The present disclosure relates to a communication control method in wireless communication systems.
In The Third Generation Partnership Project (3GPP), which is a standardization project for mobile communication systems, Passive IoT has been discussed (e.g., see Non-Patent Documents 1 to 3).
The passive IoT is a technology that supports, for example, ultra-low power devices with ultra-low costs.
Non-Patent Document 1: 3GPP Contribution RP-212688
In a first aspect, a communication control method is a communication control method in a wireless communication system. The communication control method includes a step of transmitting, by a user equipment, communication profile information indicating a time period when communication with a base station is available to the base station, the user equipment having a power supply that generates power using energy harvesting. The communication control method includes a step of performing, by the base station, the communication with the user equipment based on the communication profile information. In a second aspect, a communication control method is a communication control
method in a wireless communication system. The communication control method includes a step of transmitting, by a base station, information regarding a radio resource that communication is available without performing a random access procedure to a user equipment having a power supply that generates power using energy harvesting. The communication control method includes a step of performing, by the user equipment, the communication with the base station by using the radio resource without performing the random access procedure when received power of a received signal from the base station is equal to or greater than a determination RSRP threshold.
In an aspect, a user equipment that obtains power using energy harvesting can appropriately communicate with a base station.
In an embodiment, a wireless communication system is described with reference to the drawings. In the description of the drawings, the same or similar parts are denoted by the same or similar reference signs.
The wireless communication system 1 includes a User Equipment (UE) 100, a 5G radio access network (Next Generation Radio Access Network (NG-RAN)) 10, and a 5G Core Network (5GC) 20, and a Radio Frequency (RF) tag 300. The 5GC 20 may be hereinafter simply referred to as a core network (CN) 20.
The UE 100 is a mobile wireless communication apparatus. The UE 100 may be any apparatus as long as it is used by a user. Examples of the UE 100 include a mobile phone terminal (including a smartphone), a tablet terminal, a notebook PC, a communication module (including a communication card or a chipset), a sensor or an apparatus provided on a sensor, a vehicle or an apparatus provided on a vehicle (Vehicle UE), and a flying object or an apparatus provided on a flying object (Aerial UE).
The NG-RAN 10 includes base stations (referred to as “gNBs” in the 5G system) 200. The gNBs 200 are interconnected via an Xn interface, which is an inter-base station interface. Each gNB 200 manages one or more cells. The gNB 200 performs wireless communication with the UE 100 that has established a connection to the cell of the gNB 200. The gNB 200 has a radio resource management (RRM) function, a function of routing user data (hereinafter simply referred to as “data”), a measurement control function for mobility control and scheduling, and the like. Note that a “cell” is used as a term indicating a minimum unit of a wireless communication area. The “cell” is also used as a term representing a function or a resource for performing wireless communication with the UE 100. One cell belongs to one carrier frequency (hereinafter simply referred to as a “frequency”).
Note that the gNB can be connected to an Evolved Packet Core (EPC) corresponding to a core network of LTE. An LTE base station can also be connected to the 5GC. The LTE base station and the gNB can be connected via an inter-base station interface.
The 5GC 20 includes an Access and Mobility Management Function (AMF) 30 and a User Plane Function (UPF). The AMF 30 performs various types of mobility controls and the like for the UE 100. The AMF 30 manages mobility of the UE 100 by communicating with the UE 100 by using Non-Access Stratum (NAS) signaling. The UPF controls data transfer. The AMF 30 and the UPF are connected to the gNB 200 via an NG interface, which is an interface between the base station and the core network.
An RF tag (or wireless tag, and may be referred to as a “wireless tag”) 300 is a wireless communication apparatus capable of wireless communication with the UE 100 or the gNB 200. The wireless tag 300 is also an information medium including a built-in memory to and from which data or the like is written or read using radio waves or electromagnetic fields. The wireless tag 300 is, for example, an Internet of Things (IoT) device that is extremely small, thin, lightweight, and low complexity.
The receiver 110 performs various types of reception under control of the controller 130. The receiver 110 includes an antenna and a reception device. The reception device converts a radio signal received through the antenna into a baseband signal (a reception signal) and outputs the resulting signal to the controller 130.
