The present disclosure relates generally to network communication and, more particularly, to methods and systems for reducing congestion on a communication network.
Congestion is a problem that all types of communication networks experience. It typically occurs when too many devices attempt to simultaneously access the same resources. In cellular networks, network congestion can take the form of Access Point Name (APN) congestion. An APN is an identifier used by a user equipment (UE) to identify a network resource when attempting to connect to a resource of the cellular network. For example, if the resource is a packet data network (PDN) network, the APN identifies the PDN and the service or services of the PDN required by the UE. Such services can include a connection to a wireless application protocol (WAP) server, a connection to a multimedia messaging service (MMS). APNs are used in many types of networks, including Third Generation (3G) data networks, general packet radio service (GPRS) networks, and long term evolution (LTE) networks. When it receives the APN from the UE, a network uses the APN to determine the type of connection to create for the UE. For example, the network may use the APN to determine what IP addresses should be assigned to the UE, what security methods should be used, and whether the UE should be connected to a private network. When too many UEs simultaneously request the same resources (e.g., the same radio and core network resources) of the cellular network, “APN congestion” is said to have occurred. There are several possible underlying causes of APN congestion, such as the network having insufficient network element capacity, memory, transaction processing capability, etc. to handle a sudden spike in the number of requests.
The various aspects, features and advantages of the invention will become more fully apparent to those having ordinary skill in the art upon careful consideration of the following Detailed Description thereof with the accompanying drawings described below. The drawings may have been simplified for clarity and are not necessarily drawn to scale.
As previously discussed, APN congestion may be triggered by a variety of events. One example can be found in the context of Machine-Type Communication (MTC) devices. Although many MTC devices may be powered by batteries (or have a battery back-up system), it is anticipated that many will use the commercial power mains as their source of power. Examples of MTC scenarios that may use commercial power mains include in-home or in-business utility monitoring and reporting, i.e., “wireless meter reading,” vending applications, and the like.
It is not uncommon for many MTC devices (e.g., tens of thousands) to rely on the same network (e.g., a single cellular network) and to use the same source of commercial power. These MTC devices may, for example, be located in the same metropolitan area. However, if the commercial power source fails (due to a blackout, for example) and is then subsequently restored, then all of these MTC devices will simultaneously attempt to attach to the network to obtain the same resources. For example, the MTC devices may all attempt to connect to a server to relay diagnostic or telemetry data. The resulting flood of requests for the same resources may cause a network overload and cause APN congestion. The APN congestion would impact not only service to MTC devices, but also service to traditional mobile phone and data card users.
To reduce the likelihood of APN congestion following a power failure/restoration event, a UE (e.g., an MTC device) that is communicatively linked to a network may delay its initial attach request to the communication network. According to an embodiment of the invention, the length of this delay may be a function of a hardware identifier that is unique or nearly unique to the UE. Examples of values that may be used include the UE's International Mobile station Equipment Identity (IMEI), the UE's International Mobile station Equipment Identity and Software Version number (IMEISV), and the UE's manufacturer serial number (MSN). Also, an operator-provided identifier, such as an International Mobile Subscriber Identity (IMSI), may be used. Additionally, one or more of constituent parts of these values may be used. According to another embodiment of the invention, the length of time that the UE delays attachment to the network may be a function of a randomly generated number.
In various implementations, the delayed attach requests may be uniformly distributed over a network operator-defined period of time that takes into account the resources and capacity of the communication network.
In another embodiment of the invention, an operator of a communication network with which multiple UEs are communicating may establish prioritized groupings of UEs within the network as a function of one or more of a hardware identifier and generated random number of each of the UEs.
Turning now to
The SGW 108 acts as an interface between the E-UTRAN and the EPC network 104. SGW 108 also maintains data paths between the eNBs 106 and the PGW 110. When, for example, one or more of the UEs 116 move from an area served by one of the eNBs 106 to an area served by another of the eNBs 106, data packets from the UE 116s are routed through SGW 108. The PGW 110 acts as an interface between the EPC 110 and the PDNs 105. The PGW 110 facilitates policy enforcement (e.g., by applying operator-defined rules for resource allocation and usage), packet filtering (e.g., deep packet inspection for application-type detection), and charging support (e.g., allowing an operator to carry out per-URL charging).
