This application claims the benefit of PCT Patent Application No. PCT/EP2006/068529 which was filed on Nov. 15, 2006 the contents of which are hereby incorporated by reference herein.
The present invention relates to methods, devices and computer programs that optimize access in a multi-access communications network environment.
The following terms and abbreviations are herewith defined, at least some of which are referred to within the following description of the background and the present invention.
Ambient Networks (AN) is an integrated project that is sponsored by the European Union's 6th Framework Programme (see http://www.ambient-networks.org). The AN project has a goal of providing scalable and affordable wireless networking in an environment which is populated by a multitude of user devices, wireless technologies, network operators and business actors. For instance, the AN project has a goal of enabling a user network to use one or more access systems to connect to a remote communications network. One way that this goal can be satisfied and also be applied to existing communication systems is the subject of the present invention.
Referring to
As shown, each user network 102a, 102b . . . 102n has many different types of possible access connections 108 which can exist with multiple access systems 110a, 110b . . . 110n that are associated with the remote communication network 106 (or multiple remote communications networks 106 where some access connections 108 belong to one remote communication network 106 and other access connections 108 belong to other remote communication networks 106). Each user network 102a, 102b . . . 102n needs to be able to select one or more of these possible access connections 108 to establish one or more communication sessions with the remote communications network 106 (or multiple remote communications networks 106). In accordance with the AN project, each user network 102a, 102b . . . 102n has a processor 112 that uses a MRRM entity 114 and a GLL entity 116 (or multiple GLL entities which correspond with the multiple access systems) to perform this access selection and to help establish the communication session(s) with the remote communications network 106 (or multiple remote communications networks 106). To accomplish this, each MRRM entity 114 maintains a number of different access sets (which are stored in memory 118) that have been classified as follows:
Each user network 102a, 102b . . . 102n and in particular their respective MRRM entity 114 and GLL entity 116 function to determine and maintain the possible access connection (s) 108 which can be used to establish the communication session (s) with the remote communications network 106 (or multiple remote communications networks 106). Basically, each GLL entity 116 functions to monitor and observe the availability, capabilities and characteristics of each possible access connections 108 with the remote communications network 106 (or multiple remote communications networks 106). Then, the corresponding MRRM entity 114 uses this information to determine/validate which of the possible access connections 108 are to be admitted into the DS (in this example it is assumed that all of the possible access connections 108 are added to the DS). Thereafter, the MRRM entity 114 uses policy functions (e.g., security functions, compensation functions, local policies, remote policies) to determine which of the possible access connections 108 within the DS are to be admitted into the VS. Next, the MRRM entity 114 upon receiving a bearer request determines which of the possible access connections 108 within the VS are to be admitted into the CS. Lastly, the MRRM entity 114 determines which of the possible access connections 108 within the CS are to be placed in the AS and used as data bearer (s) for the communication session (s) with the remote communications network 106. A more detailed discussion about this process is provided next with respect to
Referring to
As shown, the MRRM entity 114 has an access detection function 204 which uses access discovery/monitoring information 202a (received from the GLL entity 116) to determine which of the possible access connections 108 are to be admitted into the DS (in this example it is assumed that all of the possible access connections 108 are added to the DS). The MRRM entity 114 also has a first access control function 206 that determines which of the possible access connections 108 in the DS are to be added to the VS. In particular, the MRRM entity 114 implements the first access control function 206 which interacts with a policy function 208 (associated with processor 112) to obtain policy constraints 209a (e.g., security functions, compensation functions, local policies) and then uses this policy information 209a to determine/validate which of the possible access connections 508 from the DS are to be admitted within the VS.
