The techniques and apparatus disclosed herein relate generally to wireless communications networks, and relate more particularly to the establishment of neighbor relations in such networks, where new neighbor relations are established based on forced accesses to unknown nodes.
A base station 2 contains a number of receivers and transmitters to give radio coverage for one or more cells. Each base station 2 is connected to network “backbone”, or core network infrastructure (not shown), which enables communications between base stations and other networks. The example system of
An important concept in such a network is the cell and its neighbors. During a call, for example, a mobile terminal 4 typically moves around among the cells; moving from one cell to one of its neighbors, repeatedly. A list of the known neighbors, the so-called “neighbor cell set”, is important for the network 1 to enable reliable handover between cells of a mobile terminal 4. The network 1 can store information relating to a neighbor set, typically for each cell. The information can further be modified to be suitable for each mobile terminal, e.g., to adapt to mobile terminal measurement capabilities. The neighbor set is used for evaluation and handover of a mobile terminal from one cell to another as the mobile terminal crosses a cell boundary. It will be readily appreciated that even in simple wireless communications networks the cell boundaries are not sharply defined, but will in practice be somewhat blurred as the range of the base stations will overlap with one another.
In existing systems, the mobile terminal 4 detects cell operating parameters for neighboring cells. The measured operating parameters in a Wideband Code-Division Multiple Access (WCDMA) system, for example, are typically the scramble code (an encoding code which is non-uniquely assigned to the cell), a signal strength, a signal quality, and timing information. The mobile terminal measures the operating parameters of each neighbor cell (Ncell) and reports one or more of these parameters back to the network 1. When the quality of a neighbor cell is considered better than the current serving cell, a handover from the serving cell to the chosen neighbor cell may be triggered by the network, such that the neighbor cell then becomes the serving cell for the mobile terminal.
It will be apparent that it is necessary in such systems to provide a mechanism for identifying each cell. In fact, each cell can typically be identified in more than one way. For example, each cell has an identity that is unique within its own “domain”, that is, the part of the system using the same network backbone. This identity may be unique within the mobile network operator's network, and may even be unique amongst all networks worldwide. Such an identity is referred to herein as a unique cell identity. This unique cell identity may also be referred to as the Cell Global Identity (CGI).
In addition, a cell can also be identified on the basis of a non-unique cell identity that may be reused within the network, but may for example nevertheless be useful because it can be retrieved easily from the cell in question. For example, in the case of a WCDMA (wideband code division multiple access) system, the scrambling code may be a useful non-unique cell identity. In the case of a GSM system, a combination of the frequency and the base station identity code (BSIC) may be used as a non-unique cell identity. The non-unique cell identity is also referred to herein as the cell-id.
Typically, in a WCDMA (wideband code division multiple access) system, the mobile terminal detects synchronization channel transmissions from surrounding cells, in order to determine identifier (scramble code) and timing information. Pilot signals can then be detected to determine signal strength and quality measurement. The mobile terminal 4 would then only report cells which have measurements above predetermined threshold levels. Similarly, in a Long-Term Evolution (LTE) wireless system, the mobile terminal detects two synchronization signals, the Primary Synchronization Signal (PSS) and the Secondary Synchronization Signal (SSS), for each surrounding cell, to determine the cell identifier, which is referred to as a physical cell identifier (PCI), and to determine timing information for the signal. Reference signals from the neighbor cells are measured and, if the measurements fulfill pre-configured conditions, the measurements are reported to the network.
In either case, and in other wireless networks, when the mobile terminal 4 reports the neighbor cell signal quality measurements to the network, the cells' respective identities become important. In both WCDMA and LTE systems, cell identities used at the physical layer are reused for more than one cell, when the entire network is considered. The network node receiving the measurement report, e.g., the eNodeB (or eNB) in an LTE system, needs to be able to map the cell identity associated with the cell measurement to a global identifier, and generally needs to be aware of the identities of the cells in the vicinity of the cell or cells served by the network node. This information can be generally referred to as “neighbor relations” or “neighbor cell relations,” and in an LTE eNodeB, for example, comprises, for each cell served by the eNodeB, a table, which may be referred to as a “neighbor relation table,” this table containing a global cell identifier and a physical cell identifier for each known neighbor to the served cell.
