[go: up one dir, main page]

CN114175714B - Managing communication of wireless devices with base stations to obtain system information from base stations while reducing congestion - Google Patents

Managing communication of wireless devices with base stations to obtain system information from base stations while reducing congestion Download PDF

Info

Publication number
CN114175714B
CN114175714B CN202080054090.6A CN202080054090A CN114175714B CN 114175714 B CN114175714 B CN 114175714B CN 202080054090 A CN202080054090 A CN 202080054090A CN 114175714 B CN114175714 B CN 114175714B
Authority
CN
China
Prior art keywords
request
wireless device
determining
access channel
base station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202080054090.6A
Other languages
Chinese (zh)
Other versions
CN114175714A (en
Inventor
K.文卡特拉姆
A.A.谢克
D.艾默加
S.王
A.V.桑塔纳姆
O.厄兹蒂尔克
北添正人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US16/929,410 external-priority patent/US11234259B2/en
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of CN114175714A publication Critical patent/CN114175714A/en
Application granted granted Critical
Publication of CN114175714B publication Critical patent/CN114175714B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0289Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/12Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • H04W74/0841Random access procedures, e.g. with 4-step access with collision treatment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present disclosure provides systems, methods, and apparatus for managing communications with a base station by a processor of a wireless device, and computer programs encoded on a computer storage medium. In one aspect, a processor of a wireless device may receive a system information change indication in first system information from a base station. The processor may determine scheduling information for the second system information from the first system information. The processor may determine a factor by which the request for the second system information will conflict with a request for the second system information from another wireless device. The processor may send a request for second system information using the determined factor.

