AU2015221490B2 - Method and apparatus for handling bursty network entry and re-entry in machine to machine networks - Google Patents
Method and apparatus for handling bursty network entry and re-entry in machine to machine networks Download PDFInfo
- Publication number
- AU2015221490B2 AU2015221490B2 AU2015221490A AU2015221490A AU2015221490B2 AU 2015221490 B2 AU2015221490 B2 AU 2015221490B2 AU 2015221490 A AU2015221490 A AU 2015221490A AU 2015221490 A AU2015221490 A AU 2015221490A AU 2015221490 B2 AU2015221490 B2 AU 2015221490B2
- Authority
- AU
- Australia
- Prior art keywords
- network
- devices
- entry
- indication message
- exception
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 94
- 238000004891 communication Methods 0.000 claims description 27
- 230000004044 response Effects 0.000 abstract description 18
- 238000010586 diagram Methods 0.000 description 19
- 238000005516 engineering process Methods 0.000 description 13
- 230000007246 mechanism Effects 0.000 description 9
- 230000008569 process Effects 0.000 description 8
- 238000011084 recovery Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 7
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 description 6
- ATJFFYVFTNAWJD-UHFFFAOYSA-N Tin Chemical compound [Sn] ATJFFYVFTNAWJD-UHFFFAOYSA-N 0.000 description 6
- 230000009471 action Effects 0.000 description 6
- 230000000737 periodic effect Effects 0.000 description 5
- 238000001514 detection method Methods 0.000 description 4
- 150000002500 ions Chemical class 0.000 description 4
- 230000001960 triggered effect Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 230000003068 static effect Effects 0.000 description 3
- 201000008217 Aggressive systemic mastocytosis Diseases 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 235000013305 food Nutrition 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- UEKHZPDUBLCUHN-UHFFFAOYSA-N 2-[[3,5,5-trimethyl-6-[2-(2-methylprop-2-enoyloxy)ethoxycarbonylamino]hexyl]carbamoyloxy]ethyl 2-methylprop-2-enoate Chemical compound CC(=C)C(=O)OCCOC(=O)NCCC(C)CC(C)(C)CNC(=O)OCCOC(=O)C(C)=C UEKHZPDUBLCUHN-UHFFFAOYSA-N 0.000 description 1
- IJJWOSAXNHWBPR-HUBLWGQQSA-N 5-[(3as,4s,6ar)-2-oxo-1,3,3a,4,6,6a-hexahydrothieno[3,4-d]imidazol-4-yl]-n-(6-hydrazinyl-6-oxohexyl)pentanamide Chemical compound N1C(=O)N[C@@H]2[C@H](CCCCC(=O)NCCCCCC(=O)NN)SC[C@@H]21 IJJWOSAXNHWBPR-HUBLWGQQSA-N 0.000 description 1
- 235000008247 Echinochloa frumentacea Nutrition 0.000 description 1
- 241000448280 Elates Species 0.000 description 1
- 241000760358 Enodes Species 0.000 description 1
- 240000002989 Euphorbia neriifolia Species 0.000 description 1
- ZYAKHFDLHJLEPJ-UHFFFAOYSA-N FICl Chemical compound FICl ZYAKHFDLHJLEPJ-UHFFFAOYSA-N 0.000 description 1
- 101001115830 Homo sapiens Prostate-associated microseminoprotein Proteins 0.000 description 1
- 241000976924 Inca Species 0.000 description 1
- 241001233242 Lontra Species 0.000 description 1
- 101100072287 Mus musculus Iffo1 gene Proteins 0.000 description 1
- 241001214714 Niea Species 0.000 description 1
- 240000004072 Panicum sumatrense Species 0.000 description 1
- 101000779423 Pisum sativum Albumin-1 C Proteins 0.000 description 1
- 102100025013 Prostate-associated microseminoprotein Human genes 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 101150014732 asnS gene Proteins 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 150000002148 esters Chemical class 0.000 description 1
- 239000000446 fuel Substances 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- NUHSROFQTUXZQQ-UHFFFAOYSA-N isopentenyl diphosphate Chemical compound CC(=C)CCO[P@](O)(=O)OP(O)(O)=O NUHSROFQTUXZQQ-UHFFFAOYSA-N 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 229910052987 metal hydride Inorganic materials 0.000 description 1
- MYWUZJCMWCOHBA-VIFPVBQESA-N methamphetamine Chemical compound CN[C@@H](C)CC1=CC=CC=C1 MYWUZJCMWCOHBA-VIFPVBQESA-N 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 229910052759 nickel Inorganic materials 0.000 description 1
- PXHVJJICTQNCMI-UHFFFAOYSA-N nickel Substances [Ni] PXHVJJICTQNCMI-UHFFFAOYSA-N 0.000 description 1
- -1 nickel metal hydride Chemical class 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- SJMYWORNLPSJQO-UHFFFAOYSA-N tert-butyl 2-methylprop-2-enoate Chemical compound CC(=C)C(=O)OC(C)(C)C SJMYWORNLPSJQO-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
A method and apparatus may be used for handling bursty network entry and re-entry in M2M networks. For example, a base station (BS) may receive a trigger from at least one device associated with the BS. The at least one device may be a wireless transmit/receive 5 unit (WTRU), or it may be a network device. The BS may determine whether a widespread exception is imminent based on the trigger. If a widespread exception is imminent, the BS may transmit an indication to the at least one device. The indication may indicate to the at least one device that the BS has received a widespread exception report. The WTRU may receive the indication, and terminate a network entry procedure in 10 response to the indication. The WTRU may enter a power saving mode in response to the indication. FiCFVED SIGXNPALN PO EHANNEI K 00 TATTARWALAF R F'. 1 V C7 AEE TEDNTEMPTNS <'K ''( \JWER NOR AiIOVE~.. A MOWTR VH B '- 84 AI. S'I".Il~l FI"K""'
Description
2015221490 02 Sep 2015 rnmmm and apparatus föe handling bursty network
Omm REFERENOE TO RELATED APPLIC ATIONS P301 j: :Ölii applicatie» claims the benefit»1'Ü'J, provisional application
No. 61/451,852 hied orrM'ateh 11, 2011,: the contents of which are hereby incorporated by reference.
BAORGROUNB . systems for MaeMim-tb-MayMpé: {M2M1 aipIieatioBs is an emerging marheL MtiM applications may cover a wide range of use eases, for example, health pare, smart metering, industrial remote maintenance and contrei, tracking, tracing and recovery, secifoph afoese anh surveillance, public safety, consumer devices, retail, payment, arfo: Ifombfoullfong aiAomatiorK Some special traffic cbaracforiStksmay beidentiEed as eefompnly seen in muItfoleihISM applications, althotigh traffoi eharacteHstiea generally may vary^ with each M2M' use case< For example, for regular: momteiag and reporting in. M2M. applications the data traffic may be characterized as:; periodic,: hating small-size bursts, for example;, «wlöö bytes, a high tolerance in latency for end-to-end deliyeryand achiaiwledgement,: This latency may fee, for example, secondA minutes, hOnrs, or days?:for a large number of M3M deyfees, for example, foÖOOte 3Ö,ÖOÖsmart meters itt a typical Cell sise of dSkmie 2hm in urban areas having a eerydhW duty éiglufjcant. idle time,. Therefore, ^ MAM ft unli cKtidus: May face new challenges to efficiently foanspertvdaia traffic, i[Cl()08j la admfiontotleregular ibbbftptingtraffic, real-time M2M srafoe data also exists, te example, alert or alarm reporting, Handling such real-time: traffic: from a large: number·': of devices may pose new challenges folthe BI2SÏ cemmUmcatioii systems, since the devices: may be low latency, and the transmissions may be non-periodic and have large burst sizes. -D. an indication to the at least Pj he device. The indication may indicate to the gt least one. device that the BS h tas received a widespread exception report. The WTRU fire·' receive the Indieat ion, and terminate a network entry procedure in 2015221490 02 Sep 2015 §D0(MJ Furthermore, in many eases, the eommtinications ter II2M applications may be introduce d as new addedeon. application layer servicesito yetetna, for example, the wireless arcess networlss imrreniiy deployed for cellular phones, or computers. Also, it may be unlikely svsto. ins will ho deployed to support M2M applihatiphp and other applications,. Therei oreyit is important to Carefully consider how to support the M2M' traffic in not works while also supporting nomM2M traffic. f00.051. A method and apj mratn a may i he: used Ipr/handling bursty network entry and re-entry in M2M n stworks. For example^ a base station CBS) may receive a trigger from at least o no device: associated with the BS, The at least one device hlay Be a wireless traps mit/receiip. uplt; CWTBBh or it may be a network device, The BS may determin e whether a widespread exception. is imminent response to the indication;. The WTRÜ may enter a power saving mode response to the indication.
BEIEF DBiöEÏPTÏÖN OF'THE DRAWINGS
[ÖÖÖSi A more detailed imdeysfanding may hm- had from the fcdlowi description, given by way pf ί sample in conjunction with the accompanying [OÖÖT] FIG, 1Λ is a systet n diagram of an exampieeonunimicauons system in which one or moro disclosed embodiments may be implemented; [Q00B] FIG. IB is a system diagram of an example wireless transrni t/reeei ve u ni t (WTRU) that may be used within the; communications svstern illustrated in FIG. .1Λ; 2015221490 02 Sep 2015 |Ö(3()9j FÏG, IG isa system diagram of an example re die access netivnrk and m example cere network that may be used within the immnmnfoaifons system illustrated in FIG. 1A; [OOIO] FIG. 2 .ts a diagram of an example nmtimd for reportiag a critical widespread exeeptioiu [Mil] FIG, 8 is a diagram of aft example method for use in an M2M device; [001¾] FIG -1 is a diagram of an example method for performing hetetorfe entry/re-oniry based cm a dedicated random access (RA) opportunity; [0OK>| FIG o is a diagram of an example method for polling-hased network eimry/re-entry; {0014] FIG 0 is a diagram of an example method for performing a system notification of a network entry flood; [081 A] FIG f is a diairam of an example method for performing a network enteyfre-entry; and |C|010J FIG 8 is a diagram of another example method for performing a network ent^y/remntry.
