Coverage loss recovery in wireless communication network

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to wireless communication systems. A re-entry method includes steps of receiving, by a base station of a wireless communication network, a message from a mobile station which includes an indication that the mobile station is in coverage loss recovery mode, and a mobile station identifier to identify the mobile station. The method further includes a step of determining whether a static context and/or a dynamic context associated with the mobile station identifier is stored at a previous serving base station of the mobile station and transmitting a message to the mobile station to indicate which re-entry actions are to be performed to facilitate re-entry of the mobile station into the wireless communication network.

EFFECT: simple procedure of re-entry into a network.

26 cl, 7 dwg

 

The technical field to which the invention relates.

The present invention in General relates to the field of wireless communication systems, and more specifically to methods, devices and system configurations to restore the loss of coverage in your wireless network.

The level of technology

A mobile network which provides data transmission speeds of broadband communication channel will continue to be developed and deployed. Such networks can be called here as a network with a wireless broadband access (BWA) and may include network operating in accordance with one or more protocols specified by the partnership Project 3rd generation (3GPP) and its derivatives, Forum WiMAX (worldwide interoperability of broadband wireless access) or the standards of the Institute of electrical and electronics (IEEE) 802.16 (for example, an amendment to IEEE 802.16-2009), although embodiments of disclosed here is not limited to this. The BWA network compatible with IEEE 802.16, usually referred to as WiMAX, with the abbreviation WiMAX means global interoperability of broadband wireless access and is a certification mark for products that are tested for compliance and interoperability for IEEE 802.16.

Many different types of devices can be is about to use in broadband wireless technologies. Such devices may include, for example, personal computers, handheld devices and other consumer electronics such as music players, digital cameras, etc. that is configured to communicate over networks BWA. Mobile station using the BWA network, such as WiMAX, may experience a loss of communication over the radio link with the BWA network by any of a variety of reasons, which include, for example, the loss of coverage of the radio signal. Typically, a mobile station should perform a full entry in the network including, at least, full authentication and negotiation of opportunities to re-login to the wireless network.

Brief description of drawings

Embodiments of apparent from the following detailed description, which is conducted with reference to the accompanying drawings. To facilitate this description, similar reference position designate like structural elements. Embodiments of shows by way of example and not limited by the figures of the accompanying drawings, in which:

1 schematically depicts an example network architecture (BWA) broadband wireless access, according to some variants of implementation;

figure 2 schematically depicts an example sequence of operations recovery of the loss of coverage for network b is Spravochnoe communication according to some variants of implementation;

figure 3 - diagram of the operational sequence of the method of storing one or more contexts associated with a mobile station, according to some variants of implementation;

4 is a diagram of a sequence of operations other way of storing one or more contexts associated with a mobile station, according to some variants of implementation;

5 is a diagram of a sequence of operations of a method of restoring the loss of coverage, according to some variants of implementation;

6 is a diagram of a sequence of operations another way to restore the loss of coverage, according to some variants of implementation;

7 schematically depicts an example system based on the processor that can be used for the practical implementation of the various embodiments described herein.

Detailed description of the invention

Embodiments of the present invention provide technology and configuration to restore the loss of coverage in your wireless network. The following detailed description given with reference to the accompanying drawings, which form a part of it, where similar reference position designate similar parts throughout, and in which is shown that can be implemented in practice group is a rotary illustrative embodiments. It should be understood that it is possible to use other embodiments of, and structural or logical changes can be performed without deviating from the scope of the present invention. Therefore, the following detailed description should not be construed in a restrictive sense, and the scope of the embodiments is limited by the attached claims and their equivalents.

Various operations can consistently be described as multiple discrete steps or operations in a way that is most suitable for understanding the claimed subject matter. However, the order of description should not be construed to imply that these operations are mandatory dependent manner. In particular, these operations can not be performed in the order of presentation. The described operations can be performed in a different order than described in the embodiment. You can perform various additional operations and/or you can omit the procedure described in additional options for implementation.