Description

Managing communication of wireless devices with base stations to obtain system information from base stations while reducing congestion
RELATED APPLICATIONS
The present application claims the benefit of priority from the indian provisional application No. 201941030908 entitled "MANAGING WIRELESS DEVICE COMMUNICATION WITH A BASE STATION" filed on 7.31 in 2019, the entire contents of which are incorporated herein by reference for all purposes.
Technical Field
The present disclosure relates generally to wireless devices and, more particularly, to managing wireless devices to obtain desired system information from a base station while reducing wireless link congestion.
Background
The wireless base station provides certain System Information (SI) that enables the wireless device to establish a communication link with the base station. SI may be provided in one or more blocks, such as a Master Information Block (MIB) or a System Information Block (SIB). In LTE systems, MIB and SIB schedules are fixed and all SIBs are broadcast by the base station. In a 5G New Radio (NR) system, SI is divided into Minimum System Information (MSIB) and other system information in order to reduce over-the-air signaling (over-the-AIR SIGNALING). MSIB, such as MIB and SIB1 messages, are broadcast periodically and include basic information needed by the wireless device to attempt initial access to the cell, as well as information for acquiring other system information. Some base stations may broadcast other system information. However, some base stations may provide other system information based on demand, for example in response to receiving a request for such information from a wireless device.
Disclosure of Invention
The systems, methods, and devices of the present disclosure each have some innovative aspects, no single one of which is solely responsible for the desirable attributes disclosed herein.
One innovative aspect of the subject matter described in this disclosure can be implemented in a wireless device. Some implementations may include: receiving an SI change indication in first System Information (SI) from the base station; determining scheduling information of a second SI from the first SI; determining a factor by which a request for the second SI will collide with a request for the second SI from another wireless device; and transmitting the request for the second SI using the determined factor.
In some implementations, the first SI may include one or more elements of a system information block 1 (SIB 1) message. In some implementations, the first SI may include one or more elements of a Master Information Block (MIB) message. Some implementations may include determining, based on the first SI, whether the second SI is a demand-based SI. In these implementations, determining the factor by which the request for the second SI will collide with the request for the second SI from another wireless device may include determining the factor by which the request for the second SI will collide with the request for the second SI from another wireless device in response to determining that the second SI is a demand-based SI.
In some implementations, determining that the request for the second SI will collide with a request for the second SI from another wireless device may include determining a random back-off (RBO) time for transmitting the request for the second SI, and transmitting the request for the second SI using the determined factor may include transmitting the request for the second SI using the determined RBO time.
In some implementations, determining that the request for the second SI will conflict with a request for the second SI from another wireless device may include determining an access restriction class of the wireless device, and transmitting the request for the second SI using the determined factor may include transmitting the request for the second SI according to the determined access restriction class. In some implementations, determining that the request for the second SI will conflict with a request for the second SI from another wireless device may include determining a factor for reducing a probability that the request for the second SI will conflict with a request for the second SI from another wireless device.
Another innovative aspect of the subject matter described in this disclosure can be implemented in a wireless device that can include: receiving network configuration information in first System Information (SI) from a base station; determining a type of access channel request to be transmitted to the base station from the network configuration information in the first SI; transmitting one or more first requests for a second SI to the base station based on the determined type of access channel request; determining whether an access channel request failure has occurred after transmitting at least one of the first requests for the second SI; responsive to determining that an access channel request failure has occurred, determining an RBO time for transmitting a second access channel request based on the determined type of access channel request; and transmitting a second request for the second SI to the base station based on the RBO time.
In some implementations, the type of access channel request may include one of a Message-1 (Message-1) single resource request, a Message-1 (Message-1) multiple resource request, and a Message-3 (Message-3) request. In some implementations, based on the determined type of access channel request, transmitting some access channel requests to the base station may include transmitting a plurality of access channel requests to the base station based on the determined type of access channel request, and determining that an access channel request failure has occurred may include determining that an access channel request failure has occurred after transmitting any of the plurality of access channel requests.
Some implementations may include identifying one or more messages of the second SI that were not received by the wireless device, and sending a request to the base station for the one or more messages of the second SI that were not received by the wireless device using the RBO time. Some implementations may include determining whether a time for receiving the second SI has elapsed, and in response to determining that the time for receiving the second SI has elapsed, sending a third request for the second SI to the base station.
In some implementations, determining whether an access channel request failure has occurred after sending at least one of the first requests for the second SI may include: monitoring the second SI based on the one or more first requests for the second SI and determining that the access channel request failure has occurred based on a failure to receive at least one element of the second SI. In some implementations, monitoring the second SI based on the request for the second SI may include monitoring the second SI requested by another wireless device.
Another innovative aspect of the subject matter described in this disclosure can be implemented in an apparatus of a wireless device. Some implementations of a wireless device may include: a first interface configured to obtain an SI change indication in first System Information (SI), and a processing system coupled to the first interface and configured to: determining scheduling information of a second SI from the first SI; determining a factor by which a request for the second SI will collide with a request for the second SI from another wireless device; and transmitting the request for the second SI using the determined factor.
In some implementations, the first SI may include one or more elements of a system information block 1 (SIB 1) message. In some implementations, the first SI may include one or more elements of a Master Information Block (MIB) message. In some implementations, the processing system may be further configured to determine whether the second SI is a demand-based SI based on the first SI. In these configurations, the processing system may be further configured to determine the factor for reducing a probability that a request for the second SI will collide with a request for the second SI from another wireless device in response to determining that the second SI is a demand-based SI.
In some implementations, the processing system may be further configured to determine an RBO time for sending the request for the second SI, and send the request for the second SI using the determined RBO time. In some implementations, the processing system may be further configured to determine an access restriction class of the wireless device, and to send the request for the second SI according to the determined access restriction class. In some implementations, the processing system may be further configured to determine a factor for reducing a probability that a request for the second SI will collide with a request for the second SI from another wireless device.
Another innovative aspect of the subject matter described in this disclosure can be implemented in an apparatus of a wireless device. Some implementations of a wireless device may include: a first interface configured to obtain network configuration information in a first SI, and a processing system coupled to the first interface and configured to: determining from the network configuration information a type of access channel request to be sent to the base station; transmitting one or more first requests for a second SI to the base station based on the determined type of access channel request; determining whether an access channel request failure has occurred after transmitting at least one of the first requests for the second SI; responsive to determining that an access channel request failure has occurred, determining an RBO time for transmitting a second access channel request based on the determined type of access channel request; and transmitting a second request for the second SI to the base station based on the RBO time.
In some implementations, the type of access channel request may include one of a message-1 single resource request, a message-1 multiple resource request, and a message-3 request. In some implementations, the processing system may be further configured to: transmitting a plurality of access channel requests to the base station based on the determined type of access channel request; and determining that an access channel request failure has occurred after transmitting any one of the plurality of access channel requests. In some implementations, the processing system may be further configured to: identifying one or more messages of the second SI that are not received by the wireless device; and sending a request to the base station for the one or more messages of the second SI not received by the wireless device using the RBO time.
In some implementations, the processing system may be further configured to: determining whether a time for receiving the second SI has elapsed; and in response to determining that the time for receiving the second SI has elapsed, sending a third request for the second SI to the base station. In some implementations, the processing system may be further configured to: monitoring the second SI based on the one or more first requests for the second SI; and determining that the access channel request failure has occurred based on a failure to receive at least one element of the second SI. In some implementations, the processing system may be further configured to: the second SI requested by another wireless device is monitored.
The details of one or more implementations of the subject matter described in this disclosure are set forth in the accompanying drawings and the description below. Other features, aspects, and advantages will become apparent from the description, the drawings, and the claims. Note that the relative dimensions of the following figures may not be drawn to scale.
Drawings
Fig. 1A shows a block diagram illustrating an example communication system.
Fig. 1B shows a data flow diagram illustrating an example of system information provisioning.
FIG. 2 illustrates a component block diagram of an example computing system.
Fig. 3 shows a component block diagram of an example software architecture including a radio protocol stack for a user and control plane in wireless communication.
Fig. 4 illustrates a component block diagram of an example system configured to manage paging monitoring by a processor of a wireless device.
Fig. 5 illustrates a process flow diagram of an example method of managing communications with a base station by a processor of a wireless device.
Fig. 6A-6C illustrate a process flow diagram of example operations that may be performed as part of a method of managing communications with a base station by a processor of a wireless device.
Fig. 7 illustrates a process flow diagram of an example method of managing communications with a base station by a processor of a wireless device.
Fig. 8A-8D illustrate process flow diagrams of example operations that may be performed as part of a method of managing communications with a base station by a processor of a wireless device.
FIG. 9 illustrates a component block diagram of an example network computing device.
Fig. 10 illustrates a component block diagram of an example wireless device.
Like reference numbers and designations in the various drawings indicate like elements.
Detailed description of the preferred embodiments
To describe innovative aspects of the present disclosure, the following description is directed to certain implementations. However, one of ordinary skill in the art will readily recognize that the teachings herein could be applied in a multitude of different ways.
The described implementations may be implemented in any device, system, or network capable of transmitting and receiving Radio Frequency (RF) signals in accordance with any Institute of Electrical and Electronics Engineers (IEEE) 16.11 standard, or any IEEE 802.11 standard, bluetooth standard, code Division Multiple Access (CDMA), frequency Division Multiple Access (FDMA), time Division Multiple Access (TDMA), global system for mobile communications (GSM), GSM/General Packet Radio Service (GPRS), enhanced Data GSM Environment (EDGE), terrestrial trunked radio (TETRA), wideband CDMA (W-CDMA), evolution data optimized (EV-DO), 1xEV-DO, EV-DO RevA, EV-DO RevB, high Speed Packet Access (HSPA), high Speed Downlink Packet Access (HSDPA), high Speed Uplink Packet Access (HSUPA), evolved high speed packet access (hspa+), long Term Evolution (LTE), AMPS, or other signals for communication within a wireless, cellular, or internet of things (IOT) network, such as systems utilizing 3G, 4G, or 5G technologies, or further implementations thereof.
Some base stations implementing the 5G NR communication protocol may be configured to broadcast reduced amounts of System Information (SI). Such a base station may be configured to provide additional SI in response to a request from a wireless device. SI is critical for wireless devices to establish communication with a base station. However, when a base station responds to a plurality of requests to broadcast a demand-based SI (on-demand SI), many wireless devices requesting the demand-based SI from the base station may cause an increase in wireless communication link congestion.
