[go: up one dir, main page]

HK1228162A - Machine-to-machine communication device and method for providing enhanced access barring in a wireless network - Google Patents

Machine-to-machine communication device and method for providing enhanced access barring in a wireless network Download PDF

Info

Publication number
HK1228162A
HK1228162A HK17101540.4A HK17101540A HK1228162A HK 1228162 A HK1228162 A HK 1228162A HK 17101540 A HK17101540 A HK 17101540A HK 1228162 A HK1228162 A HK 1228162A
Authority
HK
Hong Kong
Prior art keywords
information
eab
access
network
processing
Prior art date
Application number
HK17101540.4A
Other languages
Chinese (zh)
Other versions
HK1228162A1 (en
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed filed Critical
Publication of HK1228162A publication Critical patent/HK1228162A/en
Publication of HK1228162A1 publication Critical patent/HK1228162A1/en

Links

Description

Machine-to-machine communication device and method for providing enhanced access barring in a wireless network
Priority requirement
Priority of united states provisional patent application serial No. 61/481024 (reference number: P37916Z), filed on 29.4.2011, is claimed and is incorporated herein by reference in its entirety.
RELATED APPLICATIONS
The present application is related to a patent application entitled "EXTENDED ACCESS BARRING" filed concurrently herewith (attorney docket No.: 3224-P39105PCT, reference No.: P39105 PCT).
Technical Field
Embodiments relate to wireless communications. Some embodiments relate to enhanced access barring of wireless devices on a wireless network.
Background
While electronic wireless communication has been available for decades, in the very short past not too far away, daily interactions with devices with such functionality have shifted from the results of listening or watching such technology at home to carrying high-functionality devices almost everywhere they have arrived. As wireless services increase, so do support technologies, particularly in the area of voice communications. However, advances in wireless technology in the general field of information communication have enabled the automatic exchange of information without the need for continuous user interaction. In doing so, various industries have made available wireless devices that automatically access wireless networks, such as mobile or cellular networks, and automatically exchange information with other wireless devices. These machine-to-machine (M2M) wireless devices can be allowed to access the wireless network under the same protocol as a cellular phone. However, the ease with which these M2M devices can be implemented and the variety of data collection functions they can provide have led to a proliferation of M2M devices and, correspondingly, an increase in overall wireless traffic demand.
Drawings
Fig. 1 generally illustrates a wireless network system 100, such as a wireless mobile network, in accordance with one embodiment of the present subject matter.
Fig. 2 generally illustrates an example User Equipment (UE).
Fig. 3 and 4 generally illustrate message flow diagrams between a base station and one or more UEs for providing Enhanced Access Barring (EAB).
In the drawings, which are not necessarily drawn to scale, like numerals may describe similar components in different views. Like numerals having different letter suffixes may represent different instances of similar components. By way of example, and not limitation, the figures generally illustrate various embodiments discussed in this document.
Detailed Description
The following description and the annexed drawings set forth in detail certain illustrative embodiments, implementations of which will be apparent to those skilled in the art. Other embodiments may incorporate structural, logical, electrical, process, and other changes. Portions and features of some embodiments may be included in, or substituted for, those of others. Embodiments set forth in the claims encompass all available equivalents of those claims.
The present inventors, among other things, have recognized that the proliferation of human-to-human wireless devices and the proliferation of M2M devices have created opportunities to more efficiently handle overload conditions associated with accessing wireless communication networks, such as, but not limited to, mobile wireless networks.
The following abbreviations may be used herein: evolved universal terrestrial radio access network (E-UTRAN), Long Term Evolution (LTE), third Generation partnership project (3GPP), Universal Mobile Telecommunications System (UMTS), Worldwide Interoperability for Microwave Access (WiMAX), Wireless Local Area Network (WLAN), Orthogonal Frequency Division Multiplexing (OFDM), Orthogonal Frequency Division Multiple Access (OFDMA), Code Division Multiple Access (CDMA), Multiple Input Multiple Output (MIMO), Multi-user MIMO (MU-MIMO), Single user MIMO (SU-MIMO), Radio Access Technology (RAT), Radio Access Network (RAN), Wireless Fidelity (WiFi), Institute of Electrical and Electronics Engineers (IEEE).