LTE networks may support Automatic Neighbor Relations (ANR) functionality, which provides for the automatic updating of the neighbor relation table. When a mobile terminal, referred to as a user equipment or “UE” in LTE documentation, discovers a new cell's E-CGI, which may be obtained from the system information broadcast in that cell, it reports the detected E-CGI to the serving eNB, which then can update the neighbor relation table with the newly discovered neighbor. An eNB can also configure a UE to perform measurements and detect cells on other RATS and/or other frequencies. The UE reports the physical cell identities of detected cells in those RATS and/or other frequencies—the eNB may then instruct the UE to read the global cell identifiers and other parameters for one or more of those detected cells, for updating its neighbor relation table.
In the development of technical solutions for so-called 5th-generation wireless networks, one design principle under consideration is the concept of an ultra-lean design, where “always-on” signals transmitted by the network are minimized. The expected benefit from this design principle is expected to be significantly lower network energy consumption, better scalability, higher degree of forward compatibility during the RAT evolution phase, lower interference from system overhead signals and consequently higher throughput in low load scenario, and improved support for user centric beam-forming.
Further, advanced antenna systems (AAS) are expected to play a key role in these emerging wireless networks, since AAS technology has advanced significantly in recent years and a rapid technology development in the years to come is foreseen. Hence it is natural to assume that advanced antenna systems in general and massive multiple-input multiple-output (MIMO) transmission and reception in particular will be cornerstones of future wireless systems. One implication of this is a possible shift from a cell-centric view of network planning and mobility to a beam-centric view, where a given radio access point may support many dynamically-managed beams.
One implication arising from these likely developments in 5th-generation networks is that, in deployments with large antenna arrays and many possible candidate beam configurations, all beams cannot transmit reference and measurement signals in an always-on, static manner for the sake of mobility measurements. Instead, the connected access nodes will select a relevant set of mobility beams to transmit, only when required. Each mobility beam may carry a unique Mobility Reference signal (MRS). The UE can then be instructed to measure on each MRS and report to the system. Based on some criteria, such as the difference in MRS strength between two mobility beams, a handover can be triggered. For mobility to work efficiently, however, the involved access nodes (ANs) need to maintain beam neighbor lists, exchange beam information, and coordinate MRS usage. The use of the ultra-lean design principle, coupled with the dynamic use of mobility beams, will present new challenges for ANR in these 5th-generation networks.
The LTE solution for establishing neighbor base station relation establishment is based on the always-on reference signals in LTE, as well as the routine broadcasting, in system information, of unique cell identifiers (referred to as Cell Global ID). But this always-on signaling and the transmission of unique cell identifiers may be absent in next-generation wireless networks by design. This means that a new approach to neighbor relations is needed.
In some embodiments of the techniques and apparatus described herein, a first node (e.g., a serving access node) receives a UE report containing a mobility reference signal (MRS) sent by a second node, where the second node is unknown to the first node. In other words, the first node does not possess an association between the MRS and a unique node identifier. In this situation, the first node may force the UE to establish connection with the unknown second node. This may be done, for example, by configuring the UE so that it does not establish a connection with any node that is already known to the first node, i.e., any node for which the first node already possesses a neighbor relation. More particularly, this may be done by configuring the UE with a list of node identities that may be encountered during random access but that should not be accessed, such that the UE is thereby forced to access a node that is not in the list. Once connected to this second node, the UE will report, to the second node, a unique identifier of the first node. The second node is then able to contact the first node to set up a neighbor relation with the first node, which in turn allows the first node to set up a neighbor relation with the second node.
