HK1151669B - Using identifiers to establish communication - Google Patents
Using identifiers to establish communication Download PDFInfo
- Publication number
- HK1151669B HK1151669B HK11105673.0A HK11105673A HK1151669B HK 1151669 B HK1151669 B HK 1151669B HK 11105673 A HK11105673 A HK 11105673A HK 1151669 B HK1151669 B HK 1151669B
- Authority
- HK
- Hong Kong
- Prior art keywords
- identifier
- access point
- type
- node
- cell
- Prior art date
Links
Description
Priority requirements according to 35U.S.C. § 119
The present application claims U.S. provisional patent application No.60/988,646, filed on 16.11.2007 in common and assigned attorney docket No. 072326P1; U.S. provisional patent application No.61/059,654, filed 6.2008 and assigned attorney docket No. 081769P1; U.S. provisional patent application No.61/074114, filed on 19/6/2008 and assigned attorney docket No. 081869P1; the benefits and priority of U.S. provisional patent application No.61/074,935 filed on 23.6.2008 and assigned attorney docket No. 081893P1; the disclosure of each of which is incorporated herein by reference.
Cross reference to related applications
This application is related to U.S. patent application No.12/269,666, filed concurrently and commonly entitled "responsive NODE IDENTIFIER fusion" and assigned attorney docket No.072326, the disclosure of which is incorporated herein by reference.
Technical Field
The present application relates generally to communications and more particularly, but not exclusively, to addressing confusion issues associated with communication nodes.
Background
Wireless communication systems are widely deployed to provide various communications (e.g., voice, data, multimedia services, etc.) to multiple users. As the demand for high-rate and multimedia data services rapidly increases, challenges are presented to efficient and robust communication systems that achieve increased performance.
To supplement conventional mobile phone network base stations (e.g., macro cells), small coverage base stations (e.g., installed in a user's home) may be deployed to provide more robust indoor wireless coverage to mobile units. Such small-coverage base stations are commonly referred to as access point base stations, home nodebs, or femtocells. Typically, such small coverage base stations are connected to the internet and the mobile operator's network via a DSL router or a cable modem.
In practice, a larger number of base stations (e.g., femtocells) may be deployed within a given area (e.g., within the coverage area of a given macrocell). In such a case, efficient techniques for identifying these base stations are needed so that other nodes in the network can communicate with these base stations.
Disclosure of Invention
The following is a summary of exemplary aspects of the disclosure. It will be apparent that any reference herein to the term "aspect" may refer to one or more aspects of the disclosure.
In some aspects, the present disclosure relates to resolving confusion associated with node identifiers. For example, a limited number of node identifiers may be defined within the network, such that more than one node (e.g., access point) in the network may be assigned the same identifier. Thus, confusion may occur with the identity of the target node as the access terminal is being handed off from the source node to the target node. Various techniques for resolving such confusion are described herein.
In some aspects, an access terminal to be handed off to a target node may resolve confusion related to the target node by obtaining a unique identifier associated with the target node. In some embodiments, the access terminal sends this unique identifier to the source node that initiated the handover operation. In other embodiments, the access terminal initiates the handoff operation using the unique identifier.
The access terminal may be used to detect confusion. In some cases, the access terminal autonomously detects confusion. For example, an access terminal may monitor an identifier associated with a received signal and generate a measurement report indicating that multiple nodes are using the same identifier.
As another example, a signal threshold may be assigned to a group of identifiers that have been identified as potentially being obfuscated. This threshold may then be used to trigger acquisition of more unique identifiers or to trigger a confusion determination operation at the source node.
In some cases, the access terminal detects confusion in response to the request. For example, the source node may periodically send a message to the access terminal requesting the access terminal to send information related to confusion via measurement reports.
The access point may be used to detect confusion. For example, the access point may detect confusion based on neighbor discovery, a target node identified in a handover request, or received configuration information. Upon detecting confusion, the access point may send a message to the access terminal requesting the access terminal to obtain a unique identifier to resolve the confusion problem. In some cases, this message may instruct the access terminal to initiate a handoff operation using the unique identifier.
Confusion resolution techniques may also be employed when the access terminal directly accesses the target node. For example, in the case where the access terminal establishes communication with the target node before the target node acquires resources for the access terminal, the access terminal may send the target node a unique identifier for the source node. In this way, the target node may obtain appropriate resources from the source node even when the node identifier used by the source node may be confusing.
Drawings
These and other exemplary aspects of the present disclosure will be described in the detailed description and appended claims, wherein:
FIG. 1 is a simplified block diagram of several exemplary aspects of a communication system for solving the confusion problem;
fig. 2 is a diagram illustrating a coverage area for wireless communications;
FIG. 3 is a flow diagram of several example aspects that may be used to specify operations using a second type of identifier;
FIG. 4 is a simplified block diagram of several example aspects of components that may be used in a communication node;
FIG. 5 is a flow diagram of several example aspects of operations that may be used to determine whether to communicate with a node using a second type of identifier;
FIG. 6 is a flow diagram of several example aspects of operations that may be used to determine whether to communicate with a node using a second type of identifier based on a list of identifiers;
FIG. 7 is a flow diagram of several example aspects of operations that may be used to solve an obfuscation problem for a source node;
FIG. 8 is a flow diagram of several example aspects of operations that may be used to determine whether to request acquisition of a second type of identifier;
FIGS. 9A and 9B are flow diagrams of several example aspects of operations that may be used to trigger access terminal acquisition of a second type of identifier;
10A and 10B are flow diagrams of several example aspects of operations that may be used to trigger access terminal acquisition of a second type of identifier;
FIG. 11 is a flow diagram of several example aspects of operations that may be performed in connection with an access terminal detecting confusion;
fig. 12 is a flow diagram of several example aspects of operations that may be performed in connection with an access terminal detecting confusion;
FIG. 13 is a flow diagram of several example aspects of the operation of an access terminal that may incorporate the provision of confusion reports upon request;
fig. 14 is a diagram of a wireless communication system;
fig. 15 is a diagram of a wireless communication system including a femto node;
FIG. 16 is a simplified block diagram of several example aspects of a communications component; and
17-21 are simplified block diagrams of several example aspects of an apparatus for solving the confusion problem as taught herein.
In accordance with common practice, the various features illustrated in the drawings may not be drawn to scale. Accordingly, the dimensions of the various features may be arbitrarily expanded or reduced for clarity. In addition, some of the drawings may be simplified for clarity. Accordingly, the drawings may not depict all of the components of a given apparatus (e.g., device) or method. Finally, like reference numerals may be used to denote like features throughout the specification and figures.
Detailed Description
Aspects of the disclosure are described below. It should be apparent that the teachings herein may be embodied in a wide variety of forms and that any specific structure, function, or both being disclosed herein is merely representative. Based on the teachings herein one skilled in the art should appreciate that an aspect disclosed herein may be implemented independently of any other aspects and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented or a method practiced using any number of the aspects set forth herein. Furthermore, such an apparatus may be implemented or such a method may be practiced using other structure, functionality, or structure and functionality in addition to or other than one or more of the aspects set forth herein. Furthermore, an aspect may include at least one element of a claim.
Fig. 1 illustrates several nodes in an example communication system 100 (e.g., a portion of a communication network). For purposes of illustration, aspects of the disclosure will be described in the context of one or more access terminals, access points, and network nodes in communication with each other. It should be appreciated, however, that the teachings herein may be applicable to other types of devices referred to by other terms (e.g., base station, user equipment, etc.) or other similar devices.
An access point in system 100 provides one or more services (e.g., network connections) to one or more wireless terminals (e.g., access terminal 102) that may be installed within a geographic area of interest or that may be roaming within the geographic area of interest. For example, at various points in time, an access terminal 102 may connect to access point 104, any one of a set of access points 1-N (represented by access points 106 and 108 and associated ellipses), or access point 110. Each of the access points 102-110 can communicate with one or more network nodes (represented for convenience by network node 112) to facilitate wide area network connectivity. Such a network node may take various forms, such as one or more radio and/or core network entities (e.g., a configuration manager, a mobility management entity, or some other appropriate network entity).
Each access point in the system 100 is assigned a first type of identifier, referred to herein as a node identifier. In various implementations, such identifiers may include, for example, a physical cell identifier ("PCID"), a pseudo-random number ("PN") offset, or an acquisition pilot. Typically, a fixed number (e.g., 504) of node identifiers are defined in a given system. In this case, confusion may occur when the number of access points exceeds the number of node identifiers. A simple example of this is shown in fig. 1, where both access point 106 and access point 110 are assigned an "identifier 1"
As the access terminal 102 roams within the system 100, the access terminal 102 may be handed off from one access point (e.g., access point 104) to another access point (e.g., access point 110). The decision to handoff the access terminal 102 to the access point 110 may be based on whether the access terminal 102 receives a particularly strong signal from the access point 110. Here, the access terminal 102 identifies signals from the access point 110 by node identifiers associated with (e.g., embedded within) the signals. To complete the handoff, various information maintained by the source access point 104 (the access point to which the access terminal is currently connected) is transferred to the target access point 110. This may be done using the node identifier ("identifier 1") associated with access point 110 without confusion. However, when confusion does exist in the example of fig. 1, the access point 104 may not be able to determine whether information should be sent to the access point 106 or the access point 110.
To address such confusion issues, the access terminal 102 and/or the access point 104 are configured to detect the confusion and determine a second type identifier associated with the access point 110. In some aspects, the second identifier comprises a unique identifier. For example, the second identifier may be unique over a larger area than the first identifier. In some embodiments, the second identifier may be unique throughout the operator's network. In various embodiments, such unique identifiers may include, for example, a global cell identifier ("GCI"), an access node identifier ("ANID"), a sector identifier, an internet protocol address, or some other identifier that uniquely identifies access point 110 within the network.
In some embodiments, the access terminal 102 includes an confusion detector 114 that can detect actual or potential confusion between nodes in the system 100. Upon detecting confusion, the access terminal 102 (e.g., the unique identifier controller 116) can obtain the unique identifier. For example, the access terminal 102 may monitor for a signal broadcast by the access point 110 that includes a unique identifier. Upon detecting confusion, the access terminal 102 can also notify the access point 104 of the confusion and/or unique identifier.