BETAILlP MEBiMimmN
[CIO 17] FIG, 1.A is; a: diagram of an,: exa mple: eommumeafens system. 100 in which one or more disclosed dfobodimenfa may be implemented. The communications system: 100 may be; a multiple: access system:: that provides: content such as voices data, video, messagings broadcast, etc., to: multiple tiireleiss users, The comhinnieations system 100 may enable muhiple wireless users to access such content through the Sharing of system;'resources, including wireless bandwidifo For example, the eommunfoatfons .sysfoms 1.00 may employ one or mort; channel access methods, such as code; division:; multiple ;accesg (CDMA), time division multiple access (TDMA), frequency division multiple, access (F.DMA), orthogonal FDMA (OFDM Ah single-carrier FDMA (SC-FDM A), and the tike, -3-. 2015221490 02 Sep 2015 (00183. As shownin. FIG. !A, the communications system 100 may i&öludé·· wireless transmibroeeive units ('WTE'ösj.102a, 102¼ Ι0.2ό, 102(1, a radio access network {MAM| 104, a core network 100, a public switched telephone network (PSTN) 1.08, the: Internet 110. and other networks 112, though it will he a ^predated that the disclosed erabodsteoniè Contemplate .any nlunher Of WTElJs, base stations, networks, and/or network elements. Each of the WTEtls 102a, 1-02¼ 1020, 102d mar1 he any type of device eondgured to operate and/or eomnmmcateinaw^ By way of esau^e, the WTRUs 1.02a, 10-2¼ 102c, 102d may he oenhgured. to transmit and/or receivewireless signals and may include user equipment (UE). a mobile station ΧΜΒ|, a station (ΒΦΑΐ a fixed or mobile suhsefiher unit, a pager, a oelluiar telephOBh, a pefsoB'al digital assistant (FDA), a smartphone, a laptop, a netbook, a personal computer, a wireless sensor, and the like. (001-¾) The communications systems 100 may also include a base station 114a and,a [base station Ii4h. Eeeh of the ba se stations 114a, 114b ma y be any type of device configured to wirelessly mterfaeewith at least one of the WTKUs 102a, 102¼ 102c, 102d to faeilitato aeeeas to one or mere communication networks, such as: the core network 106, the Internet 110, and/or the networks: 112. Byway of example, the base stations 114a, IMhïnÉy b#«. station (BTS.K a Node-lk an: ehlode B, a Home Mode B. a HomeeNode/E,: a site; controller. an access point (API, a wweless router, a ètation (STA), and the like. "While the base stations 114a, 114b are each depicted, as a single éiemènty it will he appreciated that file: base stations 114a, lldb may include any number of interconnected base stations and/or netwca. k elements.
[0020] The base station 114a may he: part of the RAN 104, which may also include ether.hash:: stations and/Or network elements· (not. shown),; such as p. base: station controller (BSC),:4: raldia network contfoiler (R.MC), relay nodes, etch The base station 114a and/or. the base station 114b may be eoniignred to transmit and/or receive wip@less'plibÉ14^itMn.apartiaiiilnr geographicfegion, which, ihay be referred to: as a ceil (hot Shown), The cell may further be divided, into cell -4 2015221490 02 Sep 2015 sector ox the cei |0021) Thebase stations 114a. II 4b may communicate with one er moreel the WTRUs 102a, 102b, 102c, 102d over an air interface ΪΙί^.'^ΙήοΙί. bbi&hy suitable win sectors. For example, the cell associated with the base station I Ma may be divided into three sectors. Thus,in one embodimenti the base station 114a ;m$y· include three transceivers, he., one lot each, sector of the cell In another embodiment, the: hose station Ilia may employ muitiplfed^ (ΜΙΜΟ) technology and, therefore, may .£6£'#$ι.· eommumeation Inin (e.g., radio frequencyuuerewave, infrared. (IE), ultraviolet (U¥), visible light, etc,). Themir interface 116 may he established using any suitable radio access technology (111(1)):, (0022] More specifically, as noted above, the communiealibnayystem 100 inay he a multiple access system and may employ one or moré Channel access schemes, such as CDMA, TBMA, FDMA, ÖFÖMA, SO-FBMA, and the like,· For example, the base station 1.14a. in the RAN 102b, 102c mayirnpiernvm e radio technology ouch as Universal MolhleTelecohn^
System (UMTS) Terrestrial Radio Access (UTRA), which may establish the air interface 116 using wideband UDMA (WEDM/A), WEUMA may include communication protocols such, as High-Speed Packet Access (HSFA) and/or Evolved HSFA (HSPA-f), HSFA may include High 'Speed Downlink Packet Access (H8BFA) and/or High-Speed Uplink Packet Access (HSÜPA).
[0020] In another embobimemr the base station 114a and the WTKUs 102ay 1.02b, 102c may implement a radio technology such as Evolved UMTS Terrestrial Radio Access (E-tlTEA), which may establish the sir interface 116 using Long Terra Evolution (I,TE) and/or LTE-Advaneed (LTE-A).
[0024] In other embodiments, the base station 114a and the WTEUs 10:2a, 1.02b, 102c may implement radio technologies such as IEEE 802.16 (i.e,. Worldwide Xnferoperability &r Microwave Access (WiMAX)), ODMA20Ö0, CDMA2000 IX, CDMA2ÖQ0 EV-DO, Interim Standard 2000 (18-2000), Interim Standard 06/(1®*®®? interim Standard 80S (1S-806), Global System for Mobile νΟΛ 2015221490 02 Sep 2015 eomm:ünicatioiis |GSM), Enhanced Data .fftfes;.foi':GSM Evolution(MIGE), GSM FIJGB (GEKANT and thé like. f{K};2S| The base station 11.1b in FIG,:.1A may b§ a Wiridegs maim, HOmé Made B„ Home eNode B, or access point, ton example, and may urilise any suitabfo RAT for facilitating wireless cooimCtivliNm a loealiaed area, such as a place of business,: a home, a vehicle, a campus, and the Elan M one embodimea®, the base station 114b and the WTRIJs 102c, .i02d, imptemén£>-&:· mdi® technology such as IBEB 802,11 to establish a wireless local area network' (WLAN). In another embodiment, the base station 1 lib and the WTËüs IÖ2e, 1020 may implement a radio technology such as XBBB 802.1b to establish a wireless pebsbhhl area network CWFAN), In: yet another embodiment, the basé station 1 X4b and the WTEtfd 102c, 102d may utilize a cellular-based EAT (e,g,, WCDMA, GBMAgOOO. GSM, LTE, LTE-A, etc.) to establish a picocetl or femtocelL: As shown in FIG. 1A, the base station 114b may have a direct the base station. 114b may not he required to access the Internet 110 via the core network 106.
[0026] The BAN 104 core network: 106, which may be any type of network configured to provide voice, data, applications, and/or föiéé over internet protocol (VolP) scrviccs to one or moré of the WTBIJs 102a,- 102b, 102c, 102d. For mampte, the core network 106 may provide cal! control, billing services, mobile location-based services, pro-paid calling, Internet Cehnectivity, video distribution, etc,, and/or perform high-level security fonctkmfo such as user anfclmotieatien, Although not shown in FIG. XA, it will hé apprecfoteh that the RAN 104 and/or thé core network 106 may be in direct or indirect eonlmunieafcion with other EANs that employ the sa me BAT as the BAN 104 or a different BAT. For example, in addition to being connected to the HAN 104, which may be utilising an E-IJTEA radio technology, thé core network 106 may also be in communication with anothei radio technology. -6- 2015221490 02 Sep 2015 §0087] Tie car;e network 106 may also serve as a gateway for the: WTRIIs 102a, 102b, 102c, 1.02d to access· tbs P8T.M 108. the Internet 110, and/or other networks 112. TleTSTM .108 may include circuit-switched telephone networks Hat provide plain old taiephon^semcfeil^ölS)*. TheJntemet; 110 may include a global system of mtereMtheeted;ce^ that use common communication protocols* such as the^ transmission control protocol jTGP), user datagram protocol (IJDP) ami the intor.net protocol (IP) in the TCP/IP internet protocol suite. fbhe nftwCrks 112 may include wired or wireless com mu niea do ns networks owned and/or operated by other service: providers. For example, the networks 112:may include;another core network connected to one er more BAFls, which may employ the same EAT as the RAN .1.04 or a different EAT. 1CM32S| Borne or all of the WTBUs 102a, 102h, 102e, 102d in the communications system 100 may include multi· mode capabilities, i.e., the WTRlIs ifiia, 102%· 102c, 102-d may include multiple transceivers for communicating with different wireless networks over different wireless links. For example, the WPRU 102c shown m FIG. IA m$Y he configured to communicate with; the base station H4a. which, may employ a cellular-hased radio technology,: and with the base station 114b, which may employ anilEF 802i radio technology.
[0029] FICl, iB ls a system diagram, of an: example WTE1J 102. As shown in FIG, IB, ;thd WTBII' 1(52 may include; a processor 118, a transceiver 12(5, a transmit/receive element 122, a speaker/mierephone 124, a keypad 12% a: displny/fcoachpad ..128:, non-removaMe Memory 180, removable memory 132, a, power source 131, a global positioning system (GPS) chipset 186, and other peripherals 188. It will he appreciated that the. WTRll 102 may include any ;sdfe combination of the feregeing elements; while remaining consistent with an emhodimebh, :[0Oi0| the processer:. ITS may he a; general purpose processor, a special, purpose predééèof,: a conventinhal proceasoh d digital signal processor (DSf-%, a plnrahfy of 3hicroprooessors,;One or more; microprocessors in association with: a; 2015221490 02 Sep 2015 I) 8 P core, a controller, a mieroeontrol I Intograteë eireuits TASICs),. Field Frograosmable Gate Array (FPGAs) circuits, any otter type of integrated Aiffeult (ÏO), a state machine, anf th« lihey The processor 118 may perform slgmlrodiug, data processing* power; coa^Dij iaput/cmtput proaessmg, and/or any: other funationality that ènaMes the WTK1J 102 to operate in a wireless environment, The processor 118 may fee hopped to the transceiver 126, which may he coupled to the transnht/reeeive element 122, While FIG. IB depicts the processor 118 ond the transceiver l§^^.^^^^compoaent§;|t.:wiil. he appreciated thaffhe processor 118 and the transceiver 120 may he integrated together in an electronic pa chage Or chip, [00.31] The trahsaiii/reeewe element 122: may he confi.§tmed to trahsmit signals to»: or receive? signals Amm, a base station iRagn the: base station 114a) Over the::air ihtèriaee 116, 'For:example, in one einhOdimahi, the transmit/receme element 122 may behh antenna configured to transmit and/or receive BF :signals , in another embodiment, the trausmit/receive? élement 122 may he: an imitter/detector and/or receive IR, UY, or visible light signals, for example. In. yet: another embodiment* the. transmit/reoéive element 122 may be configur ed to transmit and receive both:®!and light signals, II will he appreciated: that the transmit/receive element 122 may he configured to transmh an<For roeaive: any comhination of wireless islgnals;. (0032! In addition, although the transm.it/receive element 122 is depicted in MG* IB as a single elementy the WlTtCi 102 may include any number <M tronsmit/receive elements 122, More specifically, the WTRU 102 may employ I4IMG technology, Thus, in one embodiment, the WT.BÖ 102 may include two or more tiansmitireceive elements 122 (e.g., multiple antennas) for transmitting and receiving wireless signals over the air interface l li.
