from an access terminal. This report will identify at least one cell as neighboring a target cell. For example, the access terminal's serving cell can be considered the target cell for which the access terminal is identifying potential neighboring cells. For this, the neighbor relationship report will include identification information for each target cell and each neighbor cell. This identifying information will include, at a minimum, one cell identifier for each cell. This identifying information may also include, for each identified cell, one or more of: a PSC, a TAC, a PLMN identifier, or some other neighbor relationship information (as described herein, for example). In some respects, the neighbor relationship report is considered to comprise ANR information since the information did not originate from an operator. In addition, due to the origin of the information, there may not be a high level of confidence that this information is accurate. For example, an access terminal might report a cell as being a neighbor of a target cell in situations where this relationship would not be recognized by the network (the reported neighbor cell is on a different network). Consequently, when the first access point exchanges neighbor relationship information of the report with another entity, the first access point can provide an indication of the origin of the neighbor relationship information so that the receiving entity can take this origin into account when updates its neighbor relationship table. [0089] As represented by block 1006, the first access point generates a message that includes neighbor relationship information from the received report. In some cases, the first access point simply embeds the received report into the message. In other cases, the first access point extracts neighbor relationship information from the report and includes this extracted information in the message. In addition, the first access point can generate the message so that the message indicates the origin of the neighbor relationship information in the message. In some cases, the type of message generated at block 1006 may indicate that the neighbor relationship information in the message originates from the access terminal. In some cases, the contents of the message (for example, an indication included in the message) may indicate that the neighbor relationship information in the message originates from the access terminal. In some cases, the message may explicitly indicate the origin of the neighbor relationship information (the message includes an identifier of the access terminal, for example). [0090] As represented by block 1008, the first access point sends the neighbor relationship message to the second access point via the direct interface. For example, the first access point can perform a direct transfer of RNSAP information in order to send an ANR report to the second access point. Consequently, the second access point (and potentially any other entities that subsequently acquire this neighbor relationship information) may receive an indication of the origin of the neighbor relationship information (which indicates that the information is not from a fully worthy source). confidence). [0091] As represented by block 1010, the second access point updates its neighbor relationship table based on the neighbor relationship message in block 1008. Given the source of neighbor relationship information in the message, however, the second access point may take other information into account when it uses neighbor relationship information in the message. For example, the second access point can use this report and additional neighbor reports (which have also reported neighbors of the target cell) in order to determine whether the reported neighbor cell is indeed a neighbor of the target cell. [0092] For purposes of explanation, additional details regarding neighbor relationship management as taught here are described in the context of Figures 11 and 12. Briefly, Figure 11 shows an example of how neighbor relationship information can be exchanged between entities. such as RAN entities, OAM and an MDT server, while Figure 12 shows an example of how neighbor relationship information can be exchanged between network entities such as RANs, core network entities (CN) and a server. of MDT. It should be understood, however, that all entities of Figures 11 and 12 can be used in a given network. [0093] Figure 11 shows an example of an automatic network reconfiguration architecture that uses Operations, Administration and Management (OAM) functions for systems management. In one example, an UE Trigger Test Minimization (MDT) Server appears at the top of the hierarchy and sends messages to various entities. Then, in an example, a Global OAM role is used in total systems management and exchanges messages with individual OAM roles for Radio Access Network (RAN) management. In one example, each RAN oversees radio access for multiple cells in the wireless system. In general, each RAN serves as an access point for a plurality of cells, which in turn connect to a plurality of UEs. [0094] Figure 12 shows an example of automatic network reconfiguration architecture, which uses CN functions for systems management. In one aspect, a UE MDT server appears at the top of the hierarchy and receives messages from the CN. In one example, a plurality of CNs exchange messages with each other and with a plurality of RANs. In general, each RAN serves as an access point for a plurality of cells, which in turn connect to a plurality of UEs. [0095] The interconnection lines of Figures 11 and 12 generically represent interfaces that can be used between the various entities. In Figure 11, for example, interface A may comprise an RRC interface, interface B may comprise an OMA-DM interface, interface C may comprise an Iub interface, interface D may comprise an Iur or X2 interface, interface E may comprise an Itf-S interface and the G interface may comprise an Itf-N interface. In Figure 12 , the J interface may comprise an Iu or S1 interface and the K interface may comprise an S3 or Gn interface. [0096] In Figures 11 and 12, individual nodes can be part of different radio access technology (RAT) architectures without affecting the scope or inventive concept of the present description. With respect to Figures 11 and 12, those skilled in the art would understand that the interface names shown are examples only and should not be interpreted as restrictive, exclusive, or comprehensive. Some of the interface names may be substituted, while other interface names may be added without affecting the scope or inventive concept of the present description. [0097] In one respect, a UE has several functions in this architecture. For example, the UE receives commands or detects pilots or reads Layer 2 or specific cell broadcasts or any detected cells. In one example, specific cells can be identified via pilot identity ranges (e.g. Primary Sync Code (PSC), Physical Cell Identity (PCI)) or via Layer 2 identities (e.g. Cell, Global Cell Identity (GCI)). Such commands may be configured via interface A or B. In one example, commands via Interface A may be unicast (e.g., RRC Measurement Setup message) or acquired by the cell broadcast UE (e.g., DRR System Information). In one respect, commands through interface A may have to be obeyed by the UE either immediately or after a reasonable delay; or, upon the occurrence of some event (for example, the UE connects to the RAN, the UE makes some other report); or when the UE is idle (when other metering or traffic activities are not impeded, for example); or periodically (at or after established times). [0098] In another example, the UE measures the required quantities. For example, timing measurements can be taken by the UE on a number of occasions, such as immediately, just before the reporting requirement, at any intermediate time, or never. If the UE can choose when to make measurements, the UE can do so by considering: whether and when measurements can be made without impacting other measurements, traffic or higher priority functions; if and when the signal received from the cell(s) to be measured is strong enough to complete the measurements; if and when the signal received from the cell(s) to be measured exceeds the threshold(s) configured via the A or B interface, or internal UE limits if and when other conditions configured via the interface A or B are satisfied (e.g. geographic location of UE or cell, matching partial parameters like routing area identifier code (RAC), local area code (LAC), primary synchronization code (PSC), physical cell identity (PCI), global cell identity (GCI), Cell Identity, closed subscriber group (CSG), radio access technology (RAT) type, PLMN identity or identities, etc.); if and when metering opportunities have been configured on the UE (measurement intervals, for example); whether the UE is equipped with capabilities (eg dual antenna, dual receive strings) to avoid disruption of other reporting/measurement/traffic activities; if and when incremental consumption can be reduced. Note that in cases where some or all of the required quantities are already available in the UE, the UE may decide not to re-measure them. For example, some such quantities may be displayed because they were measured before or because they were provided in another way to the UE, for example, the UE is connected in cell 1 with PSC1 and the cell control RNC configures the UE with the identity from cell 1; the latter is connected in cell 2 and the UE is requested to provide the Cell Identity corresponding to the neighbor PSC1 of cell 2; the UE may choose to provide the identity of cell 1 without remeasuring it. [0099] In another example, a UE provides reports of measured and derived quantities. In one respect, the report can be through existing messages (such as RRC Measurement Report Message, Random Access Channel (RACH) Measurements in Information Element (IE) of various functions) or through of new messages. Reports can be sent on the same interface the configuration arrived from, or on different interfaces, or both (eg configuration on interface A, report on interface B). Reports can contain detected or read amounts of cells (e.g. Cell Identity, CGI, LAC, RAC, TAC, multiple PLMNs, CSG Division) or derived amounts (e.g. “PSC yes/no matched Cell Identity provided", "UE is not a member of the CSG cell"), signal quality measurements (e.g. common pilot channel (CPICH) of received signal code power (RSCP), Ec/Io of CPICH (density ratio interference noise/chip power)). In one example, the reports may be incomplete (e.g. Cell Identity is reported but not the CSG Division) and the UE may indicate the quantities it failed to report as well as the reasons (e.g. “no lead time”). read", "signal not strong enough to be read", "information not present"). In another example, reports can contain the aforementioned quantities for zero, one, or multiple cells. In another example, the reports contain the identity or other characterization parameter (e.g. Cell Identity, CGI, LAC, RAC, TAC, miscellaneous PLMN, CSG split, signal quality, causes why the information was yes/no registered) for the serving cell(s). In another aspect, reports may or may not be immediate. In case the reports are not immediate, it is possible that the UE identifies the moment when the measurements were carried out or omits quantities whose contents are not valid. In the case of omissions, the UE may, implicitly or explicitly (eg “field xxx contains invalid information”), indicate the omissions. In another aspect, the UE may additionally indicate, in a message, whether additional information is available for retrieval via Interface A or B, at which the RAN/MDT Server may request (a part of) this additional information. In the report, the UE can capture times when other activities (e.g. traffic, measurements) are not affected or when incremental battery usage is reduced (e.g. CÉLULA_DCH (dedicated channel), CÉLULA_FACH (direct access channel ), etc.). Note that UE reports may contain some (or all) quantities that were acquired before the UE received the report command. It depends on the implementation of the UE whether such reports are appropriate. For example, such previously acquired quantities may have been obtained due to the UE's autonomous measurement behavior or due to measurements triggered by previous configurations received by the UE from the same or another cell/RAN/MDT Server, etc. or due to previous UE activity (eg connection to a neighboring cell). [00100] In one respect, a RAN has several functions in this architecture. For example, the RAN can configure the UEs to report amounts from neighboring cells, as explained earlier, or to receive data collected or from the serving neighbor cell. For example, the RAN can configure its OAM to report data from neighboring cells or to accept data collected from neighboring cells or data from controlled cells. For example, the RAN can configure its CN (Nucleus Network) to report data from neighboring cells or receive data from collected neighboring cells or data from controlled cells. For example, the RAN can configure its cells (NodesB, for example) to report cell data or qualities. In one respect, such a configuration, especially for the CN, may be transparent to the particular partner node through that interface (eg, transparent to the CN through the RAN Information Management (RIM) procedure). In one aspect, in the case of transparent configuration, the node on which the information is transparent can be provided with the identity of the RAN node to which the information is destined. In cases where the immediate interface partner for which the configuration is transparent is not trusted, the source RAN node can encrypt the configuration command. [00101] In another example, the command requesting neighbor cell data may contain: the pilot identities (eg PCIs, PSCs,) or range of pilots (which includes any of them) whose neighbor cell data is requested; the specific neighbor cell data to be requested (e.g. Cell Identity, Cell Identity, UTRAN Cell Identifier (UC-ID), CGI); other qualifying quantities from neighboring cells (eg CSG ID, PLMN, LAC, RAC, TAC, etc.); cell signal quality, if applicable (e.g., Ec/Io of CPICH when the configuration is sent to the UE, transmit power); neighboring