Implementations described herein provide methods for managing wireless devices to achieve acquisition of SI required for communication with a base station while also reducing wireless signaling congestion and wireless communication links. In one aspect, a wireless device that is performing a process for managing communications with a base station may receive an SI change indication in a first SI from the base station. The wireless device may determine scheduling information for the second SI from the first SI. The wireless device may determine a factor by which the request for the second SI will collide with a request for the second SI from another wireless device. The factor may be a factor for reducing the probability that a request for the second SI will collide with a request for the second SI from another wireless device. Using the determined factor, the wireless device may send a request for a second SI to the base station.
In some implementations, the first SI may include one or more elements of a system information block 1 (SIB 1) message. In some implementations, the first SI may include one or more elements of a Master Information Block (MIB) message.
In some implementations, the wireless device may determine whether the second SI is a demand-based SI based on the first SI. In some implementations, the wireless device may determine, in response to determining that the second SI is a demand-based SI, a factor for reducing a probability that a request for the second SI will collide with a request for the second SI from another wireless device.
In some implementations, the wireless device may determine a random back-off (RBO) time for transmitting the request for the second SI, and may transmit the request for the second SI using the determined RBO time. In some implementations, the wireless device may determine an access restriction class of the wireless device and may send a request for the second SI according to the determined access restriction class.
In some implementations, a wireless device that is performing a process for managing communications with a base station may receive network configuration information in a first SI from the base station and may determine a type of access channel request to send to the base station from the network configuration information. The wireless device may send some requests for the second SI to the base station based on the determined type of access channel request. The wireless device may determine that an access channel request failure has occurred after sending at least one of the requests for the second SI. In some implementations, the wireless device may determine an RBO time to send the second access channel request based on the determined type of access channel request, and may send the second request for the second SI to the base station using the RBO time. In some implementations, the type of access channel request may include one of a Message-1 (Message-1) single resource request, a Message-1 (Message-1) multiple resource request, and a Message-3 (Message-3) request.
In some implementations, the wireless device may send a plurality of access channel requests to the base station based on the determined type of access channel request, and may determine that an access channel request failure has occurred after sending any of the plurality of access channel requests. In some implementations, the wireless device may identify one or more messages of the second SI that the wireless device did not receive. The wireless device may use the RBO time to schedule a request to the base station to send one or more messages of the second SI that the wireless device did not receive.
In some implementations, the wireless device may determine that a time for receiving the second SI has elapsed and may send a third request for the second SI to the base station. In some implementations, the wireless device may monitor the second SI based on the request for the second SI, and may determine that an access channel request failure has occurred based on a failure to receive at least one element of the second SI. In some implementations, the wireless device may monitor the second SI that has been requested by another wireless device.
Particular implementations of the subject matter described in this disclosure can be implemented to realize one or more of the following potential advantages. The present disclosure may provide improved techniques for managing communications between a base station and one or more wireless devices. For example, the techniques may be used to manage allocation of SI from a base station to one or more wireless devices. Additionally, the techniques may provide improvements to improve communication efficiency and reduce wireless communication link congestion between a base station and one or more wireless devices.
The term "wireless device" as used herein refers to any or all of wireless router devices, radios, cellular telephones, smartphones, portable computing devices, personal or mobile multimedia players, laptops, tablet computers, smart books, palmtops, wireless email receivers, multimedia internet-enabled cellular telephones, wireless game controllers, internet of things (IoT) devices including large and small machines and appliances for home or business use that support wireless networks, wireless communication elements within autonomous and semi-autonomous vehicles, wireless devices attached to or incorporated into various mobile platforms, and similar electronic devices including memory, wireless communication components, and programmable processors.
The term "system on a chip" (SOC) as used herein refers to a single Integrated Circuit (IC) chip containing multiple resources or processors integrated on a single substrate. A single SOC may contain circuitry for digital, analog, mixed signal, and radio frequency functions. A single SOC may also include any number of general-purpose or special-purpose processors (digital signal processors, modem processors, video processors, etc.), memory blocks (e.g., ROM, RAM, flash memory, etc.), and resources (e.g., timers, voltage regulators, oscillators, etc.). The SOC may also include software for controlling the integrated resources and processors and controlling the peripheral devices.
The term "system in package" (SIP) as may be used herein refers to a single module or package containing multiple resources, computing units, cores or processors on two or more IC chips, substrates or SOCs. For example, SIP may include a single substrate on which a plurality of IC chips or semiconductor wafers are stacked in a vertical configuration. Similarly, SIP may include one or more multichip modules (MCMs) on which multiple ICs or semiconductor wafers are packaged into a unified substrate. SIP may also include multiple independent SOCs coupled together by high-speed communication circuitry and closely packaged (e.g., on a single motherboard or in a single wireless device). The proximity of the SOC facilitates high-speed communication and sharing of memory and resources.
The term "processing system" as used herein refers to a processor, SOC, or SIP coupled to or including a storage device.
The term "multi-core processor" as may be used herein refers to a single Integrated Circuit (IC) chip or chip package that includes two or more separate processing cores (e.g., CPU cores, internet Protocol (IP) cores, graphics Processor Unit (GPU) cores, etc.) configured to read and execute program instructions. The SOC may include a plurality of multi-core processors, and each processor in the SOC may be referred to as a core. The term "multiprocessor" as may be used herein refers to a system or device that includes two or more processing units configured to read and execute program instructions.
Fig. 1A illustrates an example of a communication system 100 suitable for implementing various implementations. The communication system 100 may be a 5G NR network, or any other suitable network, such as an LTE network.
Communication system 100 may include a heterogeneous network architecture including a communication network 140 and various mobile devices (shown in fig. 1 as wireless devices 120a-120 e). Communication system 100 may also include a plurality of base stations (shown as BS 110a, BS 110b, BS 110c, and BS 110 d) and other network entities. A base station is an entity that communicates with wireless devices (mobile devices) and may also be referred to as a NodeB, a Node B, a LET evolved NodeB (eNB), an Access Point (AP), a radio head (radio head), a Transmission and Reception Point (TRP), a new radio base station (NR BS), a 5G NodeB (NB), a next generation NodeB (gNB), and so on. Each base station may provide communication coverage for a particular geographic area. In 3GPP, the term "cell" can refer to the coverage area of a base station, a base station subsystem serving the coverage area, or a combination thereof, depending on the context in which the term is used.
The base stations 110a-110d may provide communication coverage for a macrocell, a picocell, a femtocell, another type of cell, or a combination thereof. A macrocell can cover a relatively large geographic area (e.g., several kilometers in radius) and can allow unrestricted access by mobile devices through service subscriptions. A pico cell may cover a relatively small geographic area and may allow unrestricted access by wireless devices through service subscriptions. A femto cell may cover a relatively small geographic area (e.g., a home) and may allow limited access by mobile devices associated with the femto cell (e.g., mobile devices in a Closed Subscriber Group (CSG)). A base station for a macro cell may be referred to as a macro BS. A base station for a pico cell may be referred to as a pico BS. A base station for a femto cell may be referred to as a femto BS or a home BS. In the example shown in fig. 1, the base station 110a may be a macro BS for the macro cell 102a, the base station 110b may be a pico BS for the pico cell 102b, and the base station 110c may be a femto BS for the femto cell 102 c. The base stations 110a-110d may support one or more (e.g., three) cells. The terms "eNB", "base station", "NR BS", "gNB", "TRP", "AP", "node B", "5G NB" and "cell" may be used interchangeably herein.
In some examples, the cell is not necessarily stationary and the geographic area of the cell may move according to the location of the mobile base station. In some examples, the base stations 110a-110d may be interconnected with each other and one or more other base stations or network nodes (not shown) in the communication system 100 through various types of backhaul (backhaul) interfaces (e.g., direct physical connections, virtual networks, or combinations thereof) using any suitable transport network.
Communication system 100 may also include a relay station (e.g., relay BS 110 d). A relay station is an entity that is capable of receiving data transmissions from an upstream station (e.g., a base station or mobile device) and sending the data transmissions to a downstream station (e.g., a wireless device or base station). The relay station may also be a wireless device that may relay transmissions for other mobile devices. In the example shown in fig. 1, relay station 110d may communicate with macro base station 110a and wireless device 120d in order to facilitate communication between macro base station 110a and wireless device 120 d. A relay station may also be referred to as a relay base station, relay, etc.
The communication system 100 may be a heterogeneous network including different types of base stations (e.g., macro base stations, pico base stations, femto base stations, relay base stations, etc.). These different types of base stations may have different transmission power levels, different coverage areas, and different effects on interference in communication system 100. For example, macro base stations may have high transmission power levels (e.g., 5 to 40 watts), while pico base stations, femto base stations, and relay base stations may have lower transmission power levels (e.g., 0.1 to 2 watts).
The network controller 130 may be coupled to a set of base stations and may provide coordination and control for these base stations. The network controller 130 may communicate with the base stations via backhaul. The base stations may also communicate with each other directly or indirectly, e.g., through wireless or wired backhaul.
The mobile devices 120a, 120b, 120c may be dispersed throughout the communication system 100 and each wireless device may be stationary or mobile. A wireless device can also be called an access terminal, mobile station, subscriber unit, station, or the like. The wireless devices 120a, 120b, 120c may be cellular telephones (e.g., smartphones), personal Digital Assistants (PDAs), wireless modems, wireless communication devices, handheld devices, laptop computers, cordless phones, wireless Local Loop (WLL) stations, tablet computers, cameras, gaming devices, netbooks, smartbooks, superbooks, medical devices or equipment, biometric sensors/devices, wearable devices (smartwatches, smart apparel, smartglasses, smartbracelets, smartjewelry (e.g., smartrings, smartbracelets)), entertainment devices (e.g., music or video devices or satellite radios), vehicle components or sensors, smart meters/sensors, industrial manufacturing equipment, global positioning system devices, or any other suitable device configured to communicate over a wireless or wired medium.
The macro base station 110a may communicate with the communication network 140 over a wired or wireless communication link 126. The wireless devices 120a, 120b, 120c may communicate with the base stations 110a-110d via wireless communication links 122.
The wired communication link may use various wired networks (e.g., ethernet, TV cable, telephone, fiber optic, and other forms of physical network connections) that may use one or more wired communication protocols, such as ethernet, point-to-point protocol, advanced data link control (HDLC), advanced Data Communication Control Protocol (ADCCP), and transmission control protocol/internet protocol (TCP/IP).
The wireless communication links 122, 124 may include multiple carrier signals, frequencies, or frequency bands, each of which may include multiple logical channels. The wireless communication link may utilize one or more Radio Access Technologies (RATs). Examples of RATs that may be used in the wireless communication links include 3GPP LTE, 3G, 4G, 5G (e.g., NR), GSM, code Division Multiple Access (CDMA), wideband Code Division Multiple Access (WCDMA), worldwide Interoperability for Microwave Access (WiMAX), time Division Multiple Access (TDMA), and other mobile telephone communication technology cellular RATs. Further examples of RATs that may be used in one or more of the various wireless communication links within the communication system 100 include medium range protocols such as Wi-Fi, LTE-U, LTE-Direct, LAA, muLTEfire, and relatively short range RATs such as ZigBee, bluetooth, and Low Energy (LE) bluetooth.
Some wireless networks, such as LTE, utilize Orthogonal Frequency Division Multiplexing (OFDM) on the downlink and single carrier frequency division multiplexing (SC-FDM) on the uplink. OFDM and SC-FDM divide the system bandwidth into a plurality of (K) orthogonal subcarriers, which are also commonly referred to as tones (tone), frequency bins (bin), etc. Each subcarrier may be modulated with data. Typically, the modulation symbols are transmitted with OFDM in the frequency domain and with SC-FDM in the time domain. The interval between adjacent subcarriers may be fixed, and the total number of subcarriers (K) may depend on the system bandwidth. For example, the spacing of the subcarriers may be 15kHz and the minimum resource allocation (referred to as a "resource block") may be 12 subcarriers (or 180 kHz). Thus, the nominal Fast File Transfer (FFT) size may be equal to 128, 256, 512, 1024 or 2048 for a system bandwidth of 1.25, 2.5, 5, 10 or 20 megahertz (MHz), respectively. The system bandwidth may also be divided into sub-bands. For example, a subband may cover 1.08MHz (i.e., 6 resource blocks), and there may be 1, 2,4, 8, or 16 subbands for a system bandwidth of 1.25, 2.5, 5, 10, or 20MHz, respectively.