[0033] The transceiver .120 may he confi gured to modulate the signals that are: to he transmitted by the transmh/recelve element 122 and to demodulate the signals that are received by the transmifitecmve element 122, As noted above, the WTRU 102 may have multi-mode capabhitids* Thus, ihe transceiver 120 may 2015221490 02 Sep 2015 tóelude multiple transceivers lêr-eaaiïmg the WTEIJ 102 to communicate via-multiple EldTs, m$h m ÖTEA and IEEE 802/11, for «sample,. f00341 The processor Π 8 of the WTEU 102 may he coupled to, a nd may receive user input data: from, the apeaker/microphone 124, the keypad 120, and/or the digplaWWuchpad .1.23 (e.g., a liquid crystal display (LCD) display ufj.it or organic Hghtmmitling diode |Ut£UTdispay uuith The processor 118 may also output user data to the speaker/mierophone 124, the keypad 126, and/or thé: dispfoydpuehpad ,128/. ,In addition., thei;proc0sior 113: may access informatica from, ami store: data iBvany'typeof sujtaMeinemoryysuéhms:the non-removable memory ISO and/or the removable memory 132, The non-remqvahie memory 130 may include random-access memory a hard disk, or any ether type of memory: storage device, The removable memory 132 may include a subscriber identity mndulè lSfM^card, a memory stick, a secure digital IBB) memory card, and thelile, In other embodiments, the processor 118 may ac©ewf0lQOTatS.00.irom, and: store daiaijp memory that is not physically located on fhhT¥TRÜTO^s/|iich:a|Ph a server or a home computer (not shown).
[0035] The processor 1.1.8 may receive power from the power source .134, and may be configured to distribute and/or control the power to the other components in the WTEÏ1102, The po^er source 134 may be any spitalhe device for powering the WTH0102, For example, the power source 134 may include one or more dry cell batteries (e,g,, niclfol-MdmiUih (NiCd), uickel-aiue (Mi^nh nickel metal hydride (ΕηΜΗ), luhinm-ioix fp-iou), etc.}, solar cells, fuel cede, and the [0036] The processor 118 may also he coupled to the GPS chipset, 136, which may he configured to provide location information fo,g., longitude and latitude) regarding the current iPcatioh of GieWTEU ldfo In addition to, or in lieu of the information from the GPS chipset 136, the WTRU 102 may receive location information ever: the air interface 11.6 from a base station Ce.g., base stations 114a, 114b) and/or determine its location hosed on the timing of the signals being received from two or moré nearby base stations. It will be 2015221490 02 Sep 2015 appreciated that the WTRü iMmay of a ny suitable Iqcationfoeiermmation method while renaming eprnasient with as embodtfosafo [00371 which, may include one or more software aad/ca- hardware modules that, provide additional features, fouctionahty and/or wired or wireless «nheetivity. For vexample, the peripherals 138: may include an aeeeteomstexy an ®rmmp8m,-& satellite trfmseewerj; a digital camera (for photographs or video), a umvérsal serial bus (llSBi): port, a vibration device, a television transceiver, a. hands free headset, a Hiuetoothp module, a frequency modtifoted,(FMi radio unit, a digital music player, a media player, a video game player module, ah Internet browser, and the:like*.
[$)0381 10 is a system diagram of the BAN^404 and the eore: network 106 according to ah embodiment·, The RAN 404 may be an access service network (ASN| thatemploysTEEJS 802:, 1:6 radiol^ehnoiogy to communicate with, the WTRUs 102a. 102b, 102c over the air interface 116, As will he further discussed below, the: eemmimicaAon links between the different fem4i.on.al entities of the WlSüslCQa, X02b, : 162c, the RAK104, and the core network 106 may bo defined as reforen.ee points, [0039] As shown in BIO * 1C. the RAN 104 may include base stations 140a,
140b, 140c, and/ah ASN gateway 142, fhohgh. that the RAM 104 may ihclude any number of base stations and ABN gateways while remaining conmktenfevsit&am:eh3l30^is^nt. The base stations 140a, I4Dh, I40e may each ha associated. with a particular cel! (not shown) in the RAN .1.04 and may each include one Or mere transceivers for communfoating with the WTRDs 102 a, l()2h, 102e ever the air interface Hi. In ane 140b, 1.40c may implement ΜΙΜΟ technology. Thus, the base station 140a, for example, may use multiple antennas to transnrffc wireless signals to, and receive: wireless signals from, the WT.EU 102a, The hose stations 140a, 140b, 1.40c may also provide mobility management fonotions, such as handeff triggering, tunnel 2015221490 02 Sep 2015 ^establishment, radio resource management:, traffic classification, puality of pervicedQoS) policy eiiforeemeni, and %^'Mk^,':^#'^:N:gai^way 142 may $&w&-as a Maffia aggregation point and may be Tespofiaible for paging, baching of subscriber profiles, ranting to the core network 10% and the hke,: [f)04(j| Thé air interfoce 110 beuween. 102a, l,Ö2b, 102c andlhe RAif 104 may be defined as an III reference point that implements theIEEE 802,16 specification., in addition, each of the WTRUs 1.02a, 102b, 102c may esiablish a logical infor&ce (not shown) with the core network 106, The logical interfoeehetween ihëv^^Iïtliiat4ö2H.T.Öi'0:ani^ie core network 108may be defined as an, E2 reference point, which may fee used for authentication, authorization, IP hostCbnfignration management, and/or mobility management, P041] The communication link between each of the base stations 140a, 140b, 140c may be defined as an E8 reference point that includes protocols for fociiitating WTEU handovers and the transfer of data between base stations. The communication hnk between the base stations 140a, .140b, 140c and the A8N gateway 215 may he defined as an R6 reference point. The RB reference point may include protocols for facilitating^moyiity management based on mobility events associated with each of the WTEtls 102a, 102b, lOCk, [00:42] As shown: ip: FIG, l€, the RAN 104 may be: cdnnpcfed to the core network: 106, The communication link: between the RAN' 104 and the core: network: 106 may defined as an SO reference, point that IhNndfes protocols for facilitating data transfer and mobility management capabilities, for example. The core network 106 may include a mobile IT home agent: (MIF-HA) 144, an am hentiva 140,. ahd,a gateway 14b,
While each of the .foregoing elements are: depicted as part of the: core network 106, it will be appreciated that any one of these elements may be Owned and/ór operated by an entity other than the core network operator. may enable the WTRlIa 102a, 102b, 102c to roam between, different ASMS and/or different tore networks. The MIF-HA 144 may provide the WTRUs 102a, 102b, -1.1- 2015221490 02 Sep 2015 102e'with access to packet-switched networks, such m the .Ïatséïnftit 11(¾ to WTEUs 102a, 102h, 102c:a:«;dlF-ei3ahtod: devices, The AAA ^rver 146'niay be responsible lor user auihenticat!on and tor supporting user services, ITe: gateway 148 may facilitate interwOrMag with .other networks. .For ekahfefe'., tbd gateway 148 may provide the,'WTEUs 1021. 1020, 102c svu.li aèheBf'^iöiifetiit^dt^Éeë networks» -such, -as- tlfe FÉ5TN 16B, to: facilitatecomMmh.(^tiaBa^tvs(eea:th.@:'^n?Hllg' 102a, .1.02b, 102c and traditional landdihe communications devices, In addition, the gateway 148 may provide the: WTRlls 102a? 102¾ lC52e wife access to the networks .1¾ wMch may toatode other wired or wireless networfcs feat are owned and/or operated by pfeer service providers. An access1 roütek |AÉ) l 60 of a: wireless local. ntev be in comnmnication with the Internet 110. The AR ISO may facihiate commUmea(ions hetwet# APs 160a, 160b, and 160c. The APs 100a, 1601k and 160c may be in communication, with ST As 170a, t?0b, and ifOc,
[0044] Although not shown in FIG. 11¾ it will he appreciated that the RAN 10 i may lie connected to other ASMs and the core network lOB may be -connected to other core networks, The communication link between· the RAN 104 the other ASNs may he defined as an R4 reference point, which may include protocols for .:é0öi^i^ia^ipg:fee' tééMW$-óf feé-'WTStïÉ 102a, 102b, 102c between the RAN 104 and fee: other ASMs. The communication link, between the core aetworkX06 and tbs' other core networks may he defined as an Rf> voferemv. which may include protocols tor laciltating interworking hetwoén home core networks and visited core networks.
[OCMo] in many ma.óh^e%«^dRjmtv{^|i)' applications,, fer example, smart méterimf, surveillance monitorin|:, public safety, the rmrmal operation of M2M' devices may he periodically monitering and reporting, where the reporting operation: may rehmre the M2M devices to access the data communication network. hrom the viewpoint # the network iifeerfece, for example, the air interface of the device to the hash station (BS) m a wireless access network, the M2M' device may alternate between a connected state and an idle state. When in 2015221490 02 Sep 2015 the connected state, a.«.M-2M device may fee connected to the BS through the air inferfeee and the data traffic may he transported overdn air link between :the:BS'. and the devieetWhen iir the idle state, the aininterfhce of the M2M device may not he active, for example, the:air interfere may mokhe available to the BB Ior normal data exchanges; Depending on the:M2M:application, the perindicity of the Mill reporting operations may cause a fairly low duty cycle of the network interfere of the M2M device, ihr example, remaining!» an. idle state. In an access network supporting a large' number of M2M.: devices, a low doty cycle Of each individnal M2M device may result in mest of the devices operating in the idle ; state: aba given point in time.
[0046] •W'hei:'a plurality of M2M devices pré in an idle state, a widespread exception event, for example, caused by a power outage, a leaking pipeline, a broken pipeline,· Of i terrorist attack, may result in a very bursty netiyork: entry/re-entry demand scenario. In another example, a widespread exception event: may he: an. event; that will result in the plurality of devices in. the BS losing communication with the BS, These example widesprea d exception events may result in: an overload: to the system, with, respect: to its capability of handling network ehtry/re-entry. Such a scenario may cause: system congestion and even system..feint e,:parti.cula.rly when: a eontention-hased network access, also called rand:om: acceSS pA), procedure: is used, which may be: .4 .;00iïi:^ion. i»i$al''-heiwork access ihèchahism to initiate network emtry/rmentfy,. In the following: examples, the term1 netwerk entry/f e-entry may include network entry and/or aelwork re-entry.