In addition, the MRRM entity 114 has a second access control function 210 which upon receiving a data bearer request 212 which defines the service requirements from a bearer management function 214 (associated with processor 112) functions to interact with the policy function 208 to obtain policy constraints 209b and then uses this information along with the access performance/characteristics information 202b (received from the GLL entity 116) to determine which of the possible access connections 108 within the VS are to be admitted into the CS. In other words, the MRRM entity 114 implements the second access control function 210 and determines which of the possible access connections 108 within the VS could be placed within the CS and then possibly used as communication bearer (s) with the remote communications network 106. Alternatively, this procedure can be triggered by other events besides receiving the data bearer request 212 like, for instance, this procedure could be triggered when the GLL 116 detects a new AR 108 or when there is a change in the performance/characteristics of the monitored ARs 108. This process is performed for each communications session (e.g., data session) which means that there can be multiple CSs. And, the access connections 108 which are placed within anyone of the CSs depends on the requirements of the particular data bearer (e.g., the quality of service, required security, acceptable amount of costs etc. . . . ) and to what extent these requirements can be satisified by the access systems 104a, 104b . . . 104n. Also, the policy constraints 209b can dictate or restrict which of the access connections 108 can be admitted to the CSs.
Furthermore, the MRRM entity 114 has an access selection function 216 which interacts with the policy function 208 to obtain policy constraints 209c and then uses this information along with the access performance/characteristics information 202c (received from the GLL entity 116) to determine which of the possible access connections 108 within the CS are to be used as data bearer(s) for the communication session(s) with the remote communications network 106 (note: anyone of the policy constraints 209a, 209b and 209c could alternatively be e.g., pushed or transmitted from any one of the access networks 110a, 110b . . . 110n). In other words, the MRRM entity 114 implements the access selection function 216 to determine which one of the possible access connections 108 in the CS is to be placed in the AS and actually used as a communication bearer in a communication session that is established with the remote communications network 106. Typically, the access connection 108 which is best suited to be used for a particular communication session (e.g., data bearer) is selected from the CS to be placed within the AS. There are different types of access selection algorithms which can be used for this selection, e.g. an algorithm which chooses the particular access connection 108 that best matches the data session requirements, an algorithm which chooses the particular access connection 108 which has resources that are used most efficiently, an algorithm which chooses the particular access connection 108 based on transmission costs, or various combinations of such strategies. More generally, this AS selection can be seen as an optimization with respect to a certain cost or utility function.
In each of the access systems 104a, 104b . . . 104n, the basic connectivity element that is associated with the possible access connection(s) 108 is called an access resource (AR). An AR is a resource which could be used for establishing connectivity and transmitting data (note: the RRMs 111a, 111b . . . 111n manage the ARs). Examples of an AR include frequency bands/sub carriers, time slots, CDMA codes, transmit power, interference headroom and connection identifiers. An AR can be identified by an AR identity which can be composed of the id of the resource owner such as the network id and a resource specific id such as a cell id in a wireless access system. For instance, the AR identity could be {network id; access type; resource id}. In addition, the AR can be further characterized by AR-related information/AR-descriptor, such as total/occupied/available resources, resource costs, efficiency of the resource usage like a signal-to-noise-and-interference ratio. Basically, the AR corresponds to the underlying physical resources which are associated with the specific access system, e.g. for a UMTS cell it may correspond to available power, a certain number of codes, etc. . . . .
The other connectivity element in the access systems 104a, 104b . . . 104n is the logical connection (LC) (also known as access flow (AF)). The access system 104a, 104b . . . 104n establishes the LC with the other access system 110a, 110b . . . 110n based on the corresponding access resource. For the establishment of a LC, identifiers (sometimes called locators) for that LC are created in the terminating access systems 104a, 104b . . . 104n and 110a, 110b . . . 110n. The setup of the LC can include: (1) reserving radio resources for the LC; (2) performing AAA procedures; (3) establishing LC security associations; and (4) negotiating LC usage policies. Basically, the AR provides the capability to establish the connectivity and the LC is the data bearer on which data could be transmitted.
The establishment of a LC (based on access resources) is referred to as network attachment.
The user networks 102a, 102b . . . 102n have different levels of connectivity that are established in the different phases DS-VS-CS-AS of access selection and as a consequence the types of elements managed within the DS, VS, CS and AS can vary as discussed next with respect to
Unfortunately, there is a problem in the foregoing state of art which concerns the ARs contained within the VS or CS of the various user networks 102a, 102b . . . 102n. Basically, the user networks 102a, 102b . . . 102n can all monitor the same AR and have it included in their VS and CS which means that this particular AR can be considered and evaluated for access selection by multiple user networks 102a, 102b . . . 102n. This situation can be problematic because a large number of these user networks 102a, 102b . . . 102n may try to access the AR in a short time period which may lead to an overload of the AR, a failure of the connection establishment, or a failure of the access selection procedure. Thus, there is a need to address this problem and this need and other needs are satisfied by the present invention.