Embodiments of the presently disclosed techniques include, for example, a method, in a wireless device (e.g., a UE) operating in a wireless communication network, where the method comprises receiving, from a first node in the wireless communication network, a blacklist comprising one or more random access response identifiers. The method further includes transmitting a random access preamble, to initiate random access to another node in the wireless communication network, and receiving a random access response, in response to the transmitted random access preamble. The method still further includes comparing a random access response identifier included in the received random access response to the one or more random access response identifiers in the blacklist, and establishing a connection to a second node in the wireless communication network, where the second node corresponds to the received random access response, responsive to determining that the random access response identifier included in the received random access response is not included in the blacklist. Finally, the method includes sending, to the second node, an identifier for the first node or an identifier for a beam transmitted by the first node, or both.
In some embodiments, this example method further comprises reporting one or more indications of received mobility reference signals to the first node, prior to said transmitting the random access preamble. In these embodiments, transmitting the random access preamble may be responsive to receiving, subsequent to said reporting, a request to perform random access. In some of these embodiments, the one or more indications of received mobility reference signals each comprise a sequence identifier for the respective mobility reference signal or an indicator of time-frequency resources occupied by the respective mobility reference signal, or both.
In some instances, a wireless device implementing the methods summarized above may receive a plurality of random access responses in response to the transmitted random access preamble, where at least two of the random access responses comprise respective random access response identifiers that are not included in the blacklist. In some embodiments, the method in these instances may include establishing the connection to a node corresponding to a first one of the at least two random access responses comprising random access response identifiers that are not included in the blacklist, and sending, to the second node, an indication of the random access response identifier for at least a second one of the at least two random access responses comprising random access response identifiers that are not included in the blacklist.
Other embodiments of the presently disclosed techniques include a method implemented in a first node of a wireless communication network, where the method includes receiving, from a wireless device served by the first node, one or more indications of received mobility reference signals. This example method further includes determining that a particular one of the one or more indications corresponds to a mobility reference signal associated with a node or beam that is unknown to the first node, and sending, to the wireless device, a blacklist comprising one or more random access response identifiers. The method further includes sending, to the wireless device, a request to perform random access, in response to said determining. The method still further includes receiving, from a second node of the wireless communication network, after sending the request to perform random access, neighbor relation information for the second node and/or for a beam transmitted by the second node, where the second node and/or the beam is associated with the mobility reference signal corresponding to the particular one of the one or more indications.
In some embodiments, this example method further comprises updating a neighbor list, using the received neighbor relation information. In some embodiments, the random access response identifiers each correspond to a respective node of the wireless communication network. In some, the random access response identifiers each correspond to a respective beam transmitted by another node of the wireless communication network.
In some embodiments of these methods performed by the first node, the method further comprises, prior to the determining step referred to above, and prior to sending the blacklist to the wireless device, requesting random access response identifiers from each of one or more known neighbor nodes in the wireless communication network. In these embodiments, the determining step is based on random access response identifiers received in response to said requesting. In some of these and in other embodiments, the method further includes, prior to receiving the one or more indications of received mobility reference signals, requesting each of one or more known neighbor nodes to transmit respective mobility reference signals.
Still other embodiments of the presently disclosed techniques include an example method performed in a second node of a wireless communication network, where the method includes receiving, from a wireless device in the wireless communication network, a random access preamble, and transmitting a random access response in response, the random access response comprising a random access response identifier. This example method further includes receiving a connection request from the wireless device, in response to transmitting the random access response, and establishing a connection to the wireless device. The method still further comprises receiving, from the wireless device, an identifier for a first node or an identifier for a beam transmitted by the first node, or both, and then sending, to the first node, neighbor relation information for the second node and/or for a beam transmitted by the second node.
In some embodiments of this method performed in the second node, the method further includes receiving, from the wireless device, a random access identifier corresponding to a third node and/or to a beam transmitted by the third node, and sending, to the first node, the random access identifier corresponding to the third node and/or to the beam transmitted by the third node.