cells of neighboring cells; the identity of the RAN node controlling a specific cell and the form of such identity, e.g. logic (e.g. RNC-ID + RAC + PLMN, eNB ID + TAC + PLMN) and transport (e.g. IP address + door); the identity of cells around which neighboring cell information is needed, e.g. Cell Identity + PLMN + RAC, or CGI, etc.; configuration characteristics of neighboring cells, e.g. whether the control RAN node accepts a direct interface or not, whether the control RAN Node can be subject to commands/reception of notifications (e.g. command to start/shutdown/ reduce power/increase power/adjust antennas/capacity to receive specific self-organizing network (SON) messages, etc.), or whether the control RAN node can be a generator of output commands/sending notifications (e.g. , notification and to start/off/decrease power/increase power/adjust antennas/ability to receive specific SON messages, etc.). [00102] In another example, the command that provides data from neighboring cells contains the pilot identities of controlled or neighboring cells; the data of controlled cells or specific neighboring cells (Cell Identity, eg Cell Identity, UC-ID, CGI); other qualifying quantities from neighboring cells (eg CSG ID, PLMN, LAC, RAC, TAC, etc.); cell signal quality, if applicable (e.g. Ec/Io of CPICH when configuration is sent to UE, transmit power); neighboring cells of neighboring cells; the identity of the RAN node that controls a neighboring cell or cells, and the form of such identities (e.g. logic (RNC-ID + RAC + PLMN, eNB-id + TAC + PLMN), transport (IP address + port) ). In one aspect, for each set of neighbor cells, the identity of cells whose neighbor cells are the source of specific information (e.g., UE, manual configuration, network listener module(s), trust information particular (qualitative or quantities); cell configuration characteristics (e.g. whether the control RAN node accepts a direct interface or not; or whether the control RAN node may be subject to incoming commands/reception of notifications (e.g. start/shutdown command /reduce power/increase power/adjust antennas/capacity to receive specific SON messages, etc.)); or whether the control RAN node can be the generator of output commands/sending notifications (e.g. notification and to start/turn off/reduce power/increase power/adjust antennas/ability to receive specific SON messages, etc.) . [00103] In another aspect, the RAN may report to the OAM/CN/UE some or all of the requested neighboring/controlled cell information shown above. Such a report, especially for the CN, can be transparent to the particular partner node through that interface (transparent to the CN through the RIM procedure, for example). In case of transparent reporting, the node (OAM/CN/UE) for which the information is transparent can be provided with the identity of the RAN node for which the information is intended. In cases where the immediate interface partner (UE, for example) to which the report is transparent is not trusted, the originating RAN node can encrypt the report. In one example, the RAN may also report that certain configured information has been determined to be invalid, for example, when the RAN has conflicting information from different sources (for example, the UE reported that the Cell Identity is not the same as the configured one). by OAM). If this is the case, the RAN can identify how the non-validity of the information was determined, either explicitly (eg, cause values) or through transparent methods (eg, plaintext string). [00104] In another aspect, the RAN can receive a report or a configuration that contains the same type of information described above. The RAN can use this information to configure its neighbor list to be used for relevant functions (e.g. performing broadcast on system information block 11 (SIBI/11bis), which configures UE measurements in connected mode, etc. .) or double-checking the identity of neighboring cells for various reasons, for example, periodic checking or Invalid or Missing or Expired or Changed cell data for neighboring and controlled cells. [00105] In another aspect, the OAM can be an Operations, Administration and Provisioning entity for UTRA, E-UTRA, GSM, CDMA2000 or another RAT, for example. In one example, the OAM can query its RAN nodes according to the configuration messages detailed in the RAN function above. For example, the OAM can (transparently or not to intermediate nodes) pass configuration requests it received from the RAN, addressed to another RAN, or the OAM can pass such information directly to the RAN, through a peer. OAM, or through the global OAM. In one aspect, the identification of target RAN nodes can be explained in the RAN function described above. The OAM may also identify the originating RAN node of particular configuration requests and may configure the MDT server to collect and/or report relevant/missing/unverified pieces of cell information (e.g. cell identities, broadcasts, other quantities, etc., as detailed in the RAN functions described above). [00106] In another aspect, OAM can configure peer OAM nodes or Global OAM with request to report detailed cell information in the RAN functions described above. [00107] In another aspect, the OAM may report aggregated information to other OAM nodes, the Global OAM, its controlled RAN nodes, or its OAM peer nodes. OAM may report aggregated or information specific to individual configuration requests received from RAN/OAM/OAM Global or may provide some or all of the cell information it may deem relevant. Where relevant, the OAM may omit information and may provide explicit or implicit reasons why specific cell information has been omitted. The OAM can (transparently or not to intermediate nodes) pass reports it has received from the RAN, addressed to another RAN. The OAM can pass this information directly to the RAN, through an OAM peer, or through the OAM Global. In one example, the identification of target RAN nodes can be explained in the RAN functions described above. The OAM can also identify the RAN node from which particular reporting requests originate. [00108] In another aspect, OAM can perform aggregation. OAM can collect information from various sources (OAM peer, Global OAM, MDT Server, RAN, manual configuration) to aggregate configuration from neighboring cells. In the event of aggregated information from multiple conflicting sources, OAM may notify a human operator or OAM Global, or an error collection entity (e.g., an error log file, server, etc.), of the conflict or attempt to solve it. Conflict resolution between data can be based on probabilistic computation about the source that is likely to be the most correct. [00109] In another aspect, the CN (Core Network) can be a GPRS server support node (SGSN), a mobile switching center (MSC), a mobility management entity (MME) or another core network element of RAT. CN roles are very similar to the OAM roles described earlier. In one example, the CN can query its RAN nodes according to the configuration messages detailed earlier in the RAN functions. The CN can (transparently or not to intermediate nodes) pass configuration requests it received from the RAN, addressed to another RAN. The CN can pass this information directly to the RAN, through the CN pair that controls the target RAN. Identification of target RAN nodes can be as explained earlier in RAN functions. The CN can also identify the RAN node from which particular configuration requests (for example, transparent transmission in the RIM procedure) originate. The CN can configure CN peer nodes to report cell information, as detailed earlier in the RAN functions. [00110] In another example, the CN may report aggregated information to other CN nodes or their controlled RAN nodes. The CN may report aggregated or information specific to individual configuration requests received from the RAN/CN, or may provide some or all of the cell information as it deems relevant. Where relevant, the CN may omit information and may provide explicit or implicit reasons why specific cell information was omitted. The CN can (transparently or not to intermediate nodes) pass reports it has received from the RAN, addressed to another RAN. The CN can pass this information directly to the RAN, through a CN pair. Identification of target RAN nodes can be as explained earlier in RAN functions. The CN can also identify the originating RAN node of private reporting requests (eg transparent transmission in the RIM procedure). [00111] In another example, the CN can collect information from several sources (CN pair, RAN, manual configuration) to aggregate configuration from neighboring cells. When aggregated information from multiple sources conflict, the CN may notify a human operator or an error collection entity (eg, an error log file, server, etc.) of the conflict or attempt to resolve it. Data conflict resolution can be based on probabilistic computation about the source that is likely to be the most correct. [00112] In another aspect, a Global OAM (gOAM) can be intra-RAT or inter-RAT with various functions. For example, gOAM can query its OAM nodes according to the configuration messages detailed earlier in the RAN functions. gOAM can (transparently or not to intermediate nodes) pass configuration requests it has received from the OAM, addressed to another RAN (through another OAM). Identification of target RAN nodes can be as explained earlier in RAN functions. gOAM can also identify the originating RAN node for particular configuration requests. gOAM can configure the MDT server to collect and/or report relevant, missing or unverified pieces of cell information (e.g. neighbors, cell identities, broadcasts, other quantities, etc.) UE and RAN. [00113] In another example, gOAM may report aggregated information to its OAM nodes. gOAM may report aggregated or information specific to individual configuration requests received from the OAM/RAN or may provide some or all of the cell information it may deem relevant. Where relevant, gOAM may omit information and may provide explicit or implicit reasons why specific cell information has been omitted. The gOAM can (transparently or not to intermediary nodes) pass reports it has received from the RAN, addressed to another RAN. Identification of target RAN nodes can be as explained earlier in RAN functions. gOAM can also identify the RAN node from which specific reporting requests originate. [00114] In another example, gOAM can collect information from OAM nodes to aggregate configuration from neighboring cells. When aggregated information from multiple sources conflict, the CN may notify a human operator or an error collection entity (such as an error log file, server, etc.) of the conflict or attempt to resolve the conflict. Data conflict resolution can be based on probabilistic computation about the source that is likely to be the most correct. [00115] In another aspect, an MDT Server can be an Open Mobile Alliance Device Management Server (OAM DM), which corresponds to UEs in OAM DM clients, with various roles. [00116] For example, MDTs can configure UEs to collect cell information as detailed earlier in the UE and RAN functions. The UE may or may not report all information, as detailed earlier in the UE and RAN functions. MDT can configure UEs to only collect specific information (such as Cell Identity, PLMN, CSG ID, etc.) or according to specific restrictions (such as geographic, PLMN, LAC, RAC, RF , etc.), possibly set implicitly or explicitly by OAM or gOAM. [00117] In another example, MDTs can report to the OAM or gOAM information pertinent to the OAM or gOAM request (cell identities and neighboring cell parameters of specific cells requested by the OAM or gOAM, for example). OAM or gOAM requests can be in a form similar to the settings detailed earlier in the UE and RAN functions. [00118] In another example, MDTs can collect information from UEs to aggregate configuration from neighboring cells. When aggregated information from multiple sources conflict, MDTs can notify a human operator or an error collection entity (such as an error log file, server, etc.) of the conflict or attempt to resolve it. Data conflict resolution can be based on probabilistic computation about the source that is likely to be the most correct. [00119] In another aspect, cells can be entities of cells under the same physical apparatus (eg, NodeB, Base Station Transceiver (BST)). Note that in some cases the cells and their control RANs are co-located (e.g. NodeB+, HNB, eNB), in which case the interface may be a proprietary or a direct hardware interface (e.g. bus, pins direct, etc.). [00120] The cell phone (hereinafter Cell A) has many functions. For example, Cell A may respond to requests for cellular information from the RAN. The configuration of such reports can be in a logical form similar to that detailed above for interface A. [00121] In response to a RAN request for cellular information, Cell A can perform measurements very similar to those detailed above, with very similar considerations regarding timing and other conditions. Cell A can delegate such measurements to a separate module similar to the concept of “Network Listening Module”. In addition, Cell A can choose to perform measurements under low/no traffic conditions or when no UEs are connected, or when large enough measurement intervals (eg, discontinuous reception (DRX)) are available. [00122] In one respect, the configuration and reporting taught here can be performed with newly introduced messages or part of existing messages on all interfaces, for example, but not limited to any messages that correspond to: RRC Connection Management, Radio Carrier control procedures, RRC connection mobility procedures, RRC Measurement procedures, etc.; RANAPS/S1AP Elementary Procedures, RANAP/S1AP RAB Management, RANAP/S1AP Interface Management, RANAP/S1AP Relocation/Handover, RANAP/S1AP Context Management, Alert/Tracking/UE Context/Location RANAP/S1AP management, Dedicated connection RANAP/S1AP, Configuration/Transfer, RANAP/S1AP information exchange, etc.; NBAP Elementary Procedures, NBAP Common Procedures, NBAP Dedicated Procedures, etc.; RNSAP Elementary Procedures, RNSAP Basic Mobility Procedures, RNSAP Dedicated Procedures, RNSAP Common Transport Channel Procedures, RNSAP Global Procedures, etc. [00123] Those