[0Ö47J Ifor example, the cont4h|ioïi>based network access capability'may be: designed to handle N BA requests: per second, under normal network operating: conditions, In the event of a widespread, exception., a large number, of ,M2M devices in ahidie state May attempt to iferansmit a message and enter a connected State in order to report a. system, exception,: which may result in a large: number of M2M devices using COntOBtion-based aedasa to initiate their network remntry pfooeshi The number of M’SM devices may he much larger than N > Therefore, the -13- 2015221490 02 Sep 2015 HA channels for tltenefo corfeentry/remntry may he highly congested with. many collisions,, resulting in ? ao chance: or an extremely1 low chance lor any of: the devices to succes Ally re congestion may not only •c'amse'&llttTOB"in the syst em esception reporting of the M2M application, hut a Iso may significantly and ï iegatiyely impact the operation of other·· applications suopoefed 1'sv the same n [R Π *>fcwork, v Wjt>'jv V* Vv'vv W y O.vi'v OvVA'Vλν.* v kV Wv'kv k' xi\‘ V.» V i S,*’ V. λ\ > [00481 In the eve* it. of a widespread exception, and after the ;system, ίβ: reikwered. |op (he excel ption, there may be another burst of nétvslö^· entry attempts, This mi iy be due to a large number of M2M devices attempting iy go back to them normal oper#fo&al$uiy cycle by first oohnecfihgto the network, Ebr example, i n the event of a system power outage, whan thp pdwdr returns, all the devices r ogy power on and start again, During the initialization procedure, tile devices n their net work interface t my attethpf to connect to the access system thahifialiae o enter into a normal operational, mode. In tlnooase, the attempts of network: en tryfremntry may he highly synchronised from, a large number of M:2hi devices and may· increase the likelihood of network congestion. [0Θ49] Another ex ample of n.htj;rs^:i^i^órlitén.tipy^-enl^^i6naaaö':may occur after ή. xystetu : rel ,>oot. A., large number of subscriber stations, including M2M dev soes abd/onothetsdbsCnhers,.imaV:hftempt'te enter the network at the same time, (in the other 1 ha ndj, d a system, is designed to handle imrsty network e n try /re - e n t ry de m and s, it may push to an over-design ibr the system, which may result in poor system uti fixation and inefficiency for normal netWnrfe operationSi fOööO] A system i indication: message may be used to report a critical widespread exception ev ent, Idle system rodicatioa message may indicate that the BS is a war e of a wid e spread system error. Upon, receiving onc er more critical message to all devices,: a [hd upon receivihg the system indication message from the: BB,: the: devices may ] perform certain aefionst for example terminate their RA attempts such that cohgi ;Stion at the .network entry/re-entry RA channels may be effectively controlled, Tis to svstem indicatioh message may he transmitted to one 2015221490 02 Sep 2015 or more M.2M devices to alert the M2M devices to cease transmitting event indication messages·to avoM reporfciitg the same error» fOOöll Figure 2 is a diagram of an example method 200 for reporting a critical widespread exception. Beferrlng ta JBgnre 2t Bio BS may recei ve a trigger 210, for example an event indication, messnge or a critical real-time exception report, Based on the received, trigger» the BS" may detect that it is about to experience a widespread exception. 220 a nr! transmit a system indication: message: to all the concerned devices 230. The system indication message may he transmitted to report a system wide criMcnl exception so that the devices that are still attempting to enter the network to report the same system exception may take certain, actions to reduce the loading on the network entry channels. 10052] If the BS determines that the system has not recovered 24% a system indication message may he transmitted repeatedly with a selected: periodicity until the network entryire-entry EA channel congestion is under control nr until the system is recovered from the critical widespread exception. When the BS determines that the system has recovered 24% it may résumé normal operation 250, The BS :may determine that the system has ::neeovered haSed on no longer detecting collisions on the: EA channel, or the number of Ppllfofons. on the KA channel is within a tolerable limit. An other: example of the BB determining that the system has recovered may be based on receiving a nnèssage from'^a:':0h :the network side, for example, an M2M applicaifon server^thafc indicates that the system has recovered, fÖD:ö8|' An example trigger for the BS to transmit a system indication: message to the .M2M devices may he that, the BS has receiyed a critical widespread exception report. Such critical widespread exceptions may be pre~ applications, In addition* the:M2M application system elements, including the BB and M.2M. devices in the access networks, may dynamically learn, update, and maintain the information regarding critical widesproad exceptions, during the utilixati 2015221490 02 Sep 2015 [000¾] I» addition, other trigger coaditkrns may also be defined for the BS to transmit a system indication message to thé M2M devices. For example, ;tóöth.iet -trigger a system indication message may he based on. receiving repetitious reports from a pre-determined number of M'2M devices within a pre-dbl®'imined window of time. For example, a threshold, which takf be static or eohfigerable, maybe defined. If the number of messages received of a same type withina pro-determined time period is exceeded, the system indication message may betranenuimd to the concerned devices. 'For receives ten reports of an emergency condition, the BS may transmit a System indication message of that message so that the ether M2M devices do not send the same report:to: Lthe BS. The concerned devices may include either all devices :ö:r :a sub-gröupöf devices, One example of the received messagemuy be a ranging h^^d:est..rbeè||(:^.:^|h.'Öïë.ranging.purpose field set to "'abnormal power outage,” Another example: of the received message may be a group of ranging codes that may be reservedlfor system exception report ranging, WhentheBS receives such number wuhxn a predbSned time window, the BS inav detect a widespread: system: error. iÖÖhöl In an example of a system under an extreme load with a larga awnber of collisions, grouped BA codes may allow the Bp to acknowledge an issue without being able the collided BA codes, For example, when multiple devices attempt to report the same widespread exception, those devices may be considered a group; The groupmay be iassociated with the type of device, for example a meter. The exception, reported by the group, (hr example a power oiAagpcmayd^ device type and reported exception, [0056] The BA code used to report an exception may he designed and/or selected based on the device ID and/or the group. If the devices reporting the widespread exception have a common component of tin; BA 1.0, a collision may render the individual device IBs unreadable. However, if the codes include a common group component, the grotip idea tifica tion component of the BA code may still be decodalde. -16- 2015221490 02 Sep 2015 critical excel [0067] In the event of a. widespread exception reported by many devices, the group component of the BS to^icngaizé%#:'P$f4rtipg group. The B8 may be aware of the widespread exception, and transmit a system indication message to indicate that the BB has received this widespread exception report. This systèjp. lödiiitiöhijöèlöage may allow the devices to take action as required, for example terminate BA attempts. A critical widespread exception report may be transmitted to the BS over the air link by the M2M devices that have detected the System ek#ï>tioa or by other entities in the M2M applications system, for example an M2M server or an M2M gateway .
|CM)$S| Figure 3 is a dia gram of an example method 3ÖÖ for use in; an M'2M device. Beferring to Figure 3, the M2M davide may receive a system indication, message 810 from a BS, The M2M device may determine whether the system indication message indicates a widespreaderiticalexeeption.320, lfh: widespread is not detected, the M2M device mav resume its network ventry/re-entry process 33Ck [0059] If a widespread,critical exception is detected, the M2M. device may adjust its network entry/re -entry process 340. Examples for adjusting a network Pntry/re-entry process may include terminating the; network entry/re-entry process, or randomly deciding whether to: continue the network entry/rewptry attempts with a pre-speciffod probability of continuation or termination For example, the devices may apply a I/1ÖÖÖ probability to continue network entry/re* entry attempts and 999/1000 to terminate network ehtry/refohtry attempts.
IhÖhÖJ M2M' devices may detect a critical widespread exceptipn event and may attempt to report to the M2M server through the BB of the access network. The BS may need to correctly receive the critical widespread: exception report from at haast one or multiple M2M devices before it transmits a system indication message acknowledging awareness of the system exception to the M2M devices, A widespread exception may cause system congestion and even failure due to a large number of M2M devices attempting to enter/re-enter the network, -17- 2015221490 02 Sep 2015
Therefore, in order to improve efficiency, some mechanisms may be used to help succxissfolly andtimely report a critical widespread exception. The report of tile critica\ widesprea d eaceptiod may be transmitted before or duringthe <x>ngestion:or Mlure, and may fee transmitted in the .normal BA channels for network eniry/re-entry. Reporting the critical widespread eisoep tioii in thig marnier may take advantage of the hi2M devices in a connected state.
After the system rectwera Êtom the critical widespread exception, dóè fo aotions taken by any responsible entities of the M2M appiicationey the M2M devices may report dal a collected regarding the system exception to the BS ahd/br M2M servers. Such-a postwystem-recovery report may be encoded in the network mterlace control and/or management messages* for example MAC messages in the air interface. Alternatively, this information may also be Conveyed: using an M2M application layer services message between the M2M device and the BS, or between the M2M device and an M2M server or gateway. The information fields in a post-system -recovery message may include; an indicator that indicates whether or not the device experienced a system critical exception; and identification or description information about the experienced exception, for example which system exception, time and location when 'experienced:. mij A priority aihrrh message:f RAMI' may he ü sed to in dicate events that: may need immediate attention, A device May generate a priority alarm, in the events of 0; critical widespread exception. The PAM' may be transmitted via. mfdtfoast Of broadcast messages. The; speailc method to broadcast such information may include many examples. fbOddi In a first example, the network may multicast/broadcast an indication that a PAM was received hv a device ip. the same cell or ip. the same location area, for example: a, routing area npdate/tradking area update: (RAlhTAlp;, The devices hiay then. determin4'^b.#b#ffop:b.ot they would still transmit their li&M, -18- 2015221490 02 Sep 2015 [0084} In a second example, the network may maMeast/feoadeast an indication that a PAM was received by a device ia the sama éel ar ia tha saaie location, area? for example a R.A1.J/TA.U together with an indication. of the latent or cause of the PAM, dliecause may hea set of preMefixied values determiaed by the network operator, and possibly agreed with the subscribers. Based on. the cause of their alartóy the devices may then deteranne whether or not they would still transmit their PAM.
