CROSS-REFERENCE TO RELATED APPLICATIONSThis application is a continuation application of a prior application Ser. No. 13/571,810, filed on Aug. 10, 2012, which claimed the benefit under 35 U.S.C. § 119(e) of U.S. Provisional application filed on Aug. 10, 2011 in the U.S. Patent and Trademark Office and assigned Ser. No. 61/521,910, of U.S. Provisional application filed on Sep. 6, 2011 in the U.S. Patent and Trademark Office and assigned Ser. No. 61/531,185, of U.S. Provisional application filed on Oct. 10, 2011 in the U.S. Patent and Trademark Office and assigned Ser. No. 61/545,363, of U.S. Provisional application filed on Nov. 14, 2011 in the U.S. Patent and Trademark Office and assigned Ser. No. 61/559,674, and of U.S. Provisional application filed on Nov. 23, 2011 in the U.S. Patent and Trademark Office and assigned Ser. No. 61/563,345, the entire disclosure of each of which is hereby incorporated by reference.
BACKGROUND OF THE INVENTION1. Field of the Invention
The present invention relates to wireless communication systems. More particularly, the present invention relates to a system and a method that determine, when a Machine Type Communication (MTC) device makes an attempt to access a network in a Long Term Evolution (LTE) system, whether the MTC device can access the network and that allows the MTC device to access the network according to the determination.
2. Description of the Related Art
With the rapid development of wireless communication technologies, communication systems have evolved that employ the wireless communication technologies. An example of a 4th Generation mobile communication technology is a Long Term Evolution (LTE) system. The LTE system employs technologies for supporting various types of mobile devices (or User Equipment (UE)) and is related to Machine Type Communication (MTC). MTC devices refer to machines that can communicate with other machines/metering devices such as electric charge meters or water meters, without a user's involvement. MTC devices can attempt to access a network irrespective of the priority.
In order to process MTC devices, LTE release 10 (the term ‘release’ refers to version information and the larger the number the more recent the version) provides a procedure where a UE that makes an access attempt informs an evolved Node B (eNB) that ‘an access request is made by an MTC device’ via an access request message; and the eNB determines whether to permit the access request, or, if it rejects the access request, informs the UE of how much time should pass before the UE it can make an access request.
However, the procedure of LTE release 10 is disadvantageous in that the UE must transmit an access request message at the initial stage. In particular, if a number of UEs simultaneously transmit access requests to the eNB, an access overload may occur. Therefore, there is a need for a system that addresses these problems.
The above information is presented as background information only to assist with an understanding of the present disclosure. No determination has been made, and no assertion is made, as to whether any of the above might be applicable as prior art with regard to the present invention.
SUMMARY OF THE INVENTIONAspects of the present invention are to address the above-mentioned problems and/or disadvantages and to provide at least the advantages described below. Accordingly, an aspect of the present invention is to provide a system and method that determines, when a Machine Type Communication (MTC) device makes an attempt to access a network in a wireless communication system, whether the MTC device can access the network before transmitting an access request message to the network, and that allows the UE to make an attempt to access the network according to the determination.
Another aspect of the present invention is to provide a system and method that can process a back off included in a random access reply message while an MTC device without barring the access to a network is performing a random access procedure.
Another aspect of the present invention is to provide a system and method that allows a User Equipment (UE) to identify information regarding Access Class Barring (ACB) and Extended Access Barring (EAB), transmitted from an evolved Node B (eNB), by employing an ACB mechanism and an EAB mechanism before transmitting an access request message to the eNB, and to determine whether the UE can access the eNB.
To this end, although the UE is an MTC device, the UE does not employ the EAB in any of the following cases:
- If the UE makes an access attempt to receive a call (mobile terminated call-Access (mt-Access));
- If the UE makes an emergency call; and
- If the UE makes an access attempt with a high priority (i.e., a highPriorityAccess).
 
In addition, when EAB and ACB are activated, if an MTC device employs EAB first, and then concludes that it can perform an access attempt, the MTC device employs ACB and then determines whether the access succeeds.
In accordance with an aspect of the present invention, an access control method of a MTC device in a wireless communication system is provided. The method includes determining whether a Radio Resource Control (RRC) connection establishment corresponds to aCause 1 or aCause 2, establishing, if the RRC connection establishment corresponds to theCause 1, the RRC connection so that the RRC connection is not subject to EAB procedure, and determining, if the RRC connection establishment corresponds to theCause 2, whether to employ the EAB procedure according to an establishment of a System Information Block (SIB) transmitted from an evolved Node B (eNB), and employing the EAB procedure according to the determination.
In accordance with another aspect of the present invention, a MTC device for controlling access to an eNB in a wire communication system is provided. The MTC device includes a transceiver for transmitting and receiving signals to and from the eNB, and a controller. The controller determines whether an RRC connection establishment corresponds to aCause 1 or aCause 2, establishes, if the RRC connection establishment corresponds to theCause 1, the RRC connection so that the RRC connection is not subject to EAB procedure, and determines, if the RRC connection establishment corresponds to theCause 2, whether to employ the EAB procedure according to an establishment of a SIB transmitted from the eNB, and employing the EAB procedure according to the determination.
Other aspects, advantages, and salient features of the invention will become apparent to those skilled in the art from the following detailed description, which, taken in conjunction with the annexed drawings, discloses exemplary embodiments of the invention.