Although the description of some implementations may use terminology and examples associated with LTE technology, some implementations may be applicable to other wireless communication systems, such as New Radio (NR) or 5G networks. NR may utilize OFDM with Cyclic Prefix (CP) on Uplink (UL) and Downlink (DL) and include support for half-duplex operation using Time Division Duplex (TDD). A single component carrier bandwidth of 100MHz may be supported. The NR resource block can span 12 subcarriers in a duration of 0.1 millisecond (ms), with a subcarrier bandwidth of 75kHz. Each radio frame may consist of 50 subframes of length 10 ms. Thus, each subframe may have a length of 0.2 ms. Each subframe may indicate a link direction (i.e., DL or UL) for data transmission, and the link direction of each subframe may be dynamically switched. Each subframe may include DL/UL data and DL/UL control data. Beamforming may be supported and beam directions may be dynamically configured. Multiple-input multiple-output (MIMO) transmission with precoding may also be supported. MIMO configuration in DL can support up to eight transmit antennas with multi-layer DL transmission of up to eight streams, and up to two streams per wireless device. Multi-layer transmissions with up to two streams per wireless device may be supported. Multiple cell aggregations of up to eight serving cells may be supported. Alternatively, the NR may support a different air interface than an OFDM-based air interface.
Some mobile devices may be considered Machine Type Communication (MTC) or evolved or enhanced machine type communication (eMTC) mobile devices. MTC and eMTC mobile devices include, for example, robots, drones, remote devices, sensors, meters, monitors, location tags, etc., which may communicate with a base station, another device (e.g., a remote device), or some other entity. For example, the wireless node may provide a connection to a network (e.g., a wide area network such as the internet or a cellular network) or to a network via a wired or wireless communication link. Some mobile devices may be considered internet of things (IoT) devices, or may be implemented as NB-IoT (narrowband internet of things) devices. The wireless device 120 may be included within a housing that houses components of the wireless device 120 (e.g., processor components, memory components, the like, or a combination thereof).
In general, any number of communication systems and any number of wireless networks may be deployed in a given geographic area. Each communication system and wireless network may support a particular Radio Access Technology (RAT) and may operate on one or more frequencies. RATs may also be referred to as radio technologies, air interfaces, etc. The frequency may also be referred to as a carrier wave, frequency channel, etc. Each frequency may support a single RAT in a given geographical area to avoid interference between communication systems of different RATs. In some cases, NR or 5G RAT networks may be deployed.
In some examples, access to the air interface may be scheduled, wherein a scheduling entity (e.g., a base station) allocates resources for communication between some or all devices and equipment within a service area or cell of the scheduling entity. The scheduling entity may be responsible for scheduling, allocating, reconfiguring, and releasing resources for one or more subordinate entities. That is, for scheduled communications, the subordinate entity utilizes the resources allocated by the scheduling entity.
The base station is not the only entity that can act as a scheduling entity. In some examples, the wireless device may act as a scheduling entity to schedule resources for one or more subordinate entities (e.g., one or more other mobile devices). In this example, the wireless device acts as a scheduling entity, and other mobile devices communicate wirelessly using resources scheduled by the wireless device. The wireless device may act as a scheduling entity in a peer-to-peer (P2P) network, a mesh network, or other type of network. In a mesh network example, mobile devices may optionally communicate directly with each other in addition to communicating with a scheduling entity.
Thus, in a wireless communication network having scheduled access to time-frequency resources and having cellular, P2P, and mesh configurations, a scheduling entity and one or more subordinate entities may communicate using the scheduled resources.
In some implementations, two or more mobile devices 120a-e (e.g., shown as wireless device 120a and wireless device 120 e) may communicate directly using one or more side-chain channels (e.g., without using base stations 110a-d as intermediaries for communicating with each other). For example, the mobile devices 120a-e may communicate using peer-to-peer (P2P) communication, device-to-device (D2D) communication, a vehicle-to-everything (V2X) protocol, which may include a vehicle-to-vehicle (V2V) protocol, a vehicle-to-infrastructure (V2I) protocol, or the like, a mesh network, or the like, or a combination thereof. In this case, wireless devices 120a-e may perform scheduling operations, resource selection operations, and other operations described elsewhere herein as being performed by base stations 110 a-d.
Fig. 1B shows one example of SI provisioning. To establish communication with base station 110, wireless device 120 may attempt to acquire SI from base station 110. SI may be provided in one or more system information blocks, such as a Master Information Block (MIB) and one or more System Information Blocks (SIBs). SI provides timing and structure information that enables wireless device 120 to receive and decode further information from base station 110, which enables wireless device 120 to access communications, cell access, perform cell reselection, intra-frequency, inter-frequency, and inter-RAT cell selection procedures, and other operations, for example, through base station 110.
In 5G NR, the base station broadcasts certain system information, such as MIB and SIB1 messages. In some implementations, additional SI may also be broadcast. However, in some implementations, additional SI (e.g., demand-based SI) may be sent by the base station in response to a request for additional SI (e.g., request for demand-based SI). In some implementations, the broadcasted SI (i.e., MIB or SIB1 message) may include scheduling information to enable wireless device 120 to request and receive demand-based SI.
When the wireless device 120 is powered on, the wireless device 120 may perform a cell search and obtain one or more synchronization signals (e.g., primary Synchronization Signals (PSS) and Secondary Synchronization Signals (SSS)) and a Physical Broadcast Channel (PBCH) from the base station 110. Using the synchronization signal and the information from the PBCH, the wireless device 120 may receive, decode, and store MIB messages from the base station 110. Using parameters from the decoded MIB, the wireless device 120 may receive and decode SIB1 messages. In some implementations, the SIB1 message may indicate that the base station 110 is configured to provide one or more demand-based SI messages. To obtain the demand-based SI messages, wireless device 120 may send a request for one or more demand-based SI messages to base station 110. In some implementations, the request to send one or more demand-based SI messages may be part of a Random Access Channel (RACH) request procedure.
Fig. 2 illustrates an example computing system or SIP 200 architecture that may be used in a wireless device implementing various implementations. Referring to fig. 1A-2, an example computing system 200 (which may be SIP in some implementations) is shown to include two SOCs 202, 204 coupled to a clock 206, a voltage regulator 208, and a wireless transceiver 266, the wireless transceiver 266 being configured to send and receive wireless communications to/from a wireless device (e.g., base station 110 a) via an antenna (not shown). In some implementations, the first SOC202 operates as a Central Processing Unit (CPU) of the wireless device that executes instructions of the software application by performing arithmetic, logic, control, and input/output (I/O) operations specified by the instructions. In some implementations, the second SOC204 may operate as a dedicated processing unit. For example, the second SOC204 may operate as a dedicated 5G processing unit responsible for managing high capacity, high speed (e.g., 5Gbps, etc.), or very high frequency short wavelength (e.g., 28GHz millimeter wave (mmWave) spectrum, etc.) communications.
The first SOC 202 may include a Digital Signal Processor (DSP) 210, a modem processor 212, a graphics processor 214, an application processor 216, one or more coprocessors 218 (e.g., vector coprocessors) connected to one or more processors, memory 220, custom circuitry 222, system components and resources 224, interconnect/bus module 226, one or more temperature sensors 230, a thermal management unit 232, and a Thermal Power Envelope (TPE) component 234. The second SOC 204 may include a 5G modem processor 252, a power management unit 254, an interconnect/bus module 264, a plurality of mmWave transceivers 256, a memory 258, and various additional processors 260, such as an application processor, a packet processor, and the like.
Each processor 210, 212, 214, 216, 218, 252, 260 may include one or more cores, and each processor/core may perform operations independent of the other processors/cores. For example, the first SOC 202 may include a processor executing a first type of operating system (e.g., freeBSD, LINUX, OS X, etc.) and a processor executing a second type of operating system (e.g., MICROSOFT WINDOWS). Further, any or all of the processors 210, 212, 214, 216, 218, 252, 260 may be included as part of a processor cluster architecture (e.g., a synchronous processor cluster architecture, an asynchronous or heterogeneous processor cluster architecture, etc.).
The first and second SOCs 202, 204 may include various system components, resources, and custom circuitry for managing sensor data, analog-to-digital conversion, wireless data transmission, and for performing other specialized operations (e.g., decoding data packets and processing encoded audio and video signals for rendering in a web browser). For example, the system components and resources 224 of the first SOC 202 may include power amplifiers, voltage regulators, oscillators, phase-locked loops, peripheral bridges, data controllers, memory controllers, system controllers, access ports, timers, and other similar components used to support processors and software clients running on wireless devices. The system components and resources 224 or custom circuitry 222 may also include circuitry to interface with peripheral devices such as cameras, electronic displays, wireless communication devices, external memory chips, and the like.
The first and second SOCs 202, 204 may communicate via an interconnect/bus module 250. The various processors 210, 212, 214, 216, 218 may be interconnected to one or more storage elements 220, system components and resources 224, and customization circuits 222 and thermal management units 232 via an interconnect/bus module 226. Similarly, the processor 252 may be interconnected to a power management unit 254, an mmWave transceiver 256, a memory 258, and various additional processors 260 via an interconnect/bus module 264. The interconnect/bus modules 226, 250, 264 may include an array of reconfigurable logic gates or implement a bus architecture (e.g., coreConnect, AMBA, etc.). Communication may be provided by advanced interconnects, such as a high performance network on chip (NoC).
The first or second SOCs 202, 204 may further include input/output modules (not shown), such as a clock 206 and a voltage regulator 208, for communicating with resources external to the SOCs. Resources external to the SOC (e.g., clock 206, voltage regulator 208) may be shared by two or more internal SOC processors/cores.
In addition to the example SIP 200 discussed above, some implementations may be implemented in a wide variety of computing systems that may include a single processor, multiple processors, multi-core processors, or any combination thereof.
Fig. 3 illustrates an example of a software architecture 300, the software architecture 300 including radio protocol stacks for user and control planes in wireless communications between a base station 350 (e.g., base station 110 a) and wireless devices 320 (e.g., wireless devices 102a-e, 200). Referring to fig. 1A-3, a wireless device 320 may implement a software architecture 300 to communicate with a base station 350 in a communication system (e.g., 100). In various implementations, layers in the software architecture 300 may form logical connections with corresponding layers in the base station 350 software. The software architecture 300 may be distributed among one or more processors (e.g., processors 212, 214, 216, 218, 252, 260). Although shown with respect to one radio protocol stack, in a multi-SIM (subscriber identity module) wireless device, the software architecture 300 may include multiple protocol stacks, each of which may be associated with a different SIM (e.g., two protocol stacks associated with two SIMs, respectively, in a dual-SIM wireless communication device). Although described below with reference to the LTE communication layer, the software architecture 300 may support any of a variety of standards and protocols for wireless communication, or may include additional protocol stacks supporting any of a variety of standards and protocols for wireless communication.
The software architecture 300 may include a non-access stratum (NAS) 302 and an Access Stratum (AS) 304.NAS302 may include functionality and protocols that support packet filtering, security management, mobility control, session management, and traffic and signaling between the SIM of the wireless device (e.g., SIM 204) and its core network. AS 304 may include functionality and protocols to support communications between a SIM (e.g., SIM 204) and an entity (e.g., base station) supporting an access network. In particular, AS 304 may include at least three layers (layer 1, layer 2, and layer 3), each of which may include various sublayers.
In the user and control plane, layer 1 (L1) of AS 304 may be a physical layer (PHY) 306 that may oversee the functionality of implementing transmission or reception over the air interface. Examples of such physical layer 306 functions may include Cyclic Redundancy Check (CRC) attachment, coding blocks, scrambling and descrambling, modulation and demodulation, signal measurement, MIMO, and the like. The physical layer may include various logical channels including a Physical Downlink Control Channel (PDCCH) and a Physical Downlink Shared Channel (PDSCH).
In the user and control plane, layer 2 (L2) of AS 304 may be responsible for the link between wireless device 320 and base station 350 on physical layer 306. In various implementations, layer 2 may include a Medium Access Control (MAC) sublayer 308, a Radio Link Control (RLC) sublayer 310, and a Packet Data Convergence Protocol (PDCP) sublayer 312, each forming a logical connection that terminates at the base station 350.
