The invention relates to determining the location of a terminal in a communication network.
The majority of communication devices are primarily intended to communicate data whilst they are being operated by a nearby user. For example, a typical telephone or personal computer is designed to allow a user who is holding, or is at least near to, the device to speak or type data into the device and to communicate that data to a user at another location. For this purpose the device is typically provided with a user interface that includes means for accepting data from a user and means for providing data to a user. The means for accepting data from a user could, for example, be a keypad, microphone or touch-screen. The means for providing data to a user could, for example, be a display, loudspeaker or an indicator light.
Some computers are designed for unattended operation. One example is a web server located in a server farm. Whilst this can if necessary be controlled by means of a local keypad and display, in normal operation administrative tasks are performed on the server by means of a communications link to a personal computer located elsewhere, and inputs from the user interface of that personal computer are transmitted over a network to the server. Similarly, when the web server is in a , communication session with a client browser running on a remote personal computer, the data served by the web server is provided in response to inputs that the user of that remote personal computer provides to the personal computer.
In each of the instances described above, the communication links between the devices in question need to provide a reasonably low degree of latency so that the users will be satisfied with the responsiveness of the links. For example, when two users are communicating through their telephones, they expect to be able to hear each other's speech substantially in real time; or when a user is controlling or is in a web session with a web server he will expect to receive prompt responses from the server. If there is a long delay in communication, the user may become frustrated and can be expected to eventually close the link.
It is anticipated that there will be an increase in the number of devices that communicate automatically without a user being in attendance. For example, it has been forecast that in the future devices such as domestic appliances, motor vehicles and utility meters will commonly be capable of sending data to report on their operational state and receiving data such as upgraded operating software. It is widely predicted that the preferred way for these devices to communicate will be via the internet, with their initial access to the Internet being over a wireless link.
The protocol for the wireless link is suitably one that is optimised for machine-to-machine communication. Preferably the protocol also operates in so-called whitespace: a part of the spectrum that is made available for unlicensed or opportunistic access. Conveniently, that may be in the UHF TV band and spans all or part of the range from 450 MHz to 800 MHz, depending on the country. A large amount of spectrum has been made available for unlicensed wireless systems in this frequency range. A problem with operating in whitespace is that the available bandwidth is variable and cannot be guaranteed. These limitations are well-matched to the capabilities of machine-to-machine networks in which there is no human interaction. Machine-to-machine networks are typically tolerant of delays, dropped connections and high latency communications.
Any network operating in the UHF TV band has to be able to coexist with analogue and digital television broadcast transmitters. The density of the active television channels in any given location is relatively low (resulting in the availability of whitespace that can be used by unlicensed systems). The FCC has mandated that systems operating in whitespace must reference a database that determines which channels may be used in any given location. This is intended to avoid interference with the TV transmissions and certain other incumbent systems such as wireless microphones. The network will also have to coexist with spurious interference from devices such as electric drills. In order to minimise the impact of the machine-to-machine network on television broadcasts and the negative impact of external interferers on the machine-to-machine network, the network preferably implements a frequency hopping sequence generated in dependence on information in the whitespace database and designed to avoid frequencies found to suffer interference and/or poor propagation or throughput.
The network is suitably arranged as a cellular network, in which single base station is arranged to service the terminals located in a particular geographical region. Some of the terminals may be static but others may be mobile, meaning that their location within the network may change in time. Therefore, the network is preferably able to: (i) determine the location of a mobile terminal if required; and (ii) deal with the situation when a terminal moves from the service area of one base station to that of another. Also, although the geographic regions associated with each base station may be notionally distinct from one another, in practice it is likely that some terminals are able to communicate with base stations in neighbouring cells. Therefore, if one base station is unduly loaded compared with its neighbours, it might conceivably be possible for some of that traffic may be diverted to its neighbour. One or more of these issues may be addressed by providing the network with a mechanism for handover by means of which a terminal may be transferred from one base station to another.