In some embodiments, the access point 104 includes an confusion controller 118 that can detect actual or potential confusion between nodes in the system 100. For example, the confusion controller 118 may automatically detect confusion, or upon receiving an indication of confusion from the access terminal 102, the confusion controller 118 may take further steps to determine whether there is confusion. Upon detecting the confusion, the access point 104 may request the access terminal 102 to obtain the unique identifier.
Once the confusion problem is resolved as described above, the access point 104 (e.g., the handover controller 120) may initiate a handover operation based on the unique identifier. In this manner, the access terminal 102 may be efficiently handed off to a desired target access point. As will be described below, in some embodiments, the access terminal 102 (e.g., by operating a handover controller, not shown) may initiate a handover operation based on the unique identifier (e.g., once it solves the confusion problem).
This confusion may occur in the network 200 shown in fig. 2, where some access points provide macro coverage and others provide less coverage. The macro coverage area 204 may be provided herein by a macro access point, such as a large area cellular network, e.g., a 3G network, such a network being commonly referred to as a macro cell network or wide area network ("WAN"). Further, the smaller coverage area 206 may be provided by an access point, such as a residential-based or building-based network environment, which is commonly referred to as a local area network ("LAN"). As an access terminal ("AT") moves through such a network, the access terminal may be served in certain locations by access points that provide macro coverage while in other locations by access points that provide smaller area coverage. In some aspects, access points of smaller area coverage may be used to provide incremental capacity growth, in-building coverage, and different services, all of which result in a more robust user experience.
In the description herein, a node that provides coverage over a larger area (e.g., an access point) may be referred to as a macro node, while a node that provides coverage over a smaller area (e.g., a residence) may be referred to as a femto node. It should be appreciated that the teachings herein may be applicable to nodes associated with other types of coverage areas. For example, a pico node may provide coverage over an area that is smaller than a macro area and larger than a femto area (e.g., coverage within a commercial building). In various applications, other terminology may be used to refer to macro nodes, femto nodes, or other access point type nodes. For example, a macro node may be configured or referred to as an access node, base station, access point, enodeb, macro cell, and so on. Also, the femto node may be configured or referred to as a home nodeb, home enodeb, access point base station, femto cell, and the like. In some embodiments, a node may be associated with (e.g., divided into) one or more cells or sectors. A cell or sector associated with a macro, femto, or pico node may be referred to as a macrocell, femtocell, or picocell, respectively.
In the example of fig. 2, several tracking areas 202 (or routing areas or location areas) are defined, each including several macro coverage areas 204. Here, the coverage areas 202A, 202B, and 202C associated with the tracking areas are represented by wide lines and the macro coverage areas 204 are represented by hexagons. As described above, the tracking area 202 may also include a femto coverage area 206. In this example, each femto coverage area 206 (e.g., femto coverage area 206C) is shown within one or more macro coverage areas 204 (e.g., macro coverage area 204B). It should be appreciated, however, that the femto coverage area 206 may not be entirely within the macro coverage area 204. Also, one or more pico or femto coverage areas (not shown) may be defined within a given tracking area 202 or macro coverage area 204.
In deployments where a large number of access points, such as femto and pico nodes, are located within a given area (e.g., dense urban deployments), two or more of these access points may be assigned the same node identifier. For example, in macro coverage area 204A, femto coverage areas 206A and 206D may be assigned the same identifier. In this case, node identifier confusion (e.g., PCID confusion) may occur because multiple neighboring nodes near the serving access point of the access terminal advertise the same node identifier. For example, in fig. 1, access points 106 and 110 may comprise femto nodes or pico nodes that advertise "identifier 1" via respective broadcast pilot signals. In addition, these access points may be close to the access point 104 (e.g., macro access point) currently serving the access terminal 102. In this case, access point 104 may be aware of access points 106 and 110, and thus confusion may occur when indicating a handover to an access point identified by "identifier 1".
In general, the obfuscation resolution techniques described herein may be applicable to any kind of node. However, in many deployments, the macro access points in a given area will be planned so that there is no confusion associated with handing over to the macro access points. In this case, the confusion resolution techniques taught herein may be applicable to any non-macro node in the network. Such non-macro nodes may include, for example, nodes deployed in an unplanned manner. As described above, such non-macro nodes may include femto nodes (e.g., deployed by individuals) and operator-deployed low-power pico nodes. Also, as will be discussed in more detail below, the nodes may be constrained in some manner (e.g., by restricting access). Thus, the confusion resolution techniques taught herein may be applicable to restricted nodes (e.g., nodes associated with a closed subscriber group).
In view of the above overview, various techniques that may be used to solve the confusion problem in accordance with the teachings herein will be described with reference to FIGS. 3-13. Briefly, FIG. 3 illustrates several components that may be used in an access point or access terminal, while the flow diagrams of FIGS. 4-13 relate to various techniques for resolving confusion.
For purposes of illustration, the operations of fig. 4-13 (or any other operations discussed or taught herein) may be described as being performed by specific components (e.g., components of system 100 and/or components shown in fig. 3). However, it should be appreciated that these operations may be performed by other types of components, and may be performed by a different number of components. It should be appreciated that one or more of the operations described herein may not be employed in a given implementation.
Fig. 3 illustrates several example components that may be incorporated into nodes, such as the access terminal 102 and the access point 104, to perform the confusion resolution operations described herein. The described components may also be incorporated in other nodes in the communication system. For example, other nodes in the system may include components similar to those described for the access terminal 102 and the access point 104 to provide similar functionality. A given node may contain one or more of the components. For example, an access terminal may contain multiple transceiver components such that the access terminal is capable of operating on multiple frequencies and/or communicating via different technologies.
As shown in fig. 3, the access terminal 102 and the access point 104 may include transceivers 302 and 304, respectively, for communicating with other nodes. Transceiver 302 includes a transmitter 306 for transmitting signals (e.g., messages) and a receiver 308 for receiving signals (e.g., including searching for pilot signals). The transceiver 304 includes a transmitter 310 for transmitting signals and a receiver 312 for receiving signals.
The access terminal 102 and access point 104 also include other components that may be used in conjunction with the confusion resolution operations taught herein. For example, the access terminal 102 and the access point may include communication controllers 314 and 316, respectively, for managing communications (e.g., sending and receiving messages/indications) with other nodes and for providing other related functionality as taught herein. The access terminal 102 and/or the access point 104 may include an confusion detector 318 and 320, respectively, for detecting confusion and for providing other related functionality as taught herein. The access terminal 102 and/or access point 104 may include identifier controllers 322 and 324, respectively, for managing (e.g., selecting, obtaining, requesting, etc.) node identifiers and for providing other related functionality as taught herein. Example operations of other components of fig. 3 are described below.
For convenience, access point 102 and access terminal 104 are illustrated in fig. 3 as including components that may be used in the examples described below in connection with fig. 4-13. In practice, one or more of the illustrated components may not be used in a given example. As an example, in some embodiments, the access terminal 102 may not include the confusion detector 318, and in some embodiments, the access point 104 may not include the confusion detector 320.
Referring now to fig. 4 and 5, in some aspects confusion associated with a first type of identifier (e.g., PN offset, PCID, etc.) may be resolved by specifying the use of a second type of identifier (e.g., ANID, GCI, etc.) in conjunction with a handover or other operation.
This scheme may be employed, for example, when an access terminal connected to a macro access point activates a search for nearby femto nodes (e.g., home femto nodes). When the access terminal detects a signal from a femto node, the access terminal can obtain a first type of identifier (e.g., pilot ID, sector ID, PCID, etc.) from the signal. If the received signal strength is above a threshold and/or the access terminal is authorized to access the discovered femto node (e.g., the access point is listed in the access terminal's preferred roaming list), the access terminal may add the access point to the active set for the access terminal.
A first access terminal to be route-opened for the femto node from a macro access point will establish a mapping from a first type of identifier to a second type of identifier (e.g., ANID, GCI, etc.) at the macro access point. Here, upon receiving the second type of identifier from the access terminal, the macro access point may initiate neighbor discovery for the femto node.
The presence of a subsequent femto node having a first identical identifier in the macro coverage will result in the macro access point deciding that multiple access points use a common first identifier (i.e., detecting confusion with respect to that identifier). Here, the macro access point may discover the presence of these other femto nodes, e.g., from neighbor discovery or by receiving messages from access terminals that have discovered confusion. The macro access point may then always request the second type of identifier whenever it receives a message (e.g., route open) that includes the obfuscated identifier. Upon receiving the second type of identifier from the access terminal, the macro access point may begin neighbor discovery for the femto node.
Further, as an optimization in some embodiments, the access terminal may default to sending a message with an identifier of the second type. For example, an access terminal may always use the second type of identifier when sending a route open or other message for its home femto node.
Referring initially to fig. 4, an access point (e.g., access point 104) receives a message from an access terminal, wherein the message is directed to a node identified by a first node identifier (e.g., a target node such as access point 110), as shown at block 402. For example, as described above, an access terminal may receive a route open request that includes a PN offset or some other type of message that includes some other type of identifier. It should be appreciated that such a message may take various forms. For example, in various embodiments, the message may include a message to set resources for a handover, a handover request, an active set increase request, interference management signaling, a signal strength measurement report, or a message to reserve at least one resource.
The access point determines whether another node is identified by the first node identifier, block 404. The access point may detect this confusion in various ways. For example, as described above, an access point may receive a message from one or more access terminals indicating an identifier used by a neighboring node. In some cases, an access point may perform neighbor discovery and determine that two or more neighboring nodes are using the same identifier. In some cases, the access point may receive configuration information (e.g., from a configuration manager represented by node 112 in fig. 1) that indicates which identifiers the neighbors of the access point are using. In some cases, the operations of block 404 may include determining whether the identifier is a list of identifiers maintained by the access point. As described herein, the list of identifiers may include, for example, identifiers that are not guaranteed to be obfuscated, identifiers that may be obfuscated, or identifiers that have been determined to be obfuscated. In some aspects, the column identifier may include a range of identifier values.
As shown in blocks 406 and 408, if confusion is not detected, the access point may perform an appropriate operation (e.g., a handover operation) based on the first node identifier.
If confusion is detected, the access point sends a message to the access terminal specifying that the access terminal is to establish communication with the node using a second node identifier (e.g., ANID), block 410. Such a message may take various forms. For example, the message may include a reject message (e.g., a route open reject) indicating that the access terminal uses a different identifier.