skilled in the art would understand that the list presented above is not exclusive or restrictive. Other message examples may be added or some of the enumerated message examples may be deleted without affecting the scope or inventive concept of the present description. [00124] In view of the above, it can be seen that neighbor relationship information can be acquired and distributed throughout a system in several ways. For additional purposes of explanation, several examples of such acquisition and distribution follow. [00125] Radio Access Network (RAN) nodes, e.g., a radio network controller (RNC) cell, NodeB, Home Node B (HNB), etc., can acquire neighbor topology and other information by reading network parameters from neighboring cells. For example, reading network parameters may be obtained via a broadcast or unicast message and may be transmitted over the air or over a return transport connection. For example, a return transport connection could be a connection between a RAN node and the core network (CN) or other RAN nodes. In another example, the return transport connection could be a connection between a RAN node and a Source NodeB Gateway (HNB-GW) or Source NodeB Management System (HMS) or other hub nodes. [00126] In another aspect, the reading of such network parameters can be obtained by several means: (1) through a module inside a RAN node ("network listening module"); (2) through UE reports capable of reporting the required network parameters; (3) by exchanging information with already discovered neighboring nodes; (4) through configuration by a centralized node, for example, HNB-GW or HMS. [00127] In another aspect, useful network parameters for network topology acquisition may include one or more of the following: identity of neighboring cells; access rights information; path loss information; received signal quality indication; broadcast power information; list of neighbors of the cell whose broadcast information is acquired; cell load information; amount, number or proportion of dropped calls/UEs or in poor condition due to coverage issues; quantity, number or proportion of undesiredly transferred calls/UEs; degree of ping pong movement observed. [00128] In one example, some UEs are already able to report some of the above information, for example, support by UEs for acquiring System Information for inbound mobility purposes, or UEs supporting “ Trigger Test Minimization”, which allow the UE to report information to the network. In another aspect, a network takes advantage of such UEs. [00129] In another example, the exchange of the above network parameters can take place over the above-mentioned return transport connection, via messages, for example, multicast or unicast messages between neighboring RAN nodes. Such messages may be requested by the RAN node or transmitted as needed without prompting, for example when RF conditions, load conditions, coverage conditions or other conditions warrant it, periodically or randomly. In one example, such messages may be accompanied by counts (eg, per message or per parameter), which are incremented whenever the message or network parameter traverses a RAN node. In one example, RAN nodes may use counters to limit the number of messages or judge the relevance of information that is received, in terms of distance from the originating RAN node. In one example, such counters can be either incremented or can be proportional functions of path loss or other inter-RAN distance measures. [00130] Under one aspect, network parameters, if not already present in the messages, can be added. In one example, although it is not necessary for terminal RAN nodes to understand the content of messages, other intermediate nodes, e.g. UE, HNB-GW, CN, etc., can transfer the information transparently, i.e. without interpretation. of the message content. [00131] In one aspect, network parameters can be checked before being transferred. For example, a verification parameter can be used in the verification process. Those skilled in the art would understand that the verification parameter can be determined based on many factors, such as, but not limited to, application, usage, user choice, system configuration, etc., without limiting the scope or inventive concept of the present description. In another aspect, network parameters can be aggregated with each other before being transferred. [00132] In another aspect, the transfer of information between RAN nodes through the return transport channel can occur transparently or non-transparently through existing procedures, for example, Access Network Application Part Information Transfer (RANAP) or through new procedures. [00133] One purpose of exchanging information may be to allow RAN nodes to automate configuration of their network parameters, with reduced need or no need for explicit configuration of parameters or configurations such as: handover parameters (e.g. thresholds, trigger time, hysteresis, trigger event types); re-selection parameters (eg inter-search boundaries, individual cell shifts); acceptable load (eg number of UEs, connections, cellular transmission capacity, etc.); connection limits (eg transmission capacity, Quality of Service, etc.); transmission power; beam formation; and use of multiple carriers. [00134] Figure 13 shows various sample components (represented by corresponding blocks) that can be incorporated into nodes such as an access terminal 1302, an access point 1304 and a network entity 1306 (e.g. corresponding to the terminal gateway 102, access point 104, and network entity 108, respectively, of Figure 1) to perform network relationship-related operations taught herein. The components described can also be incorporated into other nodes in a communication system. For example, other nodes in a system may include components similar to those described for access terminal 1302 and access point 1304 to provide similar functionality. Furthermore, a given node may contain one or more of the components described. For example, an access terminal may contain multiple transceiver components that allow the access terminal to operate on multiple carriers and/or communicate using different technologies. [00135] As shown in Figure 13 , access terminal 1302 and access point 1304 each include one or more transceivers (represented by a transceiver 1308 and a transceiver 1310, respectively) for communicating with other nodes. Each transceiver 1308 includes a transmitter 1312 for sending signals (e.g., messages, reports, indications, neighbor relation information) and a receiver 1314 for receiving signals (e.g., messages, neighbor relation information, requests, indications, signals pilot, criteria, limits) and perform other operations related to taking measurements. Similarly, each transceiver 1310 includes a transmitter 1316 for sending signals (e.g., messages, prompts, indications, pilot signals, neighbor relationship information, criteria, thresholds) and a receiver 1318 for receiving signals (e.g., messages, reports, neighbor relationship information, requests, referrals). [00136] Access point 1304 and network entity 1306 each include one or more network interfaces (represented by a network interface 1320 and a network interface 1322, respectively) for communicating with other nodes (e.g., other network entities). For example, network interfaces 1320 and 1322 can be configured to communicate with one or more network entities over a wired or wireless return transport channel. In some respects, the 1320 and 1322 network interfaces may be implemented as a transceiver (e.g., which includes transmitter-receiver components) configured to support wired or wireless communication (e.g., receive reports, receive messages, receive relationship information neighbors, send messages, send criteria). [00137] Access terminal 1302, access point 1304 and network entity 1306 also include other components that can be used in conjunction with neighbor relationship related operations as taught herein. For example, access terminal 1302 includes a neighbor relationship controller 1324 to manage neighbor relationship (e.g., determining that an access terminal is in a defined radio state, determining if/how to perform a relationship information measurement of neighbors, compare the received signal with a threshold, acquire neighbor relationship information, determine that not all acquired neighbor relationship information can be sent, identify the time during which reporting of neighbor relationship information will not at least prevent a specified operation, determine if/how to report neighbor relationship information, determine which neighbor relationship information will not be reported immediately, identify a condition that triggers the reporting of stored neighbor relationship information) and provide other related functionality, as per here taught. Similarly, access point 1304 includes a neighbor relationship controller 1326 to manage relationships between neighbors and to provide other related functionality, as taught herein. In addition, the network entity 1306 includes a neighbor relationship controller 1328 to manage relationships between neighbors and to provide other related functionality, as taught herein. Access terminal 1302, access point 1304, and network entity 1306 include communication controllers 1330, 1332, and 1334, respectively, to control communications (e.g., send and receive messages, establish a direct interface between access points, generate neighbor relationship messages) and to provide other related functionality, as taught here. In addition, access terminal 1302, access point 1304, and network entity 1306 include memory components 1336, 1338, and 1340 (e.g., each including a memory device), respectively, for maintaining information (e.g., , neighbor relationship information, boundaries). [00138] For convenience, access terminal 1302 and access point 1304 are shown in Figure 13 as including components that can be used in the various examples described herein. In practice, the blocks shown may have different functionality in different implementations. [00139] The components of Figure 13 can be implemented in several ways. In some implementations, the components of Figure 13 may be implemented in one or more circuits, such as, for example, one or more processors and/or one or more ASICs (which may include one or more processors). Here, each circuit (eg, processor) may utilize and/or incorporate data memory to store information or executable code used by the circuit to provide this functionality. For example, some of the functionality represented by block 1308 and some or all of the functionality represented by blocks 1324, 1330 and 1326 may be implemented by a processor or processors of an access terminal and the data memory of the access terminal (e.g., by executing the appropriate code and/or configuring the processor components properly). Similarly, some of the functionality represented by block 1310 and some or all of the functionality represented by blocks 1320, 1326, 1332 and 1338 may be implemented by a processor or processors of an access point and the data memory of the access point ( for example, by executing the appropriate code and/or by properly configuring the processor components). In addition, some or all of the functionality represented by blocks 1322, 1328, 1334, and 1340 may be implemented by a processor or processors of a network interface and the data memory of the network interface (e.g., by executing the appropriate code and /or by properly configuring the processor components). [00140] The present teachings can be used in a multiple access wireless communication system that simultaneously supports communication to multiple wireless access terminals. Here, each terminal can communicate with one or more access points through transmissions on the forward and reverse links. The forward link (or downlink) refers to the communication link from the access points to the endpoints, and the reverse link (or uplink) refers to the communication link from the endpoints to the access points. This communication link may be established through a single-input, single-output system, a multiple-input, multiple-output (MIMO) system, or some other type of system. [00141] A MIMO system uses multiple (NT) transmit antennas and multiple (NR) receive antennas for data transmission. A MIMO channel formed by the NT transmit antennas and the NR receive antennas can be decomposed into NS independent channels, which are also referred to as spatial channels, where NS < min{NT, NR}. Each of the NS independent channels corresponds to a dimension. The MIMO system can provide improved performance (eg, higher transmission capacity and/or greater reliability) if the additional dimensionalities created by multiple transmit and receive antennas are utilized. [00142] A MIMO system can support time division duplexing (TDD) and frequency division duplexing (FDD). In a TDD system, transmissions on the forward and reverse links are in the same frequency region, so that the principle of reciprocity allows the estimation of the forward link channel from the reverse link channel. This allows the access point to extract transmission beamforming gain on the forward link when multiple antennas are available at the access point. [00143] Figure 14 shows a wireless device 1410 (eg, an access point) and a wireless device 1450 (eg, an access terminal) of a sample MIMO system 1400. At device 1410, traffic data for several data streams is provided from a data source 1412 to a transmit data processor (TX) 1414. Each data stream may then be transmitted through a respective transmit antenna. [00144] The TX data processor 1414 formats, encodes and interleaves the traffic data for each data stream based on a particular encoding scheme selected for that data stream in order to provide encoded data. The encoded data for each data stream can be multiplexed with pilot data using OFDM techniques. Pilot data is typically a known pattern of data that is processed in a known manner and can be used in the receiving system to estimate the channel response. The coded and pilot multiplexed data for each data stream is then modulated (i.e., symbol-mapped) based on a specific modulation scheme (e.g., BPSK, QSPK, M-PSK, or M-QAM) selected for that stream. data to provide modulation symbols. The data rate, encoding, and modulation for each data stream may be determined by instructions executed by the processor by a processor 1430. A data memory 1432 may store program code, data, and other information used by the processor 1430 or by others. 