In one aspect, the present invention provides a multi-resource management entity which implements a method comprising the steps of: (a) obtaining information about a potentially required access resource of one access network; (b) determining that more than a certain number of a user networks may potentially use the access resource to establish a connection with the one access network; (c) obtaining information indicating an availability of the access resource; and (d) limiting a number of the user networks that may potentially access the access resource in view of the obtained availability information. The limiting of the number of user networks that may potentially access the access resource is a marked-improvement over the state of art where a large number of the user networks could try to access the same access resource in a short time period which may lead to an overload of the access resource, a failure of the connection establishment, or a failure of the access selection procedure.
In another aspect, the present invention provides an access resource managing entity which implements a method comprising the steps of: (a) obtaining information from a multi-resource managing entity where the information is related to a potentially required access resource that may be used by one or more user networks; (b) checking the availability of the potentially required access resource; (c) sending a report containing availability information back to the multi-resource managing entity. The multi-resource managing entity upon receiving the report is now able to limit the number of the user networks that may potentially access the access resource. The limiting of the number of user networks that may potentially access the access resource is a marked-improvement over the state of art where a large number of the user networks could try to access the same access resource in a short time period which may lead to an overload of the access resource, a failure of the connection establishment, or a failure of the access selection procedure.
Additional aspects of the invention will be set forth, in part, in the detailed description, figures and any claims which follow, and in part will be derived from the detailed description, or can be learned by practice of the invention. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention as disclosed.
Amore complete understanding of the present invention may be obtained by reference to the following detailed description when taken in conjunction with the accompanying drawings wherein:
Referring to
Referring to
1. The ARM 911b (for example) within the remote communications network 906 sends an AR2 report (access resource report) to the GLL entity 916 located within the user network 902a (in this case a mobile terminal 902a).
2. The GLL entity 916 forwards the AR2 report to the MRM entity 914 located within the user network 902a.
3. The MRM entity 914 updates the DS set.
4. The MRM entity 914 sends an AR2 report to the policy function 930 located within the user network 902a.
5-6. The policy function 930 accesses the appropriate validate policies and forwards the policy constraints to the MRM entity 914.
7-8. The MRM entity 914 based on the received policy constraints can ban the AR2 and send a ban AR2 signal to the GLL entity 916 (see step 7). Or, the MRM entity 914 based on the received policy constrains can permit the AR2. In this case, the MRM entity 914 performs the following: (a) update VS; (b) check if AR2 is suitable for CSs and update CSs accordingly; and (c) if CSs have changed, re-evaluate ASs accordingly. Then, the MRM entity 914 sends an AR2 report and matching VSs/CSs to the MRM entity 924 located within the remote communications network 906 (see step 8).
9. The MRM entity 924 forwards the received AR2 report to a policy function 932 within the remote communications network 906.
10-11. The policy function 932 accesses the validate policies and forwards the policy constraints to the MRM entity 924.
12. The MRM entity 924 validates the number of user networks 902a, 902b . . . 902n with AR2 included or requested to be included within the VSs/CSs and updates the VSs/CSs accordingly.
13-14. The MRM entity 924 determines if the number of user networks 902a, 902b . . . 902n with AR2 included or requested to be included within the VSs/CSs is larger than a threshold. If yes, the MRM entity 924 sends a report indicating the number of user networks 902a, 902b . . . 902n (and possibly their bearer requirements) which have the AR2 in their VSs/CSs to the ARM 911b. If not, then the MRM entity 924 operates as normal.
The ARM 911b can also receive additional information from the MRM entity 924 in step 14 such as (for example): (1) an instruction as to which AR or sub-fractions to pre-reserve; (2) information about the potentially required AR such that the access resource management entity may be adapted to derive information for the pre-reservation step; (3) information about a fraction of the potentially required AR exceeding the threshold such that the access resource management entity may be adapted to derive information for the pre-reservation step; (4) information about bearers and/or services and/or preference information (e.g. related to subscription information) associated with the potentially required AR such that the access resource management entity may be adapted to derive more accurate information for the pre-reservation step.
