Method for filtering uplink data based on characteristic of logical bearer

A logic bearing and characteristic technology, applied in the direction of access restriction, electrical components, wireless communication, etc., to achieve the effect of simple implementation, multi-flexibility, and simple specification

Active Publication Date: 2015-11-25
TELEFON AB LM ERICSSON (PUBL)
View PDF9 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this does not limit the applicability to other techniques

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for filtering uplink data based on characteristic of logical bearer
  • Method for filtering uplink data based on characteristic of logical bearer
  • Method for filtering uplink data based on characteristic of logical bearer

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0055] In a first example, a legacy barring parameter in system information may indicate that "mobile originating calls" is barred. However, when triggered by data belonging to, for example, QCI5 or QCI1, the NW may indicate explicit permission of access (overriding legacy access barring). Therefore, an established UE 100 in RRC connection or idle with a QCI5 or QCI1 bearer can still access the network to transmit corresponding data (eg, IMS signaling and Voice over Internet Protocol (VoIP) data). However, for traffic that does not match any of the above QoS classes (using filter 305), they should not access the network. This can be indicated explicitly with a per-QCI (per-QCI) suppression parameter, or as a result of other suppression methods. Furthermore, access by UEs 100 that are only performing initial access or that do not have an established QCI5 (or QCI1) bearer for other reasons is not allowed to access, unless they wish to trigger e.g. an emergency call or some othe...

example 2

[0057]In a second example, per-QCI barring can be applied even if no legacy barring is configured. This is considered useful, for example, if a UE 100 that has not yet established a bearer should be allowed to access the network. Furthermore, it is possible that the network may not implement traditional access class barring mechanisms at all and rely only on per-QCI mechanisms. To achieve this, the network will not set traditional prohibition parameters (such as mobile-initiated calls, etc.), so that all UEs 100 are allowed to access the network by default. The UE 100 may access the network during initial attach or when the UE does not have a configured (EPS-) bearer 301 for other reasons. Once in the RRC Linked state, the UE will be configured with at least one default bearer (eg QCI9) and possibly a QCI5 bearer which is considered to carry time-critical IMS signaling. If the network experiences high load, it may indicate to the UE that access triggered by data on the QCI9 ...

example 3

[0059] In one embodiment, barring per QCI / bearer may apply to UE 100 in idle or RRC connected. This means that it can prohibit or explicitly allow random access (in idle or connected state) or dedicated scheduling requests (in connected state). In other embodiments, the barring rule may only apply to UEs in connected mode or only to UEs in idle mode. To further increase the flexibility of embodiments of the present disclosure, the barring parameters provided to the UE 100 may explicitly indicate the state (idle and / or connected) to which they apply. In systems such as UMTS where there are more than two states, it may be beneficial to further distinguish the sub-states (CELL_FACH, URA_PCH, etc.) to which prohibition should apply

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure relates to methods and devices for filtering uplink data in a radio communication system. The present disclosure more specifically relates to a method performed in a radio device 100. The method comprises receiving, over a radio interface, a message comprising at least one barring parameter associated with a characteristic of a logical bearer 30 between the radio device and a core network 300. The method also comprises determining that an uplink data packet is associated with the characteristic of the logical bearer. The method also comprises determining, based at least on the barring parameter, whether access for transmitting the UL data packet 10 over the radio interface is allowed.

Description

technical field [0001] The present disclosure relates to methods and devices for filtering uplink data in a wireless communication system. Background technique [0002] In a typical cellular radio system, wireless terminals (also referred to as wireless devices, mobile stations and / or user equipment (UE)) communicate with one or more core networks (CN) via a radio access network (RAN). A wireless terminal may be a mobile station or user equipment (UE), such as a mobile telephone (cell phone) and a wireless-capable laptop (e.g. a mobile terminal), and thus may be, for example, voice and / or data via a wireless access network. Portable, pocket, handheld, computer-included, or vehicle-mounted mobile devices for communication. [0003] A radio access network (RAN) covers a geographical area divided into cell areas, each of which is controlled by a base station, such as a radio base station (RBS), also referred to in some networks as a Node B (NB) or an evolved Node B (eNodeB or ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W48/02H04W48/06
CPCH04W48/02H04W76/27H04W76/12H04W72/21H04W48/06
Inventor 亨宁·维曼里卡·苏斯泰瓦尔哈坎·帕姆
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products