Wireless device, network node, and methods therein for sending message comprising indication of restriction of the wireless device

A technology for wireless devices and network nodes, applied to computer-readable storage media, to determine the restricted areas of the first device, and to solve problems such as communication failures and inability to handle authorization

Active Publication Date: 2017-04-19
TELEFON AB LM ERICSSON (PUBL)
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is because a low complexity UE may have more than 1000 bits in the buffer even though it can only send/receive at most 1000 bits at a time
[0011] Howeve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless device, network node, and methods therein for sending message comprising indication of restriction of the wireless device
  • Wireless device, network node, and methods therein for sending message comprising indication of restriction of the wireless device
  • Wireless device, network node, and methods therein for sending message comprising indication of restriction of the wireless device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0103] Embodiment 1: The T type field is introduced into the sub-header of the CCCH SDU in Msg3.

[0104] In the first embodiment, one or both of the two reserved bits R in the MAC PDU subheader of the CCCH SDU in Msg3 may be used to send an indication of TBS restriction. In this embodiment, LCID=00000 for UL-SCH can be used, which explicitly indicates CCCH on UL-SCH. Figure 7 It is a schematic diagram showing the minimum possible Msg3 authorization using two examples a) and b) of the first embodiment. Example a) is an RRC connection request, and example b) is an RRC connection reestablishment request.

[0105] The MAC subheader corresponding to the CCCH SDU in Msg3 of the first embodiment may include the following fields:

[0106] LCID: logical channel ID field 701, LCID=00000 can identify the logical channel CCCH.

[0107] -E: Extension field 702, may be set to "0", indicating that there are no more fields in the MAC header. MAC SDU 703 corresponding to CCCH may start a...

Example Embodiment

[0115] Embodiment 2: Using the LCID value indicating the BSR in Msg3 for CCCH access

[0116]In the second embodiment, the normal LCID field currently available to indicate the CCCH content in Msg3 for CCCH access may not be used. Alternatively, in this embodiment, any one of the BSR LCIDs for UL-SCH, ie, LCID=11100, 11101 or 11110, may be used, thereby also indicating one of the truncated BSR, short BSR or long BSR. In the specific case of Embodiment 2, Msg3 may be sent as part of RRC connection establishment, that is, when buffers or logical channel groups may not yet be defined. Therefore, the normal meaning of BSR may not be valid, and instead it may be used by low-complexity UEs to simultaneously indicate CCCH on UL-SCH as well as TBS restriction. The MAC control element may not be required, and the actual buffer status report may not be valid. Also, no more bytes from the MAC control element may be needed as this may increase the message size. Therefore, in some embod...

Example Embodiment

[0125] Example 3: New LCID

[0126] In a third embodiment, a new LCID for UL-SCH may be allocated with respect to an existing LCID. The new LCID can be used by low-complexity UEs to indicate both CCCH on UL-SCH and TBS restriction. Figure 9 is a schematic diagram showing the case of the smallest possible Msg3 grant according to Embodiment 3 using LCID values ​​in the range of Msg3 for CCCH access. The smallest possible Msg3 authorization is 7 bytes. Figure 9 Two non-limiting examples a) and b) are shown, but the embodiments here apply to Msg3 of any available size. Example a) is an RRC connection request, and example b) is an RRC connection reestablishment request. as in Figure 9 It can be understood from the example in the example that the MAC header of Msg3 for CCCH access corresponding to the third embodiment may include the following fields:

[0127] - LCID: Logical Channel ID field 901, some LCIDs are in the range of 00001 to 11001, can be used to indicate that th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method performed by a wireless device (130) for sending a message comprising one or more populated fields (704, 801, 901) to a network node (110). The wireless device (130) and the network node (110) operate in a wireless communications network (100). The wireless device (130) populates (701) one or more fields (704, 801, 901) comprised in an existing message to be sent to the network node (110) with an indication of a restriction of the wireless device (130). The wireless device (130) also sends (702) the message comprising the one or more populated fields (704, 801, 901) to the network node (110) prior to an enquiry or a fetching of category and capability information of the wireless device (130) by the network node (110).

Description

technical field [0001] The present disclosure generally relates to a first device and methods therein for sending a message including one or more padding fields to a second device. The present disclosure also generally relates to a second device and a method therein for determining restrictions on a first device. The present disclosure also generally relates to computer programs and computer-readable storage media having stored thereon the computer programs for performing these methods. Background technique [0002] A communication device such as a terminal is also called eg User Equipment (UE), mobile terminal, wireless terminal and / or mobile station. Terminals are capable of communicating wirelessly in a cellular communication network or wireless communication system (also sometimes referred to as a cellular radio system or cellular network). For example, the communication may be between two terminals, between a terminal and a conventional telephone and / or between a term...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W8/24H04W4/70
CPCH04W8/24H04W72/12H04W74/0833H04W4/70H04W76/10
Inventor 埃姆雷·亚武兹凯-埃里克·苏内尔沃尔特·缪勒尔贡纳·伯奎斯特
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products