The principle of handover is well-known in cellular networks. However, different considerations apply in machine-to-machine networks, which are more tolerant of high latency and dropped communications than traditional cellular networks. Also, communication in machine-to-machine networks tends to be predictable and is often relatively infrequent. There is a need for optimising the mechanism of handover to the particular requirements and capabilities of machine-to-machine networks.
According to a first embodiment of the invention, there is provided a method for determining the location of a communication terminal in a network comprising a plurality of communication devices, each configured to communicate with at least one terminal, the method comprising instructing the terminal whose location is to be determined to handover from a communication device to which it is currently attached to another communication device in the network.
The method may comprise the terminal attaching to another communication device responsive to the instruction.
The method may comprise the other communication device determining an indication of the terminal's location.
The method may comprise g, when the terminal is attached to the other communication device, performing a timing operation to determine an indication of the terminal's location.
The method may comprise determining a location of the terminal in dependence on the indication.
The method may comprise the other communication device forwarding the indication to a location server in the network.
The method may comprise the location server determining a location of the terminal.
The method may comprise the terminal reattaching to the communication device once the indication of its location has been determined.
The method may comprise the, communication device, once the terminal has reattached, obtaining the determined location of the terminal from the location server.
The method may comprise repeatedly instructing the terminal to handover from the communication device to which it is currently attached to another communication device in the network.
The method may comprise determining, each time that the terminal hands over to another communication device responsive to the repeated instructions, an indication of the terminal's location, and determining a location for the terminal in dependence on those indications.
The method may comprise the terminal selecting the other communication device independently of the communication device to which it is currently attached.
The method may comprise the terminal selecting, as the other communication device, a communication device from which it experiences a signal strength below a threshold at which the terminal is configured to determine it can maintain a communications link with a communication device.
According to a second embodiment of the invention, there is provided a communication device for communicating with a terminal via a communication network comprising a plurality of communication devices, each configured to communicate with at least one terminal, the communication device being configured to determine a location associated with the terminal by instructing it to handover to another communication device in the network.
The communication device may be configured for machine-to-machine communication.
The communication device may be configured to operate in whitespace.
The present invention will now be described by way of example with reference to the accompanying drawings. In the drawings:
If a terminal's location is to be determined in a cellular network comprising a plurality of communication devices for providing services to terminals, the fact that the terminal will typically be capable of communicating with more than one of those communication devices may be exploited to determine the location of the terminal. Specifically, the terminal whose location is to be determined may be instructed to handover from a communication device to which it is currently attached to another communication device in the network. The location of that terminal may then be determined by means of a timing measurement made by the new communication device.
A communication device is suitably configured to communicate with one or more terminals. Typically these terminals will be located in a particular “cell”, i.e. a geographical area that the communication device services. The communication device is, however, suitably configured to communicate with any terminal that is “attached” to it, i.e. any terminal that has previously registered itself with the communication device (more details on this process are given below). The communication device may be considered as being responsible for providing communication services to all of the terminals attached to it. A terminal is suitably attached to only one communication device at a time. “Handover” may be viewed as a process of detaching from one communication service offered by the network and attaching to another. Often “handover” involves detaching from one communication device and attaching to another but it may also just involve switching between different services provided by the same communication device (e.g. by switching to a different carrier frequency).
One or more embodiments of the invention will now be described with specific reference to a wireless network in which the communication device is a base station. This is for the purposes of example only and it should be understood that the mechanisms described herein may be implemented in any suitable communication device, irrespective of what particular role that device plays within the network.
An example of a wireless network is shown in
The base station controller 107 is a device that provides a single point of communication to the base stations and then distributes the information received to other network elements as required. The network may be arranged to communicate with a client-facing portion 101 via the Internet 102. In this way a client may provide services to the terminals via the wireless network.
Other logical network elements shown in this example are:
In practice, many of the logical network elements may be implemented as databases running software and can be provided on a wide range of platforms. A number of network elements may be physically located within the same platform.