BRIEF DESCRIPTION OF THE DRAWINGSThe above and other aspects, features, and advantages of certain exemplary embodiments of the present invention will become more apparent from the following description taken in conjunction with the accompanying drawings, in which:
FIG. 1 illustrates a configuration of a Long Term Evolution (LTE) system according to an exemplary embodiment of the present invention;
FIG. 2 illustrates a view showing a wireless protocol stack of an LTE system according to an exemplary embodiment of the present invention;
FIG. 3A illustrates a view that describes communication between non-Machine Type Communication (MTC) User Equipments (UEs) according to an exemplary embodiment of the present invention;
FIG. 3B illustrates a view that describes communication between MTC devices according to an exemplary embodiment of the present invention;
FIG. 4 illustrates a flowchart that describes a method via the application of Extended Access Barring (EAB) and Access Class Barring (ACB), according to an exemplary embodiment of the present invention;
FIG. 5 illustrates a flowchart that describes a method for operating a UE, according to a first exemplary embodiment of the present invention;
FIG. 6 illustrates a flowchart that describes a method for operating a UE, according to a second exemplary embodiment of the present invention;
FIG. 7 illustrates an example of a format of a new Random Access Response (RAR) message, according to an exemplary embodiment of the present invention;
FIG. 8 illustrates a schematic block diagram of a UE according to an exemplary embodiment of the present invention; and
FIG. 9 illustrates a schematic block diagram of an evolved Node B (eNB) according to an exemplary embodiment of the present invention.
Throughout the drawings, it should be noted that like reference numbers are used to depict the same or similar elements, features, and structures.
DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTSThe following description with reference to the accompanying drawings is provided to assist in a comprehensive understanding of exemplary embodiments of the invention as defined by the claims and their equivalents. It includes various specific details to assist in that understanding but these are to be regarded as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. In addition, descriptions of well-known functions and constructions may be omitted for clarity and conciseness.
The terms and words used in the following description and claims are not limited to the bibliographical meanings, but, are merely used by the inventor to enable a clear and consistent understanding of the invention. Accordingly, it should be apparent to those skilled in the art that the following description of exemplary embodiments of the present invention is provided for illustration purpose only and not for the purpose of limiting the invention as defined by the appended claims and their equivalents.
It is to be understood that the singular forms “a,” “an,” and “the” include plural referents unless the context clearly dictates otherwise. Thus, for example, reference to “a component surface” includes reference to one or more of such surfaces.
Although the following exemplary embodiments will be described based on Long Term Evolution (LTE) systems or LTE-Advanced (LTE-A) systems, it should be understood that the invention is not limited to the described exemplary embodiments. That is, the invention can also be applied to various types of communication systems and their modifications if they have technology backgrounds or channels similar to those of LTE and LTE-A systems.
FIG. 1 illustrates a configuration of an LTE system according to an exemplary embodiment of the present invention.
Referring toFIG. 1, the LTE system configures the wireless access network, including evolved Node Bs (eNBs)105,110,115, and120, a Mobility Management Entity (MME)125, and a Serving-Gateway (S-GW)130. User Equipment (UE)135 can access an external network via theeNBs105,110,115, and120 and the S-GW130.
TheeNBs105,110,115 and120 correspond to Node Bs of the Universal Mobile Telecommunications System (UMTS) system. TheeNBs105,110,115 or120 are connected to theUE135 via a wireless channel and perform more complicated functions than a Node B of the UMTS system. Since the LTE system provides real time services, such as Voice over Internet Protocol (IP) (VoIP), and all user traffic via a shared channel, the LTE system uses devices that can collect information regarding states, such as states of a buffer of a UE, states of available transmission power, states of channels, etc., and can make a schedule. TheeNBs105,110,115 and120 are examples of such devices. One eNB controls a number of cells. For example, in order to implement a transmission rate of 100 Mbps, the LTE system employs Orthogonal Frequency Division Multiplexing (OFDM) at a bandwidth of 20 MHz, as a wireless access technology. The LTE system also employs Adaptive Modulation & Coding (AMC) to determine a modulation scheme and a channel coding rate, meeting the channel state of the UE. The S-GW130 provides a data bearer. The S-GW130 creates or removes data bearers according to the control of theMME125. TheMME125 manages the mobility of the UE and controls a variety of functions. TheMME125 connects to a number of eNBs, such aseNBs105,110,115 and120.
FIG. 2 illustrates a view of the wireless protocol stack of an LTE system according to an exemplary embodiment of the present invention.
Referring toFIG. 2, a UE and an eNB communicate using a Packet Data Convergence Protocol (PDCP)layer205 and240, a Radio Link Control (RLC)layer210 and235, and a Medium Access Control (MAC)layer215 and230, respectively. ThePDCP layer205 and240 compresses/decompresses an IP header. TheRLC layer210 and235 reconfigures a PDCP Packet Data Unit (PDU) into a proper size. TheMAC layer215 and230 connects to a number of RLC layer devices configured in one UE. TheMAC layer215 and230 multiplexes RLC PUDs to a MAC PDU, and de-multiplex RLC PDUs from MAC PDU. The Physical (PHY)layer220 and225 channel-codes and modulates data from the upper layers, creates OFDM symbols, and transmits them via a wireless channel. In addition, thePHY layer220 and225 demodulates and channel-decodes OFDM symbols transmitted via a wireless channel, and transfers them to the upper layers. ThePHY220 and225 also employs Hybrid Automatic Repeat-reQuest (ARQ) to perform additional error correction, where the receiving end determines whether a packet from a transmitting end has been received by transmitting 1 bit to the transmitting end, which is referred to as HARQ ACKnowledgement (ACK)/Negative ACKnowledgement NACK information. Downlink HARQ ACK/NACK information with respect to an uplink transmission is transmitted via a Physical Hybrid-ARQ Indicator Channel (PHICH). Likewise, uplink HARQ ACK/NACK information with respect to downlink transmission is transmitted via a Physical Uplink Control Channel (PUCCH) or Physical Uplink Shared Channel (PUS CH).