In. a third example,, on a condition that the devices belong to pre- defined groups.;, the m etworfe may multi ca st/broa d ca st ; in indication that a PAM waa:received..by a de vine: belonging to. a specific grouj x Based on the group to which they belong r mb the relations "hip between g roups, the devices may determine .whether m : not they will fra nsmif their PA1 C [0066} In a ibiu Ah ekample, on a condition thatt he devices belong to pre- defined gxoirpfotke 8( IPP network may multicast or hrc tadcast an indication, that a PAM was received ' yr a device helont fing to ;a speeiiif group, together with an indication of the hue nf or: cause of tin 3 PAM,: The ca use may be a set of pre- defined values detei 'mined by the. n atwork operate r, and agreed with the subscribers, The set. ol lcauses may lx? gr imp~speeifie,for example, each group may have its own set of pet isihle causes, Bas ed on the group to which they belong, the (•a use of their alarm. an d possibly the 3 relationship bet ween groups, the devices may determine whet] icr or not they m< iv still transmit their PAM. [0067] Figure A i is a diagram of an example me thud 4Ö8 for performing network entry/re-entry based on a dedicated BA opportunity. Referring to Figure % the BS may assign h dedicated BA opportunity 410 for one or more selected M2M devices of an M2M. application to report critica l widespread exceptions, so that the critical widespread exceptions may be correctly reported. Such dedicated BA opportunities may he pre-assipned' tö' setectéd. repfesenteflyès in a static or semi-static manner, or assigned dynamically upon: detection of a significant aMoiinf Óf BA congestion, Ih, some examples, ah BA opportunity may not he assigned. 2015221490 02 Sep 2015 §00081 Upon receiving an: exception report from one or .mare M2M devices 42Cf the BS may determine ^%é^er':^,^ide.spread.e^eeptïon is imminent 430.11 the .BS deterniines that a wi^^réaÉéxceptih». feVéajt is immiaOBt 43Ö, the BS may transmit a system, indication massage that indicates* the recepticm oka critical' widespread exception report 4¾ The BS may system: has recovered 450. If the system has recovered, the BS may resume normal operation. 4SO. If te© system; has not recovered* the BS may transmit another system indication massage 44$. Ι0Θ681 The system indication message may be broadcasted to all the : subscribers in the access netwerk, Br this; way, the.:niihs^tesy^cipding.M2||: devices add other USOV 0« nhpme.nt, nn ly bo in 4ormed of eong estion. £ it the RA. •ehannelsTör petwo rk eatr; •e subsc ribers may take: certain actions to help avoid or com rol the congestion It aged on the systefo: i.hf lication. message. Alternatively, the BS mu y multicast f he sysU am indication, n message to one or more M2M dovict :s. who: re; the: MBM: devices may belong tc ? the so me M2M applicatidns, for e xemple. . smart metes ring. A ; special subscril >er grou p ngay he formed at the aeon: sasyste m for the M 2.' M. devici as, and the BS may multicast the system: indication: messag e to thé: IIBM ' device:;: group. [0070] On a cond.it. ion. that the BS is : triggered to tr. rn.sm.it a system indicatiön:m:essaga efitha reception of a critical widespread exception report* the; BS tBaf decide te irahèfoifc 4 system indication· message repeatedly with, a selected, periodicity. The selected periodicity may he;predetermined or it may be variable, This may occur until the congestion, of the BA channel for network èhtey/re-entry is under controlor until, tin·* system is recovered from the critical widespread, exception... ;[QÖTÏÏ A dedicatedRA based netwcack entry/re-entry may prcwi(fe dedicated RA opportunities to the selected M2M devices so that they may suecesdfnhy enter/re-en.tor the access: network without experiencing; collisions in the BA channel. It may enshfO; that critical widespread exceptions may be correctly 2015221490 02 Sep 2015 reported to the BS and MsM sabers, in: the case of BA. channel congestion due to .Móessi^tkmpfei.feom a large number óf M2M: deyioesi [00721 An BA. opportunity may generally refer to an opportunity for a. subscriber to transmit an EA request .·Εογ example* && ll^..ö|>pöitiiïïity amy he described hyttijne, EA channel· and: BA Code. In effeesi^Ords, a subscriber May transmit an BA request to the BS at a pto-determined time, period Kibi* in a time-domain) and a pre-determined channel |im.si:n::a frequency domain) with a predetermined BA code (un, in a [0073] The selection of the M.2.M devices to receive dedicated EA opportunity assigsupenfs may be provided by the M2M application servers, depending on a specific M2M application. The selection may also he decided by the BS; of the access network randomly or based on seme considerations, for example, physical locations or representstive factors among the M2M devices. Borne examples of eensidermtions include, hut are hot limited to. selecting M2M devious based on physical characteristics such as: physical location; available output power; advanced antenna systems; advanced niterterence mitigation featimesf demee storage capacity; andreported BS signal strength. Borne examples of considerations include but are not limited to selecting MEM devices based, em power supply such as* whether Bie M2M device Is battery pewefed; : powered fey a grid rather than a battery; powered by a grid with' an unipterrupfeabif' power supply baok:up;or powered offthe grid with solar, Windsor·: any other Off the grid power source.
[00711 The dedicated BA, opportunities may he assigned: to the selected M2M:devices in a static or senU'StettC:Manner* For example, a special·BA dpd#: may he reserved only for the selected M2M devices: to use for their network entry/re-entry attempts for reporting a Critica 1 system-wide exception:, Buch p: special EA code assignment tnay be: signaled by the BS to the One "Oh more selected M2M devices at their initial network entry, The: EA code may also be: changed later but not ftequ.en.lly. -21- 2015221490 02 Sep 2015 5] Alternatively. the dedicated HA opportunities may be assigned to the selected M2M devices dynamically,, upon detecting a: high.: degree, of congestion. in the RA channels. If the BS defects polterbk noise in the BA channels· but cannot decode it in multiple BA channels (iie^InBeqnency-domain) ahd multiple BA allocations (ie^^m titée'doinain}, then: tBe ®S ihay sense there may be; congestion in the RA channels*: and may trigger the assignment of one or more dedicated RA opportunities.
The aasigiihpït.of #<Scated;.'^A opportunities may he encoded in s network interfaCP'·: control channel information elements (lEs) and/or COntroI/management messages for example* MAP XEs; and/or media access contrei (MAC) messages in the air interface. The assignment may he encoded in a separate new MAP IB: and/or MAC message or it may he added as a new nee case; in sornp, existing MAP IE ahd/or MAC message. Alternatively, this inforihatioh: may also he encoded in. an M2M application layer services message exchanged the BS or M2M server or gateway, iCiOTitj The assignment signal ofdedicated RA opportunities to the selected M^MldevicfeS'ma^t^pilifeM^r implicitly include the following infonnaMonfields' identification information of the recipient of fee dedicated EA opportunity assignment, for example, a special M.2M. device ID assigned in fee access network specifically for network entry/re-entry procedure wife dedicated EA opportunities; a 48-hit universal MAC address; or n special Ip assigned to fee devices in ah idle state, such as fee deregistratiohlB pilPl ih 802,16m system^ IF Address, or a uniform resource identifier (URI); and descripfion information about fee dedicated RA opportunity or opportunities for ekample, time, 'RA channel, and/or RA code. §0078] Figure δ is a diagram of an example method EDO for polling-based met work entry/re-entry, The BS may poll 510 erne or more selected M.2.M devices of an M2M: application to defect if they are attempting to enter the network. The; BS may select the devices to poll in a random manner. In addition, the BS may select fee devicos feased en avaBaMe information about fee devices, for example* .00, 2015221490 02 Sep 2015 the device types, traffic characteristics, and the like. If the BS determines that one er more selected M2M decides: a® attemptin g to en ter the network ISO, the BS mi determine a reason for network entry/reOntry 530 baseden a received, poll response, Based on the reason for network entryfoe-entry, the BS may pant access 340. Inode example^ the BS may beferfoine to poll bhe hr ihcire selected M2M! devises1 based upon: a detection öf congestion in an MA channel,: [00791 A poll from th<;: BS may be a downlink (DL) message providing an. uplink (UL) allocation or allocations to the selected M2M representative dekiees. A poll may be a unicast; poll, öh auftbï&ttó poll,: BS may poll an individual device Or poll a group of devices.