A network such as that shown in
In many applications terminals will be static (e.g. electricity meters) but there are some applications where terminals will be mobile (e.g. vehicle telemetry). The network should be capable of managing this mobility. If the network is configured for machine-to-machine communications, the network is unlikely to have to offer seamless connections since a short break in transmission while a terminal moves to a different cell is likely to be acceptable. Therefore, full handover support is not necessary. Terminals may be configured to manage their own mobility by discovering the strongest base station in their region and registering with that base station. The algorithms used in the terminal to determine when to search for other base stations preferably take into account the fact that in regions of overlapping coverage, higher data rates may be available from some of those base stations compared to others.
An example of a process that a terminal may use when attaching to a base station is shown in
Once a base station has been found that the terminal can attach to it sends a contended access message to the base station providing details of its identity and its capabilities, such as the communication modes it supports (step 205). Periodic attachment messages are not needed. The -network assumes a terminal remains attached to a given carrier on the base station until it attaches to a different carrier, base station or sends a detach message. The process terminates in step 206.
The network preferably leaves the decision to hand off to a different base station with the terminal. This minimises the network resources that need to be allocated to handoff by avoiding the substantial signalling between the base station and the terminal (of measured signal levels, handover commands etc) and between neighbouring base stations (of terminal identities, communication capabilities etc) that would otherwise be required.
Terminals may choose to periodically measure signal levels from all available cells in their location and hand off to a different cell where there is a material improvement in signal level. Moving terminals preferably make these measurements on a frequent basis so as to keep up-to-date with changes in signal levels as they move around. For static terminals, such measurement may be made as instructed by the base station. For example, the base station may be aware of a new cell recently inserted into the network and trigger a re-scan from all its attached terminals accordingly.
There are situations when the network would function better if the terminals handed over to different cells. For example, when: (1) a better signal strength is available from a neighbouring cell, allowing faster data transmission and hence a reduction in network resource requirements; and (2) a cell is congested but neighbouring cells are not. Therefore, the network may “encourage” the terminal to consider handoff.
Handover can be used to implement a distributed method of load balancing across cells in a network. If the network determines that one cell is congested, but that neighbouring cells are uncongested, it may inform the terminals in the congested cell of this. The decision to move to a different cell is, however, preferably left to the terminal. The terminal uses pre-defined algorithms in order to decide whether to move. These algorithms are preferably designed to result in optimal loading and resource allocation across the network.
It is desirable in cellular networks for loading to be reasonably evenly balanced across cells such that no one cell is congested when its neighbours are uncongested. Balancing can Often be achieved by identifying terminals that are able to receive coverage from more than one cell and moving enough of these terminals to less congested cells to re-balance the loading.
In many cellular networks the base station or the network controls all aspects of terminal mobility, including handover. In these networks it is straightforward to load balance since the network can identify those terminals that should be moved and issue handover instructions to them. However, in a machine-to-machine network, terminal mobility is preferably controlled by the terminal and not the network, with the terminal making relatively autonomous decisions as to the best cell to register on to.
When the network detects a condition where load balancing is required, it may send messages to terminals informing them of the cell that is congested and optionally providing the identities of nearby cells that are uncongested. Each terminal then decides independently whether or not to move to a different cell based on factors including:
Terminals that conclude they should move preferably wait a random length of time before performing the handover to avoid a sudden flood of traffic from one cell to another. The terminal preferably monitors its current base station to see whether the situation changes during this waiting period. If so, moving may no longer be necessary.
An example of a process by which a terminal may handover from one base station to another is shown in
Handover is not restricted to transferring terminals from one base station to another. Handover may also be used to transfer a terminal between different traffic services offered by a single base station. For example, some base stations may support multiple carriers simultaneously. Such a base station may perform load balancing across those carriers using a similar approach to that described above, i.e. by suggesting to particular terminals or classes of terminals that they handover to a different carrier. The message comprising this suggestion may also include details of the carrier to which the terminal should attach.
Leaving the final decision on handover to the terminal allows the signalling load involved in mobility management to be reduced, as explained above. There are a number of factors specific to machine-to-machine networks that enable handover to reside largely within the terminal, including the relatively infrequent nature of communications involving any particular terminal and the predictable nature of their timing. In addition, by having each terminal make its decision in dependence on algorithms that are suitably implemented by a large number of terminals throughout the network, it is possible for effective load balancing to be achieved even though ultimate management of handover resides principally in the terminals.