15. The ARM 911b performs the following functions: (a) determine the required resources and the probability that these resources would be used and from this determine how much resources should be reserved; (b) check available resources; (c) pre-reserve resources; and (d) determine the ratio of rejection. There is a benefit in pre-reserving resources in that the pre-reservation reduces the probability of not having enough resources available when a LC-establishment for the user network 902a, 902b . . . 902n is initiated and/or an AR is selected (for AS) for a user network 902a, 902b . . . 902n.
The ARM 911b can perform step 15 by using information (e.g., contained in the AR2 report) about the potentially required AR where, for example, that information can be information about a potentially required bearer and/or potentially required service related to the potentially required AR. For instance, this additional information may be e.g. a bearer and/or service identifier such that the ARM 911b can estimate the potentially required access resources more precisely based on the identifier and correlated (stored) resource information for each indicated bearer and/or service or based on explicit required access resource information like MBits/sec needed for a particular AR in a candidate or validated set. Alternatively, the additional information may be about a fraction of the potentially required access resources exceeding a threshold.
16. The ARM 911b sends a report result back to the MRM entity 924. In one example, the report can include information about the pre-reserved access resources, and information about an amount or a fraction of the user networks 902a, 902b . . . 902n (including user terminals 902a, 902b . . . 902n) that are to be rejected.
17. The MRM entity 924 determines if and to what extent AR2 has to be blocked (rejected) in user network 902a and then update the VS and/or CS accordingly.
18. The MRM entity 924 sends a confirm/remove message which indicates the results of step 17 to the MRM entity 914 located within the user network 902a.
19. The MRM entity 914 updates the VSs and CSs upon receiving the confirm/remove message.
20. The MRM entity 914 and MRM entity 924 have access selection signaling to select resources associated with AR2 to populate ASs. Alternatively, if the access selection is supported by the access network MRRM 924 then the access selection signaling with the MRM entity 924 is optional. It can also be that the access selection is only done in the UN 902a, 902b . . . 902n.
21. The MRM entity 914 sends an attach AR2 message to the GLL entity 916 within the user network 902a.
22. The GLL entity 916 and ARM 911b both interact with one another to perform the attachment procedure and setup an access flow (e.g., see
23. The GLL entity 916 sends an AR2 attach message to the MRM entity 914.
24. The MRM entity 914 and MRM entity 924 execute a handover process.
Note 1: Steps 12-18 are associated with method 1000a while steps 1-11 and 19-24 are existing technology.
Note 2: in case of changes in resource availability/utilization of the AR, the ARM 911b can notify the MRM entity 924 about a change of this situation. Then, the MRM entity 924 for example could limit the amount of time the AR can be allowed in the VS/CS of the user networks 902a, 902b . . . 902n.
Note 3: There are different options of realizing the MRM entity 924. For instance, there can be one centralized MRM entity 924 in the remote communications network 906. Or, the MRM functionality can be distributed in multiple MRM entities 924. Alternatively, the MRM entity 924 could be co-located/embedded with the ARMs 911a, 911b . . . 911n.
Referring to
1. The ARM 911b (for example) within the remote communications network 906 sends an AR2 report (access resource report) to the GLL entity 916 located within the user network 902a (in this case a mobile terminal 902a).
2. The GLL entity 916 forwards the AR2 report to the MRM entity 914 located within the user network 902a.
3. The MRM entity 914 updates the DS set.
4. The MRM entity 914 sends an AR2 report to the policy function 930 located within the user network 902a.
5-6. The policy function 930 accesses the appropriate validate policies and forwards the policy constraints to the MRM entity 914.
7-8. The MRM entity 914 based on the received policy constraints can ban the AR2 and send a ban AR2 signal to the GLL entity 916 (see step 7). Or, the MRM entity 914 based on the received policy constrains can permit the AR2. In this case, the MRM entity 914 performs the following: (a) update VS; (b) check if AR2 is suitable for CSs and update CSs accordingly; and (c) if CSs have changed, re-evaluate ASs accordingly. Then, the MRM entity 914 sends an AR2 report and matching VSs/CSs to the MRM entity 924 located within the remote communications network 906 (see step 8).