1410 device components. [00145] The modulation symbols for all data streams are then provided to a MIMO TX 1420 processor, which can process the modulation symbols as well (eg for OFDM). The TX MIMO processor 1420 then provides NT modulation symbol streams to NT transceivers (XCVR) 1422A to 1422T. In some respects, the TX 1420 MIMO processor applies beamforming weights to the symbols in the data streams and to the antenna from which the symbol is being transmitted. [00146] Each transceiver 1422 receives and processes a respective stream of symbols to provide one or more analog signals and also conditions (e.g., amplifies, filters, and upconverts) the analog signals to provide a modulated signal suitable for transmission over the channel MIMO. NT modulated signals from transceivers 1422A to 1422T are then transmitted from NT antennas 1424A to 1424T, respectively. [00147] At device 1450, transmitted modulated signals are received by NR antennas 1452A to 1452R and the signal received from each antenna 1452 is provided to a respective transceiver (XCVR) 1454A to 1454R. Each transceiver 1454 conditions (e.g., filters, amplifies, and downconverts) a respective received signal, digitizes the conditioned signal to provide samples, and also processes the samples to provide a corresponding "received" symbol stream. [00148] A receive data processor (RX) 1460 then receives and processes the NR received symbol streams from NR transceivers 1454 based on a particular receiver processing technique to provide NT "detected" symbol streams. The RX 1460 data processor then demodulates, deinterleaves and decodes each detected symbol stream to retrieve the traffic data for the data stream. Processing by the RX 1460 data processor is complementary to that performed by the TX 1420 MIMO processor and TX 1414 data processor in the 1410 device. [00149] A 1470 processor periodically determines which precoding matrix to use (discussed below). Processor 1470 formulates a reverse link message comprising an array index part and a rank value part. A data memory 1472 may store program code, data, and other information used by processor 1470 or other components of device 1450. [00150] The reverse link message can comprise different types of information regarding the communication link and/or the received data stream. The reverse link message is then processed by a TX data processor 1438, which also receives traffic data for various data streams from a data source 1436, modulated by a modulator 1480, conditioned by transceivers 1454A to 1454R, and transmitted back. to device 1410. [00151] At device 1410, modulated signals from device 1450 are received by antennas 1424, conditioned by transceivers 1422, demodulated by a demodulator (DEMOD) 1440, and processed by an RX data processor 1442 to extract the reverse link message transmitted by the device 1450. Processor 1430 then determines which precoding matrix to use to determine beamforming weights and then processes the extracted message. [00152] Figure 14 also shows that the communication components can include one or more components that perform network relationship control operations, as taught here. For example, a network relationship control component 1490 may cooperate with processor 1430 and/or other components of device 1410 to send/receive neighbor relationship information to/from another device (e.g., device 1450), as hereinbefore taught. Similarly, a network ratio control component 1492 may cooperate with processor 1470 and/or other components of device 1450 to send/receive network ratio information to/from another device (e.g., device 1410). It should be understood that, for each device 1410 and 1450, the functionality of two or more of the components described may be provided by a single component. For example, a single processing component may provide the functionality of the network ratio control component 1490 and the processor 1430 and a single processing component may provide the functionality of the network ratio control component 1492 and the processor 1470. [00153] The present teachings may be incorporated into various types of communication system and/or system components. In some respects, the present teachings may be used in a multiple access system capable of supporting communication with multiple users by sharing available system resources (e.g., by specifying one or more of bandwidth, transmission power, coding , interleaving, and so on). For example, the present teachings can be applied to any one or combination of the following technologies: Code Division Multiple Access (CDMA) systems, Multi-Carrier CDMA (MCCDMA), Broadband CDMA (W-CDMA), High Speed Packet Access (HSPA, HSPA+), Time Division Multiple Access (TDMA) systems, Frequency Division Multiple Access (FDMA) systems, Orthogonal Frequency Division Multiple Access (OFDMA) systems, or other multiple access techniques. A wireless communication system utilizing the present teachings can be designed to implement one or more standards, such as IS-95, cdma2000, IS-856, W-CDMA, TDSCDMA and other standards. A CDMA network may implement a radio technology such as Universal Terrestrial Radio Access (UTRA), cdma2000, or some other technology. UTRA includes W-CDMA and Low Chip Rate (LCR). cdma2000 technology covers IS-2000, IS-95 and IS-856 standards. A TDMA network may implement a radio technology such as the Global System for Mobile Communications (GSM). An OFDMA network can implement a radio technology such as Evolved UTRA (E-UTRA), IEEE 802.11, IEEE 802.16, IEEE 802.20, Flash-OFDM®, etc. UTRA, E—UTRA and GSM are part of the Universal Mobile Telecommunications System (UMTS). The present teachings can be implemented in a 3GPP Long Term Evolution (LTE) system, an Ultra Mobile Broadband (UMB) system and other types of system. LTE is a version of UMTS that uses E-UTRA. UTRA, E-UTRA, GSM, UMTS and LTE are described in documents from an organization called “3rd Generation Partnership Project” (3GPP), while cdma2000 is described in documents from an organization called “3rd Generation Partnership Project” 2” (3GPP2). While certain aspects of the description may be described using 3GPP terminology, it should be understood that the present teachings can be applied to 3GPP technology (e.g. Version 99, Version 5, Version 6, Version 7) as well as 3GPP2 technology (e.g. (e.g. 1xRTT, 1xEV-DO, Version 0, RevA, RevB) and other technologies. [00154] The present teachings may be incorporated into (eg implemented within or executed by) various apparatus (eg nodes). In some aspects, a node (e.g., a wireless node) implemented in accordance with the present teachings may comprise an access point or an access terminal. [00155] For example, an access terminal may comprise, be implemented as, or known as, user apparatus, subscriber station, subscriber unit, mobile station, mobile, mobile node, remote station, remote terminal, user terminal , user agent, user device, or some other terminology. In some implementations, an access terminal may comprise a cellular telephone, a cordless telephone, a session initiation protocol (SIP) telephone, a wireless local circuit station (WLL), a personal digital assistant (PDA), a handheld device that has wireless capability or some other suitable processing device connected to a wireless modem. Accordingly, one or more aspects taught herein may be incorporated into a telephone (e.g. a cell phone or smart phone), a computer (e.g. a laptop), a portable communication device, a portable computing device (for example, a personal data assistant), an entertainment device (for example, a music device, a video device, or a satellite radio), a global positioning system device, or any other suitable device that be configured to communicate over a wireless medium. [00156] An access point may comprise, be implemented as, or known as NodeB, eNodeB, Radio Network Controller (RNC), Base Station (BS), Radio Base Station (RBS), Base Station Controller (BSC) ), base transceiver station (BTS), transceiver function (TF), radio transceiver, radio router, basic service set (BSS), extended service set (ESS), macro cell, macro node, Source eNB ( HeNB), femto cell, femto node, pico node, or some other similar terminology. [00157] In some respects, a node (an access point, for example) may comprise an access node for a communication system. Such an access node may provide, for example, connectivity to or with a network (for example, a wide area network such as the Internet or a cellular network) via a wired or wireless communication link with the network. Therefore, an access node can allow another node (an access terminal, for example) to access a network or some other functionality. Furthermore, it should be understood that one or both nodes may be portable or, in some cases, relatively non-portable. [00158] It should also be understood that a wireless node is capable of transmitting and/or receiving information in a non-wireless manner (eg via a wired connection). Thus, a receiver and transmitter as discussed herein may include appropriate communication interface components (e.g., electrical or optical interface components) for communication over a non-wireless medium. [00159] A wireless node may communicate over one or more wireless communication links that are based on or otherwise support any suitable wireless communication technology. For example, in some ways a wireless node can join a network. In some respects, the network may comprise a local area network or a wide area network. A wireless device may support or otherwise utilize one or more of a variety of wireless communication technologies, protocols, or standards, such as those discussed here (e.g., CDMA, TDMA, OFDM, OFDMA, WiMAX, Wi-Fi, and so on). ). Similarly, a wireless node may support or use one or more of several corresponding modulation or multiplexing schemes. A wireless node may thus include appropriate components (eg, air interfaces) to establish and communicate over one or more wireless communication links using the above communication technologies or other wireless communication technologies. For example, a wireless node may comprise a wireless transceiver with associated transmitter and receiver components which may include various components (eg, signal generators and signal processors) that facilitate communication over a wireless medium. [00160] The present teachings can be used in a network that includes both macro-scale coverage (e.g., a large-area cellular network such as a 3G network, typically referred to as a macro-cellular network or WAN) and smaller-scale coverage (e.g., (e.g. a home-based or building-based network environment, typically referred to as a LAN). As an access terminal (AT) moves through such a network, the access terminal may be served at other locations by access points that provide coverage on a smaller scale. In some ways, lower coverage nodes can be used to provide incremental capacity growth, building coverage and different services (eg for a more robust user experience). [00161] A node (e.g., an access point) that provides coverage within a relatively large area may be referred to as a macro access point, while a node that provides coverage within a relatively small area (e.g., a home) ) can be referred to as femto access point. It should be understood that the present teachings are applicable to nodes associated with other types of coverage area. For example, a peak access point may provide coverage (eg coverage within an office building) within an area that is smaller than a macro area and larger than a femto area. In many applications, other terminology may be used to refer to a macro access point, a femto access point, or other access point type nodes. For example, an access point macro can be configured or referred to as an access node, base station, access point, eNodeB, cell macro, and so on. Furthermore, a femto access point can be configured or referred to as a Source NodeB, Source eNodeB, access point base station, femto cell, and so on. In some implementations, a node may be associated with (for example, referred to as or divided into) one or more cells or sectors. A cell or sector associated with a macro hotspot, femto hotspot, or pico hotspot may be referred to as a macro cell, femto cell, or pico cell, respectively. [00162] Access to a femto access point may be restricted in some ways. For example, a given femto access point can only provide certain services to certain access terminals. In arrangements with so-called restricted (or closed) access, a given access terminal can only be served by the macrocellular mobile network and a defined set of femto access points (e.g. femto access points residing within the residence of corresponding user). In some implementations, an access point may be constrained so as not to provide, for at least one node (eg, access terminal), at least one of: signaling, data access, logging, alerting, or service. [00163] In some respects, a femto restricted access point (which may also be referred to as a Closed Subscriber Group Home Node) is one that provides services to a restricted set of access terminals. This set can be temporarily or permanently extended as needed. In some respects, a Closed Subscriber Group (CSG) can be defined as the set of access points (eg, femto access points) that share a common access control access terminal list. [00164] Several relationships can thus exist between a given femto access point and a given access terminal. From an access terminal perspective, for example, an open femto access point may refer to a femto access point with unrestricted access (e.g., the femto access point allows access to any access terminal). A femto access point restricted can refer to a femto access point that is restricted in some way (eg restricted for access and/or registration). A Origin femto access point may refer to a femto access point which the access terminal is authorized to access and function (eg permanent access is provided to a defined set of one or more access terminals). A hybrid (or guest) femto access point may refer to a femto access point in which different access terminals are