The transmitter 120 performs various types of transmission under control of the controller 130. The transmitter 120 includes an antenna and a transmission device. The transmission device converts a baseband signal (a transmission signal) output by the controller 130 into a radio signal and transmits the resulting signal through the antenna.
The controller 130 performs various types of control and processing in the UE 100. Such processing includes processing of respective layers to be described later. The controller 130 includes at least one processor and at least one memory. The memory stores a program to be executed by the processor and information to be used for processing by the processor. The processor may include a baseband processor and a Central Processing Unit (CPU). The baseband processor performs modulation and demodulation, coding and decoding, and the like of a baseband signal. The CPU executes the program stored in the memory to thereby perform various types of processing. In the example described below, operations or processing in the UE 100 may be performed by the controller 130.
The reader/writer 140 includes a Radio Frequency identifier (RFID) antenna 141. The reader/writer 140 communicates with the wireless tag 300 via the RFID antenna 141 under control of the controller 130. The reader/writer 140 communicates with the wireless tag 300 using the RFID technology. The RFID technology is a technology for writing or reading data to and from the wireless tag 300 in a non-contact manner using radio waves or electromagnetic fields. The reader/writer 140 can also cause the wireless tag 300 to generate electric power using radio waves or electromagnetic fields transmitted from the RFID antenna 141. The UE 100 is capable of wireless communication with the wireless tag 300 via the reader/writer 140. Note that the reader/writer 140 may have only a reader function without a writer function.
Note that the reader/writer 140 can also perform wireless communication with the wireless tag 300 using a communication protocol in accordance with the 3GPP. In this case, instead of the RFID antenna 141, an antenna capable of transmitting and receiving a radio signal having a frequency used for the 3GPP may be included in the reader/writer 140. The reader/writer 140 can also perform wireless communication with the wireless tag 300 using backscattering (or backward scattering). In this case, an antenna capable of transmitting and receiving a frequency signal used in the backscattering may be included in the reader/writer 140. Note that backscattering is described in detail later.
The transmitter 210 performs various types of transmission under control of the controller 230. The transmitter 210 includes an antenna and a transmission device. The transmission device converts a baseband signal (a transmission signal) output by the controller 230 into a radio signal and transmits the resulting signal through the antenna.
The receiver 220 performs various types of reception under control of the controller 230. The receiver 220 includes an antenna and a reception device. The reception device converts a radio signal received through the antenna into a baseband signal (a reception signal) and outputs the resulting signal to the controller 230.
The controller 230 performs various types of control and processing in the gNB 200. Such processing includes processing of respective layers to be described later. The controller 230 includes at least one processor and at least one memory. The memory stores a program to be executed by the processor and information to be used for processing by the processor. The processor may include a baseband processor and a CPU. The baseband processor performs modulation and demodulation, coding and decoding, and the like of a baseband signal. The CPU executes the program stored in the memory to thereby perform various types of processing. In an example described below, operations or processing in the gNB 200 may be performed by the controller 230.
The backhaul communicator 240 is connected to a neighboring base station via an Xn interface, which is an inter-base station interface. The backhaul communicator 240 is connected to the AMF 30/UPF via the NG interface between the base station and the core network. Note that the gNB 200 may include a Central Unit (CU) and a Distributed Unit (DU) (i.e., functions are divided), and the two units may be connected via an F1 interface, which is a fronthaul interface.
The reader/writer 250 includes an RFID antenna 251. The reader/writer 250 communicates with the wireless tag 300 via the RFID antenna 251 under control of the controller 230. The reader/writer 250 writes and reads data to and from the wireless tag 300 in a non-contact manner using radio waves or electromagnetic fields transmitted from the RFID antenna 251. The reader/writer 250 can also cause the wireless tag 300 to generate electric power using radio waves or electromagnetic fields transmitted from the RFID antenna 251. The gNB 200 is capable of wireless communication with the wireless tag 300 via the reader/writer 250. Note that the reader/writer 250 may have only the reader function without the writer function.