9. The MRM entity 924 forwards the received AR2 report to a policy function 932 within the remote communications network 906.
10-11. The policy function 903 accesses the validate policies and forwards the policy constraints to the MRM entity 924.
12. The MRM entity 924 validates the number of user networks 902a, 902b . . . 902n with AR2 included or requested to be included within the VSs/CSs and updates the VSs/CSs accordingly.
13-14. The MRM entity 924 determines if the number of user networks 902a, 902b . . . 902n with AR2 included or requested to be included within the VSs/CSs is larger than a threshold. If yes, then the MRM entity 924 determines the required resources and the probability that these resources would be used and from this determine how much resources should be reserved. Then, the MRM entity 924 sends a resource reservation request to the ARM 911b. If not, then the MRM entity 924 operates as normal.
The MRM entity 924 can perform steps 13-14 by using information (e.g., contained in the AR2 report) about the potentially required AR where, for example, that information can be information about a potentially required bearer and/or potentially required service related to the potentially required AR. For instance, this additional information may be e.g. a bearer and/or service identifier such that the MRM entity 924 can estimate the potentially required access resources more precisely based on the identifier and correlated (stored) resource information for each indicated bearer and/or service or based on explicit required access resource information like MBits/sec needed for a particular AR in a candidate or validated set. If desired, this additional information may be represented by a threshold. Moreover, the MRM entity 924 can receive this information from a storage unit (see
15. The ARM 911b upon receiving the resource reservation request performs the following functions: (a) check available resources; (c) pre-reserve resources; and (d) determine the ratio of rejection. There is a benefit in pre-reserving resources in that the pre-reservation reduces the probability of not having enough resources available when a LC-establishment for the user network 902a, 902b . . . 902n is initiated and/or an AR is selected (for AS) for a user network 902a, 902b . . . 902n.
16. The ARM 911b sends a report result back to the MRM entity 924. In one example, the report can include information about the pre-reserved access resources, and information about an amount or a fraction of the user networks 902a, 902b . . . 902n (including user terminals 902a, 902b . . . 902n) that are to be rejected.
17. The MRM entity 924 determines if and to what extent AR2 has to be blocked (rejected) in user network 902a and then update the VS and/or CS accordingly.
18. The MRM entity 924 sends a confirm/remove message which indicates the results of step 17 to the MRM entity 914 located within the user network 902a.
19. The MRM entity 914 updates the VSs and CSs upon receiving the confirm/remove message.
20. The MRM entity 914 and MRM entity 924 have access selection signaling to select resources associated with AR2 to populate ASs. Alternatively, if the access selection is supported by the access network MRRM 924 then the access selection signaling with the MRM entity 924 is optional. It can also be that the access selection is only done in the UN 902a, 902b . . . 902n.
21. The MRM entity 914 sends an attach AR2 message to the GLL entity 916 within the user network 902a.
22. The GLL entity 916 and ARM 911b both interact with one another to perform the attachment procedure and setup an access flow (e.g., see
23. The GLL entity 916 sends an AR2 attach message to the MRM entity 914.
24. The MRM entity 914 and MRM entity 924 execute a handover process.
Note 1: Steps 12-18 are associated with method 1000b while steps 1-11 and 19-24 are existing technology.
Note 2: in case of changes in resource availability/utilization of the AR, the ARM 911b can notify the MRM entity 924 about a change of this situation. Then, the MRM entity 924 for example could limit the amount of time the AR can be allowed in the VS/CS of the user networks 902a, 902b . . . 902n.
Note 3: There are different options of realizing the MRM entity 924. For instance, there can be one centralized MRM entity 924 in the remote communications network 906. Or, the MRM functionality can be distributed in multiple MRM entities 924. Alternatively, the MRM entity 924 can be co-located/embedded with the ARMs 911a, 911b . . . 911n.