FIG. 3A illustrates a view that describes communication between non-MTC UEs according to an exemplary embodiment of the present invention.FIG. 3B illustrates a view that describes communication between MTC devices according to an exemplary embodiment of the present invention.
Referring toFIG. 3A, when communication, e.g., a voice call, is made between non-MTC UEs, one UE may serve as a caller and the other as a call receiver, while connecting to each other via an eNB and a core network.
On the contrary, referring toFIG. 3B, when communication is made between MTC devices, an MTC device is connected to an MTC server via an eNB and a core network. That is, MTC is performed between machines, and this differs from communication between the UEs shown inFIG. 3A.
In order to bar access from a UE to a network, an LTE system supports an Access Class Barring (ACB) mechanism since LTE release 8, and further Extended Access Barring (EAB) mechanism since LTE release 11. Both, either or neither of ACB and EAB may be used.
An ACB mechanism supported by the LTE system refers to a mechanism that bars access according to Access Classes (ACs) 0 to 15 of a UE stored in a Universal Subscriber Identity Module (USIM) card of a UE. The operation is described in detail as follows.
The UE determines whether a System Information Block No. 2 (SIB 2) transmitted from an eNB includes an ac-BarringInfo parameter. If the UE ascertains thatSIB 2 includes the ac-BarringInfo parameter, the UE performs the identification procedure as follows.
- If the UE has one or more ACs 11 to 15 that are available, and bit information regarding the available ACs 11 to 15 of UE is set to ‘1’ in ac-BarringForSpecialAC information transmitted from an eNB, the UE can perform an access attempt.
- ACs 11-15 being available means that ACs 12, 13 and 14 are available only in a home country of the UE (i.e., a service provider's country to which the UE is subscribed), and ACs 11 and 15 are available only in a Home Public Land Mobile Network (HPLMN) that refers to a service provider to which the UE is subscribed and in an Equivalent Home Public Land Mobile Network (EHPLMN) that refers to a service provider equivalent to the HPLMN.
- Otherwise, the UE generates a number between ‘0’ and ‘1.’ If the generated number is less than the ac-BarringFactor parameter value, the UE can perform an access attempt. If the generated number is greater than the ac-BarringFactor parameter value, the UE cannot perform an access attempt.
- If access is barred via the processes described above, the UE re-generates a number between ‘0’ and ‘1.’ An access bar time, Tbarring, can be calculated usingEquation 1.
 Tbarring=(0.7+0.6×rand)×ac-BarringTime   [Equation 1]
 
An EAB mechanism supported by the LTE system refers to a mechanism that bars access according toACs 0 to 9 of a UE stored in a USIM card of the UE. The operation is described in detail as follows.
The UE determines whether an SIB transmitted from an eNB includes an EAB parameter. If the UE ascertains that the SIB includes an EAB parameter, the UE performs the identification procedure as follows.
- If the UE is included in a category indicated by an eab-Category parameter transmitted from an eNB, and a value betweenACs 0 to 9 that the UE belongs to is set to ‘1’ in a bit map of an eab-BarringBitmap parameter, the UE cannot perform an access attempt.
- The category of the UE to which the EAB indicated by the eab-Category is applied are divided into three sub-categories as follows:- UEs set for EAB;
- UEs, from among the UEs set for EAB, which do not exist on HPLMN or EHPLMN, i.e., UEs of the other service providers; and
- UEs from among the UEs set for EAB, which do not exist on HPLMN or EHPLMN, or UEs from among the UEs in a roaming process, which do not exist on one of the Public Land Mobile Networks (PLMNs) in the list defined by a service provider stored in the USIM, i.e., UEs from among the UEs set for EAB, which exclude service providers' high priority UEs when roaming.
 
- Otherwise, the UE cannot perform an access attempt.
- If access is barred via the processes described above, a notice is made to the upper layer that access is barred via EAB.
 
FIG. 4 illustrates a flowchart that describes a method via the application of EAB and ACB, according to an exemplary embodiment of the present invention.
AUE401 receives a request for Radio Resource Control (RRC) connection establishment with aneNB403 from the upper layer. The upper layer of theUE401 refers to a Non-Access Stratum (NAS) layer. The upper layer of theUE401 informs the lower layer of theUE401 as to whether the RRC connection establishment relates to EAB, i.e., whether EAB should be applied to the RRC connection establishment atstep411. The lower layer of theUE401 refers to an Access Stratum (AS) layer.
If the upper layer of theUE401 satisfies the following conditions, despite theUE401 being an MTC device, it may inform the lower layer that the RRC connection establishment does not relate to EAB in order to employ EAB. The following cases are referred to as ‘Cause 1’:
- If a UE makes an access attempt to receive a call (mobile terminated call-Access (mt-Access));
- If a UE makes an emergency call; and
- If a UE makes an access attempt with a high priority (highPriorityAccess).