In the control plane, layer 3 (L3) of AS 304 may include a Radio Resource Control (RRC) sublayer 3. Although not shown, the software architecture 300 may include additional layer 3 sub-layers, as well as various upper layers above layer 3. In various implementations, the RRC sublayer 313 may provide functions including broadcasting system information, paging (paging), and establishing and releasing RRC signaling connections between the wireless device 320 and the base station 350.
In various implementations, the PDCP sublayer 312 may provide uplink functions including multiplexing between different radio bearers and logical channels, sequence number addition, handover data processing, integrity protection, ciphering and header compression. In the downlink, the PDCP sublayer 312 may provide functions including sequential delivery of data packets, redundant data packet detection, integrity verification, decryption, and header decompression.
In the uplink, the RLC sublayer 310 may provide segmentation and concatenation of upper layer data packets, retransmission of lost data packets, and automatic repeat request (ARQ). In the downlink, the functions of the RLC sublayer 310 may include reordering of data packets to compensate for out-of-order reception, reassembly of upper layer data packets, and ARQ.
In the uplink, the MAC sublayer 308 may provide functions including multiplexing between logical and transport channels, random access procedures, logical channel priority, and Hybrid ARQ (HARQ) operations. In the downlink, MAC layer functions may include intra-cell channel mapping, demultiplexing, discontinuous Reception (DRX), and HARQ operations.
While the software architecture 300 may provide functionality to transmit data over a physical medium, the software architecture 300 may further include at least one host layer 314 to provide data transfer services to various applications in the wireless device 320. In some implementations, the particular application functionality provided by the at least one host layer 314 may provide an interface between the software architecture and the general purpose processor 206.
In other implementations, the software architecture 300 may include one or more higher logical layers (e.g., transport, session, presentation, application, etc.) that provide host layer functionality. For example, in some implementations, the software architecture 300 may include a network layer (e.g., an IP layer) where logical connections terminate at a Packet Data Network (PDN) gateway (PGW). In some implementations, the software architecture 300 may include an application layer in which a logical connection is terminated at another device (e.g., an end user device, a server, etc.). In some implementations, the software architecture 300 may further include a hardware interface 316 between the physical layer 306 and communication hardware (e.g., one or more RF transceivers) in the AS 304.
Fig. 4 is a block diagram illustrating components of a system 400, the system 400 being configured to manage communications with a base station by a processor of a wireless device. Referring to fig. 1A-4, a system 400 can include a wireless device 402 (e.g., 120a-120e, 200, 320) and a base station 404 (e.g., 110a-110d, 200, 350).
The wireless device 402 may be configured with machine-readable instructions 406. Machine-readable instructions 406 may include one or more instruction modules. The instruction modules may include computer program modules. The instruction modules may include one or more of SI scheduling information determination module 410, factor determination module 412, network configuration information determination module 414, access channel request failure determination module 416, access channel request time determination module 418, message identification module 420, time determination module 422, SI monitoring module 424, and other instruction modules.
The SI scheduling information determination module 410 may be configured to determine scheduling information of the second SI from the first SI.
The factor determination module 412 may be configured to determine a factor for reducing a probability that a request for the second SI will collide with a request for the second SI from another wireless device. In some implementations, the factor determination module 412 may be configured to determine an RBO time for sending the request for the second SI. In some implementations, the factor determination module 412 may be configured to determine whether the second SI is a demand-based SI based on the first SI. In some implementations, the factor determination module 412 may be configured to determine an access restriction class of the wireless device.
The network configuration information determination module 414 may be configured to determine a type of access channel request to be sent to the base station from the network configuration information.
The access channel request failure determination module 416 may be configured to determine that an access channel request failure has occurred after at least one of the requests for the second SI is sent. In some implementations, the access channel request failure determination module 416 may be configured to determine that an access channel request failure has occurred after any of the plurality of access channel requests are sent. In some implementations, the access channel request failure determination module 416 may be configured to determine that an access channel request failure has occurred based on a failure to receive at least one element of the second SI.
The access channel request time determination module 418 may be configured to determine an RBO time for transmitting the second access channel request based on the determined type of access channel request.
The message identification module 420 may be configured to identify one or more messages of the second SI that are not received by the wireless device.
The time determination module 422 may be configured to determine that the time for receiving the second SI has elapsed.
SI monitoring module 424 may be configured to monitor the second SI based on the request for the second SI. In some implementations, the SI monitoring module 424 may be configured to monitor a second SI requested by another wireless device.
Fig. 5 illustrates a process flow diagram of an example method 500 of managing communications with a base station by a processor of a wireless device. Referring to fig. 1-5, the method 500 may be implemented by a processor (e.g., the processor 212, 216, 252, or 260 depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, and 402 depicted and described in fig. 1-4).
In block 502, a processor may receive an SI change indication in a first SI from a base station. In some implementations, the first SI may include one or more elements of a system information block 1 (SIB 1) message. In some implementations, the first SI may include one or more elements of a Master Information Block (MIB) message. In some implementations, the first SI may include one or more elements of either or both of MIB and SIB1 messages. In some implementations, the wireless device may be configured with a first interface to receive (or otherwise obtain) an SI change indication in the first SI.
In block 504, the processor may determine scheduling information for the second SI from the SI change indication in the first SI. In some implementations, the processor may determine scheduling information for the second SI from the first SI. For example, the processor may determine from the MIB or SIB1 message that enables the processor to attempt to acquire scheduling information for the demand-based SI from the base station.
In block 506, the processor may determine a factor by which the request for the second SI will conflict with a request for the second SI from another wireless device. In some implementations, the processor may determine a factor for reducing a probability that a request for the second SI will collide with a request for the second SI from another wireless device. In some implementations, the determined factor can include a random back-off (RBO) time. In some implementations, the determined factor may include an access restriction class of the wireless device.
In block 508, the processor may send a request for a second SI based on the determined factor. For example, the processor may use a random back-off time (random back off time) to determine the time to send the request for the second SI. As another example, the access restriction class may provide a probability factor that the processor may use to determine when to send the request for the second SI. The processor may send a request for the second SI at the determined time. In some implementations, the wireless device may be configured with a second interface to send (or output, or transmit) a request for a second SI based on the determined factor.
Fig. 6A illustrates a process flow diagram of an example method 600a of managing communications with a base station by a processor of a wireless device. Referring to fig. 1A-6A, the method 600b may be implemented by a processor (e.g., 212, 216, 252, or 260 depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, 402 depicted and described in fig. 1-4).
In block 602, a processor may perform operations including determining whether a second SI is a demand-based SI based on a first SI.
In block 604, in response to determining that the second SI is a demand-based SI, the processor may determine a factor by which a request for the second SI will conflict with a request for the second SI from another wireless device. In some implementations, the factor may be a factor for reducing a probability that a request for the second SI will collide with a request for the second SI from another wireless device. In some implementations, in response to determining that the second SI is a demand-based SI, the processor may determine a factor for reducing a probability that a request for the second SI will collide with a request for the second SI from another wireless device.
The processor may then perform the operations of block 508 (fig. 5).
Fig. 6B illustrates a process flow diagram of an example method 600B of managing communications with a base station by a processor of a wireless device. Referring to fig. 1A-6B, the method 600B may be implemented by a processor (e.g., 212, 216, 252, or 260 depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, 402 depicted and described in fig. 1-4).
In some implementations following the operations of block 504 (fig. 5), the processor may determine an RBO time (e.g., using a back-off timer) for sending the request for the second SI in block 606. In some implementations, the processor may determine that the back-off time is less than half of the current modification period (modification period) of the SIB1 message. For example, some SIs (e.g., SI-broadcast status (SI-BroadcastStatus)) may indicate whether a base station is broadcasting an SI message. In some implementations, when the indicated value is set to "broadcast" or another suitable value, the indicated value is valid until the end of the Broadcast Control Channel (BCCH) change period. In some implementations, the modification period of the SIB1 message may be defined as a boundary to which the SIB1 message may change. In some implementations, the change period may be calculated as a "change period," where m= modificationPeriodCoeff × defaultPagingCycle "is expressed in terms of the number of radio frames. By setting the back-off timer to less than half of the SIB1 message modification period, the processor may have one or more SI occasions to read the SIB message for the remaining time. For example, if the demand-based SI RACH procedure is successful, the processor may have at least one SI occasion to read another SI within the current SIB1 modification period at the time.
In block 608, the processor may use the determined RBO time to determine when to send a request for the second SI.
Fig. 6C illustrates a process flow diagram of an example method 600C of managing communications with a base station by a processor of a wireless device. Referring to fig. 1A-6C, the method 600C may be implemented by a processor (e.g., 212, 216, 252, or 260 depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, 402 depicted and described in fig. 1-4).
In block 610, the processor may determine an access restriction class of the wireless device. For example, the base station may be configured to provide or assign an access class to the wireless device. Depending on the access category, the wireless device may delay sending the request for the second SI.
In some implementations, the access category determined in block 610 may include a restriction factor.
In some implementations, the restriction factor may include a value that the wireless device may use to determine whether to send the request for the second SI (e.g., from 0 to 0.95 in steps of 0.05). In some implementations, the processor may use the limiting factor as a threshold for determining whether to send the request for the second SI. For example, the processor may generate a random number and determine whether the generated random number is above or below a limiting factor.
In some implementations, the access category may include a time limit. In some implementations, the processor may use the time limit as a period of time during which the processor may prohibit sending the request for the second SI.
In block 612, the processor may send a request for a second SI according to the determined access restriction class.
Fig. 7 illustrates a process flow diagram of an example method 700 of managing communications with a base station by a processor of a wireless device. Referring to fig. 1A-7, method 700 may be implemented by a processor (e.g., 212, 216, 252, or 260 depicted and described in fig. 2) of a wireless device (e.g., wireless device 120a-120e, 200, 320, 402 depicted and described in fig. 1-4).
In block 702, a processor may receive network configuration information in first System Information (SI) from a base station. In some implementations, the wireless device may be configured with a first interface to receive network configuration information in a first SI from a base station.
In block 704, the processor may determine a type of access channel request to send to the base station from the network configuration information in the first SI.
In block 706, the processor may perform sending one or more first requests to the base station for the second SI based on the determined type of access channel request.
In block 708, the processor may determine whether an access channel request failure has occurred after sending at least one of the first requests for the second SI.
In response to determining that the access channel request failure has occurred, the processor may determine an RBO time for transmitting the second access channel request based on the determined type of access channel request in block 710.
In block 712, the processor may send a second request for a second SI to the base station based on the RBO time. In other words, the processor may use the RBO time to determine when to send the second request for the second SI and send the request at the determined time.
Fig. 8A illustrates a process flow diagram of an example method 800a of managing communications with a base station by a processor of a wireless device. Referring to fig. 1A-8A, the method 800a may be implemented by a processor (e.g., 212, 216, 252, or 260 depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, 402 depicted and described in fig. 1-4).
