H04W36/30

SYSTEM AND METHOD FOR GENERATING AND USING A DIFFERENTIATED NEIGHBOR LIST

Disclosed are systems and methods for providing a differentiated neighbor list that can be individually generated for a specific service (e.g., per service) based on network service information, which can include, but is not limited to, a user equipment (UE) group identifier (ID), network slicing and/or quality of service (QoS) flow, and the like. Neighbors within the differentiated list can be characterized based on, but not limited to, service types, distance to devices, transport costs, service locations, and the like, or some combination thereof. The disclosed framework can generate and dynamically update a differentiated neighbor list for specific types of services so that optimal neighbor selection is performed for the type of service a UE is operating within to ensure that a network connection is maintained at a threshold satisfying QoS.

SYSTEM AND METHOD FOR GENERATING AND USING A DIFFERENTIATED NEIGHBOR LIST

Disclosed are systems and methods for providing a differentiated neighbor list that can be individually generated for a specific service (e.g., per service) based on network service information, which can include, but is not limited to, a user equipment (UE) group identifier (ID), network slicing and/or quality of service (QoS) flow, and the like. Neighbors within the differentiated list can be characterized based on, but not limited to, service types, distance to devices, transport costs, service locations, and the like, or some combination thereof. The disclosed framework can generate and dynamically update a differentiated neighbor list for specific types of services so that optimal neighbor selection is performed for the type of service a UE is operating within to ensure that a network connection is maintained at a threshold satisfying QoS.

Selection of rats for handovers from 4G

As described herein, one of a third generation (3G) radio access network (RAN) or a fifth generation (5G) RAN may be selected to receive a handover of a communication session from a fourth generation (4G) RAN. The 3G RAN or 5G RAN may be selected based on at least one of performance measurements for the 3G RAN and the 5G RAN, a preference for the 3G RAN or the 5G RAN, or a performance threshold for the 3G RAN or for the 5G RAN. The handover to the selected one of the 3G RAN or 5G RAN may then be initiated.

Selection of rats for handovers from 4G

As described herein, one of a third generation (3G) radio access network (RAN) or a fifth generation (5G) RAN may be selected to receive a handover of a communication session from a fourth generation (4G) RAN. The 3G RAN or 5G RAN may be selected based on at least one of performance measurements for the 3G RAN and the 5G RAN, a preference for the 3G RAN or the 5G RAN, or a performance threshold for the 3G RAN or for the 5G RAN. The handover to the selected one of the 3G RAN or 5G RAN may then be initiated.

Method and apparatus for validating stored system information

A system for converging fifth generation (5G) communication systems for supporting higher data rates beyond fourth generation (4G) systems with a technology for Internet of things (IoT) is provided. The communication method and system may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A system is provided for determining system information validity by acquiring and storing a first system information block and other system information, including information on a public land mobile network (PLMN) identity and a value tag, and determining whether the stored system information is valid for the cell. As another example, a terminal and base station are provided for performing beam failure detection and a recovery procedure using first and second configuration information for beam failure recovery (BFR) and if failure is detected, initiating a first random access (RA) procedure and if second configuration information is received while the first RA procedure is ongoing, terminating the first RA procedure and initiating a second RA procedure based on the second configuration information.

METHOD AND APPARATUS FOR CELL UPDATE WHILE IN AN ENHANCED CELL_FACH STATE

A method and apparatus for cell update while in a Cell_FACH state are disclosed. After selecting a target cell, system information is read from the target cell including high speed downlink shared channel (HS-DSCH) common system information. A radio network temporary identity (RNTI) received in a source cell is cleared and a variable HS_DSCH_RECEPTION is set to TRUE. An HS-DSCH medium access control (MAC-hs) entity is configured based on the HS-DSCH common system information. High speed downlink packet access (HSDPA) transmission is then received in the target cell. A CELL UPDATE message is sent to notify of a cell change. The HSDPA transmission may be received using a common H-RNTI broadcast in the system information, a reserved H-RNTI as requested in a CELL UPDATE message, or a temporary identity which is a subset of a U-RNTI. The MAC-hs entity may be reset.

METHOD AND APPARATUS FOR CELL UPDATE WHILE IN AN ENHANCED CELL_FACH STATE

A method and apparatus for cell update while in a Cell_FACH state are disclosed. After selecting a target cell, system information is read from the target cell including high speed downlink shared channel (HS-DSCH) common system information. A radio network temporary identity (RNTI) received in a source cell is cleared and a variable HS_DSCH_RECEPTION is set to TRUE. An HS-DSCH medium access control (MAC-hs) entity is configured based on the HS-DSCH common system information. High speed downlink packet access (HSDPA) transmission is then received in the target cell. A CELL UPDATE message is sent to notify of a cell change. The HSDPA transmission may be received using a common H-RNTI broadcast in the system information, a reserved H-RNTI as requested in a CELL UPDATE message, or a temporary identity which is a subset of a U-RNTI. The MAC-hs entity may be reset.

MACHINE-TO-MACHINE (M2M) TERMINAL, BASE STATION, METHOD, AND COMPUTER READABLE MEDIUM
20180007597 · 2018-01-04 · ·

A Machine-to-machine (M2M) terminal (11) comprises a radio communication unit (111) and a controller (112). The radio communication unit (111) is configured to communicate with a base station (13). The controller (112) is configured to change at least one of a cell selection operation, a cell reselection operation, and a handover operation according to whether a specific coverage enhancement processing is required or according to whether the specific coverage enhancement processing is supported by at least one of a cell (13) in which the M2M terminal (11) camps on and a neighbouring cell (14) of the cell (13) which the M2M terminal (11) camps on. It is thus possible to provide an improved technique for allowing the M2M terminal that is supporting a special coverage enhancement processing for M2M terminals to camp on an appropriate cell.

MACHINE-TO-MACHINE (M2M) TERMINAL, BASE STATION, METHOD, AND COMPUTER READABLE MEDIUM
20180007597 · 2018-01-04 · ·

A Machine-to-machine (M2M) terminal (11) comprises a radio communication unit (111) and a controller (112). The radio communication unit (111) is configured to communicate with a base station (13). The controller (112) is configured to change at least one of a cell selection operation, a cell reselection operation, and a handover operation according to whether a specific coverage enhancement processing is required or according to whether the specific coverage enhancement processing is supported by at least one of a cell (13) in which the M2M terminal (11) camps on and a neighbouring cell (14) of the cell (13) which the M2M terminal (11) camps on. It is thus possible to provide an improved technique for allowing the M2M terminal that is supporting a special coverage enhancement processing for M2M terminals to camp on an appropriate cell.

METHODS AND ARRANGEMENTS FOR MANAGING RADIO LINK FAILURES IN A WIRELESS COMMUNICATION NETWORK

Radio link failures, “RLF”, of a wireless device served by a wireless communication network are managed. A first, default, RLF procedure is associated with at least a first type of wireless devices supported by the wireless communication network. The wireless device obtains, e.g. received from a network node information indicative of a second RLF procedure based on that the wireless device is of a second type having an improved radio coverage capability compared to the first type. The wireless device applies, based on the obtained information, said second RLF procedure.