[00891 WifEla.polling-based network en.try/te-eiRry procedure, instead of using contention-based access, a polling- based.aeeess procedure may be used to: inifinte the network entry/re-ehfry process* ip Which airMRM device may opt; transmit Ih the tlL until it receives a poü foh'lhOipiêiwOrtoïitr'y/t'e-e'ntoy· procesSi This may be usefulfor the pulled device to successfully enterire-enter the access: network;,vU^heh the normal RA based network:experiences diMculties due to EA channel congestion, lor example, anoverlnading of the RA attempts febm a large number of M2&f devices-in case of a critical widespread exception. soul 1 Upon defecting entry/re-
entry, the B8 may poll one or more selected M.2.M devices of an M2M application to detect if they are attempting to enter to the- network, The M2M device selection and RA channel congestion detection may he conducted by using similar nfechanisnia.^A poll from the BS may he a DL signal providing an UL allocation to the selected SI2M device or devices. If the UL allocation. of a poll is allocated to one device, then the poll may be a unicast poll and the accese to the given. UL allocation may he non-contentious. If the UL allocation of a poll is allocated to multiple selected devices, then the poll may be a multicast ptll and the access to tile given. UL allocation may he contentious dr non-coptehMous, In one example, if only one device in the multicast poll device group is active and listening to the DL -23- 2015221490 02 Sep 2015 at any time elm; to one or more M2M application specific reasons, a nrnlt^ may prpyul#; KL. all0éMfon.,.&' mtultic&sfc poll may provide; :a eonMntione AIL allocation to the devices in:tffo hmlticast poll recipient group, which may bo .intended to be a muck smaller : group tha&Afc '&nisbtëM5iM. device domain supported, by tfea access network. öpoiëxamplepf an :1®2M application specific reason may be onb or more mutually exclusive activated monitors or sensors. |C|08S|: In. one example, upon receiving a poll from the BS, an Μ 2M device may transmit a poll response in a prsrdetermined UL allocation. 1%&:. poll response may include an identiScaldon of the;M2M device, an indicatien .ef ite:: networE ebtry/re'-entrj? attempt, a reason fop entering the network, and one or more Olrbandwidth requests if it needs further P'L transmission.:: p)0d3l After transmitting a. poll to tha one or more selected MSM deviceev thb'BB may wait for a pell response in. the scheduled BL allocation, K the BS: successfully receives and decodes a poll response, then the BS and the devieemay he cophected. and further: data exchanged may he performed over'tkë ·:.Βϊ^:·'ΐο : complete the network entry/re-entry process. |Ϊ)0Β4| If the BS:does pot successfully receive and: decode a; poll response, the poll may he failed. There may be .mxb.t/ipie reasons for a poll failure, for example, the polled device may not he actively listening to the OB, or a collision may have occurred for a multicast poll. If the BS does not detect, any signals in a given poll to a device, for example, no energy on the radio channel, thé BS may determine that the polled device did not transmit in the given poll. If the BS detects signals in a given poll to a specific device, for example, energy pa the radio channel, but it cannot decode the signal, the BS may determine that a epïB§iöö.bec«fPbii?n'Öi.e poll, lithe B8 detects tbepolled device did not transmit in tin; poll, it may determine that the polled device is not attempting to en.ter/re-entsr the network, la this example, the BS may torminaie tho polling process to the device and may Choose to poll a different device.. If the BS detects there is a -24- 2015221490 02 Sep 2015 eollisienin a I1L allocation of a poll, it may terminate the polling process,: change to use a: unicast polk Or change to poll a smalier:.::nmiticast poll group. fOOSil A poll from the BS and a poll response from fthe dépte may lap encoded In the notwork tetorface: control ofeapnal information elenmnts and/or control/management messages, for example, MAP Ills and/or MAC messages in the air mterrace. The poll and the poll response may be encoded in a separate new MAP IE and/or MAC message, or they may be added as a new use ease in some existing MM?"® .Alternatively, this information may also be encoded in an M2M. application layer services message exchanged between the M2M Bey ice and the BS or M2M server or gateway, (00861 A poll from the BB may explicitly or implicitly include the .following information fields; tl® identification information of the recipient of the poll and the specification information about, the IJL allocation of the poll For the MbntiSoatton information of the recipient of the poll. In a dnioast poll example, the identification of the poll recipient may uniquely identify the polled device in the access network. For example, a special. M2M device ID may be assigned in the access network speeificaliy for: this polling-based network entry/re-entry procedure; a 4.8-Mf/universal iMAO address' maybe used; or a special ID may be assigned: to the st^^^,eÏÈ&h as the DID in 802,l:6:m;/systems, an: IP Address may fee/used, er a DEI may he used, In a multicast poll exa mple, the: idehtification multicast group may he a p co - a «signed group ID, a multicast/connection ID, or a flow': ID:, [Ö08 7I For the Bpecificatmn. information regarding the XXL allocation of the/ poll, time-domain: Specifications may include: a superframe index, a frame index, a subframe index, or a symbol index/ofrsei, Frequency-domain specifications may include a subchannel indexfof&et and a resource block indexfoilsek A modulation-chding procedure and antennafinultiple-input-· multiple-output (ΜΙΜΟ) related parameters may also be included, |)088| A poll response from an. M2M device may explicitly or ijnplicitl.y include the following information fields:: the; identification information of the -id-' 2015221490 02 Sep 2015 .sender of thé poll response* where similar identifiers may be usedvinthe nhÉsaai poll; an indication of its network entry/re- entry ::attempt; a description of may be an indicator for a critical, widespread exception:: report; and a UL bandwidth reguest for further ÜL transmissions.
[0089] Figure 6 is a diagram; of an example method 600 for performing a syStenrnof ideation of a network;: entry flood. Referring to Figure B!: tho; BB niay receive one or' morfesysteM:meep^efy signals 610 from .mu work elements on the network side and/or on subscriber side, detect a awstern recovery, or detect I· congestion on the network ehtryfre-eutry channels. In. response, the BS may transmit a .notification: to thdone or more devices and subscribers to inform: them of a; perceived or detected network eidry/rwentfy channel flood 62Ö, The: notification, may also be usectfo instruct the one or more devices or sithseribers tb use a network entry flood control procedure for their netwerk entry/rei-eutry attempts, [9Θ90] A system not i Heat ion pro*, edo ce may encourage a number of devices to connect to an a»^i'T^twörkeüci^feM.%iïi;:'ö'Mffiél.y:ma.a'SéïÏpiB'thé-f^n.t that: there may be a flood;ό£:hetwoïhvehtry .httemptSi for example, after a system recovery from a. è^éhpiou. The BS may transmit^: notification, when triggered, by cme or more preuiefined trigger conditions. Examples of such triggers May includM; ficemng signals from one or moré network elements indicating a system recovery from a critical system-wideexcèptina'IMceiving one or more signals from, one or more WTRUs indicating; system recovery from a. critical System-wide exception; defecting a system recovery from a crifreal system-wide exception; and detectin g a congestion on the network enfryfremntry channels. Upon receiving a system notiheation; message that mdfeates a network entry flood, the WTRUs attempting to enter the network May change their: network entry procedure from the msemai network entry procedure to a network entry flood control procedure. -26' 2015221490 02 Sep 2015
This system notification indicating a network {miry flood may fee broadcast to all the subscribers of the BS or m#itó to a group of Concerned subscribers. The system aoti.fication indicating a network entry flood may be emioded in;:ööeörmöïö:'^two^kiut«r&:hé''eö^.töfeï':a:ö^r::maïK||imëmt messages, for example, MAC messages in the air ifeterfach, encoded hi separate new MAO messages, or addeu as hew use case m some emstmg MAC messages, for example, an A AI R N G - A C K message, .Alternatively, this information may be encoded in an. M2M application layer services message exchanged between the M2M. device and the B8 or M.2M server or gateway. used as the·access link for the M2M systems, the: system notification, indicating a network ehtry flood may be encoded in. one ^.mö^'.hiïate^st/bröadcast Olass-l na n a gehfoht foani as, The mpMeaBt/broadcaat Cfass·-1 mana ge ment frames may be in all possible states, regardless of the authentication and association status. The system :nhtl&atl0h::iiXjdiea.Mi^':a network en.tryfl.00d may fee ahcbd#diin a separate new' Class'·! management frame, or it may fee encoded in:a. new information Eletnea 1111C) and/or infbrmaCoh field that may fee added to seme eristing mufticaisChroadcast Class-! management frames, for example, a beacon .frame, aipofelfsiaotion frump* of ;tfee like. P093| Exma^te-iaform:atioft::&kis in the: system: notification message may include: an identification: pCtim Intend unicast ID, a broadcast ID, a multicast BA,.:or a :group ID; ah identilie&tion of the critical widespread exception from which the: system has recovered; description information, aboutlhe critical wide#read,exceptipfe: feom which, the system-has recovered; the recommendation of the BB to the recipients' regarding actions to take and relevant parameters upon receiving thé: system notification indicating# network entry flood.
[CM39&J In. a network entry fiood. control procedure, the. BB and/or its subscriber stations* ihclhding M2M devices and other types of subscribers, May use a?network entry/re-entry procedure: that differs from the normal network 2015221490 02 Sep 2015 entry/re-entry procedare. The flood control mechanisms may he used to handle bursty network ent^&e~ent*y attempts &dm a large number of devices. The examples of network entry flood control mechanisms may include feat are not limited to: allocating additional network entry/re-eatry importunities temporarily, using a larger initial window of the network entry oppmi unities; .-'using a larger baéhnp window for network entry BA contention resolution; using a dedicated network entry BA procedure or using a polling-haaad network entry procedure.
[0090) There'may be a difference between.the system.indication.procedure and the system notification procedure,wherein the system,indication procedure may be used: by the BS to ifdbrm the devices of its awareness of a critical exception SO that the devices stillafemptiag to enter the network to report the: same exCeiAiefe may terminate their network entry atfempts. The system notification procedure may he used by the BS to infbrrn fbe devices of its perception, or detection of a network:ienfey flood, so that a network entry flood control procedure ..may he 'triggered'' to :help a large number of devices connect to the network Successfully in a timely manner. The system notification procedure may be « sed hy the BS to tr ansmit a specific instruction to one or more receiving : deyices to help: the devices connect to the network. The specific ipétrucfipu may vary by device, and: may be group based.