In some implementations following the operations of block 704 (fig. 7), the processor may send a plurality of access channel requests to the base station based on the determined type of access channel request in block 802.
In block 804, the processor may determine whether an access channel request failure has occurred after transmitting any of a plurality of access channel requests. In some implementations, the processor may determine that the SI status indication in SIB1 broadcast by the base station has not changed to indicate that the base station is broadcasting the second SI.
The processor may then perform the operations of block 710 (fig. 7).
Fig. 8B illustrates a process flow diagram of an example method 800B of managing communications with a base station by a processor of a wireless device. Referring to fig. 1A-8B, the method 800B may be implemented by a processor (e.g., 212, 216, 252, or 260 depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, 402 depicted and described in fig. 1-4).
In some implementations following the operations of block 712 (fig. 7), the processor may identify one or more messages of the second SI that were not received by the wireless device in block 806. In some implementations, the processor may determine or detect that one or more messages of the second SI have not yet been received after sending the second request for the second SI. In some implementations, the processor may determine that the SI status indication in SIB1 broadcast by the base station has not changed to indicate that the base station is broadcasting the second SI.
In block 808, at a time based on the RBO time, the processor may send a request to the base station for one or more messages of the second SI that were not received by the wireless device.
Fig. 8C illustrates a process flow diagram of an example method 800C of managing communications with a base station by a processor of a wireless device. Referring to fig. 1A-8C, the method 800C may be implemented by a processor (e.g., 212, 216, 252, or 260 depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, 402 depicted and described in fig. 1-4).
In some implementations following the operations of block 712 (fig. 7), the processor may determine whether the time for receiving the second SI has elapsed in block 810. In some implementations, the processor may determine that a time period (e.g., a read timer) for receiving the second SI has expired.
In block 812, the processor may send a third request for the second SI to the base station. In some implementations, the processor may restart the Random Access Channel (RACH) request procedure. In some implementations, in response to determining that the time for receiving the second SI has elapsed, the processor may send a third request for the second SI to the base station.
Fig. 8D illustrates a process flow diagram of an example method 800D of managing communications with a base station by a processor of a wireless device. Referring to fig. 1A-8D, the method 800D may be implemented by a processor (e.g., 212, 216, 252, or 260 depicted and described in fig. 2) of a wireless device (e.g., the wireless devices 120a-120e, 200, 320, 402 depicted and described in fig. 1-4).
In some implementations following the operations of block 706 (fig. 7), the processor may perform operations including monitoring the second SI based on one or more first requests for the second SI in block 814.
In optional block 816, the processor may monitor a second SI requested by another wireless device.
In block 818, the processor may determine that an access channel request failure has occurred based on a failure to receive at least one element of the second SI.
Fig. 9 illustrates a component block diagram of an example network computing device 900. Computing device 900 may be implemented as a base station. Such a network computing device may include at least the components shown in fig. 9. With reference to fig. 1-9, a network computing device 900 typically may include a processor 901 coupled to volatile memory 902 and mass nonvolatile memory (e.g., disk drive 903). Network computing device 900 may also include a peripheral memory access device such as a floppy disk drive, a Compact Disc (CD), or a Digital Video Disc (DVD) drive 906 coupled to processor 901. The network computing device 900 may also include a network access port 904 (or interface) coupled to the processor 901 for establishing a data connection with a network, such as the internet or a local area network coupled to other system computers and servers. The network computing device 900 may include one or more antennas 907 for transmitting and receiving electromagnetic radiation that may be coupled to the wireless communication link. The network computing device 900 may include additional access ports (e.g., USB, firewire, lei Li, etc.) for coupling to peripheral devices, external memory, or other devices.
Fig. 10 illustrates a component block diagram of an example wireless device 1000. In various implementations, the wireless device 1000 may be similar to the wireless devices 120, 200, 320, and 402 shown in fig. 1-4. The wireless device 1000 may include a first SOC 202 (e.g., SOC-CPU) coupled to a second SOC 204 (e.g., SOC supporting 5G). The first and second SOCs 202, 204 may be coupled to the internal memories 1006, 1016, the display 1012, and the speaker 1014. Additionally, the wireless device 1000 may include an antenna 1004 for transmitting and receiving electromagnetic radiation of a cellular telephone transceiver 266 that may be connected to a wireless data link or coupled to one or more processors in the first or second SOCs 202, 204. The wireless device 1000 typically also includes a menu selection button or rocker switch 1020 for receiving user input.
The wireless device 1000 also includes a voice encoding/decoding (CODEC) circuit 1010 that digitizes voice received from the microphone into data packets suitable for wireless transmission and decodes the received voice data packets to generate analog signals that are provided to a speaker to generate voice. In addition, one or more processors in the first and second SOCs 202, 204, the wireless transceiver 266, and the CODEC 1010 may include Digital Signal Processor (DSP) circuitry (not separately shown).
The processors of the network computing device 900 and the wireless device 1000 may be any programmable microprocessor, microcomputer or multiple processor chip or chips that can be configured by software instructions (applications) to perform a variety of functions, including the functions of the various implementations described below. In some mobile devices, multiple processors may be provided, such as one processor in SOC 204 dedicated to wireless communication functions and one processor in SOC 202 dedicated to running other applications. Typically, software applications may be stored in the memories 1006, 1016 before being accessed and loaded into the processor. The processor may include internal memory sufficient to store the application software instructions.
The various implementations shown and described are provided by way of example only to illustrate various features of the claims. However, the features illustrated and described for any given implementation are not necessarily limited to the associated implementations, and may be used or combined with other implementations illustrated and described. Furthermore, the claims are not intended to be limited to any one example implementation. For example, one or more operations of methods 500, 600a-600c, 700, and 800a-800d may be replaced by one or more operations of methods 500, 600a-600c, 700, and 800a-800d, or in combination with one or more operations of methods 500, 600a-600c, 700, and 800a-800 d.
As used in this disclosure, the terms "component," "module," "system," and the like are intended to include a computer-related entity, such as but not limited to hardware, firmware, a combination of hardware and software, or software in execution, configured to perform a particular operation or function. For example, a component may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, or a computer. By way of illustration, both an application running on a wireless device and the wireless device can be referred to as a component. One or more components may reside within a process or thread of execution and a component may be localized on one processor or core or distributed between two or more processors or cores. Further, these components can execute from various non-transitory computer readable media having various instructions or data structures stored thereon. The components can communicate via local or remote processes, function or process calls, electronic signals, data packets, memory read/write, and other known network, computer, processor, or process related communication methods.
Some different cellular and mobile communication services and standards are available or contemplated in the future, all of which may be implemented and benefit from various implementations. Such services and standards include, for example, the third generation partnership project (3 GPP), long Term Evolution (LTE) systems, third generation wireless mobile communication technology (3G), fourth generation wireless mobile communication technology (4G), fifth generation wireless mobile communication technology (5G), global system for mobile communications (GSM), universal Mobile Telecommunications System (UMTS), 3GSM, general Packet Radio Service (GPRS), code Division Multiple Access (CDMA) systems (e.g., cdmaOne, CDMA1020 TM), enhanced data rates for GSM evolution (EDGE), advanced Mobile Phone Systems (AMPS), digital AMPS (IS-136/TDMA), evolution data optimized (EV-DO), digital Enhanced Cordless Telecommunications (DECT), worldwide Interoperability for Microwave Access (WiMAX), wireless Local Area Network (WLAN), wi-Fi protected access I & II (WPA 2, WPA), and Integrated Digital Enhanced Network (iDEN). For example, each of these techniques involves the transmission and reception of voice, data, signaling, or content messages. It should be understood that any reference to terminology or technical details related to a single telecommunications standard or technology is for illustrative purposes only and is not intended to limit the scope of the claims to a particular communication system or technology unless specifically recited in the claim language.
As used herein, a phrase referring to "at least one" of a list of items refers to any combination of these items, including individual members. For example, "at least one of a, b, or c" is intended to encompass a, b, c, a-b, a-c, b-c, and a-b-c.
The various illustrative logics, logical blocks, modules, circuits, and algorithm processes described in connection with the implementations disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. The interchangeability of hardware and software has been described generally in terms of functionality, and is illustrated in the various illustrative components, blocks, modules, circuits, and processes described above. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system.
The hardware and data processing apparatus used to implement the various illustrative logics, logical blocks, modules, and circuits described in connection with the aspects disclosed herein may be implemented or performed with a general purpose single or multi-chip processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor or any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. In some implementations, particular processes and methods may be performed by circuitry that is specific to a given function.
In one or more aspects, the functions described may be implemented in hardware, digital electronic circuitry, computer software, firmware (including the structures disclosed in this specification and their equivalents), or in any combination thereof. Implementations of the subject matter described in this specification can also be implemented as one or more computer programs, i.e., one or more modules of computer program instructions, encoded on a computer storage medium for execution by, or to control the operation of, data processing apparatus.
If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. The processes of the methods or algorithms disclosed herein may be implemented in software modules executable by a processor, which may reside on a computer readable medium. Computer-readable media includes both computer storage media and communication media including any medium that is capable of transporting a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer. Further, any connection is properly termed a computer-readable medium. Disk (Disk) and optical Disk (Disk) as used herein include high-density optical Disk (CD), laser Disk, optical Disk, digital Versatile Disk (DVD), floppy Disk and blu-ray Disk where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media. Additionally, the operations of a method or algorithm may be embodied as one or any combination or set of codes and instructions on a machine-readable medium and computer-readable medium, which may be incorporated into a computer program product.
In one or more aspects, the functions described may be implemented by a processor, which may be coupled to a memory. The memory may be a non-transitory computer-readable storage medium that stores processor-executable instructions. The memory may store an operating system, user application software, or other executable instructions. The memory may also store application data, such as array data structures. The processor may read and write information to and from the memory. The memory may also store instructions associated with one or more protocol stacks. The protocol stack typically includes computer executable instructions to enable communication using a radio access protocol or a communication protocol.
Various modifications to the implementations described in this disclosure will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other implementations without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the implementations shown herein but is to be accorded the widest scope consistent with the disclosure, principles and novel features disclosed herein.
Certain features that are described in this specification in the context of separate implementations can also be implemented in combination in a single implementation. Conversely, various features that are described in the context of a single implementation can also be implemented in multiple implementations separately or in any suitable subcombination. Furthermore, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, although operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. Furthermore, the figures may schematically depict one or more example processes in the form of a flow chart. However, other operations not shown may be incorporated into the example process shown schematically. For example, one or more additional operations may be performed before, after, concurrently with, or between any of the illustrated operations. In some cases, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the implementations described above should not be understood as requiring such separation in all implementations, and it should be understood that the described program components and systems can generally be integrated in a single software product or packaged into multiple software products. Additionally, other implementations are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results.