Fig. 1 generally illustrates a wireless network system 100, such as a wireless mobile network, in accordance with one embodiment of the present subject matter. In various embodiments, the wireless network system 100 can include a core network device 101, a base station 102 (sometimes referred to as a node B or enhanced or evolved node B (enb)), and a plurality of apparatuses 104 (sometimes referred to as User Equipment (UE)) capable of communicating with or through the wireless network system 100. In certain embodiments, the wireless network system 100 can include one or more communication paths between base stations 102 (e.g., enbs) that are independent of the core network device 101. In some embodiments, the UE can include a UE that is capable of communicating with other UEs automatically with little or no user intervention. Such UEs can be referred to as machine-to-machine (M2M) devices. The base station 102 and the UE 104 can operate as part of an LTE-a network, such as a Radio Access Network (RAN) or UMTS network. The base station 102 and the UE 104 are able to communicate with each other using multiple channels. In various embodiments, the base station 102 and the M2M-capable UE 104 may be configured to communicate Orthogonal Frequency Division Multiplexed (OFDM) communication signals over a multicarrier communication channel. The OFDM signal can include a plurality of orthogonal subcarriers. In some broadband multicarrier embodiments, base station 102 can be part of a Broadband Wireless Access (BWA) network communication station, such as a Worldwide Interoperability for Microwave Access (WiMAX) communication station. In some other wideband multicarrier embodiments, base station 102 may be a third generation partnership project (3GPP) Universal Terrestrial Radio Access Network (UTRAN) Long Term Evolution (LTE) or Long Term Evolution (LTE) communication station, although the scope of the invention is not limited in this respect. In these wideband multicarrier embodiments, the base station 102 and the UE (e.g., M2M device) can be configured to communicate in accordance with Orthogonal Frequency Division Multiple Access (OFDMA) techniques.
For more information on the IEEE 802.16 standard, see "IEEE information technology standard-telecommunications and information exchange between systems" -metropolitan area network-requirements-part 16: "air interface for fixed broadband wireless access system" (5 months 2005) and related revisions/versions. To obtain more information about the UTRAN LTE standard, see the third generation partnership project (3GPP) standards for UTRAN-LTE (release 8, month 3 2008), including variations and evolutions thereof.
In some embodiments, the base station 102 and the UE 104, such as an M2M device, can use one or more antennas for communicating RF signals between the UE 104 and the network. In some embodiments, the antennas can include one or more directional or omnidirectional antennas, including, for example, dipole antennas, monopole antennas, patch antennas, loop antennas, microstrip antennas or other types of antennas suitable for transmission of RF signals. In various embodiments, a single antenna with multiple apertures can be used instead of two or more antennas. In these embodiments, each aperture can be considered an independent antenna. In some multiple-input multiple-output (MIMO) embodiments, antennas can be effectively separated to take advantage of spatial diversity and the different channel characteristics that can be obtained between each antenna and the antennas of the transmitting station. In some embodiments, a UE 104, such as an M2M device, may be able to utilize a single antenna.
In various embodiments, an eNB or network resource associated with an eNB can monitor network traffic and can modify parameters of the eNB or UE to utilize the network resource, minimize disruption to network access, and maintain high priority communications on the network. In various embodiments, the eNB or other resource may be able to detect an overload condition of the network or a possible future overload of the network. In such embodiments, the eNB or other network resource (e.g., core network device) can provide commands, messages, or changes to system parameters communicated over the network that prohibit one or more UEs from accessing the wireless network system.
Fig. 2 generally illustrates one example of a UE 204 that includes a processor 210, a transceiver 211, and an antenna 213. In some embodiments, the UE 204 can include a memory 214 to store processing information and parameters. In certain embodiments, for example, the UE can house a removable memory 215, such as a System Identification Module (SIM). In certain embodiments, the UE can include a power supply 216 to allow for mobile or remote operation. In some embodiments, the UE can include an input and an output. In certain embodiments, the UE inputs can include sensors 217, such as, but not limited to, temperature sensors, modules for detecting GPS location, medical sensors, condition detectors such as voltage, current, liquid or gas flow detectors, liquid or product level sensors, light sensors, Infrared (IR) sensors, clocks, switches, or counters. In certain embodiments, the UE output can include, but is not limited to, a light, a vibration device, a voltage output, an electrode, or an actuator 218 such as a solenoid or motor. In certain examples, the UE can include user input and output (I/O)219 such as, but not limited to, a keyboard, a display, a microphone, or a speaker. In some embodiments, such as a simple M2M device, the processor 210 can include circuitry to perform the functions of the device, as opposed to a microprocessor-based processor.