[$>096) Bach embodiment may be implemented separately pr in. any Combine tiom For example, network, entry/re-entry with dedicated BA opportunities: and polling-based, network entry/re-entry may be used in parallhi to: system-wide exception reports may he received corfhctly by the BS. Upon receiving a critical widespread exception report, the BS may transmit, a system indication message: to avoid congestion in. the network 'entry/re-entry, Ρθ·97) The network entry flood control procedure may handle situations whètè, there rnay he a .flood of network entry/re-entry attèihpts for devices to establish or resume their connectivity to the access network, The network entry -28- 2015221490 02 Sep 2015 coatrol procfèiiiire may he triggered at: the devices by receiving a system notification mess^gi|:^die$tm:g;É:A©twork-böky'fi!^d or ffe$ 4ÉV&&&·: of a network entry flood. Upon. receiving a system notification message or seif-detecting of a network entry Rood, the donees that are attempting to ester the network may terminate their current network entry procedure and start a network entry flood control procedure, [dQ$8f Flood control mechanisms may be used to handle bursty network èntrydo-entry·1 tempts from a large number of devices. The examples of network entry flood control mechanisms incln de: allocation of additional radio resource for the network entry channels temporarily until the congeation channels is under control; use of a large initial window of the network entry npportunities and wiierein the devices randomly select opportunities to start theif;:héti^hf^/é:hl^ attempts, so that their attempts may he evenly distributed over:tk^hët#Öld^',ïa^'Wiö:d;o#| use of a larger backoff W'indow for network entry 1M conteaiion resolution if RA is useddödnitiatfë^erietw^oA^n^^oge^si nan of a dedicated network entry HA procoddretand use ofa entry procedure. 3] Figure ? is a diagram of an example method fÖÖ for performing; a network entry,de-entry. Referring to Kgute 7, the M2M: deylce may initiatfra:: network; eutry/remntry '%%$.. Upon receiving: a BS acknowledgement of the; reception of a critical Widespread exception, report 720, the M2M device, may take; certain actions to help the congestion control at the EA channels; :for network: veotry/re-enfry. For example, the; M2M' device may terminate its network; èntry/réfoptry attemuL 7B0. fBlOO] Figure 8 is a diagram: of another example method SOfi tor performing; a network eh;try/re-entry. Eeferringto Figured, the M2M device may attonrpta network enfryfre-entry BIO. Upon rpeiviag a BS ackhohdedgemeht of the reception of a critical widespread exception report &2Q, the M2M device may :^t0rüiihé,thafe:i^.:ïi©W!ér supply is above a threshold 8Ö0. If the powpPsupply Of the MiM device is above a threshold, the M2M device may stav awake -0«. monitor the BL from the BS 84(. l If the power supply· is below a. threshnM, the [0101] The M2M device n mv randomly decide if it should euntinuo its network reentry attempt with a pre-speciEed prohahility of continuation or termination. For example, the It I2M device may continue with, a probability of 2015221490 02 Sep 2015 OOO and it may terminate with a probability of i l000'k}/l000, where 1 integer in the range (0. 1000). The M2M device may dynemica\\v a- EA haek>o£t window. For e%mp] le, :ifoe;M2M device may extend its EA hack-oil window in a larger degree, so tl rat the EA retries1 may be spread in a longer interval Alternatively, if a secon dAl is within:range the M.2M device may select the second AF for hetwo [0102] The system indicat ion message may he encoded in one or more: netwdrkinterface oon.trolAna.nag example. MAC messages in the bir inteffoee as delnèd in 802110 /WiMAX The system indication r may be encoded in: a aepara te ne^ y MAC message, or it may he added as new use case in an existing MAClmessai fo< forfokamplcc an AAI-RNG-AOK message In B02,l:6m,: Alternatively;,: the sysi em. Indication message may be generated by an M2M application cervices layer r esiding on the BS or interlacing with the BS, for le, an M2M server or gateway. (0103] In an e^mple: whet e the 802.11 based Wireless BAN system is used as the access link for the M2M. s ystemsg the system indication message may be encoded in mulficast/broadi met Class-1 management trames The mniticast/broadcast Class- .1 man a gemeni frames may he received by the WTBlIs in. all possible states, regardless a f tfoe aihbebBoation. and association status. The system, indication message m; sy be encoded in a. separate new Üla.ss-1 management foame, or it may h 'e encoded in a: new Information Element (Iffo n he added to some mtass'l management frames,ior or the like. example, a beacon trame, a pnhhe action frame. 2015221490 02 Sep 2015 'Thé' information fields in the system indication message may include: as identification of the for ÉxamFld*. Ji imieastlD,: a broadcast ;IBga multicast ID, or a group ID; an idenMfxoatisa ófitha reported :tótiöal:\d<te^ïêatl':0Xcepiióïi, about the reported critical wideaprpad: exception; the recomrnehdafibh pf the BS to the recipients Regarding aotlphs to: take upon receiving to terminate an. BA attempt,: to continue an BA attempt with a pro- defined probability, to extend the back-off window. or to connect to other BSs/AFs as recommended by tin; current serving BS; the BS assignment of dedicated BA channels to one or more specific devices; and the BS assignment of polls to specific devices. t010e| In another: example, anB02,Xi based- WAgless hrAN system may be used as the access link for the M.2M system. In this example, an, enhanced SÖ2. 11 contention-free access mechanism may be used as the network entry flood control mechanism. For example, an enhanced BF-Bsh/C^S-CF-Poll and/or an enhanced Fower Saving Multi-Poll (FSMF) may be used, This example procedure may include enhancements such as: enabling contentionifene wireless lABi linh access opportunities tó:bó provided. to the WTRUs with, or without :assighed: Associatien; Identifiers (AIDs) as: specified in ·Β02,1.1; end. proyiding a new addressing riroeednreto identify: the WïllÖstiiat have previously associated, and ahthènticoted with the AP but, are chffently ihhCtiye id accessing the: wireless LAM link, la this example, at least:bOöö MiM’ devices may be supported, fiilClbj In an enhanced ClF-Foll/QeS-CF-Poll procedure, the: GF-Fo!l(n.o data) and QoS QF-Fpll (no data) frames may be: allowed to transmit to tlte: WTB1J«,: teprdless of the state of the WTBIJs,IThis procedure may provide the WFBDs contention-free link access opportunities to initiate or re-initiate thé communication link with the A.P, Tin; WTBT.J for specific link access opportunity assignment may be identified by its MAG address in the DesBna&on Address ).A) field;of the CPdfrAi/QoS-CF-PoH frame (no elate) transmitted by the AP. 2015221490 02 Sep 2015 101073 In: ati enhanced PSMP procedure, contention-ifee1 liivfc access opportunisms may be assigned.·# png or more WTH& fcliat may not have an Association ID: assigned, In this example, an. enbanoed:FSlvi'F foame may be used to specify- the Jink access opportunity assignments. In an enhanced FSMF frame, with, individual addressee, #a# WTRtl may be identified by an identifier assigned .by the addressmt prooedure that snpports: a large namber of WTElIs for M2.M applications. The supported number ofWTRtJsmay be beyond 2007, the max number of AIDs as specified in 80*2,11. Such an identifier may be assigned to a WTMI before emiering:. #& P31ÖS1 An AF may proyide file WTEÜs contention-free link access opportunities to reinitiate the commumcation link with the AP and may he hased on a re-initiate priority associated are a large
number of WTElla, these priorities mat be determined in advance when the WTR Ös are -ïöcÉ^Stdte-wiiE the AP. In one example, the WTEU and the AP may negotiate:a re-initiate priority for the WFMJ, In this example, an #TKU may transmit; a request to the AP for a certain re - ini tiate priority and the AP may grankthat re-ini tiate priority or a difforenta^Anitiate priori ty based on a BSS load or idne or more BSS operating conditions;, The requested re-initiate priority fey thé:1$ΐΜίί may be based on. the supported application* for example, time critical sensor applications; öt.tl^hf’fFfEÜ' device, for example, a m edical device. Each WTRU may haye a priority whore no two WTEtls may have the same re-inwiofopriority. In another example, the AF may support: a set of reinitiate priority IpveWgroups and a WTEIJ may he assigned, to, a, level/group, [010.0] The network entry Food control mechanisms may he. used individually or in combination inca:network entry Food control procedure. For example, a large iniand,a large backoff windowibr BA contenfoon resolutioncmay be used in. combination: to spread the 2015221490 02 Sep 2015 [0110] !ΤΐΐΟ selection of the network entry nood control mechanisms may he indicated in the: system notification message indicating a network entry flood. and it may also be prd-defihed based on system design decisions.
[01.11] An deyice may refer to a n 1Ï2M' subscriber station m an access network, and may be an endmsér dm és·, for example, a smart meter, or a concentrator, or a data aggregate.point (DAP), A BS may referloan access point or an attachment point mrihe: access network: that connects tbe subscriber stations to the network* and may he a NodeB or: an evolved ModeB in third generation partnersbip project (3GPP), a BS or an advanced base station in |Ö2.lCkWMAÏ, A BB may also refer to a BS that supports MSMbappiicaiksn layer services locally as well as a BS that interfaces to aBbiAer onBtybncB as an M2M server or gateway, which ..supports MMM. application layer services,
EMBODIMENTS 1.:, A meth od for use in: a base station [BB], the method comprising: receiving a trigger from aideast One device; and On a condition that a. widespread exception is imminent, transmitting a .system indication to the at least one device. % Tire method of embodiment [ Esther comprising: determining whether :a: widespread exception is Imminent based on the trigger, 8. Tin- method id endiocb monr 1 . > 2 further conumss ng; determining whether the wireless eommimlcaiion: system has recovered. 4 Thé' methödöf any one, preceding: embodiment farther Comprising; on: a condition that the system: has not recovered, transmitting another system indication to the at least one device. £y The method of aiiy one: preceding:emhodiffieBh wherein the system indication m: transmittedperiodically. 2015221490 02 Sep 2015 6. 'The .mefch od/nf embodiment: 6?: wherein: th&piriodie traftsmksidn. of the system indication is variable, 7:, The method ^embodiment h, wherein the periodic transmission of ill# system indication is dynamic. 8. The method of any: one preceding embodiment, wherein the trigger is an exception report. 9, The method of any one preceding embodiment, wherein the trigger is based on receiving a plurality of reports, 1Ö, The method of embodiment 9, wherein the plurality of reports are received from a plurality of M2.M. devices, 11. The method of embodiment 9 or 10, wherein, the plurality of reports an# received within a pro-determined Window of time. t% The method of any one preceding embodiment, wherein the trigger is based on receiving: a plurality of messages of a specific type. 18« Tile method of embodiment 1¾ wherein the plurality of messages of a specific type are of the same type. 14, The method of embodiment 72 or 13, wherein the plurality of messages of a specific type are of different types. 18. The method of any one of embodiments 12-14, wherein the pkirallty of me$s$g#s -n^iiï^^ëiyiéd· pre-dëierminéd window of time. 16, The method of any one preceding embodiment, wherein, the atlea St one device comprise one or more devices of the same type, 17. The |hèflih^^#|ty\Ph^idf''frnh(Miiraan.ta 1-lb, wherein, the at:least one device, comprise nhe:nr mere: devices of different, types. 15, one preceding emhodiment, wherein the at least one device Isi&· wireless tfapsnlil/reëeiye emit (WTRU|i 19. : The method: of any one preceding embodiment, wherein the at least one device is a networh ehtity, -31- 2015221490 02 Sep 2015 9 a a I. 28, :The' method of any one preceding enmodiment, whereimthe ai least
One: device is· a machine-to-machine CM2Mf server. 21. The method of any one preceding embodiment.,:: wherein the at least one device is: a maehme-tonhacMfte (M'2SI) gateway. 22, A base station (BS) comprising;: a receiver configured to receive a trigger from the at: least one device; and a transmitter configured to transmit:a system indication to the at least one device on a condition thaf/a widespread exception is imminent. 28. The BB of embodiment: :22 fur:thor comprising: a pmcessor configured to determine whether a widespread exception is imminent based, on. the trigger, 24, The BB of embodiment 23, wherein the processor is further configured to determine whether the wireless commanieatinn system has recovered.
Tile BB of airn onemembodiments 22-24, wherein the transmitter is further configured to tianssnit another system indication to the at least one ievicé. 28. The BS of any one of emhodiments 22:-25, wherein, the transmitter is further configured to transmit a nother system indication on a condition that the system has not recovered.