Also disclosed herein are apparatuses and systems corresponding to the above-summarized methods. For example, in some embodiments, a wireless device configured to operate in a wireless communication network includes a transceiver circuit configured to communicate with one or more nodes operating in the wireless communication network and a processing circuit operatively associated with the transceiver circuit. The processing circuit is configured to receive, from a first node in the wireless communication network, a blacklist comprising one or more random access response identifiers and transmit a random access preamble, to initiate random access to another node in the wireless communication network. The processing circuit is configured to receive a random access response, in response to the transmitted random access preamble and compare a random access response identifier included in the received random access response to the one or more random access response identifiers in the blacklist. The processing circuit is also configured to establish a connection to a second node in the wireless communication network, where the second node corresponds to the received random access response, responsive to determining that the random access response identifier included in the received random access response is not included in the blacklist. The processing circuit is configured to send, to the second node, an identifier for the first node or an identifier for a beam transmitted by the first node, or both.
In some embodiments, a first node configured to operate in a wireless communication network includes a transceiver circuit configured to communicate with a wireless device operating in the wireless communication network and served by the first node and a processing circuit operatively associated with the transceiver circuit. The processing circuit is configured to receive, from the wireless device served by the first node, one or more indications of received mobility reference signals and determine that one of the one or more indications corresponds to a mobility reference signal associated with a node or beam that is unknown to the first node. The processing circuit is also configured to send, to the wireless device, a blacklist comprising one or more random access response identifiers and send, to the wireless device, a request to perform random access, in response to said determining. The processing circuit is configured to receive, from a second node of the wireless communication network, after sending the request to perform random access, neighbor relation information for the second node and/or for a beam transmitted by the second node, where the second node and/or the beam is associated with the mobility reference signal corresponding to said one of the one or more indications.
In some embodiments, a second node configured to operate in a wireless communication network includes a transceiver circuit configured to communicate with a wireless device operating in the wireless communication network and a processing circuit operatively associated with the transceiver circuit. The processing circuit is configured to receive, from the wireless device, a random access preamble and transmit a random access response in response to said receiving, the random access response comprising a random access response identifier. The processing circuit is also configured to receive a connection request from the wireless device, in response to transmitting the random access response, and establish a connection to the wireless device. The processing circuit is configured to receive, from the wireless device, an identifier for a first node or an identifier for a beam transmitted by the first node, or both, and send, to the first node, neighbor relation information for the second node and/or for a beam transmitted by the second node.
Further aspects of the present invention are directed to an apparatus, computer program products or computer readable storage medium corresponding to the methods summarized above and functional implementations of the above-summarized nodes and wireless device. Of course, the present invention is not limited to the above features and advantages. Those of ordinary skill in the art will recognize additional features and advantages upon reading the following detailed description, and upon viewing the accompanying drawings.
As noted above, future wireless networks are expected to take advantage of advanced antenna systems (AAS) to perform dynamic beamforming, and are also expected to employ an ultra-lean design approach, where “always-on” signals are minimized. Further, mobility and coverage planning in such networks may be beam-centric, rather than cell-centric, such that identifiers for individual beams (many of which may be supported by a given access node) are more relevant than node identifiers or cell identifiers.
In network deployments using large antenna arrays and many possible candidate beam configurations, all beams cannot transmit reference and measurement signals in an always-on, static manner, for the sake of mobility measurements. Instead, the connected access nodes may instead select relevant set of mobility beams to transmit, and transmit these mobility beams when required. Each mobility beam may carry a unique Mobility Reference signal (MRS) in these systems. The UE may then be instructed to measure on each MRS, for example, and report measurement results to the system. Based on some criteria, such as a difference in MRS strength between two mobility beams, a handover can be triggered.
For mobility to work efficiently, however, the involved access nodes need to maintain beam neighbor lists, exchange beam information, and coordinate MRS usage. In order for smooth operations of the mobility procedures in next-generation wireless networks, each access node needs to have a concrete list of neighboring nodes and/or neighboring beams that can be handover candidates for the UEs.
Despite advanced radio network planning tools, it is very difficult to predict radio propagation in detail. As a consequence, it is difficult to predict, prior to the network deployment, which base stations or access nodes need to have relations with one another, and which thus may also require a direct connection. This was addressed in LTE, where UEs could be requested to retrieve unique information from the system information broadcast of unknown base stations and report to the serving base station. Such information was used to convey messages to the unknown base station via the core network, which maintained a lookup table from a unique identifier to an established S1 connection. One such message was used to request transport network layer address information necessary for a direct base-station-to-base-station connection for the X2 interface.