The two methods 1000a and 1000b indicate that the ARM 911a (for example) knows about the usage of resources (load, availability) while the MRM entity 924 knows about what candidate ARs in the CS/VS are being considered as access connections by the user networks 902a, 902b . . . 902n. Then, in method 1000a the MRM entity 924 reports to the ARM 911b the number of user networks 902a, 902b . . . 902n that consider a particular AR as a candidate for an access connection. Thereafter, the ARM 911b determines depending on their resource knowledge if and to what extent this situation is feasible, and then sends a report back to the MRM entity 924. In this scheme, the ARM 911b has the major logic for determining whether to block or admit this AR in the CSs/VSs of the user networks 902a, 902b . . . 902n. While, in method 1000b the MRM entity 924 sends a resource request to the ARM 911b and then receives “resource information” in the form of a report from the ARM 911b and then determines if and how many user networks 902a, 902b . . . 902n should have the same AR in their CSs/VSs. In this scheme, the MRM entity 924 has the major logic for determining whether to block or admit this AR in the CSs/VSs of the user networks 902a, 902b . . . 902n. In both schemes, the ARM 911b (in method 1000a) or the MRM entity 924 (in method 1000b) needs to estimate the required resources based on the number of user networks 902a, 902b . . . 902n that are considering to use the same AR as a candidate for access connections. Exemplary ways/logic about how the ARM 911b (and other ARMS 911a . . . 911n) or the MRM entity 924 can estimate the required resources are as follows:
A. The ARM 911b or MRM entity 924 could determine the estimated resource requirements by using the amount of possibly required resources if the AF/AR in all of the VSs and/or CSs should in the future be selected by the access selection function. Different levels of sophistication in this step are possible.
B. The ARM 911b or MRM entity 924 could determine the estimated resource requirements by determining a probability that the AF/AR in the VSs and/or CSs will be selected by an access selection function to be included in the ASs. Different levels of sophistication in this step are possible, ranging from taking a fixed value (e.g., based on historic events) up to and including the consideration of the metrics used in access selection.
C. The ARM 911b or MRM entity 924 could determine the estimated resource requirements that should be reserved from the amount of possibly required resources and the probability of these resources really being used in future. Different levels of sophistication are possible in this step.
D. The ARM 911b or MRM entity 924 could determine the estimated resource requirements by using a default value which can be e.g. based on measurements from the past, or based on a pre-determined value. Plus, if an AR is element of a VS or CS this does not automatically imply that an access flow for this AR will be established instead there is only an increased probability that this will happen. Thus, the ARM 911b or MRM entity 924 when determining the estimated resource requirements can take this into account and apply a certain percentage to the originally estimated resource requirement to come-up with the final estimated required resources. If desired, the precision of estimation of required resources can be further improved in the following ways:
E. The MRM entity 924 with the help of ARM 911a could determine the required amount of resources and the probability that these resources are expected to be used and from that estimate how much resources should be reserved as follows (see
Referring to
1. The MRM entity 924 determines the number of user networks 902a, 902b . . . 902n and user sessions which have the relevant AR (or derived LCs) in their VS or CS (e.g., see numeral “1” in
2. The MRM entity 924 obtains weights w1-w4 (see numeral “2” in
R=w
1
·N+w
2
·n+w
3
·M+w
4
·m
The weights w1-w4 for instance can be based on pre-determined values or they can be derived from past experience/measurements as follows:
Plus, the relationship of the weights can depend on the following:
Alternatively, R can be calculated such that the ranking of the ARs/LCs within the CS or VS is also considered. Every AR/LC in the CS/VS is associated with a utility u, such that a high value of u indicates a high probability that the access is eventually going to be selected to be in the AS, e.g.:
If desired, for access elements in the CS, the contribution to R can be normalized to the expected required resources r depending on the service requirement (data rate, delay, jitter, e.g. large for video applications, small for telephony) as follows, e.g.:
Furthermore, the contribution to R can be weighted according to the preference value p of the particular user network 902a (for example) which is part of the policy profile (e.g., depending on the subscription, e.g., a gold subscriber would be preferred in the analysis and could get pre-reserved access resources in a preferred manner and/or could get less access resources excluded by a blocking (limiting step) compared to a silver or bronze subscriber) as follows, e.g.:
3-4. The MRM entity 924 obtains a threshold “thresh” (see numeral “3” in
5-7. The ARM 911b upon receiving the resource reservation request R (see numeral “5” in
8-9. The MRM entity 924 upon receiving a rejection message (e.g., reject resources v*R) functions to limit the usage of the AR in the CS and/or VS of the user networks 902a, 902b . . . 902n (see numerals “8” and “9” in
Referring to
The present invention also concerns computer programs that include portions of software codes that can be retrieved to enable the implementation of anyone of the methods 1000 described herein when operated at a multi-resource managing entity like e.g. a MRM and an access resource managing entity like e.g. an ARM. The respective computer programs can be stored on one or more computer readable media. The computer readable media can be a permanent or rewritable memory within the MRM entity 924, the ARM 911a, 911b . . . 911n, or located externally. The respective computer programs can be also transferred to the MRM entity 924 and the ARM 911a, 911b . . . 911n for example via a cable or a wireless link as a sequence of signals.