For the purposes of the present invention, the phrase "a and/or b" means (A), (B) or (a and b). For the purposes of the present invention, the phrase "A, b and/or C" means (A), (B), (C), (a and b), (a and C), and (b and C) or (a, b and C).

The description may use the phrases "in an embodiment" or "in the nature of the implementation, each of to whom that may relate to one or more of the same or different embodiments. Moreover, the terms "comprising", "includes", "having" and the like, which are used in relation to variants of implementation of the present invention, are synonyms.

Used herein, the term "module" may refer to, be part of or include a specialized integrated circuit (ASIC), electronic circuit, a processor (shared, dedicated or group) and/or memory)that execute one or more software or hardware, combinational logic circuit, and/or other suitable components that provide the described functionality.

Although an implementation option can be described here in relation to broadband wireless access for wireless networks on a city scale (WMAN)such as a WiMAX network, embodiments of the present invention is not limited to this and can be applied to other types of wireless networks, where it is possible to obtain similar advantages. Such networks include, but are not limited to, wireless local area network (WLAN), wireless personal area networks (WPAN) and/or wireless regional area network (WWAN), such as a cellular network or similar.

The following implementation options can be used in many applications, including transmitters and receivers is rich wireless radio systems. Radio systems specifically included within the scope of embodiments of the present invention include, but are not limited to, network interface cards (NICs), network adaptors, base station, access point (AP), gateways, bridges, hubs and satellite phones. Moreover, the radio systems within the scope of embodiments of the present invention may include satellite system, personal communication system (PCS), two-way radio systems, global positioning system (GPS), two-way pagers, personal computers (PCs) and peripherals associated with them, personal digital assistants (PDA), accessories for personal computer and all existing systems and systems that will appear in the future, which may be related in nature and which can be appropriately applied the principles of the embodiments.

1 schematically depicts a network 100 broadband wireless access (BWA), according to some variants of implementation. The network 100 BWA may be a network that has one or more radio access networks (RAN), including the RAN 20 and the core network 25.

Mobile station (MS) 15 may have access to the core network 25 via line radio communication with a base station (BS) (e.g., BS 40,42 and so on) in the RAN 20. MS 15 which may represent, for example, the station, installing and using a working connection to the network 100 BWA, which uses protocols that are compatible with the IEEE 802.16 (e.g., IEEE 802.16-2009, approved may 13, 2009, or IEEE 802.16m standard version 5 approved April 2010) or WiMAX standards, such as standards network working group (NWG) version 1.5 or its variants. Base station 40, 42 can perform transmission/reception of messages between the MS 15 and the core network 25. Although in figure 1, in General, shows MS 15 as a cellular phone, in various embodiments, the implementation of the MS 15 may be a functional computer (PC), laptop computer, ultra-mobile PC (UMPC), a handheld mobile device, a universal map-based integrated circuits (UICC), a personal digital assistant (PDA), telecommunication equipment installed in customer premises (CPE)or other consumer electronics such as MP3 players, digital cameras, etc.

In some embodiments, the implementation, the connection with the MS 15 through the RAN 20 may be provided through one or more gateways, network access services (ASN-GW), for example, ASN-GW 45, while the options for implementation are not limited to this specific type of network implementation. ASN-GW 45 (or other similar type of network node) may act as the interface between the core network 25 and the RAN 20. Thus, the ASN-GW 45 can maintain rivate communication with multiple base stations 40, 42 and can function as a controller type BS and/or switching center mobile communications (MSC) to provide management handover and other functions for the RAN 20, while the options for implementation are not limited to this. When installing WiMAX, the RAN 20 may include network access services (ASN) provider access network (NAP), and the core network 25 may include a network connection services (CSN) provider access network (NSP).