In LTE systems, the solution for establishing neighbor base station relation establishment is based on the always-on reference signals in LTE, as well as on the routine broadcasting, in system information, of unique cell identifiers (referred to as Cell Global ID). But this always-on signaling and the transmission of unique cell identifiers may be absent in next-generation wireless networks by design. This means that a new approach to neighbor relations is needed.
Various techniques and apparatuses to address these problems are described in detail below. In some embodiments of these techniques and apparatuses, a first node (e.g., a serving access node) receives a UE report containing a (blindly decoded) mobility reference signal (MRS) sent by a second node, where the second node is unknown to the first node. In other words, the first node does not possess an association between the MRS and a unique node identifier. In this situation, the first node may force the UE to establish connection with the unknown second node. This may be done, for example, by configuring the UE so that it does not establish a connection with any node that is already known to the first node, i.e., any node for which the first node already possesses a neighbor relation. More particularly, this may be done by configuring the UE with a list of node identities that may be encountered during random access but that should not be accessed, such that the UE is thereby forced to access a node that is not in the list. Once connected to this second node, the UE will report, to the second node, a unique identifier of the first node. The second node is then able to contact the first node to set up a neighbor relation with the first node, which in turn allows the first node to set up a neighbor relation with the second node.
It will be appreciated that these techniques and apparatuses are especially applicable to recent technology trends that are of particular interest in a 5G context. These techniques are, however, also applicable in further development of the existing mobile broadband systems such as WCDMA and LTE.
The technique summarized above is based on the use of a random access procedure to establish a new connection between a wireless device and an access node that is unknown to a node that was previously serving the wireless device.
As seen in
Step 2 of the procedure in
Step 3 of the procedure shown in
Step 4 of the process shown in
Referring again to
The second step of the illustrated procedure, as shown at block 110, comprises the transmitting, by the wireless device or UE, of a random access signal, e.g., a random access preamble. The purpose of this random access signal is to gain access to the system via a second node, i.e., a node other than the first node, which was previously serving the wireless device. More particularly, the purpose of this random access signal is to gain access to the system through the node corresponding to the physical cell identifier or beam identifier that was unknown to the previously serving node. Thus, this random access signal transmission may be triggered, in some embodiments, by a message from the first node instructing the wireless device to initiate the random access procedure, where this instruction was in turn triggered by the first node's receipt of a measurement report corresponding to an unknown node.
As shown at block 120, the procedure illustrated in
Referring back to
It may be noted that
It will also be appreciated that the wireless device may receive several random access responses, where two (or more) include different identifiers that are each absent from the black list. In some embodiments, the wireless device may be configured to select one of these responses, based on any criteria, and initiate a connection with the corresponding node. In some embodiments, the wireless device may be configured to send, to the second node, an indicator of the other one (or more) of the received identifiers that were not on the black list. If this identifier is unknown to the second node, it may then wish to trigger the process again, after sending its own black list to the wireless device, so that neighbor relations for this further unknown neighbor may be established. If this identifier is known to the second node, on the other hand, it may forward information regarding this identifier and its corresponding node to the first node, for the updating of its neighbor relations.
An identifier uniquely identifying a node is referred to here as a Node Global Identifier (NGID). In some systems, a node can transmit one or more mobility beams, where each of the mobility beams has a unique (globally) ID hereafter referred to as the Mobility Beam Global ID (MBGID). For example, a Mobility Beam Global ID MBGID=[NGID,MBID] ] can consist of a first part defining the NGID and a second part defining the node local Mobility Beam ID (MBID). It will be appreciated that these identifiers may be referred to with other names. The MBGID is not likely to be transmitted as part of the mobility beam.
The identifier used in a Random Access Response for a node or beam, e.g., as shown in step 2 of
The core of the technique for establishing the neighbor relation with an unknown node includes steps 1-2, 7-8, and 11-13 of signal flow graph shown in
Step 1. The first node requests from known neighboring nodes (third node), the RARID used in step 2 of the random access procedure shown in
Step 2. Known neighboring nodes, including a third node, respond with the RARID used in step 2 in the random access procedure. Again, this step may be performed as late as after step 7, but before step 8 below.