Access Class Barring (ACB) is a known operation in mobile networks whereby devices of certain classes can be barred from using defined resources so that other devices can be given priority. Currently, access class barring is suitable for differentiating access control between mobile stations of an access class assigned a "regular" uniform access control process (0-9) and a higher priority class. These classes are defined when substantially all devices are used by human operators, without anticipating the emergence of machine-to-machine (M2M) operations. Thus, current specifications related to ACB mechanisms lack a mechanism to distinguish M2M devices from manually operated devices. Therefore, there is a lack of procedures capable of sending messages and instructions exclusively to M2M devices.
Additionally, the response speed of current ACB mechanisms can often be slowed to mitigate network congestion, as such mechanisms utilize system information messages that undergo a modification process (which can be relatively extensive compared to the rate at which network congestion is increased upon detection). For example, current approaches for ACB include changing parameters associated with system information block 2(SIB2) or type 2 system information blocks. In some protocols, two modification periods may be required to change the access behavior of the UE upon receiving a system information message indicating a change in ACB parameters. Such modification periods can include a System Information Block (SIB) modification period and a SIB update information period. The total time to effect the change in ACB parameters can be lengthy, for example, in some cases, the modification period can last up to about 41 seconds.
As more human operated devices and M2M devices are added to the mobile device network, the likelihood of congestion on the radio access channel increases. Many M2M devices are used to automatically report some values to a central system. The spectrum of the M2M device is extremely broad and varied. Such devices can include, but are not limited to, smart meters for power grids and other utilities, smart sensors, medical devices for mobile health and telemedicine, remote monitoring and control devices such as for vending machines, vehicles, signs, and asset tracking. While timely access to the wireless network is desirable for M2M communications, M2M communications for some UEs can be delayed access to a congested network without compromising functionality associated with delayed M2M communications. Meanwhile, congested networks may temporarily disconnect or deny access when M2M device communications are allowed to contribute to congestion even though M2M communications are not time critical, which can inconvenience users of the network devices (e.g., voice users). Without the ability to handle M2M devices differently than user operated devices, as the load on the network increases, M2M devices that do not rely on timely access to the network may be handled the same as user operated devices. By providing a mechanism to distinguish M2M devices from other network devices, the occurrence of large-scale network congestion can be reduced.
In various networks, M2M UEs are able to cause burst access. For example, an M2M UE can include an apparatus with a schedule update period. Due to the simplicity of programming such UEs, those update periods can be programmed to occur at the same interval or at intervals having an update time that overlaps with other UEs (e.g., one hour full). When a batch of M2M devices suddenly accesses the network for a short period of time, for example, between 10 and 60 seconds, as described above, the modification period of the current solution may not be helpful in relieving network congestion. In addition, while some enbs can still have additional methods for overload handling, such as Radio Resource Control (RRC) rejection, such methods may not achieve network overload protection objectives because the Random Access Channel (RACH) can be overloaded, preventing other UEs from accessing for a significant period of time. In addition, RRC rejection may not achieve network overload protection objectives because RRC signaling messages can use a large amount of radio resources, thereby affecting the quality of service of ongoing connections of other connected UEs.
The present subject matter provides apparatus and methods for enhanced access barring, EAB, that can be implemented in a UE in a more timely and efficient manner, thereby making access barring more efficient. In one example, the paging message can include a notification indicating a change in EAB parameters. Upon detection of this notification, the UE can get updated EAB parameters and apply appropriate access control without waiting for a SIB modification period. In one example, the UE can include one or more settings that identify the UE as a member of one or more device classes. In one example, one or more settings identifying the UE as a member of one or more device classes can be saved in a Subscriber Interface Module (SIM) of the UE. In some examples, the one or more categories associated with EABs and the one or more classes associated with ACBs are different.
In one example, a Machine Type Communication (MTC) -capable UE can be a member of one of several M2M device classes that can include lower priority MTC communications. In one example, lower priority MTC communications can include scheduled communications that transmit routine status or control information. In one example, for certain medical devices UE, for example, the devices can be members of a category that indicates a need for higher priority MTC communications. In some examples, high priority MTC communications can include communications reporting or controlling alarm conditions or conditions that can indicate threats to the health of a device or person.