Note that the reader/writer 250 can also perform wireless communication with the wireless tag 300 using a communication protocol in accordance with the 3GPP. In this case, instead of the RFID antenna 251, an antenna capable of transmitting and receiving a radio signal having a frequency used for the 3GPP may be included in the reader/writer 250. The reader/writer 250 can also perform wireless communication with the wireless tag 300 using backscattering. In this case, an antenna capable of transmitting and receiving a frequency signal used in the backscattering may be included in the reader/writer 250.
The RFID antenna 310 performs wireless communication with the UE 100 or the gNB 200 using the RFID technology. As described above, the RFID technology includes a radio wave type and an electromagnetic induction type.
The radio wave type is a type of transmitting energy and signals using radio waves. In this case, the RFID antenna 310 receives radio waves transmitted from the UE 100 or the gNB 200, and a rectifier circuit provided in the RFID antenna 310 outputs part of the radio waves as DC power supply to the controller 320. This causes the controller 320 to operate. The RFID antenna 310 converts the received radio wave into a reception signal by a demodulation circuit or the like provided in the RFID antenna 310, and outputs the reception signal to the controller 320. Note that the RFID antenna 310 converts a transmission signal received from the controller 320 into a radio signal by a modulation circuit or the like provided in the RFID antenna 310, and transmits the radio signal to the UE 100 or the gNB 200. In this case, the RFID antenna 310 may transmit the radio signal by using a reflected wave of a received radio wave received from the UE 100 or the gNB 200.
The electromagnetic induction type is a type of causing an antenna coil to generate an electromagnetic field by electromagnetic induction and transmitting energy and signals. For the electromagnetic induction type, the RFID antenna 310 is a loop coil antenna. Both the RFID antenna 141 in the UE 100 and the RFID antenna 251 in the gNB 200 are loop coil antennas. The electromagnetic induction type is similar to and/or the same as the radio wave type in that power supply to the controller 320 is obtained by a rectifier circuit, a reception signal is obtained by a demodulation circuit, and a reflected wave may be used.
The controller 320 receives a reception signal from the RFID antenna 310. For example, the controller 320 writes data included in the reception signal to the memory 330 in accordance with indication information included in the reception signal. The controller 320 reads data from the memory 330 in accordance with the indication information included in the reception signal, for example. The controller 320 outputs a transmission signal including the read data to the RFID antenna 310. In the example described below, operations or processing in the wireless tag 300 may be performed by the controller 320.
The memory 330 stores an identifier of the wireless tag 300 (or identification information of the wireless tag 300. Hereinafter, the “identifier” and the “identification information” are not distinguished form each other in some cases), data, and the like. The memory 330 of the wireless tag 300 may adopt the Electronic Product Code (EPC) Class 1 Generation 2 (GEN2) standard conforming to ISO/IEC 18000-63. The memory 330 of the EPC GEN2 standard has four memory areas of a USER memory, a Tag ID (TID) memory, an EPC memory, and a RESERVED memory. The USER memory is an area that can be freely written to and read from by a user using the wireless tag 300. The TID memory is an area that a manufacturer, model information, and the like of the wireless tag 300 are written. The TID memory is a readable and non-writable area. The EPC memory is an area that the identifier of the wireless tag 300 is written. The RESERVED memory is an area that password information of the wireless tag 300 is written. The password information includes password information used to lock writing to the wireless tag 300 and password information used to Kill the wireless tag 300.
The power supply 340 is, for example, a power supply using energy harvesting. An environment for harvesting includes heat, vibration, motion, light, wind, radio wave, or biotechnology. The energy harvesting is a power generation method in which an electromotive force is obtained from the surrounding environment as described above. The energy harvesting is different from a power generation method using a battery such as a secondary battery. However, the wireless tag 300 may be equipped with a battery to generate power by itself like an active tag. For this reason, the power supply 340 may be a battery power supply.
Note that the wireless tag 300 may have only the reader function of reading data or the like from the memory 330 without the writer function of writing data or the like to the memory 330.