 
If the upper layer of theUE401 satisfies the following conditions, it may inform the lower layer that the RRC connection establishment relates to EAB so that the MTC device employs EAB. The following cases are referred to as ‘Cause 2’:
- If a UE makes an access attempt to make a call to transmit data (mobile originated call-Data (mo-Data));
- If a UE makes an access attempt to make a call to transmit a control message (mobile originated call-Signaling (mo-Signaling)); and
- If a UE makes an access attempt to make a call irrespective of a transmission delay such as an MTC service (delayTolerantAccess).
 
In the present exemplary embodiment, the reasons for discerning betweenCause 1 andCause 2 are as follows.
RegardingCause 1, mt-Access is used to transmit data for a corresponding UE via a network. TheUE401 cannot determine the importance of the data until it receives the data. Therefore, if an access delay occurs, theUE401 may lose important data. If theUE401 delays a call during an emergency situation, this may endanger the user. An access attempt with a high priority is required to be differentiated from a general access attempt or an access with a lower priority.
RegardingCause 2, this includes a cause that does not cause problems although theUE401 delays access. Therefore, the upper layer ofUE401 informs the lower layer that an EAB mechanism can be employed forCause 2 only.
Additionally, when theUE401 accesses theeNB403, it receives anSIB 2 from theeNB403 in order to determine whether to employ ACB, and determines whetherSIB 2 includes an AC barring parameter atstep413. IfSIB 2 includes an AC barring parameter,UE401 makes an attempt to access theeNB403, employing ACB, and determines whether it can access theeNB403 atstep413.
If theUE401 ascertains that EAB should be applied to the RRC connection establishment atstep411, theUE401 receives an SIB from theeNB403 in order to determine whether theeNB403 bars EAB related access, and determines whether the SIB includes an EAB related parameter atstep415.
If the SIB includes an EAB related parameter atstep415, theUE401 performs an attempt to access theeNB403, employing EAB if it is related to the access, and determines whether it can access theeNB403.
For the sake of convenience in description, in an exemplary embodiment of the present invention, it is assumed that theeNB403 employs EAB and ACB. If the RRC connection establishment corresponds to Cause 1, theUE401 does not apply EAB to the access but applies ACB thereto atstep419. On the contrary, if the RRC connection establishment corresponds to Cause 2, theUE401 applies EAB and ACB to the access atsteps417 and419, and determines whether to make an attempt to perform RRC connection establishment. Since theeNB403 employs EAB and ACB, theUE401 that hasCause 2 as a cause of RRC connection establishment applies EAB first, prior to ACB, to the access, and then determines whether the access is barred due to EAB. For only the case where the access is not barred due to EAB, theUE401 applies ACB to the access. If the access is not barred by ACB, theUE401 may make an attempt to perform RRC connection establishment.
Regarding EAB and ACB, the system is operated as follows.
An ACB mechanism refers to a mechanism that bars the access according toACs 0 to 15 of theUE401 stored in a USIM card of theUE401. The operation is described in detail as follows.
TheUE401 determines whetherSIB 2 transmitted from theeNB403 includes an ac-BarringInfo parameter. If theUE401 ascertains thatSIB 2 includes an ac-BarringInfo parameter, theUE401 performs the identification procedure as follows.
- If theUE401 has one or more ACs 11 to 15 that are available, and bit information regarding the available ACs 11 to 15 ofUE401 is set to ‘1’ in ac-BarringForSpecialAC information transmitted from aneNB403, theUE401 can perform an access attempt.
- ACs 11-15 being available means that ACs 12, 13 and 14 are available only in a home country of UE401 (i.e., a service provider's country to which theUE401 is subscribed), and ACs 11 and 15 are available only in a HPLMN that refers to a service provider to which theUE401 is subscribed and in an EHPLMN that refers to a service provider equivalent to the HPLMN.
- Otherwise, theUE401 generates a number between ‘0’ and ‘1.’ If the generated number is less than the ac-BarringFactor parameter value, theUE401 can perform an access attempt. If the generated number is greater than the ac-BarringFactor parameter value, theUE401 cannot perform an access attempt.
- If access is barred via the processes described above, theUE401 re-generates a number between ‘0’ and ‘1.’ An access bar time, Tbarring, can be calculated usingEquation 2.
 Tbarring=(0.7+0.6×rand)×ac-BarringTime   [Equation 2]
 
An EAB mechanism supported by the LTE system refers to a mechanism that bars the access according toACs 0 to 9 of theUE401 stored in a USIM card ofUE401. The operation is described in detail as follows.
TheUE401 determines whether a SIB transmitted from theeNB403 includes an EAB parameter. If theUE401 ascertains that SIB includes the EAB parameter, theUE401 performs the identification procedure as follows.
- If theUE401 is included in a category indicated by an eab-Category parameter transmitted from aneNB403, and a value betweenACs 0 to 9 that theUE401 belongs to is set to ‘1’ in a bit map of an eab-BarringBitmap parameter, theUE401 cannot perform an access attempt.
- The Category of theUE401 to which EAB indicated by the eab-Category is applied are divided into three sub-categories as follows:- UEs set for EAB;
- UEs, from among the UEs set for EAB, which do not exist on HPLMN or EHPLMN, i.e., UEs of the other service providers; and
- UEs from among the UEs set for EAB, which do not exist on HPLMN or EHPLMN, or UEs from among the UEs in a roaming process, which do not exist on one of PLMN in the list defined by a service provider stored in the USIM, i.e., UEs from among the UEs set for EAB, which exclude service providers' high priority UEs when roaming.
 
- Otherwise, theUE401 cannot perform an access attempt.