provided with different levels of service (e.g. some access terminals may be allowed partial access and/or temporary, while other access terminals may be allowed full access). An unknown femto hotspot (alien) can refer to a femto hotspot that the hotspot is not authorized to access or function, except perhaps in emergency situations (911 calls, for example). [00165] From the perspective of a femto restricted access point, a Home access terminal may refer to an access terminal that is authorized to access the femto restricted access point installed in the residence of the owner of that access terminal (usually the Home access terminal that has permanent access to that femto access point). A guest access terminal may refer to an access terminal with temporary access to the femto restricted access point (e.g. limited based on fatal time, usage time, bytes, total connections or some other criterion or criteria) . An unknown access terminal can refer to an access terminal that is not allowed to access the femto restricted access point, except perhaps in emergency situations, such as 911 calls (for example, an access terminal that does not have the credentials or permission to register with the femto restricted access point). [00166] For convenience, this description describes various functionality in the context of a femto access point. It should be understood, however, that a peak access point or other type of access point may provide the same or similar functionality for a larger coverage area. For example, a peak access point can be restricted, a peak Source access point can be defined for a given access terminal, and so on. [00167] The functionality described herein (e.g. with respect to one or more of the accompanying figures) may correspond, in some respects, to a similarly designated "device for" functionality in the appended claims. Referring to Figures 15-21, apparatus 1500, 1600, 1700, 1800, 1900, 2000 and 2100 are represented as a series of interrelated functional modules. Here, a radio status determining module 1502 may correspond, at least in some respects, to, for example, a controller, as discussed herein. A module for measuring neighbor ratio information 1504 may correspond, at least in some respects, to, for example, a receiver and/or a controller, as discussed herein. A module for receiving neighbor ratio measurement criterion 1506 may correspond, at least in some respects, to, for example, a receiver and/or a controller, as discussed herein. A module for determining if/how to take measurement 1508 may correspond, at least in some respects, to, for example, a controller, as discussed herein. A module for maintaining a neighbor ratio boundary 1602 may correspond, at least in some respects, to, for example, a memory component, as discussed herein. A module for receiving a signal 1604 may correspond, at least in some respects, to, for example, a receiver and/or a controller, as discussed herein. A module for comparing the received signal with threshold 1606 may correspond, at least in some respects, to, for example, a controller, as discussed herein. A module for determining whether measurement 1608 will be performed may correspond, at least in some respects, to, for example, a controller, as discussed herein. A module for receiving a neighbor ratio boundary 1610 may correspond, at least in some respects, to, for example, a receiver and/or a controller, as discussed herein. A module for maintaining a 1612 handover threshold may correspond, at least in some respects, to, for example, a memory component, as discussed here. A module for directly interfacing 1702 may correspond, at least in some respects, to, for example, a controller, as discussed here. A module for receiving a neighbor report report 1704 may correspond, at least in some respects, to, for example, a receiver and/or a controller, as discussed herein. A module for generating a neighbor relationship message 1706 may correspond, at least in some respects, to, for example, a controller, as discussed herein. A module for sending a neighbor relationship message 1708 may correspond, at least in some respects, to, for example, a transmitter and/or a controller, as discussed herein. A module for acquiring neighbor relationship information 1802 may correspond, at least in some respects, to, for example, a controller, as discussed herein. A module for sending a 1804 message may correspond, at least in some respects, to, for example, a transmitter and/or a controller, as discussed herein. A module for determining that not all neighbor relationship information can be sent 1806 may correspond, at least in some respects, to, for example, a controller, as discussed herein. A module for sending another 1808 message may correspond, at least in some respects, to, for example, a transmitter and/or a controller, as discussed herein. A module for receiving a request 1810 may correspond in at least some respects to, for example, a receiver and/or a controller, as discussed herein. A module for sending neighbor relationship information 1812 may correspond, at least in some respects, to, for example, a transmitter and/or a controller, as discussed herein. A module for receiving a 1902 message may correspond, at least in some respects, to, for example, a receiver and/or a controller, as discussed herein. A module for sending a 1904 message may correspond, at least in some respects, to, for example, a transmitter and/or a controller, as discussed herein. A module for receiving neighbor relationship information 1906 may correspond, at least in some respects, to, for example, a receiver and/or a controller, as discussed herein. A module for determining a radio status 2002 may correspond, at least in some respects, to, for example, a controller, as discussed herein. A module for sending a message 2004 may correspond, at least in some respects, to, for example, a transmitter and/or a controller, as discussed herein. A module for identifying a time 2006 may correspond, at least in some respects, to, for example, a controller, as discussed here. A module for receiving a neighbor ratio reporting criterion 2008 may correspond, at least in some respects, to, for example, a receiver and/or a controller, as discussed herein. A module for determining if/how to report neighbor relationship information 2010 may correspond, at least in some respects, to, for example, a controller, as discussed here. A module for acquiring neighbor relationship information 2102 may correspond, at least in some respects, to, for example, a controller, as discussed herein. A module for determining which neighbor relationship information will not be reported immediately 2104 may correspond, at least in some respects, to, for example, a controller, as discussed herein. A module for storing neighbor relationship information 2106 may correspond, at least in some respects, to, for example, a memory component, as discussed herein. A module for identifying a condition that triggers a 2108 report may correspond, at least in some respects, to, for example, a controller, as discussed here. A module for sending a message 2110 may correspond, at least in some respects, to, for example, a transmitter and/or a controller, as discussed herein. [00168] The functionality of the modules of Figures 15-21 can be implemented in several ways compatible with the present teachings. In some ways, the functionality of these modules can be implemented as one or more electrical components. In some respects, the functionality of these blocks can be implemented as a processing system that includes one or more processor components. In some respects, the functionality of these modules can be implemented using, for example, at least a part of one or more integrated circuits (an ASIC, for example). As discussed herein, an integrated circuit may include a processor, software, other associated components, or some combination thereof. The functionality of these modules can also be implemented in some other way, as taught here. In some respects, one or more of any dashed blocks 15-21 are optional. [00169] It should be understood that any reference to an element thereof by means of a designation such as “first”, “second” and so on does not generally limit the quantity or order of these elements. Rather, these designations may be used herein as a convenient method of distinguishing between two or more elements or occurrences of an element. Thus, a reference to the first and second elements does not mean that only two elements can be used there or that the first element must precede the second element in some way. Furthermore, unless otherwise stated, a set of elements may comprise one or more elements. Furthermore, terminology of the form "at least one of A, B, or C" or "one or more of A, B, or C" or "one at least one of the group consisting of A, B, and C" is used. in the description or claims means "A or B or C or any combination of these elements". [00170] Those skilled in the art would understand that information and signals can be represented using any of a number of different technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols and chips referred to throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof. . [00171] Those skilled in the art would also understand that the various illustrative logic blocks, modules, processors, means, circuits, and algorithm steps described in connection with the aspects described herein may be implemented as electronic hardware (e.g., a digital implementation, a analog implementation, or a combination of the two, which may be designed using source coding or some other technique), various forms of program or design code that incorporate instructions (which may be referred to here, for convenience, as "software" or “software module”) or combinations of both. To clearly illustrate this interchangeability of hardware and software, various components, blocks, modules, circuits, and illustrative steps have been described above generically in terms of their functionality. Whether such functionality is implemented as hardware or software depends on the particular application and the design limitations imposed on the system as a whole. Those skilled in the art can implement the described functionality in a variety of ways for each particular application, but such implementation decisions should not be interpreted as departing from the scope of the present description. [00172] The various illustrative logic blocks, modules and logic circuits described in connection with the aspects described herein may be implemented within or executed by an integrated circuit (IC), an access terminal or an access point. The IC may comprise a general-purpose processor, digital signal processor (DSP), application-specific integrated circuit (ASIC), field-programmable gate array (FPGA), or other programmable logic device, discrete gate, or transistor, discrete hardware components, electrical components, optical components, mechanical components, or any combination thereof designed to perform the functions described herein, and may execute code or instructions that are inside the IC, outside the IC, or both. A general purpose processor can be a microprocessor, but alternatively the processor can be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, for example, a DSP and microprocessor combination, a plurality of microprocessors, one or more microprocessors together with a DSP core, or any other such configuration. [00173] It should be understood that the specific order or hierarchy of steps in the processes described in an example of exemplary approaches. Based on design preferences, it should be understood that the specific order or hierarchy of steps in the processes can be rearranged while remaining within the scope of the present description. The attached method claims present elements of the various steps in a sample order and are not intended to be limited to the specific order or hierarchy presented. [00174] In one or more exemplary embodiments, the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, functions can be stored in or transmitted through one or more instructions or code on a computer-readable medium. Computer readable media include both computer storage media and communication media that include any medium that facilitates the transfer of a computer program from one place to another. Storage media can be any available media that can be accessed by a computer. By way of example, and not limitation, such computer readable media may comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that may be used to port or store desired program code in the form of instructions or data structures that can be accessed by a computer. Also, any connection is appropriately termed a computer-readable medium. For example, if the software is transmitted from a network site, server or other remote source using coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL) or wireless technologies such as infrared, radio and microwave , then coaxial cable, fiber optic cable, twisted pair, DSL or wireless technologies such as infrared, radio and microwave are included in the definition of medium. Disc (disk) and Disc (disc), as used herein, includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disc and blu-ray disc, where usually discs (disks) reproduce data magnetically, while discs (discs) reproduce data optically with lasers. Thus, in some respects the computer-readable medium may comprise a non-transient computer-readable medium (eg, tangible media). In addition, in some aspects the computer-readable medium may comprise transient computer-readable medium (eg, a signal). Combinations above must also be included within the scope of computer readable media. It is to be understood that a computer readable medium may be implemented in any suitable computer program product. [00175] The foregoing description of the described embodiments is provided to enable any person skilled in the art to manufacture or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein can be applied to other embodiments without departing from the inventive concept or scope of the description. Thus, the present description is not intended to be limited to the modalities shown here, but should receive the broadest scope compatible with the unpublished principles and aspects described herein.