In some examples, the paging message from the cell base station can alleviate congestion on the mobile device network because the message can be received and processed at or before the time network congestion begins to increase. In one example, the paging message can include EAB information. In one example, the paging message can include a notification of a change in EAB information. In response to receiving the paging message, the UE can access previously stored EAB information or can receive an additional message, such as a system information message, with EAB information. In some examples, the previously stored EAB information can include default EAB information stored long before the UE receives the EAB notification. In some examples, the previously stored EAB information can include EAB information transmitted just prior to or concurrently with the EAB notification. In one example, upon receiving a paging message that includes a notification of a change in EAB information, the UE can then receive EAB information in a subsequent message, e.g., a subsequent system information message or a subsequent paging message. In some examples, the UE can apply a barring policy established by the EAB information received with or in response to the EAB notification until a subsequent paging message is received that includes a new EAB notification. In one example, the UE can apply a barring policy established by EAB information received with or in response to the EAB notification until the predetermined time interval expires. In one example, the predetermined time interval can be determined using the received EAB information. In one example, the UE can apply a barring policy established using EAB information until new EAB information is received at the UE.
In some examples, the UE is able to access a system information block that includes EAB information each time the UE attempts to access the mobile wireless network. In one example, a system information block including EAB information can be accessed without substantial delay. In one example, a system information block including EAB information can be accessed, and EAB policies established through the EAB information can be implemented in the UE within a predetermined time period. In some examples, the predetermined time period for accessing the system information block including EAB information and applying EAB policy at the UE can be less than about 1 second. In one example, the system information block including EAB information is different from the system information block including ACB information. In one example, an apparatus, e.g., one or more processors, of the UE can request access to a mobile device network. As part of the process of accessing the mobile wireless network, the one or more UE processors can access a system information block that includes EAB information in order to determine whether the UE is a device in a class of devices that are barred from accessing the wireless mobile network. The one or more processors can deny the request to access the mobile device network if the UE belongs to a class of devices that are barred from accessing the mobile device network. The one or more processors can grant the request to allow the UE to access the mobile device network if the UE does not belong to a class of devices that are barred from accessing the mobile device network.
Fig. 3 generally illustrates a message flow diagram 300 between one or more MTC UEs 304 and a base station 302 of an example mobile wireless system. In some examples, upon detection of network congestion 330 or a threshold probability of network congestion, network resources (e.g., without limitation, core network devices) and radio access technology devices (such as a Mobility Management Entity (MME), a Radio Network Controller (RNC), Radio Resource Control (RRC), or Radio Resource Management (RRM)) can provide command information to implement EAB. In some examples, the network resources can determine one or more categories of UE devices to be barred from accessing the mobile device network. In some examples, the order information can be received from network resources at one or more base stations 302, such as one or more enbs or henbs. In some examples, upon receiving the command information, the base station 302 can wirelessly transmit a message 331, such as a paging message, to provide EAB information using the mobile device network. In some examples, upon receiving the command information, the base station 302 can wirelessly transmit a message 331, such as a paging message, to provide EAB notification using the mobile device network. In such an example, the base station can wirelessly transmit another message 332 that includes EAB information. Subsequent message 332 can include, but is not limited to, a paging message or a system information message. In some examples, the UE 304 can apply the barring policy established by the EAB information received with or in response to the EAB notification until a second subsequent message 340 is received that includes a new EAB notification. In one example, the UE 304 can apply a barring policy established by EAB information received with or in response to the EAB notification until the predetermined time interval expires. In one example, the predetermined time interval can be determined using the received EAB information.