The access point may then receive a message from the access terminal including the second node identifier, as shown in block 412. The access point may perform appropriate operations (e.g., handover operations) based on the second node identifier. In some embodiments, this may involve tunneling a message including the second node identifier towards the target node.
In some aspects, the operations of fig. 4 involve reserving resources for handover operations over the backhaul (e.g., in conjunction with an active set addition operation). Furthermore, since the obfuscated node may be restricted in some way (e.g., association restricted or otherwise restricted as described below), these operations may involve reserving resources for the restricted node.
Fig. 5 relates in some aspects to specifying establishment of communication with a node using an un-obfuscated identifier. In some aspects, these operations may be complementary to some of the operations of fig. 4.
An access terminal (e.g., access terminal 102) selects to send a message to a target node identified by a first node identifier, as shown in block 502. As described above, this message may be sent via an associated access point (e.g., access point 104) in block 402.
The access terminal determines whether there may be another node identified by the first node identifier, block 504. This determination may be made in various ways. As described above, the access terminal may have sent a message to the access point 104 using the first node identifier and received a message from the access point 104 indicating confusion (and specifying to use the second node identifier). In some cases, such a determination may involve attempting to communicate with the target node and receiving a message from the target node indicating that the communication is unauthorized. Such a reject message may be received because the context for the access terminal was sent to nodes other than the intended target node due to node identifier confusion. Moreover, the access terminal can identify the confusion based on signals it receives from neighboring access points that indicate identifiers used by those access points.
If no confusion is detected, the access terminal may establish communication with the target node using the first node identifier, as shown in blocks 506 and 508.
If confusion is detected, the access terminal may establish communication with the target node using the second node identifier, as shown in block 510.
Further, as shown at block 512, the access terminal can be configured to establish communication with the target node using the second node identifier. For example, an access terminal may be so configured after the access terminal detects confusion. Alternatively, the access terminal may transmit the second node identifier by default, as described herein.
Fig. 6 in some aspects relates to reserving a subset of a node identifier space (e.g., PCID space) for non-macro nodes to simplify confusion resolution. In this way, the node receiving the identifier from the subset can easily determine that confusion is possible. In some embodiments, the subset includes a set of specified values associated with access points that are specified as not being confusion-free. In some implementations, the subset includes a set of specified values associated with a closed user group (e.g., as described below). In some embodiments, the subset includes a set of specified values associated with access points of at least one specified type (e.g., node type). Such specified types may relate to, for example, one or more of transmit power, coverage area, or relay capability.
An access terminal (e.g., access terminal 102) receives a list of node identifiers, as shown in block 602. This list may for example comprise a subset of the above-mentioned node identifiers. In some implementations, this list can be received from a serving access point (e.g., access point 104) advertising the list. In some embodiments, the target access point or some other access point (e.g., via neighbor list information) may advertise that the second type of identifier (e.g., GCI) is to be used when accessing the target access point. In some embodiments, this list may be received from a configuration manager (e.g., network node 112) that tracks reserved groups of nodes assigned identifiers from the list.
The access terminal determines a first identifier for communicating with the target access point, block 604. For example, such an identifier may be received via a pilot signal or some other suitable signal, as described herein.
The access terminal may determine (e.g., automatically) whether to establish communication with the access point using the second identifier (e.g., GCI), as shown at block 606. In some aspects, such a determination may be based on the first identifier (e.g., by determining a type of the first identifier). For example, the access terminal may obtain the second identifier if the identifier obtained at block 604 is on the list obtained at block 602. Here, obtaining the second identifier may include monitoring for other signals containing the second identifier (from the target access point). As an example, the target access point may broadcast the second identifier at less frequent intervals than the intervals at which the target access point broadcasts the first identifier.
The access terminal may send a message including the second identifier to establish communication with the target access point, as shown in block 608. Such messages may take various forms in various situations. For example, the message may comprise a signal strength measurement message, a radio resource report, or a handover request. In typical embodiments, an access terminal (e.g., access terminal 102) includes an associated PCID and GCI value in a measurement report that the access terminal sends to its serving access point (e.g., access point 104). Further, as described below in connection with fig. 7, in certain instances, the access terminal may send this information to the target access point.
Upon receiving this information, the serving access point may initiate a handover procedure using the GCI value, as shown in block 610. Thus, the serving access point will establish resources at the target cell and send a handover command to the access terminal.
Fig. 7 relates in some aspects to selecting an identifier to provide to a target access point, wherein the identifier is associated with a source access point. For example, in the case where an access terminal directly accesses a target access point without prior handover preparation, the access terminal may use the GCI of the source access point. In this case, the access terminal may include the GCI of the source access point when accessing the target access point. This allows the target access point to resolve any confusion relating to the source access point identity. The target access point can then fetch context for the access terminal from the appropriate source access point and complete the handover. These operations are described in blocks 702-706 of FIG. 7.
As shown at block 702, the access terminal selects an identifier (e.g., GCI) of a set of identifiers (e.g., a first identifier such as a PCID and a second identifier such as GCI) associated with a target access point (e.g., access point 110). In some aspects, in a manner similar to that described above in connection with fig. 6, selecting the second identifier may be based on whether the first identifier is in a received list of identifiers (e.g., an access point based on node type is designated as non-confusion, etc.). As described above, in some aspects, the selection of the second identifier may be based on a loss of communication with the source access point (e.g., access point 104).
The access terminal transmits the selected identifier to the target access point when establishing communication with the target access point, as shown in block 704. For example, the access terminal may include the GCI of the source access point in the connection request message.
The source access point may then establish communication with the source access point using the selected identifier and/or obtain configuration information from the source access point, as shown in block 706. In this manner, the source access point can obtain context information for the access terminal to complete the handoff.
Fig. 8 relates in some aspects to operations that an access point and/or access terminal may perform in connection with detecting and resolving node identifier confusion. In some aspects, these operations are complementary to the operations described above in connection with fig. 5.
An access point (e.g., access point 104) determines whether multiple nodes use the same identifier, where the identifier is of a first type (e.g., PCID), as shown in block 802. As described above, the access point may detect this confusion based on measurement reports, neighbor discovery, and received messages.
If no confusion is detected, the access point may continue to operate normally, as shown in blocks 804 and 806. For example, the access point may determine whether to perform a handover based on the identifier of the first type received via the measurement report.
If confusion is detected, the access point may issue a request to obtain a second type of identifier associated with the obfuscated first type of identifier, as shown in block 808. For example, if a obfuscated PCID is received from an access terminal (e.g., access terminal 102) via a measurement report, the access point may send a request to the access terminal to obtain a GCI associated with the PCID. The access terminal may then acquire, for example, GCI, as described herein.
The access point may then receive a response from the access terminal that includes the GCI, as shown at block 810. Since the confusion problem will now be resolved (e.g., at the access point), at block 812, a handover operation may be initiated (e.g., by the access point) using the received GCI.
Fig. 9A and 9B relate in some aspects to triggering acquisition of a unique identifier (e.g., GCI) using a threshold. In some cases, the access terminal may automatically determine when to acquire the unique identifier; in other words, there is no need to be instructed by another node (e.g., an access point) to do so.
As shown at block 902, the access terminal may receive a defined set of identifiers of a first type (e.g., a list of node identifiers as described above). In some embodiments, this information may be defined and/or provided by the serving access point (e.g., by identifier controller 324) or some other node. For example, the serving access point may identify all PCID identifiers that are or may be subject to confusion and provide a list of these identifiers to the access terminal.
The access terminal may also receive a threshold associated with a defined set of identifiers, as shown in block 904. For example, this threshold may specify a threshold signal strength value for the received signal that triggers the access terminal to acquire GCI. In some embodiments, this threshold may be defined and/or provided by a serving access point (e.g., by threshold controller 334) or some other node. This threshold may be defined, for example, to be lower (e.g., a few dB lower) than a received signal strength threshold that triggers a handover operation. In some embodiments, the threshold may be specified as a relative offset from the target access point signal strength or as an absolute threshold for a carrier-to-interference ratio ("C/I") value from the target access point.
At some point in time, the access terminal will receive a signal associated with an identifier of the first type, as shown in block 906. The access terminal (e.g., comparator 330) may determine whether the received identifier is in a list of identifiers, as shown in block 908. In addition, the access terminal (e.g., signal processor 332, which may be implemented in receiver 308 or operating in conjunction with receiver 308) determines whether the received signal strength of the signal received by block 906 is greater than or equal to a threshold.
As shown in blocks 910 and 912, if the criterion of block 908 is not met, the access terminal may continue to monitor for signals from neighboring access points.
As shown at block 914, if the criteria of block 908 are met, the access terminal obtains an identifier of the second type (e.g., GCI) associated with the identifier received at block 906. As described above, this may involve monitoring a broadcast signal with a certain periodicity.
As shown at block 916, the access terminal (e.g., report generator 328) sends a message to the access point including the identifiers obtained at blocks 906 and 910 and the received signal strength of the associated signals (e.g., the signals received at block 906). This message may be sent just after the unique identifier is obtained at block 910 or at some other time. In some embodiments, this information is sent in a measurement report. This report may be sent, for example, once the received signal strength of the received signal (e.g., from the target access point) exceeds a handover threshold.
As indicated at block 918, the access point (e.g., the handover controller 326) determines whether to initiate a handover operation based on the identifier and received signal strength provided in this message, as all confusion will now be resolved. As described herein, if a handover operation is indicated, the access point will prepare the target access point using the unique identifier and send a handover command to the access terminal.
In some aspects, the scheme of fig. 9 may prove advantageous in high mobility environments. For example, such an approach may provide for faster handovers because the GCI may be read before the signal strength of the target access point is strong enough to require a handover.
Fig. 10A and 10B relate in some aspects to schemes in which an access terminal reports to an access point that a signal exceeding a threshold (e.g., a GCI threshold) is received. In this case, the access point may determine whether confusion is possible and, if so, instruct the access terminal to acquire a unique identifier (e.g., GCI). Here, the operations of blocks 1002-1012 may be similar to the operations of blocks 902-912, respectively.
However, at block 1014, if the criteria are met at block 1010, the access terminal sends a message to the access point including the identifier and received signal strength of the associated signal obtained at block 1006. This message may be sent just after the identifier is obtained at block 1006 or at some other time. In some embodiments, this information is sent in a measurement report.