- If access is barred via the processes described above, a notice is made to the upper layer that access is barred via EAB.
 
After performingsteps417 and419, if theUE401 ascertains that the access to a cell is not barred, theUE401 transmits a Random Access Preamble to theeNB403 atstep421. The Random Access Preamble indicates one from among the sets noticed by theeNB403, selected by theUE401, and is transmitted to theeNB403. Therefore, theeNB403 does not detect whichUE401 makes an access attempt thereto.
If theeNB403 receives the Preamble, theeNB403 transmits a Random Access Response (RAR) message to theUE401 atstep423. The RAR message may include the received Preamble index and the resource allocation,Type 1 backoff, andType 2 backoff value.
Type 1 backoff is applied to a non-MTC UE and not a MTC device.Type 2 backoff is applied to UEs sharing a specific property (e.g., delay tolerant MTC device or EAB configured UE). That is, if the RAR message received atstep423 does not include the index of the Preamble transmitted from theUE401 to theeNB403 atstep421 but includes aType 2 backoff value, theUE401 waits aType 2 backoff time period by employing theType 2 backoff value atstep425. After theType 2 backoff time period has elapsed atstep425, theUE401 re-transmits a Random Access Preamble to theeNB403 atstep427.
For example, if there is only aType 1 backoff, an EAB configured UE applies theType 1 backoff algorithm to the access. If there is only aType 2 backoff, the EAB configured UE applies theType 2 backoff algorithm to the access. If there areType 1 backoff andType 2 backoff, an EAB configured UE applies theType 2 backoff algorithm first, prior to theType 1 backoff algorithm, to the access. However, if there is aType 1 backoff, a non-MTC UE applies theType 1 backoff algorithm to the access. If there is not a backoff, thenon-MTC UE401 does not apply any backoff algorithm to the access.
A detailed format of the RAR message will be described further below with reference toFIG. 7.
After re-transmitting a Random Access Preamble to theeNB403 atstep427, theUE401 receives an RAR message thereto from theeNB403 atstep429. If the received RAR message includes resource allocation information regarding the Preamble transmitted atstep427, theUE401 transmits, to theeNB403, an RRC connection request message, RRCConnectionRequest, including its identifier and the access attempt cause, according to the resource allocation information atstep431.
After receiving the RRC connection request message, theeNB403 transmits the RRC connection setup message, RRCConnectionSetup, to theUE401 and accepts the RRC connection setup atstep433. TheUE401 receives the RRC connection setup message from theeNB403, and transmits an RRC connection setup complete message, RRCConnectionSetupComplete, to theeNB403, thereby notifying theeNB403 that RRC connection has been set up atstep435.
FIG. 5 illustrates a flowchart that describes a method for operating a UE, according to a first exemplary embodiment of the present invention.
A UE receives a request for a RRC connection establishment with an eNB from the upper layer (e.g., NAS) atstep503. The upper layer of UE informs the lower layer (e.g., AS) as to whether the RRC connection establishment is related to EAB or the RRC connection establishment employs EAB atstep505.
As described above with respect toFIG. 4, if an RRC connection establishment is requested due toCause 1, the upper layer of UE informs the lower layer that RRC connection establishment is not related to EAB. If an RRC connection establishment is requested due toCause 2, the upper layer of UE informs the lower layer that RRC connection establishment is related to EAB.
If RRC connection establishment is related to EAB atstep505, the UE receivesSIB 2 and SIB atstep507. On the contrary, if RRC connection establishment is not related to EAB atstep505, UE receives onlySIB 2 atstep509.
If RRC connection establishment is related to EAB atstep505 and SIB includes EAB related to information atstep511, the UE performs the EAB procedure atstep513. On the contrary, if RRC connection establishment is related to EAB atstep505, and SIB does not include EAB related to information atstep511 or SIB does not exist atstep509, the UE performs an ACB identification procedure atstep519. That is, UE performs the EAB procedure and then the ACB procedure.
An EAB procedure refers to a mechanism that bars the access according toACs 0 to 9 of a UE stored in a USIM card of the UE. The operation is described in detail as follows.
The UE determines whether a SIB transmitted from an eNB includes an EAB parameter. If the UE ascertains that SIB includes an EAB parameter, the UE performs the identification procedure as follows.
- If the UE is included in a category indicated by an eab-Category parameter transmitted from an eNB, and a value betweenACs 0 to 9 that the UE belongs to is set to ‘1’ in a bit map of an eab-BarringBitmap parameter, the UE cannot perform an access attempt.
- The category of the UE to which EAB indicated by the eab-Category is applied are divided into three sub-categories as follows:- UEs set for EAB;
- UEs, from among the UEs set for EAB, which do not exist on HPLMN or EHPLMN, i.e., UEs of the other service providers; and
- UEs from among the UEs set for EAB, which do not exist on HPLMN or EHPLMN, or UEs from among the UEs in a roaming process, which do not exist on one of PLMN in the list defined by a service provider stored in the USIM; i.e., UEs from among the UEs set for EAB, which exclude service providers' high priority UEs when roaming.
 
- Otherwise, the UE cannot perform an access attempt.
- If access is barred via the processes described above, a notice is made to the upper layer that access is barred via EAB.
 
After performing the EAB procedure atstep513, the UE determines whether the access is barred by EAB atstep515. If the access is barred by EAB atstep515, UE informs the upper layer of the failure of the RRC connection establishment atstep517 and then terminates the operation.