Handover may also be used to determine terminal location.
It is often advantageous to be able to determine the location of a terminal. For example, when deploying environmental sensors the network may determine the location of the sensor after deployment to make the deployment process more straightforward. Alternatively, location determination can be useful for tracking the location of assets.
The accuracy with which a terminal's location can be determined will depend on a number of issues including base station timing accuracy, number of base stations in range of the terminal and the terrain (because of the resultant multipath effects). There are two main methods of location: passive and active. Both are preferably supported by the network. Both methods start with a message from the network requesting the terminal instigate the location procedure.
In passive location a terminal monitors the transmissions from as many base stations as possible and determines the relative time of arrival of the synchronisation burst from each. It also decodes the identity of each base station. Preferably the terminal selects which base stations it uses. The terminal acts largely autonomously in this regard. It is also free to choose base stations with relatively low signal strength—such that the terminal might not be able to maintain an adequate communications link with that base station—since the terminal only needs to be able to decode the base station's identity and determine a time of arrival of its synchronisation burst. It then returns to its “home” base station the identities and timings of each synchronisation burst relative to the home base station. The base station then passes this information to the location server in the network which uses its knowledge of the location of each base station to triangulate the terminal location. This is then sent back to the client. Passive location requires accurate synchronisation of each of the base stations implying each base station has access to an absolute time, such as GPS time or similar.
In active location the terminal detaches from the home base station and attempts to attach to as many other base stations as it can. An example of this process is illustrated in
The location calculation could be performed in the terminal, in which case the terminal should be provided with the locations of the base stations from which it obtained its timing measurements. However, this is not a preferred option as many terminals will be relatively simple devices with limited battery and processing power. In addition, the location of the terminal is usually required by the client rather than the terminal itself. Therefore, in most instances it will be more convenient to perform the calculation in the core network.
Using handover in this way has the advantage that the different base stations do not need to be synchronised. It is a mechanism that is not appropriate for pre-existing cellular networks due to the risk that a call or other communication might be missed while the terminal attaches to the other base stations. In machine-to-machine networks this does not tend to be an issue because: (i) the base station typically knows in advance when it will need to communicate with the terminal so it can schedule the location process accordingly; and (ii) in any event the network is designed to be tolerant of delays, high latency, lost packets etc due to the inherent unreliability of operating in whitespace.
An example of the functional blocks that may be comprised in a communication device according to one embodiment of the invention are shown in
An example of the functional blocks that may be comprised in a communication terminal according to one embodiment of the invention are shown in
The apparatus in
Although one or more embodiments of the invention have been described above with specific reference to machine-to-machine networks, it should be understood that the mechanisms described above may be advantageously implemented in any type of network.
The applicants hereby disclose in isolation each individual feature described herein and any combination of two or more such features, to the extent that such features or combinations are capable of being carried out based on the present specification as a whole in light of the common general knowledge of a person skilled in the art, irrespective of whether such features or combinations of features solve any problems discloses herein, and without limitation to the scope of the claims. The applicants indicate that aspects of the present invention may consist of any such feature or combination of features. In view of the foregoing description it will be evident to a person skilled in the art that various modifications may be made within the scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
1109829.0 | Jun 2011 | GB | national |
1109830.8 | Jun 2011 | GB | national |
1109836.5 | Jun 2011 | GB | national |
1109837.3 | Jun 2011 | GB | national |
1109840.7 | Jun 2011 | GB | national |
1109844.9 | Jun 2011 | GB | national |
1109848.0 | Jun 2011 | GB | national |
1109850.6 | Jun 2011 | GB | national |
1109853.0 | Jun 2011 | GB | national |
1109854.8 | Jun 2011 | GB | national |
1109863.9 | Jun 2011 | GB | national |
1109867.0 | Jun 2011 | GB | national |
1109874.6 | Jun 2011 | GB | national |
1115528.0 | Jun 2011 | GB | national |
1116910.9 | Sep 2011 | GB | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2012/061097 | 6/12/2012 | WO | 00 | 4/7/2014 |