Step 3. A condition to initiate mobility procedure is fulfilled. Details of the mobility procedures and actions are not provided, as they are not necessary for the purposes of understanding the presently disclosed techniques for establishing neighbor relations. The criteria for initiating mobility procedures may be similar to those specified in existing standards for LTE, for example. It could be the UE initiating the mobility action or the network initiating the mobility action, in various embodiments.
Step 4. The first node requests known neighbors (third node) to activate mobility reference signals (MRSs). This also involves a coordination procedure, where the first node will be aware of the MRSs transmitted by the third node, for example. Again, details of the mobility procedure and action are not provided here, since they are not necessary to the understanding of the core techniques for establishing neighbor relations.
Step 5. The UE (wireless device) detects and measures the MRSs transmitted by surrounding nodes, and obtains a MRS identifier for each MRS. This MRS identifier may be an indicator of the time-frequency resources occupied by the MRS, for example, or an indicator of a particular sequence included in the MRS, or an explicit identifier carried by the MRS, or some combination thereof. Note that the MRS transmission from the unknown node (the second node) is not requested by the first node, as the first node has no relation with this node, but a transmission that is happening because of some other reason. Note that in this configuration mode the UE is configured to detect and report the MRSs from all detected MRSs, e.g., within a given MRS range, rather than being configured to search for particular MRSs.
Step 6. The UE reports detected MRS identifiers to first node, potentially also including signal strength measurements
Step 7. First node detects that UE has reported an MRS identifier which is unknown to the first node (using information obtained from step 4), in the sense that the first node does not know which other node transmitted the MRS. In some embodiments, the first node may also check whether the reported signal strength of MRS is above a certain threshold, and only perform the following steps in the event that the signal strength for this MRS is above the threshold.
Step 8. The first node configures a RARID blacklist in the UE, where the RARID blacklist {RARID1, RARID2, RARID3, . . . } includes all RARIDs of known neighboring nodes (third node) collected in step 2 above. The first node then requests UE to perform random access. Note that these operations may be performed separately in some embodiments, e.g., with the configuring of the RARID blacklist occurring considerably earlier.
Step 9. The UE sends a random access preamble to initiate random access. In some embodiments, this random access preamble may be a random access preamble that is specifically reserved for the purpose of establishing neighbor relations between nodes, or chosen from a group of random access preambles set aside for this purpose.
Step 10. All nodes that detect the preamble transmitted in step 9 send random access response to the UE including their RARID. In some embodiments, nodes may be configured to include the RARID in the random access response message only if the detected preamble is known to the node to be reserved for the procedure of establishing neighbor relations between nodes.
Step 11. The UE establishes a connection to a node having a RARID not in the RARID blacklist, i.e., a second node. In some embodiments, the UE may include a flag in in the connection establishment step in order to inform that UE has information about relation establishment of new neighbor. In some embodiments, the UE may be configured so that it only connects to the node in the event that the signal strength of random access response (step 10) is above certain threshold.
Step 12. The UE reports NGID of first node and/or information about the mobility beam the UE was located in in the first node, referred to as mobility beam information such as MBGID.
Step 13. The second node establishes neighbor relation and connection with first node using the first node's NGID the UE reported in step 12. This may be done, for example, by establishing a connection directly with the first node, using the reported NGID. In other embodiments, this may be done by retrieving contact information for the first node from a core network node, using the reported NGID, and then establishing a connection directly with the first node. In still other embodiments, this may be done by forwarding the reported NGID to a core network node, which then contacts the first node to set up the new neighbor relation.