The access point determines whether confusion is possible based on the received information, block 1016. For example, such a determination may be based on whether multiple nodes use the same identifier. Further, this determination may optionally be based on the received signal strength of any detected signal that includes this identifier.
If no confusion is detected, the access point may continue to operate normally, as shown in blocks 1018 and 1020. For example, the access point may determine whether to perform a handover based on the identifier of the first type received via the measurement report.
If confusion is detected, the access point sends a message to the access terminal requesting the access terminal to retrieve a unique identifier (e.g., CGI) associated with the identifier that is subject to confusion, as shown in block 1022. The access terminal may then obtain an identifier as described herein and send the identifier to the access point (e.g., via a measurement report), as depicted at block 1024.
The access point thus resolves the confusion and determines whether to initiate a handoff based on the unique identifier and received signal strength (e.g., as described herein), as shown at blocks 1026 and 1028.
Fig. 11 relates in some aspects to collision detection (e.g., automatic detection) by an access terminal. In particular, such an approach relates to an access terminal providing measurement reports with conflicting information.
The access terminal detects a collision for a given identifier of the first type, as shown in block 1102. For example, based on monitored pilot signals or other suitable signals, an access terminal may decide that multiple access points use the same PCID as described herein.
The access terminal may optionally obtain a second type of identifier (e.g., GCI) associated with the identifier for which the conflict has been indicated, as shown at block 1104. Also, such operations may be performed as described above.
The access terminal sends a measurement report including a plurality of entries for identifiers for which a conflict has been indicated, as shown in block 1106. For example, if two access terminals use PCID value 12, the measurement report may include two separate entries corresponding to PCID value 12. Further, the measurement report may optionally include a unique identifier (e.g., GCI) associated with each of these entries.
Fig. 12 relates in some aspects to automatic collision detection by an access terminal. In particular, such schemes involve sending measurement reports if the access terminal detects a collision.
The access terminal detects a collision for a given identifier of the first type, as shown at block 1202. As described above, the access terminal may determine that multiple access points use the same PCID based on monitored pilot signals or other suitable signals, as described herein.
In some aspects, collision detection may be indicated based on whether at least two nodes are currently using this same identifier or have recently used the same identifier. For example, a collision may be indicated if the access terminal is currently receiving synchronization or pilot signals from multiple access points using the same PCID. Further, a collision is indicated if the access terminal receives synchronization or pilot signals from multiple access points within a defined time (e.g., the last 10 seconds). Under certain conditions, this time period may be set to zero (e.g., for an access terminal that is moving very fast). Also, a collision may be indicated if the access terminal receives synchronization or pilot signals from multiple access points within a period associated with a defined number of handovers (e.g., the last four handovers). The latter approach may advantageously allow reports sent by slow moving access terminals to cover a desired geographic area. In other words, this approach allows for the detection of duplicate node identifiers over a wider geographic area.
As shown at block 1204, the access terminal may optionally obtain a second type of identifier (e.g., GCI) associated with the identifier for which the conflict has been indicated. Also, such operations may be performed as described above.
As shown at block 1206, the access terminal sends a measurement report if a collision is detected at block 1202. Further, the measurement report may optionally include a unique identifier (e.g., GCI) associated with each of these entries.
Fig. 13 relates in some aspects to an access terminal providing a collision report upon request. The access terminal receives a request for a collision report, block 1302. For example, the network may periodically request the access terminal to send measurement reports with conflicting information. Such a request may specify one or more identifiers (e.g., PCIDs) for which conflicting information is requested. This identifier may be an identifier of the requesting node (e.g., serving access point). Alternatively, this request may include a wildcard identifier, where the access terminal is requested to report all conflicts detected. The access terminal monitors signals from neighboring access points, and if so, detects a collision (block 1306). If a collision is detected at block 1306, the access terminal sends a collision report, as shown at block 1308. When the access terminal does not have any conflicting information, the access terminal may respond with a "no event" message or may not provide any response. It should be appreciated that one or more of the operations of FIGS. 11-13 may be combined in various ways in different embodiments.
As noted above, the teachings herein may be implemented in a network employing macro access points and femto nodes. Fig. 14 and 15 show examples of how access points may be deployed in such a network. Fig. 14 illustrates, in a simplified manner, how a cell 1402 (e.g., macro cells 1402A-1402G) of a wireless communication system 1400 can be served by a corresponding access point 1404 (e.g., access points 1404A-1404G). Here, the macro cell 1402 may correspond to the macro coverage area 204 of fig. 2. As shown in fig. 14, over time, access terminals 1406 (e.g., access terminals 1406A-1406L) may be dispersed throughout the system at various locations. For example, each access terminal 1406 may communicate with one or more access points on a forward link ("FL") and/or a reverse link ("RL") at a given moment, depending on whether the access terminal 1406 is active and whether it is in soft handoff. Using this cellular scheme, the wireless communication system 1400 may provide service over a large geographic area. For example, in a rural environment each of the macro cells 1402A-1402G may cover several tiles within adjacent or several square miles.
Fig. 15 illustrates an example of how one or more femto nodes can be deployed within a network environment (e.g., system 1400). In the system 1500 of fig. 15, multiple femto nodes 1510 (e.g., femto nodes 1510A and 1510B) are installed in a small area coverage network environment (e.g., in one or more user residences 1530). Each femto node 1510 may be coupled to a wide area network 1540 (e.g., the internet) and a mobile operator core network 1550 via a DSL router, cable modem, wireless link, or other connection means (not shown).
The owner of the femto node 1510 may subscribe to mobile services, such as 3G mobile services, provided through the mobile operator core network 1550. Further, an access terminal 1520 may be capable of operating in both large environments and in smaller area coverage (e.g., residential) network environments. In other words, depending on the current location of the access terminal 1520, the access terminal 1520 may be served by a macrocell access point 1560 associated with the mobile operator core network 1550 or by any one of a set of femto nodes 1510 (e.g., the femto nodes 1510A and 1510B located within a corresponding user residence 1530). For example, a user may be served by a standard macro access point (e.g., access point 1560) when the user is outside his home, and a femto node (e.g., node 1510A) when the user is near or at his home. Here, a femto node 1510 may be backward compatible with legacy access terminals 1520.
The femto nodes 1510 may be deployed on a single frequency, or in the alternative, on multiple frequencies. Depending on the particular configuration, a single frequency or one or more of the multiple frequencies may overlap with one or more frequencies used by a macro access point (e.g., access point 1560).
In some aspects, an access terminal 1520 may be configured to connect to a preferred femto node (e.g., a home femto node for the access terminal 1520) whenever such a connection is possible. For example, whenever an access terminal 1520A is within a user residence 1530, it may be desirable for the access terminal 1520A to communicate only with the home femto node 1510A or 1510B.
In some aspects, if the access terminal 1520 is operating within the macro cellular network 1550 but is not staying on its most preferred network (e.g., as defined in the preferred roaming list), the access terminal 1520 may continue to search for the most preferred network (e.g., the preferred femto node 1510) using better system selection ("BSR"), which may involve periodically scanning available systems to determine if a better system is currently available, and then attempting to associate with such a preferred system. With the acquisition entry, the access terminal 1520 may limit the search for a particular frequency band and channel. For example, the search for the most preferred system may be repeated periodically. Upon discovering the preferred femto node 1510, the access terminal 1520 selects the femto node 1510 to camp within its coverage area.
A femto node may be restricted in some aspects. For example, a given femto node may only provide particular services to particular access terminals. In deployments with so-called restricted (or closed) associations, a given access terminal may be served only by a macro cell mobile network and a defined set of femto nodes (e.g., femto node 1510 located within a corresponding user residence 1530). In some embodiments, a node may be restricted from providing, for at least one node, at least one of: signaling, data access, registration, paging, or service.
In some aspects, a restricted femto node (which may also be referred to as a closed subscriber group home node B) is a femto node that serves a restricted provisioning group of access terminals. This group can be expanded temporarily or permanently as desired. In some aspects, a closed subscriber group ("CSG") may be defined as a set of access points (e.g., femto nodes) that share a common access control list for access terminals. A channel on which all femto nodes (or all restricted femto nodes) in an area operate may be referred to as a femto channel.
Various relationships then exist between a given femto node and a given access terminal. For example, from the perspective of an access terminal, an open femto node may refer to a femto node without restricted association (e.g., the femto node allows access to any access terminal). A restricted femto node may refer to a femto node that is restricted in some manner (e.g., restricted in association and/or registration). A home femto node may refer to a femto node on which an access terminal is authorized to access and operate (e.g., to provide permanent access for a defined set of one or more access terminals). A guest femto node may refer to a femto node on which an access terminal is temporarily authorized to access or operate. An alien femto node may refer to a femto node on which an access terminal cannot access or operate except in a possible emergency (e.g., 911 call).
From the perspective of a restricted femto node, a home access terminal may refer to an access terminal that is authorized to access the restricted femto node (e.g., an access terminal that has permanent access to the femto node). A guest access terminal may refer to an access terminal that has temporary access to a restricted femto node (e.g., restricted based on deadline, time of use, bytes, number of connections, or some other criterion). An alien access terminal may refer to an access terminal that has no permission to access a restricted femto node (e.g., an access terminal that has no credentials or permission to register with the restricted femto node) except for possible emergency situations, such as 911 calls.
For convenience, the disclosure herein describes various functionality in the context of a femto node. It should be appreciated, however, that a pico node may provide the same or similar functionality for a larger coverage area. For example, a pico node may be restricted, a home pico node may be defined for a given access terminal, and so on.
The teachings herein may be implemented in a variety of communication devices. In some aspects, the teachings herein may be implemented in a wireless device that may be deployed in a multiple access communication system that may support communication for multiple wireless access terminals simultaneously. Here, each terminal may communicate with one or more access points via transmissions on forward and reverse links. The forward link (or downlink) refers to the communication link from the access points to the terminals, and the reverse link (or uplink) refers to the communication link from the terminals to the access points. Such communication links may be established via a single-in single-out system, a multiple-in multiple-out ("MIMO") system, or some other type of system.