The core network 25 may include logic (e.g., a module) to activate/control 15 MS or other activities associated with the MS 15. For example, the core network 25 typically includes one or more servers 50. One or more servers may include, for example, server authentication, authorization, and accounting (ADA), the server OMA-DM server initialization, the server bootstrap, the subscription server and/or a home agent (ON). One or more servers 50 can communicate with the base stations 40, 42 through line 80 connection to send/receive messages related to the management/operation 15 MS in the network 100 BWA. One or more servers 50 can be called wireless (OTA) servers. In some embodiments, implementation, logic associated with the various functionalities of one or more servers 50, can be combined to reduce the number of servers, including, for example, merging into one machine.

Figure 2 schematically and obrazana sequence of operations 200 recovery loss coverage area for a wireless network (for example, network 100 BWA), according to some variants of implementation. As shown in figures 1 and 2, the actions associated with the initial entry into the network at step 202, are performed using wireless communication devices (e.g., 15 MS) to log in to the wireless communications network (for example, in network 100 BWA). For example, the MS 15 may enter the service area for NSP network 100 BWA. The MS 15 may perform actions associated with the discovery and network selection (ND&S), such as scanning and finding ads for the NSP, which is wirelessly transmitted from a transmitter (e.g., BS 40 RAN 20) network 100 BWA. The MS 15 may perform additional actions, including, for example, the definition of the range, coordination capabilities, authentication, authorization and/or registration.

Activities associated with the initial entry into the network at step 202, may include communication with the core network 25. For example, the actions associated with the authentication can be performed by servers PTA (e.g., AAA server) while maintaining a wireless connection with the MS 15 through the base station (e.g., BS 40) and can be performed using, for example, extensible authentication Protocol (EAP). According to some variants of implementation, one or more servers 50 can perform authentication for networks that do not use the functionality of the PTA, such as initializing the PTA.

the donkey initial network entry at step 202 15 MS in the network 100 BWA, The MS 15 may obtain the address of Internet Protocol (IP) stage 204 to establish a data channel with the network 100 BWA and/or servers PTA. The IP address can be provide, for example, using a server in the network connection service (CSN) network 100 BWA using Protocol dynamic host configuration (DHCP). You can support other configurations and/or protocols. After receiving the IP address at step 204, the MS 15 may be connected to network 100 BWA at step 206.

The MS 15 may experience a loss of coverage at the step 208. Embodiments of described herein provide reentrancy wireless communication devices (e.g., 15 MS) in a BWA network after the wireless device experiences a loss of coverage. Loss of coverage (for example, at step 208), which is used here, refers in a broad sense to any situation where the wireless communication is disconnected by the radio communication network 100 BWA. Embodiments of described herein, for example, allow you to eliminate or reduce the number of actions to be performed by the wireless communication device to re-enter the network 100 BWA after loss of coverage.

The RAN 20 may detect the loss of coverage on the stage 210. For example, last serving base station (e.g., BS 40) may send unsolicited periodic command is about determining the distance, unsolicited grant or some other type of message control access to the transmission medium (MAC)if you do not find the action radio from 15 MS for a specified period of time. If BS 40 does not accept the answer message sent from the BS 40 within a predetermined period of time, BS 40 detects that the MS 15 is in a state of loss coverage on the stage 210. Other types of scenarios that verify the availability of the MS 15, can be used with BS 40 for detecting loss of coverage on the stage 210.

Before describing the next steps to recover from the loss of coverage according to the sequence of operations 200 that describes one or more contexts associated with the MS 15. One or more contexts associated with the MS 15, it is possible to maintain and/or keep with the RAN 20 or core network 25 to ensure re-entry 15 MS in the network 100 BWA by providing information that allows the MS 15 and other objects of the BWA network, such as BS 40, to eliminate or reduce the number of actions for re-entry, which will be executed before re-entry 15 MS in a BWA network. One or more contexts can include a static context and/or dynamic context.

Static context, as a rule, effective for different transmitting stations (e.g., BS 40, BS 42) domain NAP. The static context may include the information which is associated with a network domain addressing, security context, paging communication, performance, flow, services, and configuration of layer 3 (L3) for MS 15. According to different variants of implementation, information about addressing includes, for example, the ID of the mobile station (MSID) to uniquely identify the mobile station in network 100 BWA, the identifier of the base station (BSID) to identify the last serving base station (e.g., BS 40) for 15 MS or base station, where MS 15 last updated location (LU) or network logon/attempt re-entry, and/or the MAC address of the MS 15.