The wireless tag 300 can also perform wireless communication with the UE 100 or the gNB 200 using a communication protocol in accordance with the 3GPP. In this case, instead of the RFID antenna 310, an antenna capable of transmitting and receiving a radio signal having a frequency used for the 3GPP may be included in the wireless tag 300.
Hereinafter, a communication method of the wireless tag 300 is described as using the RFID technology, but is not limited thereto. For example, the communication method of the wireless tag 300 may use a 3GPP-compliant communication protocol. The wireless tag 300 may perform communication by using backscattering.
The radio interface protocol of the user plane includes a physical (PHY) layer, a Medium Access Control (MAC) layer, a Radio Link Control (RLC) layer, a Packet Data Convergence Protocol (PDCP) layer, and a Service Data Adaptation Protocol (SDAP) layer.
The PHY layer performs coding and decoding, modulation and demodulation, antenna mapping and demapping, and resource mapping and demapping. Data and control information are transmitted between the PHY layer of the UE 100 and the PHY layer of the gNB 200 via a physical channel. Note that the PHY layer of the UE 100 receives downlink control information (DCI) transmitted from the gNB 200 over a physical downlink control channel (PDCCH). Specifically, the UE 100 blind decodes the PDCCH using a radio network temporary identifier (RNTI) and acquires successfully decoded DCI as DCI addressed to the UE 100. The DCI transmitted from the gNB 200 is appended with CRC parity bits scrambled by the RNTI.
The MAC layer performs priority control of data, retransmission processing through hybrid ARQ (HARQ: Hybrid Automatic Repeat reQuest), a random access procedure, and the like. Data and control information are transmitted between the MAC layer of the UE 100 and the MAC layer of the gNB 200 via a transport channel. The MAC layer of the gNB 200 includes a scheduler. The scheduler decides transport formats (transport block sizes, Modulation and Coding Schemes (MCSs)) in the uplink and the downlink and resource blocks to be allocated to the UE 100.
The RLC layer transmits data to the RLC layer on the reception side by using functions of the MAC layer and the PHY layer. Data and control information are transmitted between the RLC layer of the UE 100 and the RLC layer of the gNB 200 via a logical channel.
The PDCP layer performs header compression/decompression, encryption/decryption, and the like.
The SDAP layer performs mapping between an IP flow as the unit of Quality of Service (QOS) control performed by a core network and a radio bearer as the unit of QoS control performed by an Access Stratum (AS). Note that, when the RAN is connected to the EPC, the SDAP need not be provided.
The protocol stack of the radio interface of the control plane includes a Radio Resource Control (RRC) layer and a Non-Access Stratum (NAS) layer instead of the SDAP layer illustrated in
RRC signaling for various configurations is transmitted between the RRC layer of the UE 100 and the RRC layer of the gNB 200. The RRC layer controls a logical channel, a transport channel, and a physical channel according to establishment, re-establishment, and release of a radio bearer. When a connection (RRC connection) between the RRC of the UE 100 and the RRC of the gNB 200 is present, the UE 100 is in an RRC connected state. When no connection (RRC connection) between the RRC of the UE 100 and the RRC of the gNB 200 is present, the UE 100 is in an RRC idle state. When the connection between the RRC of the UE 100 and the RRC of the gNB 200 is suspended, the UE 100 is in an RRC inactive state.
The NAS, which is positioned upper than the RRC layer, performs session management, mobility management, and the like. NAS signaling is transmitted between the NAS of the UE 100 and the NAS of the AMF 30. Note that the UE 100 includes an application layer other than the protocol of the radio interface. A layer lower than the NAS is referred to as Access Stratum (AS).
The passive IoT device supports an ultra-low power device. Due to the low power consumption of the passive IoT, the passive IoT device may not need to use a battery or may use the energy harvesting.
Even the passive IoT devices may be equipped with a power supply. However, even such a case can be realized by a small-capacity battery and/or the energy harvesting on the premise of low power consumption, and thus low cost can be realized as compared with a device using a large-capacity battery.