权利要求:
Claims (15) [0001] 1. A method of capturing neighbor relationship information, comprising: determining (404) that an access terminal is operating in a first defined radio state that is one of a set of specified radio states; conducting (406) a measurement of neighbor relationship information as a result of determining that the access terminal is in the first defined radio state; further characterized by the fact that: determines that neighbor relationship information is not to be reported immediately to a network entity based on a determination that the access terminal is not in a second defined radio state for which reporting Neighbor relationship information is allowed; and sending a message to report the neighbor relationship information to the network entity based on a determination that the access terminal is in the second defined radio state. [0002] 2. Method according to claim 1, characterized in that the first defined radio state comprises a state during which the measurement of neighbor relationship information will not prevent at least one specified operation of the access terminal. [0003] 3. Method according to claim 2, characterized in that the at least one specified operation comprises at least one operation where the access terminal sends traffic or receives traffic. [0004] 4. Method according to claim 2, characterized in that the at least one specified operation comprises at least one operation where the access terminal conducts a measurement other than a neighbor ratio measurement. [0005] 5. Method according to claim 1, characterized in that the first defined radio state comprises an IDLE state, a CELL_PCH state, a CELL_PCH state with DRX intervals, a PCH URA state or a CELL_FACH state. [0006] 6. Method according to claim 1, characterized in that: the measurement of neighbor relationship information comprises processing signals transmitted by at least one cell that the access terminal is able to receive while the access terminal is inside covering a first cell; and the neighbor relationship information identifies neighboring cells of the first cell. [0007] 7. Method, according to claim 6, characterized in that it additionally comprises: receiving a neighbor ratio measurement criterion through the first cell; and determining, based on the received neighbor relationship measurement criterion, whether to conduct measurement of neighbor relationship information or how to conduct measurement of neighbor relationship information. [0008] 8. Method according to claim 1, characterized in that the neighbor relationship information comprises at least one of the group consisting of: a cell identifier, a global cell identifier, a location area code, a tracking area code, a routing area code, a public land mobile network identifier, reference signal information, and a signal quality measure. [0009] 9. Apparatus for capturing neighbor relationship information, comprising: mechanisms for determining (1502) that the apparatus is operating in a first defined radio state which is one of a set of specified radio states; and mechanisms for conducting (1504) a measurement for neighbor relationship information as a result of determining that the apparatus is in the first defined radio state, further characterized by the fact that it comprises: mechanisms for determining that neighbor relationship information is not is to be reported immediately to a network entity based on a determination that the device is not in a second defined radio state; and mechanisms for sending a message to report neighbor relationship information to the network entity based on a determination that the apparatus is in the second defined radio state. [0010] 10. Apparatus according to claim 9, characterized in that: the mechanisms for determining comprise a controller configured to determine that the apparatus is in a first defined radio state; and the mechanisms for conducting measurement comprise a receiver configured to conduct a measurement of neighbor relationship information as a result of determining that the apparatus is in the first defined radio state. [0011] 11. Apparatus according to claim 9, characterized in that the first defined radio state comprises a state during which the measurement of neighbor relationship information will not impede at least one specified operation of the apparatus. [0012] 12. Device according to claim 11, characterized in that the at least one specified operation comprises: at least one operation in which the device sends traffic or receives traffic; or at least one operation where the apparatus conducts a measurement other than a neighbor ratio measurement. [0013] 13. Device according to claim 9, characterized in that the first defined radio state comprises an IDLE state, a CELL_PCH state, a CELL_PCH state with DRX intervals, a PCH URA state or a CÉLULA_FACH state. [0014] 14. Apparatus according to claim 9, characterized in that: the measurement of neighbor relationship information comprises processing signals transmitted by at least one cell that the apparatus is capable of receiving while the apparatus is within the coverage of a first cell; and the neighbor relationship information identifies neighboring cells of the first cell; wherein preferably: the receiver is also configured to receive a neighbor ratio measurement criterion via the first cell; and the controller is also configured to determine, based on the received neighbor ratio measurement criterion, whether to conduct measurement of neighbor ratio information or how to conduct measurement of neighbor ratio information. [0015] 15. Computer readable memory characterized in that it comprises instructions stored therein which, when executed, cause a computer to implement the method as defined in any one of claims 1 to 8.
类似技术:
公开号 | 公开日 | 专利标题 BR112012027586B1|2022-01-11|NEIGHBORING RELATIONSHIP INFORMATION MANAGEMENT US9294972B2|2016-03-22|Neighbor relation information management BRPI0921095B1|2020-11-10|reports on radio link failures US8760998B2|2014-06-24|Using identifier mapping to resolve access point identifier ambiguity US10448292B2|2019-10-15|Determining handover parameter for transmission by access point BRPI0921252B1|2020-11-03|MOBILITY MANAGEMENT BASED ON RADIO LINK FAILURE REPORT BRPI1014110B1|2021-02-09|access control based on access mode US9088981B2|2015-07-21|Access point communication based on transmission of physical layer identifiers according to at least one time offset
同族专利:
公开号 | 公开日 TW201206215A|2012-02-01| JP2016158239A|2016-09-01| JP6009620B2|2016-10-19| WO2011139855A1|2011-11-10| KR101461112B1|2014-11-20| CN102860066A|2013-01-02| JP2013529433A|2013-07-18| JP2015222949A|2015-12-10| JP2014150557A|2014-08-21| JP6130003B2|2017-05-17| BR112012027586A2|2016-08-09| US20120106370A1|2012-05-03| US20160165527A1|2016-06-09| CN102860066B|2016-03-23| US9264954B2|2016-02-16| KR20130028745A|2013-03-19| CN104780571A|2015-07-15| TWI473509B|2015-02-11| JP5813752B2|2015-11-17| EP2564623B1|2019-03-06| EP2564623A1|2013-03-06|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US5915221A|1995-08-08|1999-06-22|Telefonaktiebolaget Lm Ericsson|Neighbor cell list creation and verification in a telecommunications system| US20040022217A1|2002-04-29|2004-02-05|Sari Korpela|Method and apparatus for soft handover area detection using inter-band measurements| US20040156318A1|2002-12-23|2004-08-12|Johan Rune|Bridging between a Bluetooth scatternet and an Ethernet LAN| US20040151193A1|2002-12-23|2004-08-05|Johan Rune|Bridging between a Bluetooth scatternet and an Ethernet LAN| US20040156384A1|2002-12-23|2004-08-12|Johan Rune|Bridging between a Bluetooth scatternet and an Ethernet LAN| US20040153520A1|2002-12-23|2004-08-05|Johan Rune|Bridging between a bluetooth scatternet and an ethernet LAN| US20040141511A1|2002-12-23|2004-07-22|Johan Rune|Bridging between a bluetooth scatternet and an ethernet LAN| US20040167988A1|2002-12-23|2004-08-26|Johan Rune|Bridging between a Bluetooth scatternet and an Ethernet LAN| US20050002372A1|2003-06-13|2005-01-06|Johan Rune|Method of and system for intra-piconet scheduling| US7831256B2|2003-06-25|2010-11-09|Nec Corporation|Mobile communication system and access control method| SE0303463D0|2003-12-22|2003-12-22|Ericsson Telefon Ab L M|Arrangements and method for handling macro diversity in a Universal Mobile Telecommunications System| EP1738566A4|2004-08-09|2012-11-14|Rpx Corp|Measurement data collection method and portable information device| KR100724900B1|2004-09-15|2007-06-04|삼성전자주식회사|A hard handover method and appratus for ue to be applied to frequency layer convergence in a multimedia broadcast multicast service system| US20060140117A1|2004-12-29|2006-06-29|Naveen Aerrabotu|Apparatus and method for cell selection| EP1703679A1|2005-03-16|2006-09-20|Alcatel|Mobile terminal and access point| KR20060103106A|2005-03-24|2006-09-28|엘지전자 주식회사|Method of executing handover in broadband wireless access system| KR100810207B1|2005-07-22|2008-03-06|삼성전자주식회사|Handover method between core network entities in packet-switched based network and therefor apparatus| WO2007027034A1|2005-08-29|2007-03-08|Ktfreetel Co., Ltd.|Method and apparatus for optimizing neighbor list automatically in asynchronous wcdma network| US7764650B2|2006-03-02|2010-07-27|Intel Corporation|Mobile station and method for fast roaming with integrity protection and source authentication using a common protocol| US8462742B2|2006-03-31|2013-06-11|Samsung Electronics Co., Ltd|System and method for optimizing authentication procedure during inter access system handovers| US8359033B2|2006-06-13|2013-01-22|Telefonaktiebolaget L M Ericsson |System and method of supporting packet-switched handover| US7848292B2|2006-06-29|2010-12-07|Alcatel-Lucent Usa Inc.