Claims (28)

1. A method of managing communications with a base station by a processor of a wireless device, comprising:
receiving an SI change indication in first system information SI from the base station;
determining scheduling information of a second SI from the SI change indication in the first SI;
Determining, based on the first SI, whether the second SI is a demand-based SI;
In response to determining that the second SI is a demand-based SI, determining a factor by which a request for the second SI will conflict with a request for the second SI from another wireless device; and
The request for the second SI is sent using the determined factor.
2. The method of claim 1, wherein the first SI comprises one or more elements of a system information block 1SIB1 message.
3. The method of claim 1, wherein the first SI comprises one or more elements of a master information block MIB message.
4. The method according to claim 1, wherein:
Determining that a request for the second SI will collide with a request for the second SI from another wireless device includes determining a random back-off, RBO, time for transmitting the request for the second SI; and
Transmitting the request for the second SI using the determined factor includes transmitting the request for the second SI using the determined RBO time.
5. The method according to claim 1, wherein:
Determining that the request for the second SI will conflict with a request for the second SI from another wireless device includes determining an access restriction class of the wireless device; and
Transmitting the request for the second SI using the determined factor includes transmitting the request for the second SI according to the determined access restriction class.
6. The method of claim 1, wherein determining that the request for the second SI will conflict with a request for the second SI from another wireless device comprises: the factor for reducing the probability that the request for the second SI will collide with the request for the second SI from another wireless device is determined.
7. A method of managing communications with a base station by a processor of a wireless device, comprising:
Receiving network configuration information in first system information SI from the base station;
Determining a type of access channel request to be transmitted to the base station from the network configuration information in the first SI;
Transmitting one or more first requests for a second SI to the base station based on the determined type of access channel request;
determining whether an access channel request failure has occurred after transmitting at least one of the first requests for the second SI;
in response to determining that an access channel request failure has occurred, determining a random back-off, RBO, time for transmitting a second access channel request based on the determined type of access channel request; and
And sending a second request for the second SI to the base station based on the RBO time.
8. The method of claim 7, wherein the type of access channel request comprises one of a message-1 single resource request, a message-1 multiple resource request, and a message-3 request.
9. The method of claim 7, wherein:
Transmitting some access channel requests to the base station based on the determined type of access channel request includes transmitting a plurality of access channel requests to the base station based on the determined type of access channel request; and
Determining that an access channel request failure has occurred includes determining that the access channel request failure has occurred after transmitting any one of the plurality of access channel requests.
10. The method of claim 7, further comprising:
identifying one or more messages of the second SI that are not received by the wireless device; and
A request for the one or more messages of the second SI that were not received by the wireless device is sent to the base station using the RBO time.
11. The method of claim 7, further comprising:
Determining whether a time for receiving the second SI has elapsed; and
In response to determining that the time for receiving the second SI has elapsed, a third request for the second SI is sent to the base station.
12. The method of claim 7, wherein determining whether an access channel request failure has occurred after sending at least one of the first requests for the second SI comprises:
Monitoring the second SI based on the one or more first requests for the second SI; and
Determining that the access channel request failure has occurred based on a failure to receive at least one element of the second SI.
13. The method of claim 12, wherein monitoring the second SI based on the request for the second SI comprises:
The second SI requested by another wireless device is monitored.
14. An apparatus of a wireless device, comprising:
A first interface configured to obtain an SI change indication in first system information SI; and
A processing system coupled to the first interface and configured to:
determining scheduling information of a second SI from the SI change indication in the first SI;
Determining, based on the first SI, whether the second SI is a demand-based SI;
In response to determining that the second SI is a demand-based SI, determining a factor by which a request for the second SI will conflict with a request for the second SI from another wireless device; and
A second interface configured to output the request for the second SI using the determined factor.
15. The apparatus of claim 14, wherein the first SI comprises one or more elements of a system information block 1SIB1 message.
16. The apparatus of claim 14, wherein the first SI comprises one or more elements of a master information block, MIB, message.
17. The apparatus of claim 14, wherein the processing system is further configured to:
Determining a random back-off, RBO, time for transmitting the request for the second SI; and
The request for the second SI is transmitted using the determined RBO time.
18. The apparatus of claim 14, wherein the processing system is further configured to:
Determining an access restriction class of the wireless device; and
And sending the request for the second SI according to the determined access restriction class.
19. The apparatus of claim 14, wherein the processing system is further configured to determine the factor for reducing a probability that the request for the second SI will collide with the request for the second SI from another wireless device.
20. An apparatus of a wireless device, comprising:
A first interface configured to obtain network configuration information in first system information SI; and
A processing system coupled to the first interface and configured to:
determining a type of access channel request to be transmitted to a base station from the network configuration information in the first SI;
Transmitting one or more first requests for a second SI to the base station based on the determined type of access channel request;
determining whether an access channel request failure has occurred after transmitting at least one of the first requests for the second SI;
in response to determining that an access channel request failure has occurred, determining a random back-off, RBO, time for transmitting a second access channel request based on the determined type of access channel request; and
And sending a second request for the second SI to the base station based on the RBO time.
21. The apparatus of claim 20, wherein the type of access channel request comprises one of a message-1 single resource request, a message-1 multiple resource request, and a message-3 request.
22. The apparatus of claim 20, wherein the processing system is further configured to:
Transmitting a plurality of access channel requests to the base station based on the determined type of access channel request; and
Determining that an access channel request failure has occurred includes determining that the access channel request failure has occurred after transmitting any one of the plurality of access channel requests.
23. The apparatus of claim 20, wherein the processing system is further configured to:
identifying one or more messages of the second SI that are not received by the wireless device; and
A request for the one or more messages of the second SI that were not received by the wireless device is sent to the base station using the RBO time.
24. The apparatus of claim 20, wherein the processing system is further configured to:
Determining whether a time for receiving the second SI has elapsed; and
In response to determining that the time for receiving the second SI has elapsed, a third request for the second SI is sent to the base station.
25. The apparatus of claim 20, wherein the processing system is further configured to:
Monitoring the second SI based on the one or more first requests for the second SI; and
Determining that the access channel request failure has occurred based on a failure to receive at least one element of the second SI.
26. The apparatus of claim 20, wherein the processing system is further configured to:
The second SI requested by another wireless device is monitored.
27. A non-transitory computer-readable medium storing instructions that, when executed by a processor of a wireless device, cause the wireless device to perform the method of any of claims 1-6.
28. A non-transitory computer-readable medium storing instructions that, when executed by a processor of a wireless device, cause the wireless device to perform the method of any of claims 7-13.
CN202080054090.6A 2019-07-31 2020-07-16 Managing communication of wireless devices with base stations to obtain system information from base stations while reducing congestion Active CN114175714B (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
IN201941030908 2019-07-31
IN201941030908 2019-07-31
US16/929,410 US11234259B2 (en) 2020-07-15 2020-07-15 Managing wireless device communication with a base station
US16/929,410 2020-07-15
PCT/US2020/042218 WO2021021448A1 (en) 2019-07-31 2020-07-16 Managing wireless device communication to obtain system information from a base station while reducing collisions