On the other hand, since the passive IoT device performs communication using low power as compared with the UE 100 of the 5G system, a coverage range is narrow. A communication time is limited and an amount of data that can be transmitted and received at a time is small. In the passive IoT, interference may occur when multiple passive IoT devices communicate at the same time. Therefore, in the passive IoT, communication may be unstable and irregular.
The passive IoT may target the RFID, for example. Types of the RFID include a passive tag, an active tag, and a semi-passive tag (or a semi-active tag). The passive tag is a wireless tag that uses radio waves from a reader as a power supply. The passive tag is assumed to be mainly used for the passive IoT. The active tag is a wireless tag that uses a battery built in the wireless tag as a power supply. The semi-passive tag is a wireless tag that normally operates as a passive tag and operates as an active tag in response to a request from a reader. The passive IoT may target, for example, the semi-passive tag or the active tag.
Targets for the passive IoT include the backscattering, for example. The backscattering refers to reflection of a radio wave, a particle, or a signal back to a direction from which the radio wave, the particle, or the signal came. As described above, the backscattering in the passive IoT is used in the communication method using the reflected wave. The wireless tag 300 can modulate a reflected wave to transmit data by using the reflected wave.
Further, the targets for the passive IoT include the energy harvesting, for example. As described above, the energy harvesting is the power generation in which power is obtained from the environment. For example, in the energy harvesting, energy such as vibration or heat is converted into electrical energy to generate power. The energy harvesting may include solar panels or windmills. The low power consumption of the passive IoT allows the energy harvesting to be used as a power supply. Unlike a battery, the energy harvesting does not need to be charged or replaced, and thus can operate for a long time without maintenance.
However, when the passive IoT is accommodated in the mobile communication system, some problems may be considered.
When viewed from the network 500 (CN 20 or gNB 200), a problem is whether the wireless tag 300 is managed as a wireless tag or the UE 100. In the network 500, when the wireless tag 300 can be managed as the UE 100, the wireless tag 300 can be also handled in the same manner as the UE 100.
A problem is also whether the reader function (and/or writer function) is performed by the UE 100 or the gNB 200. Not only the UE 100 but also the gNB 200 can directly communicate with the wireless tag 300.
A further problem is whether the link between the communication node 400 and the wireless tag 300 uses existing specifications such as the RFID or uses the 3GPP-compliant communication protocol. Alternatively, a problem is whether a 3GPP-compliant communication band is used or a communication band for RFID (13.56 MHz band, 900 MHz band, or the like) is used.
As described above, there are several problems in order to accommodate the passive IoT in the mobile communication system. It will be understood that all or part of the above-described problems can be solved in the embodiments described below.
As illustrated in
An example of
In the first embodiment, a case is described in which the communication node 400 is the UE 100 and the network 500 is the gNB 200. Furthermore, the first embodiment describes a case in which the UE 100 is the wireless tag 300.
Here, the UE 100 has a power supply that generates power using the energy harvesting.
The UE 100 does not use a battery such as a secondary battery. As such, the UE 100 operates as a passive IoT device. Hereinafter, a UE operating as a passive IoT device may be referred to as a “PIOT UE”. Note that the UE 100 (PIOT UE) may operate using the energy harvesting and an auxiliary secondary battery.
Referring back to
That is, the PIOT UE 100 uses the energy harvesting. Therefore, the PIOT UE 100 is affected by the surrounding environment in terms of obtaining electric power. A magnitude of the electric power is smaller than that of the battery. Therefore, in the PIOT UE 100, the power supply may not be stable, and its capacitance may be limited.
The PIOT UE 100 also has a transmit power smaller than the UE using the battery. Therefore, the PIOT UE 100 may perform communication only in a small area (or a localized area) compared to the UE using the battery.
Further, the PIOT UE 100 may take time to obtain the electric power needed for communication (i.e., in charging). A charging time depends on the type of energy harvesting.
Moreover, the PIOT UE 100 cannot perform communication during charging. Furthermore, the PIOT UE 100, when being charged and then discharged, cannot perform communication.