[he BS of anv one of embodiments 22-28, wherein the system indication is tomnsmitted periodically, 28, The BS of enmodiment 22, wherein the periodic transmission of the system indication is variable. 29, The BS of embodiment.. 27, wherein the periodic transmission, of the system indication is dynamic. 30, The BS of any one of embodiments 22-29, wherein the trigger is an exception report, -35- 2015221490 02 Sep 2015 31, 'The BS of any one of embodiments 22-3Θ, wherein the trigger: in based on. receiving a plurality of reports, <12. The BS of embodiment 31, wherein tile plurality of reports are received from a: plurality of M2M' devious. id* ThéBS of embodiment SI or 32, ara received:within: a, pre-deternYmed window 3d., Tile BS of any one' of embodiments 22-33, wherein flip trigger is based on reeoivipg: a plurality of messages of anpeeifie type. 33., The BS of embodiment 34, whnpdfelhe plurality of messages of a: specific: type ore of the same type. 3d.,: The,Bl. of embodiment 34 or 3¾ wherein the plurality of messages of é'.specific.'type.are If different, types, 373 TheBis? Of any one of embodiments 34-33, wherein, the plurality of messages are received; within a pre-determined: window of time. 33« The BS of any one of embochinents 22-37, wherem the at least one device comprise one or more devices of the same type. 39, The BS of any one of embodiments 22-37, wherein the at least one device comprise one or more devices of different types. 40, The BS of any one of embodiments 22-33, wherein the at least one: device is a wireless transmit/receive unit (WTRU). 41, Thé BB of any one: of embodiments 22-40, wherein the at least one device is a networkentiiy. 42« The BB of any one of embodiments 22-41, wherein the at least one device is a machi.nB-to-macMne |M2M) server, 43. The BS of any one of embodiments 22-42, wherein tie at least one device is a maohme-fco-machine (M2M) gateway. 44., : A method fer use in a wireless transmit/receive unit (WTEÜ), tho: method comprising: attempting a network entry procedure; and -36- 2015221490 02 Sep 2015 receiving 'a&indieatiöP.nfh? vridespread exception report from abase station (BS), 45. The method of embodiment 44 further comprising: in response to the indication, terminating the network enten? procedure. 46. The method of embodiment 44 or 45 further comprising: entering a power saving mode in response to the indication, 47. The method of any one -of enihodimoitts 44- dR&hther comprising;: determining whether ;a power supply of the WTRU is above a threshoid. 48. .The method of any one of:embodiments 44-47 further comprising: on a condition that a: power supply is: above a:threshold, entering a power saving mode. 4Sb Thé method of any ona of embodiments 44-47 further comprising:: on: a condi tion that the power supply Is Belowa threshold., remaining: aWakednd monitoring a downUnfe (Blip charme! from the B$. 50. Mwireless transmit/receive onit (WTRU) comprising; a .attempt-Jt network entry procedure: and a receipef configured to receive an indication of a widespread exception report from a base station (BS). 51. Thé WTRU of embodiment oft wherein the processor is further configured to terminate the network entry procedure: in response to the indication,: tpi, .The WTRU 0f embodiment 50 or 51, wherein the processor is configured to enter a power saving made in Msponsb to the indication. 58, The WTRU of any one of embodiments 50-5¾ wherein the processor is fnfthef cohilgpred to determine whether a power supply of the WTRU is shove a: threshold, 84, The WTRU of any onepf embodiments 80-53, wherein the processor is further configured to enter a power saving mode, -57- 2015221490 02 Sep 2015 οδ, 'The WTËIX of embodiment 54, wherein on a..condition that the power supply is above a tfeeshoM,, the processor is further configured to enter a: power saving mode. SCL The WTR1J of embodirnent .1.9, wherein the processor is further configured to remain awake and monitor a downlink (DL) channel from the BS on a condition that the power supply is. below a threshold.
Although features and elements are described above in. particular eomhinaiinnsv one of ordinary shill i n the art w ill a ppreci a te that each feature or element can be used alone or in any combination with the other features and elements. In addition, the methods described herein may he implemented in a computer program., software* or firmware incorporated in a computer-readable; inedfem fef execution, by a computer or processor. readable media include electronic pvb* wired or wireless connections): and e^nputsnreadahle storage media, Examples of computer-readable storage mourn include, hiit are not limited to, a read only memofy fKOM), a. random access memory (EAMi, a register, cache memom semiconductor memory devices* magnetic media snch as internal bard dishs and removable disks, ma gn.eto - op ti ca ] m odi a, and optical media such as Cl)-ROM dishs* and digital versatile diafa (IWBsh A processor in association with software may be used to implement a radio frequency transceiver for use in. a terminal* base statiom RNC* or any host -Computer.
Claims (12)
- THE CLAIMS DEFINING THE INVENTION ARE AS FOLLOWS: E A method for use in a base station (BS), the method comprising: receiving an event indication message from one device of a plurality of devices in communication with the BS; determining, based on the event indication message, whether a widespread exception event is imminent, wherein a widespread exception event is an event that will result in the plurality of devices in communication with the BS losing communication with the BS; and on a condition that a widespread exception event is imminent, transmitting a first system indication message to at least the one device, wherein the first system indication message is a beacon that indicates that the plurality of devices in communication with the BS should cease transmitting event indication messages to the BS.
- 2. The method of claim 1 further comprising: determining whether the BS has recovered from the widespread exception event; and on a condition that the BS has not recovered from the widespread exception event, transmitting a second system indication message to at least one of the plurality of devices.
- 3. The method of claim 1, wherein the system indication message is transmitted periodically.
- 4. The method of claim 1, wherein the event indication message is an exception report.
- 5. The method of claim 1, wherein the first system indication message is transmitted by the BS based on the BS receiving a plurality of exception reports from a plurality of devices within a pre-determined time period.
- 6. The method of claim 1, wherein the first system indication message is transmitted by the BS based on the BS receiving a plurality of messages of a specific type within a pre-determined time period.
- 7. A base station (BS) comprising: a receiver configured to receive an event indication message from one device of a plurality of devices in communication with the BS; a processor configured to determine whether a widespread exception event is imminent based on the event indication message, wherein a widespread exception event is an event that will result in the plurality of devices in communication with the BS losing communication with the BS; and a transmitter configured to transmit, on a condition that a widespread exception event is imminent, a first system indication message to at least the one device, wherein the first system indication message is a beacon that indicates that the plurality of devices in communication with the BS should cease transmitting event indication messages to the BS.
- 8. The BS of claim 7, wherein the processor is further configured to determine whether the BS has recovered from the widespread exception event, and wherein the transmitter is further configured to transmit, on a condition that the BS has not recovered, a second system indication message to at least one of the plurality of devices.
- 9. The BS of claim 7, wherein the system indication message is transmitted periodically.
- 10. The BS of claim 7, wherein the event indication message is an exception report.
- 11. The BS of claim 7, wherein the transmitter is further configured to transmit the first system indication message based on the BS receiving a plurality of exception reports from a plurality of devices within a pre-determined time period.
- 12. The BS of claim 7, wherein the transmitter is further configured to transmit the first system indication message based on the BS receiving a plurality of messages of a specific type within a pre-determined time period.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2015221490A AU2015221490B2 (en) | 2011-03-11 | 2015-09-02 | Method and apparatus for handling bursty network entry and re-entry in machine to machine networks |
AU2016216572A AU2016216572A1 (en) | 2011-03-11 | 2016-08-16 | Method and apparatus for handling bursty network entry and re-entry in machine to machine networks |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US61/451,852 | 2011-03-11 | ||
AU2012229319A AU2012229319A1 (en) | 2011-03-11 | 2012-03-09 | Method and apparatus for handling bursty network entry and re-entry in machine to machine networks |
AU2015221490A AU2015221490B2 (en) | 2011-03-11 | 2015-09-02 | Method and apparatus for handling bursty network entry and re-entry in machine to machine networks |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2012229319A Division AU2012229319A1 (en) | 2011-03-11 | 2012-03-09 | Method and apparatus for handling bursty network entry and re-entry in machine to machine networks |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2016216572A Division AU2016216572A1 (en) | 2011-03-11 | 2016-08-16 | Method and apparatus for handling bursty network entry and re-entry in machine to machine networks |
Publications (2)
Publication Number | Publication Date |
---|---|
AU2015221490A1 AU2015221490A1 (en) | 2015-09-24 |
AU2015221490B2 true AU2015221490B2 (en) | 2016-11-03 |
Family
ID=54200147
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2015221490A Active AU2015221490B2 (en) | 2011-03-11 | 2015-09-02 | Method and apparatus for handling bursty network entry and re-entry in machine to machine networks |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2015221490B2 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6631121B1 (en) * | 1997-04-16 | 2003-10-07 | Samsung Electronics Co., Ltd. | Method and apparatus for managing overhead channel in mobile communication system |
US20060294214A1 (en) * | 2005-06-23 | 2006-12-28 | Joey Chou | Event logging techniques for broadband wireless access networks |
-
2015
- 2015-09-02 AU AU2015221490A patent/AU2015221490B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6631121B1 (en) * | 1997-04-16 | 2003-10-07 | Samsung Electronics Co., Ltd. | Method and apparatus for managing overhead channel in mobile communication system |
US20060294214A1 (en) * | 2005-06-23 | 2006-12-28 | Joey Chou | Event logging techniques for broadband wireless access networks |
Also Published As
Publication number | Publication date |
---|---|
AU2015221490A1 (en) | 2015-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2684391B1 (en) | Method and apparatus for handling bursty network entry and re-entry in machine to machine networks | |
US10122700B2 (en) | Secure method for MTC device triggering | |
EP2568758B1 (en) | Method and device for processing data transmission of machine-type communication device | |
CN105850161B (en) | A method and device for maintaining business continuity | |
JP5514949B2 (en) | Efficient signaling for machine type communication | |
JP6685384B2 (en) | Method and apparatus for notifying SI update, EAB update and PWS message in wireless communication system | |
CN104186010B (en) | Random access procedure in wireless system | |
TW202322653A (en) | An ieee 802.11 station and a method for use therein | |
US10306552B2 (en) | Coordination using the UE application | |
US20130273855A1 (en) | Systems, methods, and apparatus for machine to machine device triggering | |
US20140171061A1 (en) | Network access delay for eab-configured ues and/or group-based addressed ues | |
KR102196817B1 (en) | Paging method, device and system | |
KR101540480B1 (en) | Method of receiving a disaster warning message using a paging message in mobile communication system | |
EP3562211A1 (en) | Data transmitting/receiving apparatus and method, and communication system | |
WO2012139377A1 (en) | Method, system, terminal, and base station for uplink scheduling | |
CN103548322B (en) | Method and apparatus for triggering detached machine type communication device | |
WO2018182482A1 (en) | A network node, a communications device and methods therein for secure paging | |
JP6517425B2 (en) | Contention based radio resource management for small packet transmission | |
US20180270789A1 (en) | Updating Apparatus and Method for Access Control Parameter and Communication System | |
KR101540479B1 (en) | Method of receiving a disaster warning message in mobile communication system | |
AU2015221490B2 (en) | Method and apparatus for handling bursty network entry and re-entry in machine to machine networks | |
GB2493722A (en) | Machine-to-machine transmission using a bearer connection with a security context | |
AU2016216572A1 (en) | Method and apparatus for handling bursty network entry and re-entry in machine to machine networks | |
CN104205925B (en) | The method and device of transmission network management data | |
Prasannakumar | Signaling Congestion Control Mechanisms for Supporting Machine-To-Machine Communications in 4G LTE Cellular Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGA | Letters patent sealed or granted (standard patent) |