In one example, an apparatus, e.g., one or more processors, of the UE 304 can request access to a mobile device network. As part of the process of accessing the mobile wireless network, the one or more UE processors can access a system information block or other parameter that includes EAB information in order to determine whether the UE is a device in a class of devices that is barred from accessing the wireless mobile network. If the UE belongs to a class of devices that are barred from accessing the mobile device network, the one or more processors are capable of denying the request to access the mobile device network when enhanced access barring for the UE is valid (333). The one or more processors can grant the request to allow the UE to access the mobile device network (334) if the UE does not belong to a class of devices that are barred from accessing the mobile device network.
It is to be understood that if the initial message 331 includes EAB information, the subsequent message 332 can be optional. It is also to be understood that the second subsequent message can be optional if the expiration of EAB information is predetermined.
Fig. 4 generally illustrates a message flow diagram 400 between one or more MTC UEs 404 and a base station 402 of an example mobile wireless system. In some examples, upon detection of network congestion 430 or a threshold probability of network congestion, network resources (e.g., without limitation, core network devices) and radio access technology devices (such as a Mobility Management Entity (MME), a Radio Network Controller (RNC), Radio Resource Control (RRC), or Radio Resource Management (RRM)) can provide command information to implement EAB. In some examples, the network resources can determine one or more categories of UE devices to be barred from accessing the mobile device network. In some examples, the order information can be received from network resources at one or more base stations 402, such as one or more enbs or henbs. In some examples, upon receiving the command information, the base station 402 can wirelessly transmit a message 431, such as a system information message, to provide EAB information using the mobile device network. In one example, the EAB information can be included in a system information block. In one example, the system information block can be different from a system information block that includes ACB information. In some examples, the UE 304 can apply the barring policy established by the EAB information received with the system information message 431 until a subsequent system message 340 is received that includes a new EAB notification. In one example, the UE can apply a barring policy established by EAB information received with system information message 331 until a predetermined time interval expires. In one example, the predetermined time interval can be determined using the received EAB information.
In one example, a device, e.g., one or more processors, of the UE 404 can request access to a mobile device network. As part of the process of accessing the mobile wireless network, the one or more UE processors can access a system information block or other parameter that includes EAB information in order to determine whether the UE is a device in a class of devices that is barred from accessing the wireless mobile network. If the UE belongs to a class of devices that are barred from accessing the mobile device network, the one or more processors are capable of denying the request to access the mobile device network when enhanced access barring for the UE is active (433). If the UE does not belong to a class of devices that are barred from accessing the mobile device network, the one or more processors can grant the request to allow the UE to access the mobile device network (434).
It is to be understood that the second subsequent message 440 can be optional if the expiration of EAB information is predetermined.
Examples and additional notes
In example 1, a method for controlling access in a mobile device network can include receiving, at a User Equipment (UE), Access Class Barring (ACB) information as part of a system information message including a first system information block, receiving, at the UE, Enhanced Access Barring (EAB) information as part of a system information message including a second system information block, and wherein the first system information block is different from the second system information block.
In example 2, the method of claim 1 optionally comprises generating, at the UE, a request to access the mobile device network, and processing the request to access the mobile device network using a processor of the UE and the EAB information.
In example 3, processing the request of any one or more of examples 1 and 2 optionally includes: the request to access the mobile device network is denied when the EAB information indicates that the UE belongs to a machine-to-machine (M2M) device class that is barred from accessing the mobile wireless network.
In example 4, processing the request of any one or more of examples 1-3 optionally includes: accessing the mobile device network in response to the request when the EAB information indicates that the UE does not belong to a UE category that is barred from accessing the mobile wireless network.
In example 5, receiving the Enhanced Access Barring (EAB) information of any one or more of examples 1-4 optionally includes: a paging message is received from a base station of a mobile radio network.