In the 3GPP, the specifications of Discontinuous Reception (DRX) (or extended DRX (eDRX)) technology have been drafted. The DRX is a technology to stop transmission and reception of a radio signal for a time period during which a paging signal is not received. This can reduce a power consumption of the UE and extend a battery life of the UE. Therefore, it can be said that the purpose of the DRX is to reduce the power consumption of the UE with limited battery capacity and extend the battery life.
On the other hand, the PIOT UE 100 using the energy harvesting is assumed to intermittently operate such that communication is available for a certain time period and not available for other time periods. The energy harvesting is a technique different from the DRX in that the intermittent operation is performed that has the communication available time period and the communication not available time period.
Therefore, the problem of the first embodiment is that even the UE (PIOT UE) 100 generating power using the energy harvesting can appropriately communicate with the gNB 200.
Therefore, the PIOT UE 100 transmits the time period when communication with the gNB 200 is available to the gNB 200. To be more specific, first, the user equipment (e.g., the PIOT UE 100) transmits communication profile information indicating a time period when communication with the base station (e.g., a gNB 200) is available to the base station, the user equipment having the power supply (e.g., the power supply 150) that generates power using energy harvesting. Second, the base station performs the communication with the user equipment based on the communication profile information.
As described above, for example, the gNB 200 can grasp the time period when communication with the PIOT UE 100 is available, based on the communication profile information. Therefore, the gNB 200 can decide a transmission timing appropriate for the PIOT UE 100 or the like. Therefore, the PIOT UE 100 can appropriately communicate with the gNB 200.
As illustrated in
First, the communication profile information may be a communication available time period representing a time period from when the communication ends in the PIOT UE 100 to when next communication is available. For example, the PIOT UE 100 may calculate the communication available time period based on a charging time required for charging. The communication available time period may be the charging time.
Second, the communication profile information may be a sustainable time period representing a communication time period sustainable by the PIOT UE 100 in one communication. For example, the PIOT UE 100 may use a discharging time calculated from a battery capacity (e.g., a capacitor capacity) and a power consumption of the power supply 150 as the sustainable time. The sustainable time may be divided for each activity. For example, a sustainable time for DL monitoring (e.g. monitoring of paging signals), a sustainable time for DL data reception, a sustainable time for UL data transmission, or the like may be used.
Third, the communication profile information may be adequately generated by the PIOT UE 100. The communication profile information may also be written in advance in a memory of the PIOT UE 100 (pre-configuration).
Fourth, the communication profile information may be represented by an identifier for each communication profile. That is, in the communication profile information, an identifier is assigned to each communication profile, and the communication profile information may have a different value depending on the identifier. For example, the identifier “1” of the communication profile information represents the communication profile information in which the communication available time period is “10 minutes” and the sustainable time is “30 minutes”. For example, the identifier “2” of the communication profile information represents the communication profile information in which the communication available time period is “15 minutes” and the sustainable time is “45 minutes”. The transmitting the communication profile information by using the identifier can reduce an amount of transmitted information compared to transmitting the communication profile information itself. This can reduce the power consumption of the PIOT UE 100. The identifier may be hard coded in the specification. The identifier may also be provided from the gNB 200 (or the CN 20) to the PIOT UE 100. The PIOT UE 100 can select an identifier of the optimum communication profile information according to communication characteristics of the PIOT UE 100 itself and transmit the identifier to the gNB 200 (or the CN 20).
Note that the communication profile information may include information specifying the type of downlink signaling from the gNB 200 to the PIOT UE 100. For example, the information can specify, for example, a NAS message or an RRC message.
The PIOT UE 100 may transmit the communication profile information in either an RRC message including the communication profile information or a NAS message including the communication profile information. Alternatively, the communication profile information may be transmitted by way of the MAC CE or UCI.
In step S11, the gNB 200 decides the transmission timing of the DL data to the PIOT UE 100 or the like based on the communication profile information. For example, the gNB 200 may perform the following processing. That is, the gNB 200, upon performing (or completing) the communication with the PIOT UE 100, starts a timer in which the communication available time period is set. The gNB 200 does not communicate with the PIOT UE 100 while the timer is running. The gNB 200 communicates with the PIOT UE 100 when the timer expires. Alternatively, the gNB 200 may adjust the DRX (or eDRX) parameters instead of the timer. The gNB 200 may perform communication with the PIOT UE 100 through the DRX (or eDRX). In this case, the gNB 200 may adjust the DRX parameters so that communication with the PIOT UE 100 is available during the communication available time period.
A scenario is assumed in which the PIOT UE 100, near the gNB 200, communicates with the gNB 200. In such a scenario, the PIOT UE 100 may not need to adjust a Timing Advance value. The timing advance value is a value for adjusting the transmission timing for the UE so that signals from the UEs located at different distances can be received within a receive window of the gNB 200.
On the other hand, in the random access procedure, the gNB 200 calculates the TA value based on a reception timing of a preamble (PRACH) (MSG1) received from the UE. The gNB 200 notifies the UE of the TA value by transmitting a response message (MSG2) including the TA value to the UE. However, since the PIOT UE 100, when located near the gNB 200, may not need to adjust the TA value, the PIOT UE 100 can perform communication with the gNB 200 without performing the random access procedure.
Communication with the gNB 200 without performing the random access procedure may be referred to as “RACH-less communication”. The second embodiment describes the RACH-less communication by the PIOT UE 100.
The PUR is triggered when the following three conditions are satisfied. First, a valid configuration for PUR (e.g., the UE has a valid PUR resource) is required to be configured. Second, the TA timer for PUR is required to be not expired (or be not set). Third, a difference between a past RSRP value and a current RSRP value is required to be equal to or less than a PUR variation threshold.
In the PUR, the UE uses the TA value without change. Then, the UE confirms that the distance to the gNB 200 is within an allowable range based on the PUR variable threshold, and performs the PUR.
The SDT supports a RACH-based SDT and a Configured Grant (CG)-based SDT. In the RACH-based SDT, the SDT is performed using the random access procedure. In the CG-based SDT, the SDT is performed using a configured resource without performing the random access procedure.
Not limited to the RACH-based SDT, in general, an RSRP threshold may be used to select a random access procedure by a 2-step RACH. Based on the RSRP threshold, either the random access procedure by the 2-step RACH or the random access procedure by a 4-step RACH is selected. The RSRP threshold is used to suppress a failure of the random access procedure due to the 2-step RACH. In the random access procedure by the 2-step RACH, the TA value is taken into account.
To be more specific, first, the base station (e.g., the gNB 200) transmits information regarding a radio resource that communication is available without performing the random access procedure to the user equipment (e.g., the PIOT UE 100) having a power supply that generates power using the energy harvesting. Second, the user equipment performs the communication with the base station by using the radio resource without performing the random access procedure when the received power of the received signal from the base station is equal to or greater than the determination RSRP threshold.
In this way, when the received power is equal to or greater than the determination RSRP threshold, the PIOT UE 100 can be assumed to be located near the gNB 200, thus the PIOT UE 100 communicates with the gNB 200 by using the radio resource received from the gNB 200 without performing the random access procedure. Therefore, the PIOT UE 100 can appropriately communicate with the gNB 200. In addition, since the PIOT UE 100 can communicate with the gNB 200 without performing the random access procedure, the power consumption can also be reduced.
Note that in the above-described PUR, a difference from a past RSRP value is used. Therefore, a memory (area) for storing the past RSRP value and arithmetic processing for comparing the past RSRP value with the current RSRP value are required. However, in the second embodiment, the past RSRP value is not used. Therefore, in the second embodiment, a memory capacity and the arithmetic processing can be reduced. Note that in the second embodiment, when the PIOT UE 100 performs RACH-less communication, the TA value is set to “0”. Therefore, the TA value may not need to be diverted as in the PUR.
The RSRP threshold value used in the 2-step RACH selection described above is used to suppress the failure of the random access procedure due to the 2-step RACH. In contrast, the determination RSRP threshold according to the second embodiment is used to confirm whether the PIOT UE 100 is located near the gNB 200. Therefore, the determination RSRP threshold according to the second embodiment is used for a purpose different from the RSRP threshold used in the 2-step RACH selection.
Note that as described above, the determination RSRP threshold is a threshold used for determining whether the PIOT UE 100 performs the random access procedure.
As illustrated in
In step S21, the gNB 200 transmits information regarding a RACH-less communication radio resource to the PIOT UE 100. That is, the gNB 200 transmits the information regarding the radio resource that communication is available without performing the random access procedure to the PIOT UE 100. The gNB 200 transmits the information regarding the radio resource included in a system information block (SIB) or an RRC message (dedicated signaling).
In step S22, the PIOT UE 100 generates UL data. For example, the AS layer of the PIOT UE 100 receives UL data from a higher layer (e.g., an application layer, or the like). The PIOT UE 100 may receive a paging message (or a reader signal) from the gNB 200. The latter is on the premise that the PIOT UE 100 is in the RRC idle state or an RRC inactive state.
In step S23, the PIOT UE 100 measures received power (RSRP) of a signal (i.e., a reference signal) transmitted from the gNB 200. The PIOT UE 100 compares the measurement result with the determination RSRP threshold.
Here, when [measurement result]<[determination threshold] holds, the PIOT UE 100 determines that the random access procedure is required. In this case, the PIOT UE 100 initiates a random access procedure. Alternatively, the PIOT UE 100 does not perform data transmission. When [measurement result]<[determination threshold] holds, the PIOT UE 100 performs a normal random access procedure because a distance from the gNB 200 is equal to or greater than a certain distance.
On the other hand, when [measurement result]≥[determination threshold] holds, the PIOT UE 100 determines that the random access procedure is not required. At this time, the PIOT UE 100 sets the TA value to “0”. The PIOT UE 100 determines that the distance from the gNB 200 is within a certain range and thus the TA value does not need to be adjusted, and sets the TA value to “0”. The PIOT UE 100 selects the RACH-less communication radio resource received in step S21. The following description is given on the assumption of [measurement results]≥[determination thresholds].
Then, in step S24, the PIOT UE 100 starts the RACH-less communication using the RACH-less communication radio resource without performing the random access procedure. For example, the PIOT UE 100 may transmit a message 3 (MSG3). The PIOT UE 100 may transmit data.
Circuits for executing processing performed by the UE 100 (PIOT UE 100) or the gNB 200 may be integrated, and at least a part of the UE 100 (PIOT UE 100) or the gNB 200 may be implemented as a semiconductor integrated circuit (a chipset or a System on a chip (SoC)).
The phrases “based on” and “depending on” used in the present disclosure do not mean “based only on” and “only depending on”, unless specifically stated otherwise. The phrase “based on” means both “based only on” and “based at least in part on”. The phrase “depending on” means both “only depending on” and “at least partially depending on”. The terms “include”, “comprise”, and variations thereof do not mean “include only items stated”, but instead mean “may include only items stated” or “may include not only the items stated but also other items”. The term “or” used in the present disclosure is not intended to be “exclusive or”. Any references to elements using designations such as “first” and “second” as used in the present disclosure do not generally limit the quantity or order of those elements. These designations may be used herein as a convenient method of distinguishing between two or more elements. Thus, a reference to first and second elements does not mean that only two elements may be employed there or that the first element needs to precede the second element in some manner. For example, when the English articles such as “a”, “an”, and “the” are added in the present disclosure through translation, these articles include the plural unless clearly indicated otherwise in context.
Embodiments have been described above in detail with reference to the drawings, but specific configurations are not limited to those described above, and various design variation can be made without departing from the gist of the present disclosure. All or some of the embodiments, operations, processes, and steps may be combined without being inconsistent.
Number | Date | Country | Kind |
---|---|---|---|
2022-032195 | Mar 2022 | JP | national |
The present application is a continuation based on PCT Application No. PCT/JP2023/007496, filed on Mar. 1, 2023, which claims the benefit of Japanese Patent Application No. 2022-032195 filed on Mar. 2, 2022. The content of which is incorporated by reference herein in their entirety.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/JP2023/007496 | Mar 2023 | WO |
Child | 18822875 | US |