Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for handling bursty network entry and re-entry in a machine-to-machine network

A processor and transmitter technology, applied in machine-to-machine/machine-type communication services, network data management, network traffic/resource management, etc., which can solve problems such as low latency, large burst size, and aperiodic transmission

Active Publication Date: 2016-10-19
INTERDIGITAL PATENT HLDG INC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Handling such real-time traffic from a large number of devices may bring new challenges to M2M communication systems, since these devices may be low-latency, and transmissions may be aperiodic and have large burst sizes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for handling bursty network entry and re-entry in a machine-to-machine network
  • Method and apparatus for handling bursty network entry and re-entry in a machine-to-machine network
  • Method and apparatus for handling bursty network entry and re-entry in a machine-to-machine network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0114] 1. A method used in a base station (BS), the method comprising:

[0115] Receive a trigger from at least one device; and

[0116] In the case of general abnormal proximity, the transmission system indicates to the at least one device.

[0117] 2. The method according to embodiment 1, further comprising:

[0118] Based on the trigger, it is determined whether a general abnormality is approaching.

[0119] 3. The method according to embodiment 1 or 2, further comprising:

[0120] Determine whether the wireless communication system has recovered.

[0121] 4. According to the method according to any one of the above embodiments, the method further includes:

[0122] In the case that the system is not restored, another system instruction is transmitted to the at least one device.

[0123] 5. The method according to any one of the above embodiments, wherein the system indication is periodically transmitted.

[0124] 6. The method of embodiment 5, wherein the periodic transmission indicated ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and apparatus for handling bursty network entry and re-entry in an M2M network. For example, a base station (BS) may receive a trigger from at least one device associated with the BS. The at least one device may be a wireless transmit / receive unit (WTRU), or it may be a network device. The BS may determine whether a general anomaly is imminent based on the trigger. The BS may transmit an indication to the at least one device if a general anomaly is imminent. The indication may indicate to the at least one device that the BS has received a general anomaly report. The WTRU may receive the indication and terminate the network entry procedure in response to the indication. The WTRU may enter a power save mode in response to the indication.

Description

[0001] Cross references to related applications [0002] This application claims the benefits of U.S. Provisional Application No. 61 / 451,852 filed on March 11, 2011, and the contents of these applications are hereby incorporated by reference. Background technique [0003] Communication systems for machine-to-machine (M2M) applications are an emerging market. M2M applications can cover a wide range of use cases, such as health care, smart meters, industrial remote maintenance and control, tracking, tracking and recovery, secure access and monitoring, public safety, consumer equipment, retail, payment, home / building automation. Although business characteristics usually change with the change of each M2M use case, some specific business characteristics can be recognized as common in multiple M2M applications. For example, data services used for periodic monitoring and reporting in M2M applications are characterized by periodicity and have miniaturized bursts (for example, <=100 by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W28/12H04L12/24H04L12/801H04W4/70
CPCH04L41/0627H04W48/16H04L41/0816H04W88/08H04W8/04H04W76/50H04W4/70Y02D30/70Y04S40/00H04W28/0205H04W28/0215H04W52/38H04W28/10H04L47/12
Inventor L·王R·G·穆里亚斯D·N·锡德A·L·宾海若S·A·格兰帝
Owner INTERDIGITAL PATENT HLDG INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More