For purposes of illustration, fig. 16 depicts example communication components that can be employed in a wireless device in the context of a MIMO-based system 800. The system 1600 employs a plurality (N)T) Transmitting antenna and a plurality of (N)R) And the receiving antenna is used for data transmission. Can be substituted by NTA transmitting antenna and NRMIMO channel formed by multiple receiving antennas is decomposed into NSIndividual channels, also called spatial channels, where NS≤min{NT,NR}。NSEach of the individual channels corresponds to a dimension. MIMO systems can provide improved performance (e.g., higher throughput and/or greater reliability) if the additional dimensionalities created by the multiple transmit and receive antennas are utilized.
System 1600 can support time division duplex ("TDD") and frequency division duplex ("FDD"). In a TDD system, the forward and reverse link transmissions are on the same frequency region, so that the reciprocity principle allows the estimation of the forward link channel from the reverse link channel. This enables the access point to extract transmit beamforming gain on the forward link when multiple antennas are available at the access point.
System 1600 includes a wireless device 1610, e.g., an access point, and a wireless device 1650, e.g., an access terminal. At the device 1610, traffic data for a number of data streams is provided from a data source 1612 to a transmit ("TX") data processor 1614.
In some aspects, each data stream is transmitted over a respective transmit antenna. TX data processor 1614 formats, codes, and interleaves the traffic data for each data stream based on a particular coding scheme selected for that data stream to provide coded data.
The coded data for each data stream may be multiplexed with pilot data using OFDM techniques. The pilot data is typically a known data pattern that is processed in a known manner and may be used at the receiver system to estimate the channel response. The multiplexed pilot data and coded data for each data stream is then modulated (i.e., symbol mapped) based on a particular modulation scheme (e.g., BPSK, QSPK, M-PSK, or M-QAM) selected for that data stream to provide modulation symbols. The data rate, coding, and modulation for each data stream may be determined by instructions performed by processor 1630. A data memory 1632 may store program code, data, and other information used by the processor 1630 or other components of the device 1610.
The modulation symbols for all data streams are then provided to a TX MIMO processor 1620, which may further process the modulation symbols (e.g., for OFDM). TX MIMO processor 1620 then feeds NTN is provided by transceivers ("XCVR") 1622A through 1622TTA stream of modulation symbols. In some aspects, TX MIMO processor 1620 applies beamforming weights to the symbols of the data streams and to the antenna from which the symbol is being transmitted.
Each transceiver 1622 receives and processes a respective symbol stream to provide one or more analog signals, and further conditions (e.g., amplifies, filters, and upconverts) the analog signals to provide a modulated signal suitable for transmission over the MIMO channel. Then respectively from NTN transmitted from transceivers 1622A through 1622T by antennas 1624A through 1624TTA modulated signal.
At apparatus 1650, the transmitted modulated signal is coded NRThe antennas 1652A through 1652R receive and provide signals received from each antenna 1652 to a respective transceiver ("XCVR") 1654A through 1654R. Each transceiver 1654 conditions (e.g., filters, amplifies, and downconverts) a respective received signal, digitizes the conditioned signal to provide samples, and performsThe samples are processed in one step to provide a corresponding "received" symbol stream.
Receive ("RX") data processor 1660 then operates on a particular receiver processing technique from NRA transceiver 1654 receives and processes NRA received symbol stream to provide NTA stream of "detected" symbols. RX data processor 1660 then demodulates, deinterleaves, and decodes the detected symbol streams to recover the traffic data for the data streams. The processing by RX data processor 1660 is complementary to that performed by TX MIMO processor 1620 and TX data processor 1614 at device 1610.
A processor 1670 periodically determines which pre-coding matrix to use (as described below). Processor 1670 formulates a reverse link message comprising a matrix index portion and a rank value portion. Data memory 1672 may store program code, data, and other information used by processor 1670 or other components of device 1650.
The reverse link message may comprise various information regarding the communication link and/or the received data stream. The reverse link message is then processed by a TX data processor 1638, modulated by a modulator 1680, conditioned by transceivers 1654A through 1654R, and transmitted back to device 1610, which also receives traffic data for a number of data streams from a data source 1636.
At the apparatus 1610, the modulated signals from the apparatus 1650 are received by the antennas 1624, conditioned by the transceivers 1622, demodulated by a demodulator ("DEMOD") 1640, and processed by a RX data processor 1642 to extract the reverse link message transmitted by the apparatus 1650. A processor 1630 then determines which pre-coding matrix to use for determining the beamforming weights then processes the extracted message.
Fig. 16 also illustrates that the communication components may include one or more components that perform obfuscation control operations as taught herein. For example, the confusion control component 1690 may cooperate with the processor 1630 and/or other components of the device 1610 to send/receive signals to/from another device (e.g., device 1650) as taught herein. Similarly, the confusion control component 1692 may cooperate with the processor 1670 and/or other components of the device 1650 to send/receive signals to/from another device (e.g., the device 1610). It should be appreciated that for each of the devices 1610 and 1650, the functionality of two or more of the described components may be provided by a single component. For example, a single processing component may provide the functionality of the obfuscation control component 1690 and the processor 1630, and a single processing component may provide the functionality of the obfuscation control component 1692 and the processor 1670.
The teachings herein may be incorporated into various types of communication systems and/or system components. In some aspects, the teachings herein may be employed in a multiple-access system capable of supporting communication with multiple users by sharing available system resources (e.g., by specifying bandwidth, transmit power, coding, interleaving, etc.). For example, the teachings herein may be applied to any one or combination of the following technologies: code division multiple access ("CDMA") systems, multi-carrier CDMA ("MCCDMA"), wideband CDMA ("W-CDMA"), high speed packet access ("HSPA", "HSPA +") systems, time division multiple access ("TDMA") systems, frequency division multiple access ("FDMA") systems, single carrier FDMA ("SC-FDMA") systems, orthogonal frequency division multiple access ("OFDMA") systems, or other multiple access techniques. A wireless communication system employing the teachings herein may be designed to implement one or more standards such as IS-95, CDMA2000, IS-856, W-CDMA, TDSCDMA, and others. The CDMA network may implement a radio technology such as universal terrestrial radio access ("UTRA"), CDMA2000, or some other technology. UTRA includes W-CDMA and low chip rate ("LCR"). CDMA2000 technology covers IS-2000, IS-95 and IS-856 standards. TDMA networks may implement radio technologies such as global system for mobile communications ("GSM"). OFDMA networks may implement methods such as evolved UTRA ("E-UTRA"), IEEE 802.11, IEEE 802.16, IEEE 802.20, Flash-And so on. UTRA, E-UTRA and GSM are parts of the Universal Mobile Telecommunications System ("UMTS"). This may be implemented in 3GPP Long term evolution ("LTE") systems, ultra Mobile broadband ("UMB") systems, and other types of systemsTo (3) is described. LTE is a UMTS release using E-UTRA. Although some aspects of the disclosure may be described using 3GPP terminology, it is apparent that the teachings herein may be applied to 3GPP (Re199, Re15, Re16, Re17) technology as well as 3GPP2(IxRTT, 1xEV-DO RelO, ReVA, RevB) technology and other technologies.
The teachings herein may be incorporated into (e.g., implemented within or performed by) a variety of devices (e.g., nodes). In some aspects, a node (e.g., a wireless node) implemented in accordance with the teachings herein may comprise an access point or an access terminal.
For example, an access terminal may comprise, be implemented as or referred to as a user equipment, a subscriber station, a subscriber unit, a mobile station, a mobile device, a mobile node, a remote station, a remote terminal, a user agent, a user device, or some other terminology. In some implementations, an access terminal can comprise a cellular telephone, a cordless telephone, a session initiation protocol ("SIP") phone, a wireless local loop ("WLL") station, a personal digital assistant ("PDA"), a handheld device having wireless connection capability, or some other suitable processing device connected to a wireless modem. Accordingly, one or more aspects taught herein may be incorporated into a phone (e.g., a cellular phone or smart phone), a computer (e.g., a laptop), a portable communication device, a portable computing device (e.g., a personal data assistant), an entertainment device (e.g., a music device, a video device, or a satellite radio), a global positioning system device, or any other suitable device for communicating via a wireless medium.
An access point may include, be implemented as or referred to as node B, e node B, radio network controller ("RNC"), base station ("BS"), radio base station ("RBS"), base station controller ("BSC"), base transceiver station ("BTS"), transceiver function ("TF"), radio transceiver, radio router, basic service set ("BSs"), extended service set ("ESS"), or some other similar terminology.
In some aspects, a node (e.g., an access point) may comprise an access node for a communication system. Such an access node may provide a connection to or to a network (e.g., a wide area network such as the internet or a cellular network), for example, via a wired or wireless communication link to the network. Thus, an access node may enable another node (e.g., an access terminal) to access a network or some other functionality. Further, it should be appreciated that one or both of the nodes may be portable or, in some cases, relatively non-portable.
Moreover, it should be appreciated that a wireless node may be capable of sending and/or receiving information in a non-wireless manner (e.g., via a wired connection). Thus, the receivers and transmitters discussed herein may include appropriate communication interface components (e.g., electrical or optical interface components) to communicate via a non-wireless medium.
The wireless nodes may communicate via one or more wireless communication links based on or otherwise supporting any suitable wireless communication technology. For example, in some aspects a wireless node may be associated with a network. In some aspects, the network may comprise a local area network or a wide area network. The wireless device may support or otherwise use one or more of various wireless communication technologies, protocols, or standards such as those described herein (e.g., CDMA, TDMA, OFDM, OFDMA, WiMAX, Wi-Fi, etc.). Similarly, the wireless node may support or otherwise use one or more of a variety of corresponding modulation or multiplexing schemes. The wireless node may then include appropriate components (e.g., air interfaces) to establish and communicate via one or more wireless communication links using the above or other wireless communication techniques. For example, a wireless node may include a wireless transceiver associated with transmitter and receiver components, which may include various components (e.g., signal generators and signal processors) that facilitate communication over a wireless medium.
The components described herein may be implemented in a number of ways. Referring to FIGS. 17-21, devices 1700, 1800, 1900, 2000, and 2100 are represented as a series of interrelated functional blocks. In some aspects, the functions of these blocks may be implemented as a processing system including one or more processor components. In some aspects, for example, the functions of these blocks may be implemented using at least a portion of one or more integrated circuits (e.g., an ASIC). As described herein, an integrated circuit may include a processor, software, other related components, or some combination thereof. The functions of these blocks may also be implemented in some other manner as taught herein. In some aspects, one or more of the dashed blocks in FIGS. 17-21 are optional.