|Method of dynamically populating a neighbor list in a wireless communication system| EP2067331A4|2006-09-18|2012-04-25|Nokia Corp|Method and apparatus for adjusting guard band size between two carriers by quality of service data positioning in the spectrum band| EP2077051B1|2006-10-11|2020-07-22|Nokia Technologies Oy|Control method for network configuration measurements| JP5082390B2|2006-11-03|2012-11-28|日本電気株式会社|Mobile station mobility management method and apparatus in mobile communication system| KR100784324B1|2006-11-28|2007-12-13|삼성전자주식회사|Apparatus and method for idle current saving in mobile communication terminal| KR101312876B1|2006-12-13|2013-09-30|삼성전자주식회사|Method and apparatus for measurementing in a wireless system| JP4952240B2|2006-12-27|2012-06-13|日本電気株式会社|Radio base control station, mobile communication system, and priority cell selection method used therefor| WO2008082193A1|2007-01-04|2008-07-10|Lg Electronics Inc.|Tracking area choice| EP2122929B1|2007-01-18|2010-06-02|Nokia Corporation|Network oriented control system for self-configuration and self-optimization measurements| US20080176564A1|2007-01-22|2008-07-24|Nokia Corporation|Apparatus, method and computer program product providing inter-rat measurement control based on connection data rate| JP5021768B2|2007-02-05|2012-09-12|テレフオンアクチーボラゲットエルエムエリクソン(パブル)|Network controlled E-UTRAN neighbor cell measurements| CN101606421A|2007-02-12|2009-12-16|诺基亚公司|Device, the method and computer program product of the signaling of cell status information between Node B are provided| US8811349B2|2007-02-21|2014-08-19|Qualcomm Incorporated|Wireless node search procedure| US8289925B2|2007-02-23|2012-10-16|Nokia Corporation|Self optimization of forbidden neighbor cell list| ES2452524T3|2007-02-28|2014-04-01|Unwired Planet, Llc|Self-configuration and optimization of neighboring cells in wireless telecommunications networks| JP4916920B2|2007-03-06|2012-04-18|三菱電機株式会社|Mobile communication system, neighbor cell list management method, and base station| KR101606313B1|2007-04-30|2016-03-24|인터디지탈 테크날러지 코포레이션|Mobility procedures and differentiated charging in home node-bs| EP2156704B1|2007-06-11|2017-08-09|Optis Wireless Technology, LLC|Radio resource management based on parameters indicating imbalance between uplink and downlink| KR101482255B1|2007-06-18|2015-01-13|삼성전자주식회사|A method and an apparatus for measuring on neighboring cells in mobile telecommunication system| US8620320B2|2007-06-19|2013-12-31|Motorola Mobility Llc|Methods for handing over calls between communication networks using dissimilar air interfaces| JP2009049545A|2007-08-15|2009-03-05|Tokyo Electric Power Co Inc:The|Communication system| CN103037345B|2007-08-21|2015-08-19|华为技术有限公司|A kind of universal access network and utilize it to realize the method for business| CN103024804B|2007-09-26|2016-03-02|日本电气株式会社|Wireless communication system and method| US8855007B2|2007-11-19|2014-10-07|Qualcomm Incorporated|Configuring an identifier for an access point| JP5392091B2|2007-11-19|2014-01-22|日本電気株式会社|Wireless communication system and method| KR20160140967A|2008-01-02|2016-12-07|시그널 트러스트 포 와이어리스 이노베이션|Method and apparatus for cell reselection| WO2009088332A1|2008-01-07|2009-07-16|Telefonaktiebolaget Lm Ericsson |Identification of unique cell identity for building neighbour cell relation| US20100329150A1|2008-02-01|2010-12-30|Johan Nielsen|Configuration of a node in a communications network| WO2009120127A1|2008-03-25|2009-10-01|Telefonaktiebolaget L M Ericsson |Method and communication network node in a communication network system| US8494526B2|2008-03-25|2013-07-23|Telefonaktiebolaget L M Ericsson |Method for automatically selecting a physical cell identity of a long term evolution radio cell| GB2458886A|2008-03-25|2009-10-07|Nec Corp|Inter-network handover request message incorporating identifier of target gateway component| EP2304991B1|2008-04-18|2018-12-26|Telefonaktiebolaget LM Ericsson |Access network selection in a multi-access network environment| US8583119B2|2008-04-21|2013-11-12|Qualcomm Incorporated|Method and apparatus for management of automatic neighbor relation function in wireless networks| EP2324666B1|2008-07-02|2012-12-26|Telefonaktiebolaget L M Ericsson |Automatic configuration of inter-domain access technology neighbor relations| EP2345277B1|2008-09-02|2017-07-19|Telefonaktiebolaget LM Ericsson |Verifying neighbor cell| US8666410B2|2008-09-22|2014-03-04|Htc Corporation|Method of controlling cell selection for a wireless communication system and related device| EP2332377B1|2008-10-02|2016-07-06|Telefonaktiebolaget LM Ericsson |Area identifier replacement in a wireless communication network| ES2436786T3|2008-12-29|2014-01-07|Unwired Planet, Llc|Method and base station for energy saving| US8838090B2|2009-01-15|2014-09-16|Telefonaktiebolaget Lm Ericsson |Automatic detection and correction of physical cell identity conflicts| ES2814700T3|2009-02-13|2021-03-29|Samsung Electronics Co Ltd|Handover procedure and apparatus in a wireless communication system that includes femtocells| US8165597B2|2009-03-25|2012-04-24|Motorola Mobility, Inc.|Method and apparatus to facilitate partitioning use of wireless communication resources amongst base stations| CN102396269B|2009-04-14|2016-02-03|交互数字专利控股公司|For solving the method and apparatus of the PCI confusion providing inbound mobility to closed user group| EP2244502B1|2009-04-20|2011-06-08|Alcatel Lucent|Handover method| US8842633B2|2009-05-04|2014-09-23|Blackberry Limited|Systems and methods for mobile stations to identify radio access technologies| CN102461277B|2009-06-03|2015-01-21|黑莓有限公司|Voice service in evolved packet system| US20120093087A1|2009-06-29|2012-04-19|Nokia Corporation|Trail-Based Data Gathering Mechanism for Wireless Sensor Networks with Mobile Sinks| CN102165802B|2009-06-30|2013-06-05|华为技术有限公司|Method and apparatus of communication| US8737359B2|2009-07-30|2014-05-27|Qualcomm Incorporated|Apparatus and method for feedback-based radio resource management parameter optimization| US8639243B2|2009-08-21|2014-01-28|Qualcomm Incorporated|Systems, methods and apparatus configured to manage neighbor cell lists| WO2011061990A1|2009-11-19|2011-05-26|日本電気株式会社|Wireless communication system, adjacent-cell list optimizing system, base station and adjacent-cell list updating method| EP2685761A1|2010-01-08|2014-01-15|Interdigital Patent Holdings, Inc.|Method and apparatus for managing CSG priorities in idle and connected modes| US8886177B2|2010-01-26|2014-11-11|Nokia Corporation|Measurement reporting of inter-rat cells of more than one rat in GERAN| US8600390B2|2010-02-02|2013-12-03|Telefonaktiebolet L M Ericsson |Returning user equipment to a source radio access network| ES2689145T3|2010-02-10|2018-11-08|Beijing Xiaomi Mobile Software Co., Ltd.|Method and device for data processing in a wireless network| KR101637587B1|2010-04-07|2016-07-07|엘지전자 주식회사|METHOD FOR CONTROLLING CONNECTION AT Femto Base station and Connection METHOD AT Terminal| WO2011133079A1|2010-04-23|2011-10-27|Telefonaktiebolaget L M Ericsson |Improving handover in case of a radio link failure| US9294972B2|2010-04-28|2016-03-22|Qualcomm Incorporated|Neighbor relation information management| JP5516164B2|2010-07-09|2014-06-11|富士通株式会社|Cell identifier determination method, radio base station, and radio communication system| WO2012050492A1|2010-10-11|2012-04-19|Telefonaktiebolaget L M Ericsson |A method for use in associating tracking area lists with user equipments in a wireless communications network| US8837399B2|2011-08-23|2014-09-16|Telefonaktiebolaget L M Ericsson |Fast notification of relative radio-access technology priorities|KR101609641B1|2009-07-28|2016-04-07|삼성전자주식회사|Apparatus and method for configuration and optimization of automatic neighbor relation in wireless communication system| US9294972B2|2010-04-28|2016-03-22|Qualcomm Incorporated|Neighbor relation information management| JP5244151B2|2010-05-07|2013-07-24|株式会社エヌ・ティ・ティ・ドコモ|Portable terminal device and method| GB201010186D0|2010-06-17|2010-07-21|Vodafone Ip Licensing Ltd|Fallback between radio access technologies| ES2668541T3|2010-06-21|2018-05-18|Nokia Solutions And Networks Oy|Methods and apparatus for notifying measurement information| CN102378273B|2010-08-10|2016-03-30|中兴通讯股份有限公司|Obtain method and the wireless relay system of adjoining base station/via node interface message| JP4975151B2|2010-08-11|2012-07-11|株式会社エヌ・ティ・ティ・ドコモ|Mobile device, network device, wireless communication system, and cell information reporting method| EP2474183B1|2010-08-13|2016-10-12|Huawei Technologies Co., Ltd.|Method for providing information in a cellular wireless communication system| GB2482734A|2010-08-13|2012-02-15|Nec Corp|Biased RSRP cell selection for use with overlapping cell operating ranges.| US9560539B2|2010-08-16|2017-01-31|Lg Electronics Inc.|Method for allowing terminal to report measurement result for MDT to base station in wireless communication system and device therefor| KR20120057713A|2010-08-20|2012-06-07|삼성전자주식회사|Device and method for controlling drive test in wireless communication system| JP5612112B2|2010-09-21|2014-10-22|京セラ株式会社|Wireless measurement collection method and wireless terminal| US8582458B2|2010-09-29|2013-11-12|At&T Intellectual Property I, L.P.