In example 6, the base station of any one or more of examples 1-5 may optionally comprise an enhanced node b (enb) base station of a Long Term Evolution (LTE) mobile radio network.
In example 7, receiving the Enhanced Access Barring (EAB) information of any one or more of examples 1-6 optionally includes: the paging message is received from a Radio Network Controller (RNC) of the UMTS network.
In example 8, processing the request of any one or more of examples 1-7 optionally includes: a second block of system information is accessed.
In example 9, a method for operating an enhanced base station can comprise: the method includes transmitting system information of a first block type including Access Class Barring (ACB) information, receiving an indication of an overload condition in a mobile device network, and transmitting system information of a second block type including Enhanced Access Barring (EAB) information, wherein the EAB information uses one or more UE categories to reduce the overload condition.
In example 10, transmitting the system information of the second block type of any one or more of examples 1-9 optionally includes: a paging message is transmitted.
In example 11, transmitting the paging message of any one or more of examples 1-10 optionally comprises: transmitting a paging message including therein a notification indicating a change in the EAB information.
In example 12, transmitting the system information of the second block type of any one or more of examples 1-11 optionally includes: transmitting EAB information indicating one or more UE categories for which access to the mobile device network is forbidden.
In example 13, a mobile device for wireless communication within a radio access network can comprise: a wireless transceiver to receive a system information message of a first block type including access barring information from a base station, receive a system information message of a second block type including Access Class Barring (ACB) information from the base station, and transmit output information using a mobile device network, wherein the first block type is different from the second block type; and a processor that receives first system information of the first block type of system information message, receives second system information of the second block type of system information, and provides output information to the wireless transceiver.
In example 14, the processor of any one or more of examples 1-13 may optionally be arranged to receive a request to access a mobile device network.
In example 15, the processor of any one or more of examples 1-14 may optionally be arranged to reject the request to access the mobile device network when the EAB information indicates that the mobile device belongs to a class of devices that are barred from accessing the mobile wireless network.
In example 16, the processor of any one or more of examples 1-15 may optionally be arranged to use the wireless transceiver to access the mobile device network in response to a request to access the mobile wireless network when the EAB information indicates that the mobile device does not belong to a class of devices barred from accessing the mobile wireless network.
In example 17, the processor and wireless transceiver of any one or more of examples 1-16 may optionally be arranged to provide wireless, Machine Type Communication (MTC) capability using a mobile device network.
In example 18, the wireless transceiver and processor of any one or more of examples 1-17 are to receive and process system information messages of the first and second block types from an enhanced node b (enb) of a Long Term Evolution (LTE) mobile radio network.
In example 19, the wireless transceiver and the processor of any one or more of examples 1-18 may optionally receive and process a paging message indicating a change in EAB information.
In example 20, the mobile device of any one or more of examples 1-19 may optionally include a memory, and wherein the processor of any one or more of examples 1-19 is optionally configured to store the received EAB information in the memory.
In example 21, the processor of any one or more of examples 1-20 may optionally be arranged to access the stored EAB information in response to a request by the mobile device to access a mobile device network.
In example 22, the processor of any one or more of examples 1-21 may optionally be arranged to access the stored EAB information in response to each request by the mobile device to access the mobile device network.
In example 23, a machine-to-machine (M2M) apparatus can include: a transceiver to receive Access Class Barring (ACB) information as part of a first message and to receive Enhanced Access Barring (EAB) information as part of a second message; and circuitry to deny the request to access the mobile device network when the EAB information indicates that the device belongs to a class of devices that are barred from accessing the mobile wireless network, and to use the transceiver to access the mobile device network in response to the request to access the mobile device network when the EAB information indicates that the device does not belong to a class of devices that are barred from accessing the mobile wireless network.
In example 24, the second message of any one or more of examples 1-23 may optionally comprise a paging message.
In example 25, the second message of any one or more of examples 1-24 may optionally comprise a paging message comprising an indication of changed EAB information in a system information block.