Devices 1700, 1800, 1900, 2000, and 2100 may include one or more modules that may perform one or more of the functions described above with reference to the various figures. For example, the receiving module 1702, the message receiving module 1806, the request receiving module 1906, the signal receiving module 2012, or the receiving module 2108 may correspond to a receiver and/or a communication controller, for example, as discussed herein. The identity determination module 1704 or the same identifier determination module 1902 may, for example, correspond to the confusion detector discussed herein. The message sending module 1706, the identifier sending module 1802, the identifier defining module 1808, the identifier determining module 1908, the type determining module 2004, the second identifier determining module 2006, or the identifier selecting module 2104 may correspond to, for example, the identifier controller discussed herein. The transmitting module 1706 or the transmitting module 2008 may correspond to, for example, a transmitter and/or a communication controller as discussed herein. The threshold sending module 1804 or the threshold definition module 1810 may correspond to, for example, the threshold controllers discussed herein. The report sending module 1904 may correspond to, for example, a report generator as discussed herein. The first identifier determination module 2002, the identifier usage module 2010, the communication module 2102, or the transmission module 2106 may correspond to, for example, a communication controller as discussed herein. The signal strength determination module 2014 may correspond to, for example, the signal processors and/or receivers discussed herein.
It will be understood that the use of references to any element herein, such as "first," "second," etc., does not generally limit the amount or order of such elements. Rather, these references may be used herein as a convenient way to distinguish between two or more elements or instances of elements. Thus, reference to first and second elements does not imply that only two elements may be employed there or that the first element must somehow precede the second element. Also, unless otherwise specified, a group of elements may include one or more elements. Furthermore, as used in the specification or claims, the term "in the form of at least one of" A, B or "C" means "a or B or C or any combination of these elements.
Those of skill in the art would understand that information and signals may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols, and chips that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
Those of skill would further appreciate that any of the various illustrative logical blocks, modules, processors, mechanisms, circuits, and algorithm steps described in connection with the aspects disclosed herein may be implemented as electronic hardware (e.g., a digital implementation, an analog implementation, or a combination of the two, which may be designed using source coding or some other technique), various forms of program or design code incorporating instructions (which may be referred to herein, for convenience, as "software" or a "software module"), or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
The various illustrative logical blocks, modules, and circuits described in connection with the aspects disclosed herein may be implemented within or performed by an integrated circuit ("IC"), an access terminal, or an access point. The IC may include a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, electrical components, optical components, mechanical components, or any combination thereof designed to perform the functions described herein and may execute code or instructions that reside within the IC, external to the IC, or both. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
It should be apparent that any specific order or hierarchy of steps in any disclosed process is exemplary of a sample approach. It will be apparent that the specific order or hierarchy of steps in the processes may be rearranged based on design preferences while remaining within the scope of the present disclosure. The accompanying method claims present elements of the various steps in a sample order, and are not intended to be limited to the specific order or hierarchy presented.
The functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of data structures and that can be accessed by a computer. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. As used herein, disks and platters include Compact Disks (CDs), laser disks, optical disks, Digital Versatile Disks (DVDs), floppy disks, and blu-ray disks where disks usually reproduce data magnetically, while platters reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media. In general, it should be appreciated that the computer-readable medium may be implemented in any suitable computer program product.
In view of the foregoing, in some aspects a first method of communication comprises: receiving a message for a node identified by the first node identifier; determining whether another node is identified by the first node identifier; and sending a message specifying establishment of communication with the node using the second node identifier as a result of the determination. Further, in some aspects, at least one of the following may also be applied to the first communication method: determining whether another node is identified by the first node identifier comprises determining whether a plurality of cells use the designated cell identifier; the second node identifier uniquely identifies the node; the first node identifier is unique in a first area and the second node identifier is unique in a second area larger than the first area; the message comprises a handover request, interference management signaling, a signal strength measurement report or a message for reserving at least one resource; the method further comprises the following steps: receiving another message for the node, wherein the other message includes a second node identifier, and tunneling the other message to the node; the judgment comprises the following steps: performing neighbor discovery, or determining whether a first identifier is found in a list of identifiers; the column identifier includes a range; the message includes an indication of the first node identifier, the determining including comparing the indication to a list of node identifier indications; the list of node identifier indications includes a node identifier common to more than one node in an area, the node identifier received via another message or through neighbor discovery; the first node identifier comprises a physical cell identifier, a pilot identifier or a pseudo-random number sequence, and the second node identifier comprises a cell global identifier, an access network identifier or a sector identifier; the node comprises an access point; the nodes comprise femto cells or pico cells; the node is restricted so as not to provide at least one of signaling, data access, alignment, paging, or service to at least one other node.
In some aspects, an apparatus for communication comprises: a receiver for receiving a message for a node identified by a first node identifier; a confusion detector for determining whether another node is identified by the first node identifier; and an identifier controller for sending a message specifying establishment of communication with the node using the second node identifier as a result of the determination.
In some aspects, an apparatus for communication comprises: means for receiving a message for a node identified by a first node identifier; means for determining whether another node is identified by the first node identifier; and means for sending a message specifying establishment of communication with the node using the second node identifier as a result of the determination.
In some aspects, a computer program product comprises: a computer-readable medium comprising code for causing a computer to: receiving a message for a node identified by the first node identifier; determining whether another node is identified by the first node identifier; and sending a message specifying establishment of communication with the node using the second node identifier as a result of the determination.
In some aspects, a second method of communication comprises: selecting to send a message to a node identified by the first node identifier; determining whether another node is likely to be identified by the first node identifier; and establishing communication with the node using the second node identifier based on the determination. Further, in some aspects, at least one of the following may also be applied to the second communication method: the second node identifier uniquely identifies the node; the first node identifier is unique in a first area and the second node identifier is unique in a second area larger than the first area; the message comprises a handover request, interference management signaling, a signal strength measurement report or a message for reserving at least one resource; determining comprises receiving a message indicating whether another node is identified by the first node identifier; the method further includes sending a message including an indication of the first node identifier to establish the communication, wherein determining includes receiving a response to the message, the response specifying that the communication was established using the second node identifier; the judgment comprises the following steps: attempting to communicate with another node; and receiving a message from another node indicating an unauthorized communication; the method further includes continuing to attempt to establish communication with the node using the second node identifier; the first node identifier comprises a physical cell identifier, a pilot identifier or a pseudo-random number sequence, and the second node identifier comprises a cell global identifier, an access network identifier or a sector identifier; the node comprises an access point; the nodes comprise femto cells or pico cells; the node is restricted so as not to provide at least one of signaling, data access, alignment, paging, or service to at least one other node.
In some aspects, an apparatus for communication comprises: a communication controller for selecting to send a message to a node identified by the first node identifier; and a confusion detector for determining whether another node is likely to be identified by the first node identifier; wherein the communication controller is further configured to establish communication with the node using the second node identifier based on the determination.
In some aspects, an apparatus for communication comprises: means for selecting to send a message to a node identified by the first node identifier; means for determining whether another node is likely to be identified by the first node identifier; and means for establishing communication with the node using the second node identifier based on the determination.
In some aspects, a computer program product comprises: a computer-readable medium comprising code for causing a computer to: selecting to send a message to a node identified by the first node identifier; determining whether another node is likely to be identified by the first node identifier; and establishing communication with the node using the second node identifier based on the determination.
In some aspects, a third method of communication includes: determining a first identifier for establishing communication with an access point; determining a type of the first identifier; and determining a second identifier for establishing communication with the access point based on the type of the first identifier. Further, in some aspects, at least one of the following may also be applied to the third communication method: determining the type of the first identifier includes receiving a message indicating whether another node is identified by the first node identifier; the method also includes continuing to attempt to establish communication with the access point using the second identifier; determining the type of the first identifier includes determining whether a plurality of cells use the same cell identifier of the first type; the method also includes transmitting a measurement report, the measurement report including a plurality of entries for a same cell identifier; the first identifier comprises a physical cell identifier associated with the access point, a pseudo-random number offset associated with the access point, or an acquisition pilot associated with the access point, and the second identifier comprises a global cell identifier associated with the access point, an internet protocol address associated with the access point, or an identifier that uniquely identifies the access point within the network; invoking a determination of the second identifier to avoid confusion that would otherwise result from using the first identifier when establishing communication with the access point; the determination of the second identifier is based on whether the value of the first identifier is one of a set of specified values; the set of specified values is associated with access points that are specified as not being confusion-free; the set of specified values is associated with a closed subscriber group; the set of specified values is associated with at least one specified type; the at least one specified type relates to at least one of the group consisting of transmit power, coverage area, and relay capability; the method also includes receiving a list of the set of specified values from another access point; establishing communication with the access point comprises transmitting a second identifier along with a signal strength measurement message, a radio resource report, or a handover request; transmitting the second identifier to another access point that initiates a handover to the access point; the method also includes sending a message to the access point using the second identifier; the access point comprises a femto cell or a pico cell; an access point serves a restricted group of at least one access terminal.
In some aspects, an apparatus for communication comprises: a communication controller for determining a first identifier for establishing communication with an access point; and an identifier controller for determining a second identifier for establishing communication with the access point based on the first identifier.
In some aspects, an apparatus for communication comprises: means for determining a first identifier for establishing communication with an access point; and means for determining a second identifier for establishing communication with the access point based on the first identifier.
In some aspects, a computer program product comprises: a computer-readable medium comprising code for causing a computer to: determining a first identifier for establishing communication with an access point; and determining a second identifier for establishing communication with the access point based on the first identifier.
