Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device in communication system

A technology of equipment and mobile equipment, which is applied in the field of telecommunication systems, can solve problems such as loss of important services, and achieve the effect of avoiding access attempts

Active Publication Date: 2015-11-25
TELEFON AB LM ERICSSON (PUBL)
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This can lead to an overload situation where important traffic such as voice calls is lost due to high load on the signaling interface due to access attempts for non-time critical communications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device in communication system
  • Method and device in communication system
  • Method and device in communication system

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0103] Example 1: Extension of existing "RACH Control Parameters" information element

[0104] according to figure 2 , the RACH control parameters are extended for the example case of 8 new "Extended Access Control Classes": EACCC00-C07 in octet 5.

[0105] figure 1 Shows the RACH control parameter information element, extended with 1 octet of "Extended Access Control Class" bits, denoted as "EACCxx". The corresponding description to be inserted in Table 10.5.2.29.1 in 3GPP TS 44.018 is shown in Table 3 below:

[0106] Table 3 RACH control parameter information element (excerpt from Table 10.5.2.29.1 in 3GPPTS44.018)

[0107]

[0108] Alternatively, the above example with 8 "Extended Access Control Classes" can be extended to eg 16 such "Extended Access Control Classes" by adding another octet to the "RACH Control Parameters" information element.

[0109] The disadvantage of this method is that the scheme is not backward compatible, because the existing 3GPPTS44.018 mo...

example 2

[0110] Example 2: Creating a new "Extended RACH Control Parameters" information element

[0111] To ensure backward compatibility, instead of extending the existing RACH Control Parameters information element of 3GPPTS 44.018 as described above, a new "Extended RACH Control parameters" information element. This does not need to contain any other information than the new "EACCxx" bits (eg Tx integer, cell access barring, etc.) as these are already included in the (mandatory) "RACH Control Parameters" information element. Therefore, the new information element can be as image 3 shown. image 3 The "Extended RACH Control Parameters" information element is shown, containing only the "RACH Extended Control Parameters IEI" and "Extended Access Control Class" bits (denoted as EACCxx).

[0112] In, for example, a system information type 1 message, a new "extended RACH control parameter" may be added as an optional information element, as shown in Table 4 below, where the addition ...

example 3

[0118] Example 3: Add "Extended Access Control Class" information to the remaining octets

[0119] An alternative to the scheme described above in Example 1 and Example 2 is to add "extended access control class" information to the remaining octets of the corresponding system information message, rather than creating a new information element. As an example, for System Information Type 1, this can be achieved by modifying the remaining octets of SI1 described in 10.5.2.32 of 3GPPTS 44.018 as follows:

[0120]

[0121] For 8 instances of such classes, the remaining octets of SI1 are extended with the "extended access control class" bits

[0122] The corresponding description to be inserted in Table 10.5.2.32.1a of 3GPPTS 44.018 is according to Table 5 below:

[0123] Table 5 Details of the remaining octet information elements of SI1 to be added in Table 10.5.2.32.1a of 3GPPTS 44.018 for "Extended Access Control Category"

[0124]

[0125] Any (3GPPTS 44.018) legacy MS o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to methods and arrangements for controlling access of a mobile device to a network, such as GSM. The mobile devices belong to an access control class (ACC) and for providing extended access control may also belong to an additional access control class (EACC). The arrangement broadcasts system information to the mobile devices, which system information indicates whether mobile device, which belong to an access control class (ACC), is allowed to access or are barred from accessing the network, and the system information further indicates whether the mobile device, which also belong to an extended access control class (EACC), is allowed to access or are limited from accessing the network. Different ways for limiting access is provided. An example is to block the mobile device from initiating communication, and allow the mobile device for communication initiated by the network. An example is to block the mobile device from communication initiated from the network, and allow the mobile for initiating communication. An example is to block the mobile device from initiating communication, as well as for communication initiated by the network. A mobile device blocked from network initiated communication is not allowed to answer a paging from the network.

Description

technical field [0001] The present disclosure relates to methods and devices in telecommunication systems, in particular to methods and devices for access control. Background technique [0002] A highly-penetrated cellular network with devices (using the network to communicate with servers or other devices) can be overloaded with devices flooding signaling interfaces and wasting available system resources. Many of these devices may not be time critical in the sense that it does not matter whether the data transfer is done directly or waits a few minutes or even longer. [0003] In this application, the concept is generally exemplified on a GSM network, however, this application can also be applied to other 3GPP radio access technologies, such as UMTS or LTE. [0004] Different types of mobile devices use the same communication resources in the radio access network, and some mobile devices may not be able to access the network due to high traffic caused by other mobile devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W48/02
CPCH04W48/08H04W48/02H04W48/06H04W48/12
Inventor 安德斯·克里斯藤森莫滕·松德贝里保尔·斯利瓦-伯特林安德烈亚斯·伯格斯特罗姆
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products