Publications (2)

Publication Number Publication Date
CN114175714A CN114175714A (en) 2022-03-11
CN114175714B true CN114175714B (en) 2024-07-19

Family

ID=71944403

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080054090.6A Active CN114175714B (en) 2019-07-31 2020-07-16 Managing communication of wireless devices with base stations to obtain system information from base stations while reducing congestion

Country Status (3)

Country Link
EP (1) EP4005286A1 (en)
CN (1) CN114175714B (en)
WO (1) WO2021021448A1 (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3419340A1 (en) * 2016-03-11 2018-12-26 LG Electronics Inc. -1- System information signal reception method, user equipment, system information signal transmitting method and base station

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110096660A1 (en) * 2008-06-24 2011-04-28 Panasonic Corporation Handover processing method, and mobile terminal used in the method
US10616822B2 (en) * 2015-02-10 2020-04-07 Qualcomm Incorporated System information updating
EP3481111B1 (en) * 2017-01-26 2022-06-29 LG Electronics Inc. Method and apparatus for requesting system information
CN107343323B (en) * 2017-06-12 2020-10-27 西安交通大学 A differentiated back-off method based on user classification in 5G big connection IoT
EP3416427A1 (en) * 2017-06-16 2018-12-19 Panasonic Intellectual Property Corporation of America User equipment and base station participating in a system information acquisition procedure

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3419340A1 (en) * 2016-03-11 2018-12-26 LG Electronics Inc. -1- System information signal reception method, user equipment, system information signal transmitting method and base station

Also Published As

Publication number Publication date
CN114175714A (en) 2022-03-11
EP4005286A1 (en) 2022-06-01
WO2021021448A1 (en) 2021-02-04

Similar Documents

Publication Publication Date Title
CN114557096B (en) Method and product for bandwidth part (BWP) for unicast/multicast and resource allocation for multicast
US11805493B2 (en) Compressed DC location reporting scheme for UL CA
CN114731575B (en) Enhancement of System Information Block (SIB) validity checking for non-public network (NPN)
US11770772B2 (en) Discontinuous reception for sidelink control signaling
US20230199751A1 (en) Wake-Up Signal Collision Handling for NR Multicast
CN115023982B (en) Method and apparatus for determining transmit power of uplink transmission
US11234259B2 (en) Managing wireless device communication with a base station
US12035334B2 (en) Interaction of multicast band width part (BWP) with multiple BWP
US11764855B2 (en) Managing beam selection
CN114175714B (en) Managing communication of wireless devices with base stations to obtain system information from base stations while reducing congestion
US20240107455A1 (en) Managing control channel monitoring
CN114128368A (en) Managing paging monitoring by wireless devices
US11690022B2 (en) Managing transmit power control
TWI859263B (en) Managing paging monitoring by a wireless device
CN114450987B (en) User Plane Integrity Protection (UP IP) Capability Signaling in 5G/4G Systems
US20220346025A1 (en) Early Uplink Transmit Power Control
US20210352514A1 (en) Power Efficient Processing of Down Link Traffic Using Multiple Parallel Flows

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant