The present invention relates generally to communication systems and, in particular, to supporting handover in communication networks.
An unsolicited handover occurs when an 802.16e-based mobile initiates a handover by performing handover ranging at a target base station (BS), which has not been previously notified of an impending handover by the MS's serving BS. An unsolicited inter-ASN handover occurs when a mobile station (MS) begins handover ranging at a target BS controlled by a target access service network (ASN), which is different than its current serving ASN, and when the target BS/ASN has not been notified of an impending handover by the MS's serving ASN. When an unsolicited handover occurs, the target BS/ASN does not have context information for the MS. Context information for the MS may include an Authenticator context or an Authenticator ASN ID (which indicates where the authenticator context may be retrieved from), the Anchor DP ASN ID for the ASN that hosts the MIP (mobile internet protocol) foreign agent and data path function for the MS, and the latest MAC (media access control) information for the MS. Unsolicited handovers result in latency delays and, in the worst case, may cause the failure of real-time applications supported by the mobile prior to the handover.
An authenticator context for an MS includes, for example, a Security Association context and an Authentication Key (AK) context. A Security Association context includes, for example, a Security Association descriptor, traffic encryption key (TEK) parameters, Packet Number, etc., all of which are specified in 802.16e-2005. An Authenticator Key context includes Authentication Key information, AK SN, AK Lifetime, PMS SN, PMK2SN, etc., all which are also specified in 802.16e-2005.
When a handover of an 802.16e mobile is desired, the MS may notify its current serving BS or serving ASN, which controls the serving BS via its ASN-Gateway, that it intends to perform a handover. The serving ASN, in turn, can then notify the target ASN(s), controlling potential target BSs to which the MS may attempt to handover, via the backbone network in order to prepare the target ASN(s) for a handover of the MS. The target BS/ASN may then allow non-contention-based Initial Ranging opportunities and a dedicated bandwidth allocation for the MS to support handover ranging. However, when a target ASN fails to receive prior notification of an impending handover of an MS from the MS's current serving ASN, the handover that occurs is treated as an unsolicited handover.
A serving ASN may fail to notify a target ASN of an impending handover of an MS for many reasons. One reason may be that the serving BS/ASN itself may not have been notified by the mobile that it intended to handover to a particular target BS/ASN. IEEE 802.16e does not mandate that a mobile notify its current serving BS/ASN of its intention to handover to a target BS/ASN, and an MS may autonomously do so without the serving BS/ASN's knowledge. Hence, not all 802.16e/WiMAX (Worldwide Interoperability for Microwave Access) handset vendors may implement such MS-handover-notification functionality in their products.
Another reason a serving BS/ASN may fail to receive notification from the mobile that it intends to handover to a particular target BS/ASN is because a handover notification, sent by the mobile, may not have been received at the serving BS/ASN due to deteriorating wireless conditions over the air, resulting in either the handover notification sent by the MS (802.16e MOB_MSHO-REQ message) being lost over the air or the message not being sent at all. For example, the message may not be sent because the mobile is attempting to expedite the handover to a target BS/ASN with better radio conditions before its call gets dropped. Deteriorating radio conditions over the air is a common occurrence in wireless networks.
A target BS/ASN may also fail to receive prior notification of an impending handover from an MS's current serving BS/ASN when an MS notifies the serving BS/ASN of its intent to handover to one of a set of potential target BSs by sending the MOB_MSHO-REQ message to the serving BS/ASN, which in turn notifies all the potential target BS/ASNs before the handover takes place and confirms a target BS, but the mobile decides at the time of the handover to handover to a different target BS/ASN that was not notified of the impending handover. See e.g., 802.16e-2005 6.3.22.2 HO process and 6.3.22.2.2 HO decision and initiation. This scenario can also occur due to rapidly changing air interface conditions and is supported by the 802.16e standard.
Hence, unsolicited handovers will be a frequent occurrence in 802.16e-based networks such as WiMAX networks.
When a target ASN is notified by the serving ASN of an impending handover from an MS, the target BS/ASN provides bandwidth for the MS to complete handover ranging quickly. However if the target ASN is not informed of the impending handover, an MS initiating an unsolicited handover must range anonymously using a CDMA ranging code and may not receive enough bandwidth from the target BS to complete handover ranging or complete it fast enough. The mobile may need to resend the RNG-REQ message multiple times until all of the TLVs and more specifically for this invention, the Ranging Purpose Indication, which signals a handover, and the Serving BSID can be sent. See e.g., 802.16e-2005 6.3.10.3.3 CDMA handover ranging and automatic adjustment, 6.3.10.3.1 Contention-based initial ranging and automatic adjustments and 6.3.2.3.5 Ranging request (RNG-REQ) message. This means that an unsolicited handover may be delayed by several seconds until the RNG-REQ message and all of the required TLVS for handover are successfully transmitted and the RNG-REQ from the MS is authenticated.
A target BS/ASN can detect that an MS is initiating an unsolicited inter-ASN handover when it receives a RNG-REQ message from an MS. Since the target ASN was not previously notified by the serving ASN previously supporting the mobile of an impending handover from the MS, the target ASN will not have the context information it needs. The target ASN can then use the serving BSID information, if it is provided by the mobile in the RNG-REQ message, to obtain context information for the MS so that it can authenticate and setup data path connections for the mobile, before accepting the handover and admitting the mobile into the network. See e.g., 802.16e-2005 6.3.2.3.5 and 6.3.22.2. If a mobile doesn't provide the Serving BSID TLV in the 802.16e RNG-REQ message when it initiates the unsolicited handover at a target BS/ASN, a full network re-entry procedure and re-authentication will be required since the target ASN has no authenticator information for the MS.
At best, if handover ranging from a mobile is received for an unsolicited handover by a target BS/ASN, if bandwidth is available at the target BS/ASN and granted to the MS for completing handover ranging, and if the MS included the Serving BS-ID TLV in the RNG-REQ message when it initiated the unsolicited handover ranging, latency delays will result while the target ASN prepares for the handover by requesting Authenticator ID, Anchor ASN ID, and the latest MAC context for the MS from the serving ASN (presently requires two messages), by requesting Authenticator context and service authorization information for the MS from the Authenticator ASN to authenticate the MS and the RNG-REQ, and by initiating data path registration with the anchor ASN prior to accepting the handover.
In the worst case scenario, if handover ranging is delayed due to lack of bandwidth for anonymous ranging and/or the MS doesn't provide the Serving BS-ID TLV in the RNG-REQ message during handover ranging, an unsolicited handover can take several seconds to complete and can result in unacceptable handover performance, particularly for real-time services such as VoIP (voice over internet protocol). Handover latency delays can result in delay sensitive applications that may have been active prior to the handover at the Serving ASN to fail while full network re-entry and re-authentication occur.
The prior art (WiMAX Network Stage-3 v&v document section 5.7.2) offers the following solution, with reference to signaling flow 10 on
If the MS doesn't provide the serving BSID when it initiates handover ranging at the target BS, prior art techniques utilize a full network re-entry including re-authentication. This can take several seconds depending on where and how busy the authenticator ASN is. For this and the various other reasons described above, it would be desirable to have a method and apparatus that could better support handover, particularly unsolicited handover, in communication networks.
Specific embodiments of the present invention are disclosed below with reference to
Simplicity and clarity in both illustration and description are sought to effectively enable a person of skill in the art to make, use, and best practice the present invention in view of what is already known in the art. One of skill in the art will appreciate that various modifications and changes may be made to the specific embodiments described below without departing from the spirit and scope of the present invention. Thus, the specification and drawings are to be regarded as illustrative and exemplary rather than restrictive or all-encompassing, and all such modifications to the specific embodiments described below are intended to be included within the scope of the present invention.
Various embodiments are described to better facilitate handover, particularly unsolicited handover, in communication networks. Generally, embodiments of the present invention allow for the ASNs that may be selected for handover by a remote unit to begin receiving information related to such a handover before a request for handover is received from the remote unit. When the serving ASN detects a communication loss with the remote unit, it proceeds to either provide handover-related information for the remote unit to the potential target ASNs or to initiate the transfer of this information. Thus, latency delay may be reduced by various embodiments of the present invention, if this handover-related information can be provided to the target ASN more quickly.
The disclosed embodiments can be more fully understood with reference to
Communication system 100 is depicted in a very generalized manner. In particular, access service network (ASN) 121 is shown communicating with remote unit 101 via wireless interface 111, this interface being in accordance with the particular access technology utilized by ASN 121, such as an IEEE 802.16-based wireless interface. In addition, target ASNs 131 and 141 are depicted as potential handover targets for remote unit 101. Should remote unit 101 select ASN 131 as its target for a handover, then remote unit 101 and ASN 131 would communicate via wireless interface 112, this interface being in accordance with the particular access technology utilized by ASN 131, such as an IEEE 802.16-based wireless interface. (In various places of this detailed description, reference is made to a remote unit selecting an ASN as its handover target. However, in many embodiments a remote unit actually selects a particular ASN component device, such as a base station (BS) for example. Therefore, references to selecting an ASN should be understood to include both selecting the ASN itself or selecting some part of the ASN.) Authenticator ASN 151 and anchor data path (DP) ASN 161 are also depicted, as well as inter-ASN network 110, through which the ASNs of system 100 communicate. Authenticator ASN 151 provides authentication services, while anchor DP ASN 161 provides an anchor DP function such as that described in the WiMAX Forum document entitled “WiMAX End-to-End Network Systems Architecture (Stage 3: Detailed Protocols and Procedures).” Although the authenticator ASN and the anchor DP ASN are different ASNs in system 100, a single ASN may serve as either or both authenticator and/or anchor DP. For example, serving ASN 121 could additionally perform the functions of authenticator and anchor DP in place of ASNs 151 and 161.
Those skilled in the art will recognize that
Thus, given a high-level description, an algorithm, a logic flow, a messaging/signaling flow, and/or a protocol specification, those skilled in the art are aware of the many design and development techniques available to implement a processing unit that performs the given logic. Therefore, ASNs 121 and 131 represent known devices that have been adapted, in accordance with the description herein, to implement multiple embodiments of the present invention. Furthermore, those skilled in the art will recognize that aspects of the present invention may be implemented in and across various physical components and none are necessarily limited to single platform implementations. For example, processing unit 123, transceiver 125, and network interface 127 may be implemented in or across one or more network components, such as one or more base stations (BSs) and/or ASN gateways (ASN-GWs). Similarly, processing unit 133, transceiver 135, and network interface 137 may be implemented in or across one or more network components, such as one or more BSs and/or ASN-GWs.
Remote unit 101 and ASN 121 is shown communicating via a technology-dependent, wireless interface. Remote units, wireless devices, subscriber stations (SSs) or user equipment (UEs), may be thought of as mobile stations (MSs); however, wireless devices are not necessarily mobile nor able to move. In addition, remote unit platforms are known to refer to a wide variety of consumer electronic platforms such as, but not limited to, mobile stations (MSs), access terminals (ATs), terminal equipment, mobile devices, gaming devices, personal computers, and personal digital assistants (PDAs).
Operation of embodiments in accordance with the present invention occurs substantially as follows, first with reference to
In some embodiments, in response to detecting the communication loss, ASN processing unit 123 sends to target ASNs 131 and 141, via network interface 127, authenticator context information and service authorization information for remote unit 101. This information is sent to ASNs 131 and 141 because they are determined to be potential handover targets, either of which (or any of which, if there are more than two potential target ASNs) remote unit 101 could select as its handover target. Depending on the embodiment, the authenticator context information that is sent may include one or more of the following: a Security Association descriptor, traffic encryption key (TEK) parameters, Packet Number, Authentication Key information, AK SN, AK Lifetime, PMS SN, and PMK2SN. Since this list is provided as an example for an 802.16-based system, further information regarding this information may be found in the 802.16e-2005 specification. Depending on the embodiment, the service authorization information that is sent may include information regarding the applicable user service level, such as QoS (quality of service) allowed, the number of service flows that can be supported, etc.
In addition to sending authenticator context information and service authorization information to the potential handover targets, the serving ASN may also send an authenticator ASN identifier, an anchor data path (DP) ASN identifier, MAC (media access control) context information for the remote unit, and/or an indication that the remote unit may initiate a handover with the target ASN. In general, the sooner a target ASN has information such as this for the remote unit, the less latency delay will result from the unsolicited handover.