|Femtocell automatic speed test| WO2012042311A1|2010-10-01|2012-04-05|Nokia Corporation|Apparatus and method for neighbor relation reporting| US10595221B2|2010-11-03|2020-03-17|Hfi Innovation, Inc.|Method of MDT information logging and reporting| KR101711659B1|2010-12-17|2017-03-02|한국전자통신연구원|Power management apparatus for network and power management method for the same| US8548474B2|2011-01-07|2013-10-01|Renesas Mobile Corporation|Method for automatic neighbor cell relation reporting in a mobile communication system| US9198069B2|2011-02-09|2015-11-24|Broadcom Corporation|Priority measurement rules for channel measurement occasions| EP2676484B1|2011-02-14|2018-08-08|Nokia Solutions and Networks Oy|Automatic neighbour relations in a communications network| CN102118686B|2011-03-17|2013-08-07|华为技术有限公司|Position information processing method and access network equipment| US20120275315A1|2011-04-27|2012-11-01|Motorola Solutions, Inc.|Physical-layer cell identityconflict detection| US9264919B2|2011-06-01|2016-02-16|Optis Cellular Technology, Llc|Method, node and system for management of a mobile network| RU2606061C2|2011-08-25|2017-01-10|Телефонактиеболагет Л М Эрикссон |Initiation threshold adaptation for cell reselection measurements| WO2013087087A1|2011-12-12|2013-06-20|Telefonaktiebolaget L M Ericsson |Handover restriction| CN103220711B|2012-01-20|2018-08-03|中兴通讯股份有限公司|Terminal reports FGI abilities and network side to configure the method and system of measurement task| CA2865692C|2012-01-31|2017-05-16|Telefonaktiebolaget L M Ericsson |Connection setup with an access selection of a terminal| US9198143B2|2012-03-30|2015-11-24|Alcatel Lucent|Method and apparatus for improved management of service-impacting events| US9407391B2|2012-05-11|2016-08-02|Intel Corporation|User equipment power savings for machine type communications| US9389304B2|2012-05-21|2016-07-12|Zte Corporation|Using multiple access channels for wireless device positioning| EP2873271B1|2012-07-10|2016-09-14|Telefonaktiebolaget LM Ericsson |Methods, user equipment and base station for supporting update of neighbour cell relations in a cellular communications network| JP5991059B2|2012-07-27|2016-09-14|富士通株式会社|Offload device, network system, and multicast traffic handover method| US9414273B2|2012-08-08|2016-08-09|At&T Intellectual Property I, L.P.|Inbound handover for macrocell-to-femtocell call transfer| KR101969560B1|2012-09-24|2019-04-16|삼성전자주식회사|System and method for setting up radio front haul link in cloud cell communication system| GB2507499B|2012-10-30|2015-10-07|Broadcom Corp|Method and apparatus for blocking spurious inter-frequency and inter-system measurement reports| WO2014067565A1|2012-10-30|2014-05-08|Telefonaktiebolaget L M Ericsson |Methods and apparatus for maintaining information regarding the movement of user terminals| US9769718B2|2012-11-12|2017-09-19|Telefonaktiebolaget Lm Ericsson |DRX parameter configuration method and associated base station for facilitating ANR measurement| GB2507970B|2012-11-14|2016-07-13|Ubiquisys Ltd|Self-configuration of wireless networks| US10039073B2|2013-01-03|2018-07-31|Qualcomm Incorporated|Method for determining location of wireless devices| CN104904286B|2013-01-07|2019-09-03|华为技术有限公司|Collect the method, apparatus and system of the access-in point information of WLAN| WO2014112745A1|2013-01-17|2014-07-24|Lg Electronics Inc.|Method for reporting cell status information in wireless communication system and an apparatus therefor| US9148820B2|2013-03-29|2015-09-29|Nokia Solutions And Networks Oy|Idle load balancing during random access procedure| WO2014162905A1|2013-04-05|2014-10-09|京セラ株式会社|Network selection control method and user terminal| US9642146B2|2013-06-05|2017-05-02|Huawei Technologies Co., Ltd.|System and method for an agile wireless access network| JPWO2015011822A1|2013-07-25|2017-03-02|富士通株式会社|Wireless communication system, base station, mobile station, and wireless communication method| US9564958B2|2013-08-08|2017-02-07|Intel IP Corporation|Power saving mode optimizations and related procedures| EP3031146B1|2013-08-08|2019-02-20|Intel IP Corporation|Method, apparatus and system for electrical downtilt adjustment in a multiple input multiple output system| US9326122B2|2013-08-08|2016-04-26|Intel IP Corporation|User equipment and method for packet based device-to-devicediscovery in an LTE network| US9661603B2|2013-08-30|2017-05-23|Qualcomm Incorporated|Passive positioning utilizing beacon neighbor reports| KR101385049B1|2013-09-27|2014-04-14|주식회사 이노와이어리스|Long term evolution femtocell based contents service system, and the method thereof| KR101513096B1|2013-10-25|2015-04-17|국방과학연구소|ADJACENT BSs INFORMATION GENERATING METHOD BASED ON DISTRIBUTION| US9918258B2|2013-11-26|2018-03-13|At&T Intellectual Property I, L.P.|Anomaly correlation mechanism for analysis of handovers in a communication network| CN103747522B|2013-12-31|2019-03-08|上海华为技术有限公司|A kind of location information acquisition method and equipment| US10735599B2|2014-01-30|2020-08-04|Sony Corporation|Unlicensed band usage measurement reporting| US9877272B2|2014-03-25|2018-01-23|Qualcomm, Incorporated|Initial scan enhancements| US20150296439A1|2014-04-09|2015-10-15|Qualcomm Incorporated|Distributed neigboring cell assisted neighbour discovery| CN103985094B|2014-05-16|2017-08-29|大庆市华拓数码科技有限公司|image data packet processing method and system| US9794840B1|2014-05-27|2017-10-17|Sprint Sprectrum LP|Systems and methods for determining access node candidates for handover of wireless devices| US10850265B2|2014-06-18|2020-12-01|Basf Corporation|Molecular sieve catalyst compositions, catalytic composites, systems, and methods| US10182413B2|2014-07-30|2019-01-15|Qualcomm Incorporated|Wireless positioning using scheduled transmissions| US9578530B2|2014-12-09|2017-02-21|Futurewei Technologies, Inc.|Method and apparatus for determining cell states to adjust antenna configuration parameters| US9769689B2|2014-12-09|2017-09-19|Futurewei Technologies, Inc.|Method and apparatus for optimizing cell specific antenna configuration parameters| US9838879B2|2014-12-19|2017-12-05|Telefonaktiebolaget Lm Ericsson |Network node and method for detecting false base stations| CN106162687B|2015-04-01|2021-06-11|索尼公司|Apparatus and method for user equipment side and base station side for wireless communication| CN107431997B|2015-04-03|2020-12-29|日本电气株式会社|Core network node, base station, mobile station, server, communication system, paging method, and program| EP3298825B1|2015-05-20|2020-01-01|Telefonaktiebolaget LM Ericsson |Methods and nodes for managing bearers| US10637834B2|2015-07-12|2020-04-28|Qualcomm Incorporated|Network architecture and security with simplified mobility procedure| US10757633B2|2015-10-21|2020-08-25|Telefonaktiebolaget Lm Ericsson |Optimized broadcasting of system information messages| TWI625064B|2016-03-07|2018-05-21|財團法人工業技術研究院|Method, apparatus and system for managing transmission of notification messages| US10485054B2|2016-05-26|2019-11-19|Futurewei Technologies, Inc.|System and method for managing neighbors in a communications system with beamforming| US20180368036A1|2016-07-08|2018-12-20|Telefonaktiebolaget Lm Ericsson |Network Node, Radio Network Nodes, Wireless Device and Methods Performed Therein| US9907047B1|2016-08-30|2018-02-27|Qualcomm Incorporated|Passive positioning procedure and use of single burst ASAP FTM sessions| US10278082B2|2016-10-06|2019-04-30|Telefonaktiebolaget Lm Ericsson |Methods and nodes for establishing a neighbor relation in a wireless network| WO2018093315A1|2016-11-15|2018-05-24|Telefonaktiebolaget Lm Ericsson |Handling neighbour relationships| WO2018111163A1|2016-12-15|2018-06-21|Telefonaktiebolaget Lm Ericsson |Methods and nodes relating to automatic neighbour detection based on uplink measurements| KR102339065B1|2017-03-17|2021-12-15|삼성전자주식회사|Radio access network notification area update failure| CN107396325B|2017-07-21|2020-05-26|锐捷网络股份有限公司|Neighbor extraction system, method and related device of wireless access point| WO2019051671A1|2017-09-13|2019-03-21|Oppo广东移动通信有限公司|Anr configuration method, terminal device, base station and core network device| WO2019202516A1|2018-04-16|2019-10-24|Telefonaktiebolaget Lm Ericsson |Handling of periodic radio access networkbased notification areatimer| CN108924815A|2018-06-20|2018-11-30|普联技术有限公司|A kind of wireless roaming method and system| GB201909462D0|2019-07-01|2019-08-14|Samsung Electronics Co Ltd|eMeas and MDT| WO2021016928A1|2019-07-31|2021-02-04|Zte Corporation|Discontinuous receptionconfiguration for automatic neighbor relation |
法律状态:
2018-12-26| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]| 2020-05-26| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]| 2021-11-03| B09A| Decision: intention to grant [chapter 9.1 patent gazette]| 2022-01-11| B16A| Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 28/04/2011, OBSERVADAS AS CONDICOES LEGAIS. PATENTE CONCEDIDA CONFORME ADI 5.529/DF, QUE DETERMINA A ALTERACAO DO PRAZO DE CONCESSAO. |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 US32885610P| true| 2010-04-28|2010-04-28| US61/328,856|2010-04-28| US13/095,479|2011-04-27| US13/095,479|US9264954B2|2010-04-28|2011-04-27|Neighbor relation information management| PCT/US2011/034391|WO2011139855A1|2010-04-28|2011-04-28|Neighbor relation information management| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|