In some aspects, a fourth method of communication comprises: communicating with a first access point; selecting an identifier of a set of identifiers associated with a first access point; and transmitting the selected identifier to the second access point upon establishing communication with the second access point. Further, in some aspects, at least one of the following may also be applied to the fourth communication method: the selection of the identifier is based on a node type associated with the first access point; the set of identifiers includes a first identifier and a second identifier, the selected identifier including the second identifier; the first identifier comprises a physical cell identifier associated with the first access point, a pseudo-random number offset associated with the first access point, or an acquisition pilot associated with the first access point, and the second identifier comprises a global cell identifier associated with the first access point, an internet protocol address associated with the first access point, or an identifier that uniquely identifies the first access point within the network; selecting the second identifier to avoid confusion that would otherwise result from using the first identifier when establishing communication with the second access point; the selection of the identifier is based on whether the value of the first identifier is one of a set of specified values; the set of specified values is associated with at least one of the group of access points, closed subscriber groups, and access points of at least one specified type that are specified to be non-confusion; the at least one specified type relates to at least one of the group consisting of transmit power, coverage area, and relay capability; the method also includes receiving a list of the set of specified values from the first access point; sending the selected identifier along with the connection request; losing selection of the communication trigger identifier with the first access point; the second access point establishing communication with the first access point using the selected identifier and/or obtaining configuration information from the first access point; the first access point comprises a femto cell or a pico cell; the first access point serves a restricted group of at least one access terminal.
In some aspects, an apparatus for communication comprises: a communication controller for communicating with a first access point; and an identifier controller for selecting an identifier of a set of identifiers associated with the first access point; wherein the communication controller is further configured to transmit the selected identifier to the second access point upon establishing communication with the second access point.
In some aspects, an apparatus for communication comprises: means for communicating with a first access point; means for selecting an identifier of a set of identifiers associated with a first access point; and means for transmitting the selected identifier to the second access point upon establishing communication with the second access point.
In some aspects, a computer program product comprises: a computer-readable medium comprising code for causing a computer to: communicating with a first access point; selecting an identifier of a set of identifiers associated with a first access point; and transmitting the selected identifier to the second access point upon establishing communication with the second access point.
In some aspects, a fifth method of communication comprises: determining whether a plurality of cells use the same cell identifier of the first type; and transmitting a request for a second type of cell identifier associated with the first type of cell identifier based on the determining. Further, in some aspects, at least one of the following may also be applied to the fifth communication method: the first type of cell identifier comprises a physical cell identifier and the second type of cell identifier comprises a global cell identifier; the method further comprises receiving a measurement report indicating that one of the cells uses a cell identifier that may cause confusion; determining neighbor discovery based on a cell identifier indicating cell usage; determining a received message based on a cell identifier indicating cell usage; the method further comprises the following steps: receiving a response to the request, wherein the response includes a cell identifier of the second type, and initiating a handover using the cell identifier of the second type; the cells include femto or pico cells; the method is performed by a base station.
In some aspects, an apparatus for communication comprises: a confusion detector for determining whether the first cell and the second cell use the same cell identifier of the first type; and an identifier controller for sending a request for a second type of cell identifier associated with the first type of cell identifier based on the determination.
In some aspects, an apparatus for communication comprises: means for determining whether the first cell and the second cell use the same cell identifier of the first type; and means for sending a request for a second type of cell identifier associated with the first type of cell identifier based on the determination.
In some aspects, a computer program product comprises: a computer-readable medium comprising code for causing a computer to: determining whether the first cell and the second cell use the same cell identifier of the first type; and transmitting a request for a second type of cell identifier associated with the first type of cell identifier based on the determining.
In some aspects, a sixth method of communication comprises: receiving a signal associated with a cell identifier; determining whether the cell identifier is one of a defined set of cell identifiers of a first type; determining whether a signal strength of the signal is greater than or equal to a threshold associated with a defined set of cell identifiers; if the cell identifier is one of a defined set of cell identifiers and the signal strength is greater than or equal to a threshold, obtaining a cell identifier of a second type identifier associated with the cell identifier; and transmitting a message including the acquired cell identifier. Further, in some aspects, at least one of the following may also be applied to the sixth communication method: the first type of cell identifier comprises a physical cell identifier and the second type of cell identifier comprises a global cell identifier; a defined set comprising a subset of all cell identifiers of said first type, the defined set identifying cell identifiers of a plurality of cells within a coverage area that may be allocated to another cell; obtaining the cell identifier comprises receiving the cell identifier from a cell transmitting the signal; the message comprises a measurement report; the method further includes, as a result of sending the message, receiving a command to perform a handover to a cell associated with the acquired cell identifier; the method also includes receiving a defined set of cell identifiers and a threshold over the air; a first type of cell identifier identifies a femto or pico cell; the method is performed by an access terminal.
In some aspects, an apparatus for communication comprises: a receiver for receiving a signal associated with a cell identifier; a comparator that determines whether the cell identifier is one of a defined set of cell identifiers of a first type; a signal processor that determines whether a signal strength of a signal is greater than or equal to a threshold associated with a defined set of cell identifiers; an identifier controller for obtaining a cell identifier of a second type identifier associated with the cell identifier if the cell identifier is one of a defined set of cell identifiers and the signal strength is greater than or equal to a threshold; and a transmitter for transmitting a message including the acquired cell identifier.
In some aspects, an apparatus for communication comprises: means for receiving a signal associated with a cell identifier; means for determining whether the cell identifier is one of a defined set of cell identifiers of a first type; means for determining whether a signal strength of a signal is greater than or equal to a threshold associated with a defined set of cell identifiers; means for obtaining a cell identifier of a second type identifier associated with the cell identifier if the cell identifier is one of a defined set of cell identifiers and the signal strength is greater than or equal to a threshold; and means for transmitting a message including the acquired cell identifier.
In some aspects, a computer program product comprises: a computer-readable medium comprising code for causing a computer to: receiving a signal associated with a cell identifier; determining whether the cell identifier is one of a defined set of cell identifiers of a first type; determining whether a signal strength of the signal is greater than or equal to a threshold associated with a defined set of cell identifiers; if the cell identifier is one of a defined set of cell identifiers and the signal strength is greater than or equal to a threshold, obtaining a cell identifier of a second type identifier associated with the cell identifier; and transmitting a message including the acquired cell identifier.
In some aspects, a seventh method of communication comprises: sending a defined set of cell identifiers of a first type to a node; sending a threshold associated with a defined set of cell identifiers to the node, wherein the threshold is used to determine whether to acquire a second type of cell identifier; and receiving a message from the node comprising one of the cell identifiers of the second type. Further, in some aspects, at least one of the following may also be applied to the seventh communication method: the first type of cell identifier comprises a physical cell identifier and the second type of cell identifier comprises a global cell identifier; a defined set comprising a subset of a superset of all cell identifiers of said first type, the defined set identifying cell identifiers of a plurality of cells within a coverage area potentially allocated to another cell; the method also includes defining a defined set of cell identifiers; defining a defined set of cell identifiers comprises identifying a plurality of neighboring cells using a common cell identifier of the first type; the method also includes defining a threshold; the message comprises a measurement report; the method further comprises instructing the node to perform a handover to a cell associated with the received cell identifier of the second type; a first type of cell identifier identifies a femto or pico cell; the method is performed by a base station.
In some aspects, an apparatus for communication comprises: an identifier controller for sending a defined set of cell identifiers of a first type to a node; a threshold controller for sending a threshold associated with a defined set of cell identifiers to the node, wherein the threshold is used to determine whether to acquire a second type of cell identifier; and a receiver for receiving a message from the node comprising one of the cell identifiers of the second type.
In some aspects, an apparatus for communication comprises: means for transmitting a defined set of cell identifiers of a first type to a node; means for sending a threshold associated with a defined set of cell identifiers to a node, wherein the threshold is used to determine whether to acquire a second type of cell identifier; and means for receiving a message from the node including one of the cell identifiers of the second type.
In some aspects, a computer program product comprises: a computer-readable medium comprising code for causing a computer to: sending a defined set of cell identifiers of a first type to a node; sending a threshold associated with a defined set of cell identifiers to the node, wherein the threshold is used to determine whether to acquire a second type of cell identifier; and receiving a message from the node comprising one of the cell identifiers of the second type.
In some aspects, an eighth method of communication comprises: receiving a message including a specified first type of cell identifier; judging whether a plurality of cells use the appointed cell identifier; and transmitting a request for a second type of cell identifier associated with the specified cell identifier based on the determination. Further, in some aspects, at least one of the following may also be applied to the eighth communication method: the first type of cell identifier comprises a physical cell identifier and the second type of cell identifier comprises a global cell identifier; the message further includes a first indication of a signal strength of a first signal received from a first one of the cells using the specified cell identifier, the method further includes determining whether cell identifier confusion is likely to occur based on the first indication of a received signal strength and a second indication of a received signal strength of a second signal from a second one of the cells using the specified cell identifier, and the sending the request is further based on the determination of whether cell identifier confusion is likely to occur; sending a first type of defined group of cell identifiers to a node sending the message, and sending a threshold associated with the defined group of cell identifiers to the node, wherein the threshold is used for judging whether to acquire a second type of cell identifiers; a defined set comprising a subset of a superset of all cell identifiers of said first type, the defined set identifying cell identifiers of a plurality of cells within a coverage area potentially allocated to another cell; the message comprises a measurement report; the method further comprises instructing the node to perform a handover to a cell associated with the received cell identifier of the second type; a first type of cell identifier identifies a femto or pico cell; the method is performed by a base station.
In some aspects, an apparatus for communication comprises: a receiver for receiving a message comprising a cell identifier of a specified first type; a confusion detector for determining whether a plurality of cells use the designated cell identifier; and an identifier controller for sending a request for a cell identifier of a second type associated with the specified cell identifier based on the determination.
In some aspects, an apparatus for communication comprises: means for receiving a message comprising a specified first type of cell identifier; means for determining whether a plurality of cells use a specified cell identifier; and means for sending a request for a second type of cell identifier associated with the specified cell identifier based on the determination.
In some aspects, a computer program product comprises: a computer-readable medium comprising code for causing a computer to: receiving a message including a specified first type of cell identifier; judging whether a plurality of cells use the appointed cell identifier; and transmitting a request for a second type of cell identifier associated with the specified cell identifier based on the determination.
In some aspects, a ninth method of communication comprises: determining whether a plurality of cells use the same cell identifier of the first type; and transmitting a measurement report including a plurality of entries for the same cell identifier. Further, in some aspects, at least one of the following may also be applied to the ninth communication method: the method further includes determining a second type of cell identifier associated with the same cell identifier, the measurement report further including the second type of cell identifier; the first type of cell identifier comprises a physical cell identifier and the second type of cell identifier comprises a global cell identifier; determining comprises receiving signals from a plurality of cells, the signals comprising the same cell identifier; the cells include femto or pico cells; the method is performed by an access terminal.