For example, in the prior art, a target ASN would first receive a request for handover from the remote unit and then proceed to obtain context information from the authenticator ASN and to establish a data path by signaling with the anchor ASN. In contrast, embodiments of the present invention allow for the ASNs that may be selected for handover by the remote unit to begin receiving information related to such a handover before a request for handover is received from the remote unit. However, even if the remote has begun ranging with a target when the serving ASN detects that communication has been lost, the target can allocate dedicated bandwidth for handover ranging as a result of receiving the pushed handover information. When the serving ASN detects a communication loss with the remote unit, it begins to facilitate a handover by the remote unit with the potential target ASNs.
Depending on the embodiment, the serving ASN may take various actions. In some embodiments, in response to detecting the communication loss, ASN processing unit 123 via network interface 127 may request the authenticator context information and/or the service authorization information for the remote unit from authenticator ASN 151 by initiating a context request procedure. Upon receiving this information, ASN 121 can in turn send it to target ASNs 131 and 141, via network interface 127. Of course, in situations in which the serving ASN also happens to be the authenticator ASN a context request procedure is not necessary. The information can just be sent to target ASNs 131 and 141.
In other embodiments, serving ASN 121 may instead request authenticator ASN 151 to send the authenticator context information and/or the service authorization information for remote unit 101 to target ASNs 131 and 141 directly. Thus, ASN processing unit 123 via network interface 127 may send ASN identifiers, which identify target ASNs 131 and 141, to authenticator ASN 151 in response to detecting the communication loss. In this way, the ASNs that may be selected for handover by remote unit 101 can begin receiving information related to such a handover before a request for handover is received from remote unit 101.
In still other embodiments, serving ASN 121 may instead send target ASNs 131 and 141 an authenticator ASN identifier (which identifies ASN 151) and/or an anchor data path (DP) ASN identifier (which identifies ASN 161), in response to detecting the communication loss. Target ASNs 131 and 141 may then proceed to request the authenticator context information and/or the service authorization information for remote unit 101 from authenticator ASN 151. Target ASNs 131 and 141 may also proceed with data path establishment signaling with anchor DP ASN 161; however, the target ASNs may instead wait to proceed with data path establishment until handover by the remote unit to one of them is confirmed.
One of skill in the art will appreciate that various modifications and changes may be made to the specific embodiments described above with respect to
Benefits, other advantages, and solutions to problems have been described above with regard to specific embodiments of the present invention. However, the benefits, advantages, solutions to problems, and any element(s) that may cause or result in such benefits, advantages, or solutions, or cause such benefits, advantages, or solutions to become more pronounced are not to be construed as a critical, required, or essential feature or element of any or all the claims.
As used herein and in the appended claims, the term “comprises,” “comprising,” or any other variation thereof is intended to refer to a non-exclusive inclusion, such that a process, method, article of manufacture, or apparatus that comprises a list of elements does not include only those elements in the list, but may include other elements not expressly listed or inherent to such process, method, article of manufacture, or apparatus. The terms a or an, as used herein, are defined as one or more than one. The term plurality, as used herein, is defined as two or more than two. The term another, as used herein, is defined as at least a second or more. Unless otherwise indicated herein, the use of relational terms, if any, such as first and second, and the like, are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
The terms including and/or having, as used herein, are defined as comprising (i.e., open language). The term coupled, as used herein, is defined as connected, although not necessarily directly, and not necessarily mechanically. Terminology derived from the word “indicating” (e.g., “indicates” and “indication”) are intended to encompass all the various techniques available for communicating or referencing the object being indicated. Some, but not all examples of techniques available for communicating or referencing the object being indicated include the conveyance of the object being indicated, the conveyance of an identifier of the object being indicated, the conveyance of information used to generate the object being indicated, the conveyance of some part or portion of the object being indicated, the conveyance of some derivation of the object being indicated, and the conveyance of some symbol representing the object being indicated. The terms program, computer program, and computer instructions, as used herein, are defined as a sequence of instructions designed for execution on a computer system. This sequence of instructions may include, but is not limited to, a subroutine, a function, a procedure, an object method, an object implementation, an executable application, an applet, a servlet, a shared library/dynamic load library, a source code, an object code and/or an assembly code.
The present application claims priority from a provisional application, Ser. No. 60/869,147, entitled “METHOD AND APPARATUS FOR SUPPORTING HANDOVER IN A COMMUNICATION NETWORK,” filed Dec. 8, 2006, which is commonly owned and incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
60869147 | Dec 2006 | US |