In example 26, the system information block of any one or more of examples 1-25 is optionally different from a second system information block comprising at least a portion of ACB information.
In example 27, the circuitry of any one or more of examples 1-26 may optionally be arranged to read EAB information of the system information block in response to each request to access the mobile device network.
In example 28, the mobile device network of any one or more of examples 1-27 may optionally include at least one of an LTE network or a UMTS network.
Any portion or any combination of portions of any one or more of examples 1-20 can be included in example 29, or can optionally be combined with the any portion or any combination of portions to include the following subject matter: can include means for performing any one or more of the functions of examples 1-20, or at least one machine readable medium comprising a plurality of instructions that in response to being executed on a computing device, cause the computing device to perform any one or more of the functions of examples 1-28.
The foregoing detailed description includes references to the accompanying drawings, which form a part hereof. The drawings show, by way of illustration, specific embodiments in which the invention can be practiced. These embodiments are also referred to herein as "examples". Such examples can include elements in addition to those illustrated or described. However, the inventors also contemplate examples providing only those elements shown or described. Moreover, the inventors also contemplate examples using any combination or permutation of those elements shown or described (or one or more aspects thereof) for a particular example (or one or more aspects thereof) shown or described herein or for other examples (or one or more aspects thereof).
All publications, patents, and patent documents mentioned in this document are incorporated herein by reference in their entirety, as if individually incorporated by reference. In the event of inconsistent usages between this document and those documents so incorporated by reference, the usage in the incorporated references should be considered supplementary to this document; for irreconcilable inconsistencies, the use in this document prevails.
In this document, the terms "a" or "an" are used, as is common in patent documents, to include one or more than one, regardless of any other instances or uses of "at least one" or "one or more. In this document, the term "or" is used to mean not exclusive or such that "a or B" includes "a instead of B", "B instead of a" and "a and B", unless otherwise specified. In this document, the terms "including" and "in which" are used as the plain-english equivalents of the respective terms "comprising" and "wherein". In addition, in the following claims, the terms "comprises" and "comprising" are open-ended, that is, a system, apparatus, product, or process that comprises elements in addition to those listed after such term in a claim still is considered to be within the scope of that claim. Furthermore, in the following claims, the terms "first," "second," and "third," etc. are used merely as labels, and are not used to impose numerical requirements on their objects.
The method examples described herein can be machine or computer implemented at least in part. Some examples can include a computer-readable medium or machine-readable medium having encoded therein instructions operable to configure an electronic device to perform a method as described in the above examples. Implementations of such methods can include code, such as microcode, assembly language code, a higher level language code, and the like. Such code can include computer readable instructions for performing various methods. The code may form part of a computer program product. Further, in one example, the code can be tangibly stored on one or more volatile, non-transitory, or non-volatile tangible computer-readable media, such as during execution or at other times. Examples of such tangible computer-readable media can include, but are not limited to, hard disks, removable magnetic disks, removable optical disks (e.g., compact disks and digital video disks), magnetic cassettes, memory cards or sticks, Random Access Memories (RAMs), Read Only Memories (ROMs), and the like.
The above description is intended to be illustrative, and not restrictive. For example, the above-described examples (or one or more aspects thereof) may be used in combination with each other. Other embodiments can be used, for example, by one skilled in the art upon reading the above description. The "abstract" is provided to comply with 37 c.f.r. ยง 1.72(b) to allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. Additionally, in the foregoing detailed description, various features may be grouped together to simplify the present disclosure. This should not be understood as intending that a disclosed feature not written in a claim is essential to any claim. Rather, inventive subject matter may lie in less than all features of a particular disclosed embodiment. Thus, the following claims are hereby incorporated into the detailed description, with each claim standing on its own as a separate embodiment, and it is contemplated that such embodiments can be combined with each other in various combinations or permutations. The scope of the invention should be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.