In some aspects, an apparatus for communication comprises: a confusion detector for determining whether a plurality of cells use the same cell identifier; and a measurement report generator for transmitting a measurement report including a plurality of entries for the same cell identifier.
In some aspects, an apparatus for communication comprises: means for determining whether a plurality of cells use the same cell identifier; and means for transmitting a measurement report including a plurality of entries for the same cell identifier.
In some aspects, a computer program product comprises: a computer-readable medium comprising code for causing a computer to: judging whether a plurality of cells use the same cell identifier; and transmitting a measurement report including a plurality of entries for the same cell identifier.
In some aspects, a tenth method of communication comprises: judging whether a plurality of cells use the same cell identifier; and sending a measurement report based on the determination. Further, in some aspects, at least one of the following may also be applied to the tenth communication method: the method also includes receiving a request for obfuscation information; the measurement report is sent in response to the request and includes an indication of the determination; the same cell identifier comprises a physical cell identifier; a cell reporting a cell from which a synchronization signal and/or a pilot signal is currently being received; the cells include cells from which synchronization signals and/or pilot signals are received at defined time periods; the cells include cells from which synchronization signals and/or pilot signals are received at a time period associated with a defined number of handovers; the same cell identifier is a first type of cell identifier, the method further comprises determining a second type of cell identifier associated with the same cell identifier, the measurement report further comprising the second type of cell identifier; the first type of cell identifier comprises a physical cell identifier and the second type of cell identifier comprises a global cell identifier; determining comprises receiving signals from a plurality of cells, the signals comprising the same cell identifier; the cells include femto or pico cells; the method is performed by an access terminal.
In some aspects, an apparatus for communication comprises: a confusion detector for determining whether a plurality of cells use the same cell identifier; and a measurement report generator for sending a measurement report based on the determination.
In some aspects, an apparatus for communication comprises: means for determining whether a plurality of cells use the same cell identifier; and a module that sends a measurement report based on the determination.
In some aspects, a computer program product comprises: a computer-readable medium comprising code for causing a computer to: judging whether a plurality of cells use the same cell identifier; and sending a measurement report based on the determination.
In view of the above, in some aspects an eleventh method of communication comprises: receiving a request for obfuscated information; judging whether a plurality of cells use the same cell identifier; and sending a message in response to the request, wherein the message includes an indication of the determination. Further, in some aspects, at least one of the following may also be applied to the eleventh communication method: the same cell identifier comprises a physical cell identifier; the request for confusion information relates to a specified cell identifier; transmitting a message due to a determination that a plurality of cells use the same cell identifier; the request comprises a request for a measurement report; the message comprises a measurement report; the cells include femto or pico cells; the method is performed by an access terminal.
In some aspects, an apparatus for communication comprises: a receiver for receiving a request for obfuscated information; a confusion detector for determining whether a plurality of cells use the same cell identifier; and a transmitter for sending a message in response to the request, wherein the message includes an indication of the determination.
In some aspects, an apparatus for communication comprises: means for receiving a request for obfuscated information; means for determining whether a plurality of cells use the same cell identifier; and means for sending a message in response to the request, wherein the message includes an indication of the determination.
In some aspects, a computer program product comprises: a computer-readable medium comprising code for causing a computer to: receiving a request for obfuscated information; judging whether a plurality of cells use the same cell identifier; and sending a message in response to the request, wherein the message includes an indication of the determination.
In some aspects, for example, functionality corresponding to one or more of the above aspects relating to the first, second, third, fourth, fifth, sixth, seventh, eighth, ninth, tenth and eleventh communication methods may be implemented in a device using a structure as taught herein. Furthermore, the computer program product may comprise code for causing a computer to provide functions corresponding to one or more of the above aspects relating to the first, second, third, fourth, fifth, sixth, seventh, eighth, ninth, tenth and eleventh communication methods.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present disclosure. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles described herein may be applied to other aspects without departing from the scope of the disclosure. Thus, the present disclosure is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (21)
1. A method of communication, comprising:
receiving a signal associated with a first identifier for establishing communication with an access point;
determining the first identifier;
determining a type of the first identifier, wherein the determination of the type comprises determining whether the first identifier is one of a defined set of cell identifiers of a first type; and
determining a second identifier for establishing communication with the access point based on the type of the first identifier,
wherein the first identifier and the second identifier are of different types and the determination of the second identifier is based on whether the value of the first identifier is one of a set of designated values from a defined set of the cell identifiers, wherein the set of designated values is associated with at least one of a group, wherein the group consists of: are designated as access points that are not confusion free, as closed subscriber groups, or as access points of at least one designated type.
2. The method of claim 1, wherein the determination of the type of the first identifier comprises receiving a message indicating whether another node is identified by the first identifier.
3. The method of claim 1, further comprising using the second identifier for subsequent attempts to establish communication with the access point.
4. The method of claim 1, wherein:
the defined set comprises a subset of all cell identifiers of the first type; and is
The defined set identifies cell identifiers that may be assigned to a plurality of cells within a coverage area of another cell.
5. The method of claim 1, wherein:
the first identifier comprises a physical cell identifier associated with the access point, a pseudo-random number offset associated with the access point, or an acquisition pilot associated with the access point; and is
The second identifier comprises a global cell identifier associated with the access point, an internet protocol address associated with the access point, or an identifier that uniquely identifies the access point within a network.
6. The method of claim 1, wherein the set of designated values is associated with access points of at least one designated type.
7. The method of claim 6, wherein the at least one specified type relates to at least one of the group consisting of transmit power, coverage area, and relay capability.
8. An apparatus for communication, comprising:
a receiver configured to receive a signal associated with a first identifier for establishing communication with an access point;
a communication controller configured to determine the first identifier; and
an identifier controller configured to determine a type of the first identifier, and further configured to determine a second identifier for establishing communication with the access point based on the type of the first identifier, wherein the type determination includes determining whether the first identifier is one of a defined set of cell identifiers of the first type,
wherein the first identifier and the second identifier are of different types and the determination of the second identifier is based on whether the value of the first identifier is one of a set of designated values from a defined set of the cell identifiers, wherein the set of designated values is associated with at least one of a group, wherein the group consists of: are designated as access points that are not confusion free, as closed subscriber groups, or as access points of at least one designated type.
9. The apparatus of claim 8, wherein the determination of the type of the first identifier comprises receiving a message indicating whether another node is identified by the first identifier.
10. The apparatus of claim 8, wherein the communication controller is further configured to use the second identifier for subsequent attempts to establish communication with the access point.
11. The apparatus of claim 8, wherein:
the defined set comprises a subset of all cell identifiers of the first type; and is
The defined set identifies cell identifiers that may be assigned to a plurality of cells within a coverage area of another cell.
12. The apparatus of claim 8, wherein:
the first identifier comprises a physical cell identifier associated with the access point, a pseudo-random number offset associated with the access point, or an acquisition pilot associated with the access point; and is
The second identifier comprises a global cell identifier associated with the access point, an internet protocol address associated with the access point, or an identifier that uniquely identifies the access point within a network.
13. The apparatus of claim 8, wherein the set of designated values is associated with access points of at least one designated type.
14. The apparatus of claim 13, wherein the at least one specified type relates to at least one of the group consisting of transmit power, coverage area, and relay capability.
15. An apparatus for communication, comprising:
means for receiving a signal associated with a first identifier for establishing communication with an access point;
means for determining the first identifier;
means for determining a type of the first identifier, wherein the determination of the type comprises determining whether the first identifier is one of a defined set of cell identifiers of a first type; and
means for determining a second identifier for establishing communication with the access point based on the type of the first identifier,
wherein the first identifier and the second identifier are of different types and the determination of the second identifier is based on whether the value of the first identifier is one of a set of designated values from a defined set of the cell identifiers, wherein the set of designated values is associated with at least one of a group, wherein the group consists of: are designated as access points that are not confusion free, as closed subscriber groups, or as access points of at least one designated type.
16. The apparatus of claim 15, wherein the determination of the type of the first identifier comprises receiving a message indicating whether another node is identified by the first identifier.
17. The apparatus of claim 15, further comprising means for using the second identifier for subsequent attempts to establish communication with the access point.
18. The apparatus of claim 15, wherein:
the defined set comprises a subset of all cell identifiers of the first type; and is
The defined set identifies cell identifiers that may be assigned to a plurality of cells within a coverage area of another cell.
19. The apparatus of claim 15, wherein:
the first identifier comprises a physical cell identifier associated with the access point, a pseudo-random number offset associated with the access point, or an acquisition pilot associated with the access point; and is
The second identifier comprises a global cell identifier associated with the access point, an internet protocol address associated with the access point, or an identifier that uniquely identifies the access point within a network.
20. The apparatus of claim 15, wherein the set of designated values is associated with access points of at least one designated type.
21. The apparatus of claim 20, wherein the at least one specified type relates to at least one of the group consisting of transmit power, coverage area, and relay capability.
Applications Claiming Priority (11)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US98864607P | 2007-11-16 | 2007-11-16 | |
| US60/988,646 | 2007-11-16 | ||
| US5965408P | 2008-06-06 | 2008-06-06 | |
| US61/059,654 | 2008-06-06 | ||
| US7411408P | 2008-06-19 | 2008-06-19 | |
| US61/074,114 | 2008-06-19 | ||
| US7493508P | 2008-06-23 | 2008-06-23 | |
| US61/074,935 | 2008-06-23 | ||
| US12/269,676 US9648493B2 (en) | 2007-11-16 | 2008-11-12 | Using identifiers to establish communication |
| US12/269,676 | 2008-11-12 | ||
| PCT/US2008/083658 WO2009065053A2 (en) | 2007-11-16 | 2008-11-14 | Using identifiers to establish communication |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| HK1151669A1 HK1151669A1 (en) | 2012-02-03 |
| HK1151669B true HK1151669B (en) | 2015-09-18 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN101911769B (en) | Use identifiers to establish communication | |
| CN101861746B (en) | Solve node identifier confusion | |
| AU2013224736B2 (en) | Using identifiers to establish communication | |
| HK1194894A (en) | Using identifiers to establish communication | |
| HK1151669B (en) | Using identifiers to establish communication | |
| HK1194894B (en) | Using identifiers to establish communication | |
| HK1149669B (en) | Resolving node identifier confusion | |
| HK1149669A (en) | Resolving node identifier confusion |