On the contrary, if the access is not barred by EAB atstep515, the UE determines whetherSIB 2 includes ACB information atstep519. If the UE ascertains thatSIB 2 includes ACB information atstep519, the UE performs the ACB procedure atstep521. On the contrary, ifSIB 2 does not include ACB information atstep519, the UE makes an attempt to perform RRC connection establishment via Random Access procedure atstep525.
The ACB procedure refers to a mechanism that bars access according toACs 0 to 15 of a UE stored in a USIM card of the UE. The operation is described in detail as follows.
The UE determines whether theSIB 2 transmitted from an eNB includes an ac-BarringInfo parameter. If the UE ascertains thatSIB 2 includes an ac-BarringInfo parameter, the UE performs the identification procedure as follows.
- If the UE has one or more ACs 11 to 15 that are available, and bit information regarding the available ACs 11 to 15 of UE is set to ‘1’ in ac-BarringForSpecialAC information transmitted from an eNB, the UE can perform an access attempt.
- ACs 11-15 being available means that ACs 12, 13 and 14 are available only in a home country of the UE (i.e., a service provider's country to which the UE is subscribed), and ACs 11 and 15 are available only in a HPLMN that refers to a service provider to which the UE is subscribed and in a EHPLMN that refers to a service provider equivalent to the HPLMN.
- Otherwise, the UE generates a number between ‘0’ and ‘1.’ If the generated number is less than ac-BarringFactor parameter value, the UE can perform an access attempt. If the generated number is greater than ac-BarringFactor parameter value, the UE cannot perform an access attempt.
- If access is barred via the processes described above, the UE re-generates a number between ‘0’ and ‘1.’ An access bar time, Tbarring, can be calculated usingEquation 3.
 Tbarring=(0.7+0.6×rand)×ac-BarringTime   [Equation 3]
 
After performing the ACB procedure atstep521, the UE determines whether a cell access is barred by ACB atstep523. If a cell access has been barred by ACB atstep523, the UE re-applies the ACB procedure to the access after the access bar time, Tbarring, has elapsed atstep521. On the contrary, if a cell access is not barred via ACB atstep523, the UE makes an attempt to perform RRC connection establishment via Random Access procedure atstep525, which is described in detail below with reference toFIG. 6.
FIG. 6 illustrates a flowchart that describes a method for operating UE, according to a second exemplary embodiment of the present invention.
After performing EAB and ACB procedures as shown inFIG. 5, a UE makes an attempt to perform RRC connection establishment via a Random Access procedure atstep601. To this end, the UE transmits a Random Access Preamble to an eNB atstep602. The Random Access Preamble that will be transmitted may be selected randomly from among preambles by the UE or designated by the eNB.
After transmitting the Random Access Preamble to the eNB, the UE makes an attempt to receive an RAR message in a preset period of time atstep603. The UE checks the PDCCH to receive a RAR message, for a preset period of time, after a period of time has elapsed from a time point that it transmits the Preamble.
If the UE receives a MAC PDU addressed by a proper Radio Network Temporary Identity (RA-RNTI) in the preset period of time, the UE receives and decodes the RAR. The proper RA-RNTI is mapped, one-to-one, to a transmission resource (defined in time domain and frequency domain) to which the UE transmits the Preamble.
If the UE receives an RAR and ascertains that the RAR includes a backoff atstep603, the UE checks the type of UE and a cause of RRC connection establishment in order to determine the procedure to process the backoff atstep604.
If the UE ascertains that the UE is a non-MTC UE or, although the UE is an MTC device, the cause of RRC connection establishment is not a delayTolerantAccess atstep604, the UE proceeds withstep605. On the contrary, if the UE is an MTC device and the cause of RRC connection establishment is a delayTolerantAccess atstep604, the UE proceeds withstep608.
A non-MTC type of UE refers to general UE, not an MTC device. An MTC device refers to a machine type communication device that is provided with a Machine to Machine (M2M) service and performs communication between machines, not between humans or between humans and machines. An example of the MTC device is a metering device providing smart metering services. MTC devices are also referred to as UEs that are configured for EAB.
MTC devices generate data that is not urgent. MTC devices establish an RRC connection in order to transmit such data, in such a way that the EstablishmentCause field of an RRC connection request message, RRC CONNECTION REQUEST, is set as delayTolerantAccess.
MTC devices may transmit more important data (e.g., an alarm message, etc.). In that case, MTC devices may employ mo-Signaling, for example, for the EstablishmentCause field.
In an exemplary embodiment of the present invention, MTC devices are controlled viaType 2 backoff by default. However, if MTC devices are intended to transmit important data, it is preferable that they are subject to the same congestion control as non-MTC UEs.
When an MTC device establishes a RRC connection, the MTC device stores the establishment cause, EstablishmentCause, that it used. After that, the MTC device uses the EstablishmentCause to determine whether it is a delayTolerantAccess or the other value when performing a Random Access Procedure, thereby determining a backoff value according to the result.
If a UE in an idle mode performs a Random Access procedure to operate in a connection state, i.e., to perform a RRC connection establishment process, the UE checks whether EstablishmentCause of an RRC CONNECTION REQUEST message to be transmitted is delayTolerantAccess and then determines the operation according to the result.