The MME 112 performs signaling and control functions to manage the UEs access to various portions of E-UTRAN 102 and the EPC 104. The MME 112 also assigns network resources to the UEs 116, and controls paging, roaming and handover functions and authentication of the UEs 116. When a UE 116 attempts to attach to the E-UTRAN 102, the MME 112 processes the request, including (1) checking a Home Subscriber Server (HSS) to determine whether the UE is permitted to access the E-UTRAN, and (2) authenticating the UE. The PCRF 114 supports applications that require dynamic policy and/or charging control.
The PDNs 105 include various types of entities, including public networks (such as the Internet) and private networks (such as cellular provider networks or networks used by corporations). One or more of the PDNs 105 may be accessed via a larger PDN, such as the Internet. Each of the PDNs 105 includes one or more Access Points (APs) 105a that controls access to the PDN 105. An AP 105a may be implemented in a number of ways, including as a gateway server.
The E-UTRAN 102 may be distributed over a geographical region. The UEs 116 communicate with one another, with UEs on other networks, with the EPC 104, and with the PDNs 105, among other entities, via the E-UTRAN 102. Such communication may occur in the time, frequency or spatial domain or a combination thereof.
It is to be understood that other types of devices may be used in place of the eNBs 106, including a generic access point, an access terminal, other types of base stations, a Home NodeB (HNB), a Home eNodeB (HeNB), a Macro eNodeB (MeNB), a Donor eNodeB (DeNB), a relay node (RN), a femtocell, a femto-node, a pico-cell, and a network node. Each eNB 106 may include one or more transmitters for downlink transmissions and one or more receivers for uplink transmissions.
Referring still to
Although
The UEs 116 may be implemented as devices that communicate using MTC or Machine-to-Machine (M2M) communications.
To communicate with one or more of the PDNs 105 and access resources therein in an embodiment of the invention, a UE 116 identifies the appropriate PDN 105 by using an APN associated with the PDN 105. More specifically, the UE 116 uses the address of the AP 105a that controls access to the desired PDN 105. In one embodiment, an APN is structured as shown in
In an embodiment of the invention, the length of time that each UE 116 of
In another embodiment of the invention, each UE 116 may generate a random number as an input to an algorithm that calculates a back-off timer value for the UEs initial attach request following a power-failure/power-restoration event.
In yet another embodiment of the invention each UE 116 may use its hardware identifier and/or a random number generator to enable an operator of the E-UTRAN to establish prioritized groupings of UEs within the network. This enables the operator to permit UEs with higher priority to attempt to attach to the E-UTRAN prior to lower priority UEs making an attempt.
Other procedures may be implemented in conjunction with any of the aforesaid techniques. For example, in an embodiment of the invention, each UE 116 (
In any of the above-described embodiments, the UE 116 (
As previously discussed, some embodiments of the invention rely on the use of the IMEI of one or more of the UEs 106 as an input to an algorithm that produces a back-off timer value for attach requests following a power-failure/power-restoration event. Referring to
As an alternative to the use of the IMEI, the UE's International Mobile station Equipment Identity and Software Version Number (IMEISV) may serve as an input to the attach back-off timer algorithm. Referring to
An example of an algorithm that a UE 116 may execute (e.g., on the processor 220 of
Where TBackoff(N,IMEI)=Time delay for initial attach request of the UE following power restoration to the UE, in units of time, as a function of N least significant digits of the UE's IMEI or IMEISV (N, IMEISV if IMEISV is used); Tmin=Minimum delay for UE's initial request following power restoration, in units of time; TMax=Maximum delay for the UE's initial request following power restoration, in units of time; N=Number of least significant digits of IMEI or IMEISV considered in the calculation; and VIMEI(N)=Decimal value of “N” least significant digits of the UE's IMEI or IMEISV (VIMEISV(N) if IEMEISV is used). This is equivalent to IMEI mod 10N or IMEISV mod 10N.
An example of how VIMEI(N) is determined will now be described. Assuming the IMEI value is 356914023690342, then the processor 220 (
V
IMEI(3)=342 , VIMEI(5)=90342, VIMEI(10)=4023690342, etc. [1]
VIMEISV(N) may be calculated in a similar fashion.
An example of the impact of various embodiments of the invention will now be described with respect to the simulation shown in
Table 1 shows the rate of occurrence for a given number of MTC device attach requests per second over the time period of the simulation. The table shows that 25.17% of the time, a network can expect no MTC devices to attempt an attach request for any one second interval over the time period. Similarly, 34.50% of the time, it can expect one MTC device attach request over a given one second interval.