Additional details for two variants of the technique generally illustrated in
Technique 1—the focus of this variant is to establish node neighbor relations. In this case:
Technique 2—the focus of this variant is to establish mobility beam neighbor relations. In this case:
The network node 30 also includes one or more processing circuits 32 that are operatively associated with and configured to control the communication interface circuit(s) 38 and/or the transceiver circuit 36. The processing circuit 32 comprises one or more digital processors 42, e.g., one or more microprocessors, microcontrollers, Digital Signal Processors (DSPs), Field Programmable Gate Arrays (FPGAs), Complex Programmable Logic Devices (CPLDs), Application Specific Integrated Circuits (ASICs), or any combination thereof. More generally, the processing circuit 32 may comprise fixed circuitry, or programmable circuitry that is specially configured via the execution of program instructions implementing the functionality taught herein, or may comprise some combination of fixed and programmable circuitry. The processor(s) 42 may be multi-core.
The processing circuit 32 also includes a memory 44. The memory 44, in some embodiments, stores one or more computer programs 46 and, optionally, configuration data 48. The memory 44 provides non-transitory storage for the computer program 46 and it may comprise one or more types of computer-readable media, such as disk storage, solid-state memory storage, or any combination thereof. By way of non-limiting example, the memory 44 may comprise any one or more of SRAM, DRAM, EEPROM, and FLASH memory, which may be in the processing circuit 32 and/or separate from the processing circuit 32. In general, the memory 44 comprises one or more types of computer-readable storage media providing non-transitory storage of the computer program 46 and any configuration data 48 used by the node 30. Here, “non-transitory” means permanent, semi-permanent, or at least temporarily persistent storage and encompasses both long-term storage in non-volatile memory and storage in working memory, e.g., for program execution.
In some embodiments, the network node 30 is configured to operate as a first node 30 (e.g., serving access node). Accordingly, in some embodiments, the processing circuit 32 of the first node 30 is configured to receive, from a wireless device served by the first node 30, one or more indications of received mobility reference signals and determine that one of the one or more indications corresponds to a mobility reference signal associated with a node or beam that is unknown to the first node 30. The processing circuit 32 is also configured to send, to the wireless device, a blacklist comprising one or more random access response identifiers and send, to the wireless device, a request to perform random access, in response to said determining. The processing circuit 32 is configured to receive, from a second node of the wireless communication network, after sending the request to perform random access, neighbor relation information for the second node and/or for a beam transmitted by the second node, where the second node and/or the beam is associated with the mobility reference signal corresponding to said one of the one or more indications.
Regardless of its specific implementation details, the processing circuit 32 of the first node 30 is configured to perform a method according to one or more of the techniques described above, such as method 600 of
The method 600 may include updating a neighbor list, using the received neighbor relation information. The random access response identifiers may each correspond to a respective node of the wireless communication network or a respective beam transmitted by another node of the wireless communication network.
In some embodiments, the method 600 includes, prior to said determining and prior to sending the blacklist to the wireless device, requesting random access response identifiers from each of one or more known neighbor nodes in the wireless communication network. The determining is based on random access response identifiers received in response to said requesting.
In other embodiments, the method 600 includes, prior to receiving the one or more indications of received mobility reference signals, requesting each of one or more known neighbor nodes to transmit respective mobility reference signals.
The network node 30 may also be configured to operate as a second node 30 (e.g., node unknown to the wireless device), according to some embodiments. The processing circuit 32 of the second node 30 is configured to receive, from a wireless device, a random access preamble and transmit a random access response in response to said receiving. The random access response includes a random access response identifier. The processing circuit 32 is also configured to receive a connection request from the wireless device, in response to transmitting the random access response, and establish a connection to the wireless device. The processing circuit 32 is configured to receive, from the wireless device, an identifier for a first node or an identifier for a beam transmitted by the first node, or both, and send, to the first node, neighbor relation information for the second node 30 and/or for a beam transmitted by the second node 30.
Regardless of its specific implementation details, the processing circuit 32 of the second node 30 is configured to perform a method according to one or more of the techniques described above, such as method 700 of
In some cases, the method 700 also includes receiving, from the wireless device, a random access identifier corresponding to a third node and/or to a beam transmitted by the third node and sending, to the first node, the random access identifier corresponding to the third node and/or to the beam transmitted by the third node.