After checking the type of UE and a cause of RRC connection establishment atstep604,
- if the UE is not an MTC device, the UE performs a congestion control process, employingType 1 backoff atstep605;
- if the UE is an MTC device that performs an Random Access procedure for RRC connection establishment and the EstablishmentCause of an RRC CONNECTION REQUEST message is not delayTolerantAccess, the UE performs a congestion control process, employingType 1 backoff atstep605;
- if the UE is an MTC device that performs an Random Access procedure for RRC connection establishment and the EstablishmentCause of an RRC CONNECTION REQUEST message is not delayTolerantAccess, the UE performs a congestion control process, employingType 1 backoff atstep605;
- if the UE is an MTC device that performs an Random Access procedure for RRC connection establishment and the EstablishmentCause of an RRC CONNECTION REQUEST message is delayTolerantAccess, the UE performs a congestion control process, employingType 1 backoff andType 2 backoff atstep608;
- if the UE is an MTC device in an RRC connection state and the EstablishmentCause has been set to a cause (e.g., emergency, highPriorityAccess, mo-Signaling, or mo-Data) other than delayTolerantAccess, when establishing the current RRC connection, the UE performs a congestion control process, employingType 1 backoff atstep605; and
- if the UE is an MTC device in an RRC connection state and the EstablishmentCause has been set to delayTolerantAccess, when establishing the current RRC connection, the UE performs a congestion control process, employingType 1 backoff andType 2 backoff atstep608.
 
If the UE is a non-MTC UE or an MTC device with high priority access, the UE checks whether the received RAR includesType 1 backoff atstep605.
If the UE ascertains that the received RAR does not includeType 1 backoff atstep605, it sets the backoff parameter to 0 ms atstep606. This means that backoff is not employed when re-transmitting a Preamble due to a variety of causes, such as a congestion resolution failure, etc.
On the contrary, if the UE ascertains that the received RAR includesType 1 backoff atstep605, the UE sets the backoff parameter to a value indicated byType 1 backoff atstep607. This means that a value is randomly selected between ‘0’ and a value stored in the backoff parameter when re-transmitting a Preamble due to a variety of causes, such as a congestion resolution failure, etc., and the backoff is performed by the selected value.
If the UE is an MTC device that performs access, delayTolerantAccess, the UE checks whether the received RAR includesType 1 backoff andType 2 backoff atstep608. The format of RAR will be described in detail further below with reference toFIG. 7.
If the received RAR does not includeType 1 backoff andType 2 backoff atstep608, the UE stores ‘0’ ms as a backoff parameter atstep609.
If the received RAR includesType 1 backoff atstep608, the UE storesType 1 backoff value as a backoff parameter atstep610. The stored value is applied to the transmission of the Preamble.
If the received RAR includesType 1 backoff andType 2 backoff atstep608, the UE storesType 2 backoff value as a backoff parameter atstep611. The stored value is applied to the transmission of the Preamble.
Meanwhile, ifType 2 backoff exists and is less thanType 1 backoff (or ifType 2 backoff is 0 ms butType 1 backoff is not 0 ms), the UE storesType 1 backoff as a backoff parameter. It is normal that the exceptional case does not occur; however, the exceptional case is prepared to process a case that occurs sinceType 2 backoff always exists during the standard process, and that may be determined by indicating ‘0’ ms if there is no need to apply aType 2 backoff.
After that, the UE performs a Random Access process, e.g., a message transmitting process, a contention resolution process, or the like, atstep612.
FIG. 7 illustrates an example of a format of a new RAR message, according to an exemplary embodiment of the present invention.
A RAR message includes two parts,first part701 andsecond part703.
Thefirst part701 is configured in the same format as a RAR of the related art, so that it can be detected by all UEs. That is, thefirst part701 includes a number of MAC subheaders711,713,715 and717 and a number ofRAR payloads719,721 and723.
The MAC subheaders have one byte and includesType 1backoff information711 or Random Access Preamble Identifiers (RAPIDs)713,715 and717. The information MAC subheaders include is indicated by a value of a bit position (e.g., the second bit). The MAC subheaders may or may not includeType 1backoff711. IfType 1backoff711 is included in the MAC subheaders, it is indicated by the first MAC subheader.
TheRAR payloads719,721 and723 include information regarding reverse resource allocation and information regarding a transmission timing control command, Timing advance Command.
Thesecond part703 includesType 2 backoff. The UE determines the presence ofType 2 backoff and the value, referring to the format of thesecond part703.
Type 2 backoff is located at the first byte of thesecond part703, for example. Thesecond part703 configures a number ofcomponents731,733,735 and737.
AnE bit731 indicates whether the next byte is a padding or another subheader.
A Tbit733 indicates whether a corresponding byte is related toType 2 backoff.
Ascaling factor735 is a value that is combined with a backoff indicator and defines thefinal Type 2 backoff.
Type 2 backoff=Scaling factor×Backoff Indicator
The Scaling factor has two bits and the definitions presented in the following table.
|  | 
| Scaling factor | Definitions | 
|  | 
| 0 | x 1 | 
| 1 | x n1 | 
| 2 | x n2 | 
| 3 | x n3 | 
|  | 
Referring to the table, if the scaling factor is ‘0,’Type 2 backoff can be calculated by multiplying Backoff Indicator by ‘1.’
As such, backoff Indicator used forType 1 backoff is reused to calculateType 2 backoff.Type 2 backoff should indicate a larger value thanType 1 backoff. However, the exemplary embodiment of the present invention is implemented in such a way that the scaling factor and backoff indicator used forType 1 backoff are reused for the other type of backoff, thereby avoiding defining an additional backoff.
The UE calculates a start time point of the second part as follows.