The description herein uses the term MRRM which refers to a multi-radio resource management entity. This term is used on a common basis in the context of an wireless access environment. However, the present invention can also be used in a fixed access environment and not just in a wireless access environment. Therefore, although the term MRRM is used in some the examples provided in the aforementioned description, the term MRM alias Multi-Resource Management could have also been used to reflect that the present invention applies to wireless and/or fixed access environment. Thus, for pure wireless embodiments the term MRRM is strictly correct and may be applied unchanged. But, for fixed access embodiments with or without wireless access, the term MRM may be used. It is emphasized, that the examples provided herein could be easily adapted to such fixed and/or wireless network access environments by replacing the MRRM by MRM. Likewise, the term ARM is an example for an access resource managing entity which may manage wireless and/or fixed access resources. Whereas, the term RRM can be used to describe an access resource managing entity which manages only wireless access resources.
From the foregoing, it should be appreciated that the present invention relates to a MRM entity 924 (or MRRM 924) that keeps a list of ARs which are used in the VSs and/or CSs of different user networks 902a, 902b . . . 902n. If a specific AR is in more than a certain number of VSs/CSs in the user networks 902a, 902b . . . 902n, then the MRM entity 924 interacts with the corresponding ARM 911b (for example) which manages that particular AR to ask if sufficient resources of the AR are available to be used by this many user networks 902a, 902b . . . 902n. If no, then the MRM entity 924 limits the number of user networks 902a, 902b . . . 902n that may include the specific AR in their VSs/CSs. Thus, the present invention solves the aforementioned problem where too many user networks 902a, 902b . . . 902n could monitor and try to access the same AR in a short time period which could lead to an overload of the AR, a failure of the connection establishment, or a failure of the access selection procedure. Plus, the present invention has many other advantages some of which are as follows:
1. The present invention decreases the risk for access selection/handover failure in multi-access networks by limiting the number of candidate users for a certain access resource and/or by reserving access resources for these candidate users.
2. The present invention enables energy efficient multi-access management for user networks 902a, 902b . . . 902n that happen to be mobile terminals.
3. The present invention causes a low risk of failure when establishing a connection to an access resource as result of access selection.
The present invention in addition to the aforementioned multi-access network is applicable to different types of multi-access network environments wherein for instance an access resource managing entity may be embodied in a network intrinsic RRM and the MRRM may communicate with the network intrinsic RRM via the GLL. In some applications, the network intrinsic RRM (as examples for access resource managing entities) may reside at an RNC or a WLAN access point. Basically, an intrinsic RRM is an access-specific RRM which is also often used in an AN. For more details about these different types of multi-access network environments reference is made to the aforementioned document “Ambient Networks, “Multi-Radio Access Architecture”, Project Deliverable D2-4, December 2005.
Although several embodiments of the present invention have been illustrated in the accompanying Drawings and described in the foregoing Detailed Description, it should be understood that the invention is not limited to the disclosed embodiments, but is also capable of numerous rearrangements, modifications and substitutions without departing from the scope of the invention as set forth and defined by the following claims.
Number | Date | Country | Kind |
---|---|---|---|
PCT/EP2006/068529 | Nov 2006 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP07/62342 | 11/14/2007 | WO | 00 | 3/25/2010 |