The UE 50 communicates with one or more radio nodes or base stations, such as one or more network nodes 30, via antennas 54 and a transceiver circuit 56. The transceiver circuit 56 may include transmitter circuits, receiver circuits, and associated control circuits that are collectively configured to transmit and receive signals according to a radio access technology, for the purposes of providing cellular communication services.
The UE 50 also includes one or more processing circuits 52 that are operatively associated with and control the radio transceiver circuit 56. The processing circuit 52 comprises one or more digital processing circuits, e.g., one or more microprocessors, microcontrollers, DSPs, FPGAs, CPLDs, ASICs, or any mix thereof. More generally, the processing circuit 52 may comprise fixed circuitry, or programmable circuitry that is specially adapted via the execution of program instructions implementing the functionality taught herein, or may comprise some mix of fixed and programmed circuitry. The processing circuit 52 may be multi-core.
The processing circuit 52 also includes a memory 64. The memory 64, in some embodiments, stores one or more computer programs 66 and, optionally, configuration data 68. The memory 64 provides non-transitory storage for the computer program 66 and it may comprise one or more types of computer-readable media, such as disk storage, solid-state memory storage, or any mix thereof. By way of non-limiting example, the memory 64 comprises any one or more of SRAM, DRAM, EEPROM, and FLASH memory, which may be in the processing circuit 52 and/or separate from processing circuit 52. In general, the memory 64 comprises one or more types of computer-readable storage media providing non-transitory storage of the computer program 66 and any configuration data 68 used by the user equipment 50.
Accordingly, in some embodiments, the processing circuit 52 of the UE 50 is configured to receive, from a first node 30 (e.g., network node 30 serving the UE 50) in the wireless communication network, a blacklist comprising one or more random access response identifiers. The processing circuit 52 is also configured to transmit a random access preamble, to initiate random access to another node in the wireless communication network and receive a random access response, in response to the transmitted random access preamble. The processing circuit 52 is configured to compare a random access response identifier included in the received random access response to the one or more random access response identifiers in the blacklist and establish a connection to a second node in the wireless communication network, wherein the second node corresponds to the received random access response, responsive to determining that the random access response identifier included in the received random access response is not included in the blacklist. The processing circuit 52 is configured to send, to the second node, an identifier for the first node 30 or an identifier for a beam transmitted by the first node 30, or both.
Regardless of its specific implementation details, the processing circuit 52 of the UE 50 is configured to perform a method according to one or more of the techniques described, such as method 900 of
The method 900 may further include reporting one or more indications of received mobility reference signals to the first node 30, prior to said transmitting the random access preamble. The transmitting the random access preamble is responsive to receiving, subsequent to said reporting, a request to perform random access. The one or more indications of received mobility reference signals may each comprise a sequence identifier for the respective mobility reference signal or an indicator of time-frequency resources occupied by the respective mobility reference signal, or both.
In some cases, the method 900 includes receiving a plurality of random access responses in response to the transmitted random access preamble, at least two of the random access responses comprising respective random access response identifiers that are not included in the blacklist. Establishing the connection to the second node then includes establishing the connection to a node corresponding to a first one of the at least two random access responses comprising random access response identifiers that are not included in the blacklist. The method 900 further includes sending, to the second node, an indication of the random access response identifier for at least a second one of the at least two random access responses comprising random access response identifiers that are not included in the blacklist. In some cases, this may mean that the UE 50 could be configured so that if it receives two random access responses (RARs) with identifiers that are not in the blacklist, the UE 50 connects to one of those nodes, reports the node/beam ID for the original serving node to the new serving node, and also reports the RAR identifier for the node/beam to which it did not connect. Then, the new serving node will identify itself to the original serving node, and also forward the other RAR identifier to the original serving node, so that the original serving node gets what it needs for both of the unknown nodes/beams.
As discussed in detail above, the techniques described herein, e.g., as illustrated in the process flow diagrams of
Notably, modifications and other embodiments of the disclosed invention(s) will come to mind to one skilled in the art having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention(s) is/are not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of this disclosure. Although specific terms may be employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/SE2016/051043 | 10/27/2016 | WO | 00 |