First, UE identifies the size of the first part. An MAC subheader and each RAR payload are one byte and six bytes in size, respectively. The UE can calculate from which byte the second byte starts using Equation 4.
n+m×7   [Equation 4]
where n is the number of subheaders ofType 1 backoff’ and m is the number of RAPID subheaders. Here, n is ‘0’ or ‘1.
Thesecond part703 follows the last byte of thefirst part701.
FIG. 8 illustrates a schematic block diagram of user equipment according to an exemplary embodiment of the present invention.
Referring toFIG. 8, the UE includes atransceiver805, acontroller810, a multiplexer anddemultiplexer815, acontrol message processor830,upper layer devices820 and825.
Thetransceiver805 receives data and control signals via the forward channel of a serving cell and transmits data and control signals via the reverse channel. If the UE establishes channels with a number of serving cells, thetransceiver805 can transmit and receive data and control signals to and from the serving cells.
The multiplexer anddemultiplexer815 multiplexes data from thecontrol message processor830 or theupper layer devices820 and825 or de-multiplexes data from thetransceiver805, and transfers the processed data to thecontrol message processor830 or theupper layer devices820 and825.
Thecontrol message processor830 processes control messages from an eNB and performs corresponding operations. For example, thecontrol message processor830 receives Discontinuous Reception (DRX)-related parameters and transfers them to thecontroller810.
Theupper layer devices820 and825 may be configured according to types of services. For example, theupper layer devices820 and825 process data, generated when user services such as File Transfer Protocol (FTP) or VoIP services are provided, and transfer them to the multiplexer anddemultiplexer815. Theupper layer devices820 and825 may also process data, from the multiplexer anddemultiplexer815, and transfers them to the upper layer service application.
Thecontroller810 receives a scheduling command via thetransceiver805, identifies the reverse grants, and controls thetransceiver805 and the multiplexer anddemultiplexer815 to transmit them as a proper transmission resource, in the reverse direction, at a proper time point. Thecontroller810 also controls thetransceiver805 to perform DRX operation and Channel State Information (CSI)/Sounding Reference Signal (SRS) transmission.
Thecontroller810 determines whether RRC connection establishment corresponds to Cause 1 or 2. If RRC connection establishment corresponds to Cause 1, thecontroller810 establishes an RRC connection so that it is not subject to EAB. On the contrary, if RRC connection establishment corresponds to Cause 2, thecontroller810 determines whether an EAB procedure is employed according to an SIB transmitted from an eNB, and performs EAB according to the determination.
Cause 1 may be one or more cases where a UE makes an access attempt to receive a call, a UE makes an emergency call, and a UE makes an access attempt with a high priority.Cause 2 may be one or more cases where a UE makes an access attempt to make a call to transmit data a UE makes an access attempt to make a call to transmit control message, and a UE makes an access attempt to make a call irrespective of a transmission delay such as an MTC service.
Thecontroller810 determines whether to employ ACB according to the establishment of SIB transmitted from an eNB, and employs the ACB procedure according to the determination. That is, if thecontroller810 ascertains cases where the access is not subject to EAB because it corresponds to Cause 1, and the access is not barred according to the result of employing EAB procedure, thecontroller810 determines whether to employ ACB according to the establishment of SIB transmitted from an eNB, and employs the ACB procedure according to the determination.
If the access is not barred according to the result of employing the EAB and ACB, thecontroller810 requests RRC connection establishment from the eNB.
Although the exemplary embodiment of the UE is implemented in such a way that the components are distinguished according to the functions, it should be understood that the present invention is not limited to the exemplary embodiment. For example, the exemplary embodiment may be modified in such a way that thecontroller810 can perform the operations of thecontrol message processor830. This principle can also be applied to the eNB described as follows.
FIG. 9 illustrates a schematic block diagram of an eNB according to an exemplary embodiment of the present invention.
Referring toFIG. 9, the eNB includes atransceiver905, acontroller910, a multiplexer anddemultiplexer920, acontrol message processor935,upper layer devices925 and930, and ascheduler915.
Thetransceiver905 transmits data and control signals via the forward carriers and receives data and control signals via the reverse carriers. If a number of carriers are set, thetransceiver905 transmits and receives data and control signals via the carriers.
The multiplexer anddemultiplexer920 multiplexes data from thecontrol message processor935 or theupper layer devices925 and930 or de-multiplexes data from thetransceiver905, and transfers the processed data to thecontrol message processor935 or theupper layer devices925 and930 or thecontroller910.
Thecontrol message processor935 processes control messages from the UE and performs corresponding operations. Thecontrol message processor935 also generates control messages to be transmitted to the UE and transmits them to the lower layer.
Theupper layer devices925 and930 may be configured according to types of services. For example, theupper layer devices925 and930 process data, generated when user services such as FTP or VoIP services are provided, and transfer them to the multiplexer anddemultiplexer920. Theupper layer devices925 and930 may also process data, from the multiplexer anddemultiplexer920, and transfers them to the upper layer service application.
Thecontroller910 detects a time point when UE will transmit CSI/SRS and controls thetransceiver905 to transmit CSI/SRS.
Thescheduler915 allocates transmission resources at a proper time point, considering the buffer state, the channel state and Active time of the UE. Thescheduler915 processes signals transmitted from or to the UE.
As described above, the system and method according to exemplary embodiments of the present invention can control the operations of UEs that make attempts to access a network, thereby preventing excessive access.
While the invention has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the of the invention as defined in the appended claims and their equivalents.