Claims (20)

1. An apparatus of a UE with access control for an evolved universal terrestrial radio access network (E-UTRAN), the apparatus comprising:
a memory; and
a processing circuit configured to:
processing, at the UE, Access Class Barring (ACB) information from a first System Information Block (SIB);
processing Enhanced Access Barring (EAB) information at the UE as part of a second SIB;
storing the EAB information in the memory;
processing a paging message from a base station of the E-UTRAN indicating a change in EAB parameters for the UE; and
in response to the paging message:
requesting updated EAB parameters from the base station; or
Adjusting access control at the UE using the EAB information.
2. The apparatus of claim 1, wherein the first SIBs are different from the second SIBs; and wherein the first SIB is a system information block type 2.
3. The device of claim 2, wherein the circuitry is further configured to request updated EAB parameters from the base station in response to the paging message.
4. The apparatus of claim 2, wherein the circuitry is further configured to adjust, at the UE, the set of access controls in response to the paging message.
5. The device of claim 4, wherein the circuitry is further configured to adjust the set of access controls without waiting for a SIB modification period.
6. The apparatus of claim 1, comprising:
generating, at the UE, a request to access the mobile device network; and
processing the request to access the mobile device network using a processor of the UE and the EAB information.
7. The device of claim 6, wherein processing the request comprises: denying the request to access the mobile device network when the EAB information indicates that the UE belongs to a machine-to-machine (M2M) device class that is barred from accessing the mobile wireless network.
8. The device of claim 6, wherein processing the request comprises: accessing the mobile device network in response to the request when the EAB information indicates that the UE does not belong to a UE category that is barred from accessing the mobile wireless network.
9. The device of claim 6, wherein processing the request comprises accessing the second SIB.
10. An enhanced base station apparatus comprising:
a memory; and
a processing circuit coupled to the memory, the processing circuit configured to:
processing system information of a first block type including Access Class Barring (ACB) information;
processing system information of a second block type including Enhanced Access Barring (EAB) information, wherein the EAB information reduces the overload condition using one or more UE categories;
processing an indication of an overload condition in a mobile device network; and
processing a paging message for delivery to at least a first UE, the paging message indicating a change in EAB information for the UE.
11. The enhanced base station apparatus of claim 10, wherein the system information of the second block type comprises EAB information indicating one or more categories of UEs barred from accessing the mobile device network.
12. A non-transitory computer-readable medium comprising instructions that, when executed by one or more processors of a User Equipment (UE), cause the UE to communicate with a base station of an evolved universal terrestrial radio access network (E-UTRAN) to implement access control operations, wherein the instructions configure the UE to:
processing, at the UE, Access Class Barring (ACB) information from a first System Information Block (SIB);
processing Enhanced Access Barring (EAB) information at the UE as part of a second SIB;
storing the EAB information at the UE;
processing a paging message from a base station of the E-UTRAN indicating a change in EAB parameters for the UE; and
in response to the paging message:
requesting updated EAB parameters from the base station; or
Adjusting access control at the UE using the EAB information.
13. The non-transitory computer-readable medium of claim 12, wherein the first SIB is different from the second SIB.
14. The non-transitory computer readable medium of claim 12, wherein the circuitry is further configured to request updated EAB parameters from the base station in response to the paging message.
15. The non-transitory computer readable medium of claim 12, wherein the circuitry is further configured to adjust access control in response to the paging message.
16. The non-transitory computer readable medium of claim 12, wherein the circuitry is further configured to adjust the set of access controls without waiting for a SIB modification period.
17. An apparatus of a UE with access control for an evolved universal terrestrial radio access network (E-UTRAN), the apparatus comprising:
a memory; and
a processing circuit configured to:
processing, at the UE, Access Class Barring (ACB) information from a first system information block;
processing and storing Enhanced Access Barring (EAB) information at the UE as part of a second system information block;
processing a paging message from a base station of the E-UTRAN indicating a change in EAB parameters for the UE; and
adjusting, at the UE, a set of access controls in response to the paging message.
18. The apparatus of claim 17, wherein the circuitry is further configured to request updated EAB parameters from the base station in response to the paging message prior to the UE adjusting the set of access controls.
19. The apparatus of claim 18, wherein the circuitry is further configured to adjust the set of access controls without waiting for a System Information Block (SIB) modification period.
20. The apparatus of claim 17, further comprising:
one or more antennas; and
a transceiver coupled to the one or more antennas and configured to receive the ACB information, the EAB information, and the paging message from the UE.
HK17101540.4A 2011-04-29 2017-02-13 Machine-to-machine communication device and method for providing enhanced access barring in a wireless network HK1228162A1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US61/481024 2011-04-29

Publications (2)

Publication Number Publication Date
HK1228162A true HK1228162A (en) 2017-10-27
HK1228162A1 HK1228162A1 (en) 2017-10-27

Family

ID=

Similar Documents

Publication Publication Date Title
EP2702807B1 (en) Machine-to-machine communication device and method for providing enhanced access barring in a wireless network
JP6097814B2 (en) Transmitting station, LTE system, computer program and processing module
US9578645B2 (en) Reducing congestion in wireless communication networks
CN103053204B (en) Enhanced Access Control Method
CN109951888B (en) Method and apparatus for applying extended access class barring in a UE
EP3619956B1 (en) Access category and establishment cause
EP2807761A1 (en) Extended access barring (eab) signaling for a core network (cn) and node
EP3335473B1 (en) System and method for providing control information for application-specific congestion control for data communication
HK1228162A (en) Machine-to-machine communication device and method for providing enhanced access barring in a wireless network
HK1228162A1 (en) Machine-to-machine communication device and method for providing enhanced access barring in a wireless network