As can be seen, when the value of N exceeds 7 and the number of unique TAC codes present in the MTC devices within an operator's network is small, the values of TBackoff tend to center about values influenced by the lower order digits of the TAC codes. This is illustrated in
Although the previous description focused on the use of IMEI or IMEISV as the input to the calculation of TBackoff, it is understood that other manufacturer hardware identifiers or operator provisioned identifiers could be used as an input to the algorithm. In particular, it should be noted that wireless networks operating in accordance with specifications developed by Third Generation Partnership Project 2 (3GPP2) make use of the MEID (Mobile Equipment Identifier) as the unique terminal hardware identifier. For terminals that may operate in both 3GPP and 3GPP2 networks, a single MEID is provisioned in the device (e.g., in the memory 240 of the UE 200 of
where TBackoff(N,MEID)=Time delay for initial attach request following power restoration, in units of time, as a function of N least significant hexadecimal digits of UE's MEID; TMin=Minimum delay for initial request following power restoration to the UE, in units of time; TMax=Maximum delay for initial request following power restoration to the UE, in units of time; N=Number of least significant hexadecimal digits of the UE's MEID considered in calculation; and VMEID(N)=Decimal value of “N” least significant hexadecimal digits of MEID.
An example of how to determine VMEID(N) will now be described. Assuming that the MEID value is A0000002261F342, equation [2] would be evaluated to:
V
MEID(3)=834, VMEID(5)=127810, VMEID(10)=576844610, etc.
As an alternative to the use of a hardware identifier to uniformly distribute the value of TBackoff for a given UE (e.g., an MTC device) over the range from TMin to TMax, the UE device may use a locally generated random number as input to an algorithm for calculating TBackoff. An example of such an algorithm is shown below:
T
Backoff
=T
min+└rand(0,1)×(Tmax−Tmin)┘ [3]
where TBackoff=Time delay for initial attach request following power restoration, in units of time; TMin=Minimum delay for initial request following power restoration, in units of time; TMax=Maximum delay for initial request following power restoration, in units of time; and rand(0,1)=Random number between 0 and 1.
Table 2 shows the rate of occurrence for a given number of MTC devices attach requests per second over the time period of the simulation. The table shows that 24.63% of the time, a network can expect no MTC devices to attempt an attach request for any one second interval over the time period from TMin to TMax. Similarly, 35.19% of the time, it can expect one MTC device attach request over a given one second interval.
Another embodiment of the invention allows an operator to establish priority groupings of UEs (e.g., MTC devices) within its communication network. This enables an operator to ensure that UEs considered of higher priority re-establish connectivity to the network in advance of lower priority devices following a power failure/restoration event. For example, a network operator may desire that UEs performing more critical tasks, such as theft detection, attach to the network in advance of less critical tasks, such as wireless meter reading.
This may be achieved by assigning each UE a priority value, p, from the set of assignable priority values {1,2, . . . , pMax}. Upon restoration of power following a power failure, the MTC device could use the assigned priority value in algorithm for determining the value of TBackoff(p). Upon the expiration of TBackoff(p), the UE would perform an attach procedure with the serving network.
To ensure more uniformity of UE attach requests over time, the algorithm for calculating TBackoff(p) may incorporate aspects of the techniques previously described using either a hardware identifier or a random number generator within the UE.
An example algorithm for determining TBackoff(p) using a random number generator is provided below:
where TBackoff(p)=Time delay for initial attach request following power restoration, in units of time, as a function of assigned priority of UE; p. TMin=Minimum delay for initial request following power restoration, in units of time; TMax=Maximum delay for initial request following power restoration, in units of time; rand(0,1)=Random number between 0 and 1; and p=Assigned priority of U, where p ∈ {1,2, . . . , pMax}. A lower value of p indicates higher priority. Finally pMax=Maximum value of assigned priority values (integer).
As stated, the above embodiment allows the operator to distribute the UEs attach attempts over time and assign each MTC device to a priority class. The effect of this embodiment is shown in
Referring to
The present disclosure illustrates the architecture, functionality, and operation of possible implementations of systems and methods according to various embodiments of the present invention. In this regard, procedures outlined in the disclosure (for example, in flowchart of
It should also be noted that, in some alternative implementations, functions noted in this disclosure may occur out of the order noted in the figures (e.g., in the flowchart of
While the present disclosure and the best modes thereof have been described in a manner establishing possession and enabling those of ordinary skill to make and use the same, it will be understood and appreciated that there are equivalents to the exemplary embodiments disclosed herein and that modifications and variations may be made thereto without departing from the scope and spirit of the inventions, which are set forth in the appended claims.
Number | Date | Country | |
---|---|---|---|
61669411 | Jul 2012 | US |