H04W48/02

Method and apparatus for informing changes in coverage enhancement usage in a network

The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. There is disclosed a method, for a first network entity, for informing a change in coverage enhancement usage in a network comprising the first network entity and a user equipment (UE). The method comprises, in response to determining that a restriction on the use of coverage enhancement has changed for the UE, transmitting, to the UE, a first message including an indication of the change.

Method and apparatus for informing changes in coverage enhancement usage in a network

The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. There is disclosed a method, for a first network entity, for informing a change in coverage enhancement usage in a network comprising the first network entity and a user equipment (UE). The method comprises, in response to determining that a restriction on the use of coverage enhancement has changed for the UE, transmitting, to the UE, a first message including an indication of the change.

Access rejection method, apparatus and system, and storage medium and processor
11716673 · 2023-08-01 · ·

Disclosed are an access rejection method, apparatus and system, where the access rejection method includes: a first base station receives an access request from a terminal; and the first base station sends an access rejection message to the terminal; where the access rejection message at least carries: a check value generated based on a key of the terminal and at least part of contents of the access rejection message. And further disclosed are related computer storage media and processors.

Access rejection method, apparatus and system, and storage medium and processor
11716673 · 2023-08-01 · ·

Disclosed are an access rejection method, apparatus and system, where the access rejection method includes: a first base station receives an access request from a terminal; and the first base station sends an access rejection message to the terminal; where the access rejection message at least carries: a check value generated based on a key of the terminal and at least part of contents of the access rejection message. And further disclosed are related computer storage media and processors.

Method and apparatus to control access attempts from a terminal for wireless backhaul

A method, apparatus, and computer program product provide for controlling access attempts for wireless backhaul. In the context of a method, the method constructs an access request comprising an Integrated Access and Backhaul (IAB) access indication. The method further determines whether the access attempt is allowed for a particular cell, and if so, determines an establishment cause value based at least on the IAB access indication. The method also causes transmission of the access request and establishment cause value.

Method and apparatus to control access attempts from a terminal for wireless backhaul

A method, apparatus, and computer program product provide for controlling access attempts for wireless backhaul. In the context of a method, the method constructs an access request comprising an Integrated Access and Backhaul (IAB) access indication. The method further determines whether the access attempt is allowed for a particular cell, and if so, determines an establishment cause value based at least on the IAB access indication. The method also causes transmission of the access request and establishment cause value.

Communication Method, Apparatus, and System
20230024669 · 2023-01-26 ·

Embodiments of this application provide a communication method, apparatus, and system. The method includes a network management entity determines a dual connectivity attribute of a first neighbor cell of a first cell, where the dual connectivity attribute is used to indicate whether the first neighbor cell can be used as a secondary cell of the first cell, the first cell belongs to a first base station, and the first neighbor cell belongs to a second base station; and the network management entity sends configuration information to the first base station, where the configuration information indicates the first base station to configure the dual connectivity attribute of the first neighbor cell.

Communication Method, Apparatus, and System
20230024669 · 2023-01-26 ·

Embodiments of this application provide a communication method, apparatus, and system. The method includes a network management entity determines a dual connectivity attribute of a first neighbor cell of a first cell, where the dual connectivity attribute is used to indicate whether the first neighbor cell can be used as a secondary cell of the first cell, the first cell belongs to a first base station, and the first neighbor cell belongs to a second base station; and the network management entity sends configuration information to the first base station, where the configuration information indicates the first base station to configure the dual connectivity attribute of the first neighbor cell.

Network Configuration Options for Reduced Capability Device Coexistence with Legacy New Radio Devices

Improved network configuration options enable reduced capability (Redcap) devices to coexist with legacy devices. A master information block (MIB) cellBarred indication received in a Synchronization System Block (SSB) by a Redcap device may be ignored by the Redcap device, which may read a System Information Block1 (SIB1) to determine whether to connect to the cell defined by the received SSB. The Redcap device may consider the cell barred if the SIB1 includes a cellBarred indication targeting Redcap devices. The Redcap device may alternately search for an alternative SSB indicated by the SIB1 to determine whether to connect to the cell defined by the alternative SSB. A network node may broadcast Redcap specific and legacy specific SSBs at the same frequency location in a time-multiplexed manner, with each type of device determining cell access based on the received specific SSB. The network node may transmit SSB bursts specifically targeting Redcap devices.

Network Configuration Options for Reduced Capability Device Coexistence with Legacy New Radio Devices

Improved network configuration options enable reduced capability (Redcap) devices to coexist with legacy devices. A master information block (MIB) cellBarred indication received in a Synchronization System Block (SSB) by a Redcap device may be ignored by the Redcap device, which may read a System Information Block1 (SIB1) to determine whether to connect to the cell defined by the received SSB. The Redcap device may consider the cell barred if the SIB1 includes a cellBarred indication targeting Redcap devices. The Redcap device may alternately search for an alternative SSB indicated by the SIB1 to determine whether to connect to the cell defined by the alternative SSB. A network node may broadcast Redcap specific and legacy specific SSBs at the same frequency location in a time-multiplexed manner, with each type of device determining cell access based on the received specific SSB. The network node may transmit SSB bursts specifically targeting Redcap devices.