MSID can be a hashed 48-bit version of the 48-bit MAC address of the MS 15 to ensure the secrecy of the 48-bit MAC address, when it is impossible to ensure secrecy. In the embodiment, the MSID is the last MSID, which was used to establish a security context using BS 40 (for example, during the authentication at initial entry 202 in the network). For example, the MSID can be an identifier transmitted in the BS 40 with 15 MS before authentication. Security keys shared between the BS 40 and 15 MS, such as the authentication key (AK) and derived keys can be obtained using MSID. Static context m which should be indexed using the MSID and/or BSID.

According to different variants of implementation, information about the security context of the static context includes a master session key (MSK), pair MASTEK key (RMK) and/or count key message authentication codes based encryption (SMAS). Information about the paging static context may include the group identifier paging (PGID) and/or ID (DID) mode cancellation of registration with maintaining context (DCR). Information about the possibility of a static context may include information related to the capabilities of the hardware MS 15. Information about the flow of services of the static context may include information associated with the subscription services MS 15. Information about the configuration of L3 may include the IP address and related information.

Returning to the dynamic context dynamic context can be generally effective for a particular BS (e.g., BS 40) domain NAP. Dynamic context may, for example, include information related to the security keys low level, such as AK and derived keys, the buffer and the status of automatic resend request (ARQ) or specific cell identifiers transmitted over the radio interface, such as an identifier of stations (STID).

One or more contexts associated the MS 15, you can save in the RAN 20 (e.g., last serving base station 15 MS), or in the core network 25, or both, in accordance with various technologies described herein. For example, support/storage of one or more contexts may depend on whether 15 MS in idle mode or active mode. For clarity, the sequence of operations 200 depicts only support/storage of one or more contexts for connected/working 15 MS in active mode when performing operations on the stages 210, 212, 214, 216 and 218. However, the support/storage of one or more connected/working 15 MS in idle mode described with reference to figure 4, and support/storage you can replace or be combined with the technologies described in the sequence of operations 200, according to various implementation options.

Returning to the sequence of operations 200 at step 212, the latter serving base station (e.g., BS 40) may start a timer T1 preserve the context(s) in response to detection of the loss of coverage at the step 210, according to various implementation options. The timer T1 preserve the context(s) specifies the time period in which the serving base station supports or locally stores one or more contexts associated with the MS 15, when the loss of coverage. One or more Conte the ists are locally stored in the last serving base station during operation of the timer T1 preserve the context(s) to ensure re-enter the network 100 BWA, if the MS 15 is returned to the network 100 BWA before the expiry of the period of time T1. In the embodiment, the latter serving base station locally stores and caches both static context and dynamic context associated with the MS 15. According to different variants of implementation, the timer T1 preserve the context(s) is the time period of the order of seconds, but is not limited to this.

In response to the expiration of the time period of timer T1 preserve the context(s) in step 214, the latter serving base station promotes and maintains a static context associated with the MS 15, in the core network 25 at step 216. For example, last serving base station (e.g., BS 40) may signal to the network node (e.g., ASN-GW 45) for caching static context in the core network 25. The core network 25 may trigger the timer, during which the static context is maintained/stored in the core network. Static context is stored in the core network 25 can be removed in response to expiration of the timer. According to different variants of implementation, the timer associated with the storing static context in the core network 25 has a period of time of the order of hours, but is not limited to this.

At step 218, the latter serving base station deletes the locally stored contexts on the side of the RAN 20. In option is sushestvennee, the last serving base station removes the dynamic context and static context associated with the mobile station, from the last serving base station after the alarm network node for caching static context in the network. For clarity, the steps described here, which runs the latest serving base station can be performed using the module RAN 20 that is external to the latter serving base station.

Returning now to the side 15 MS after loss of coverage at the step 208, the MS 15 may detect the loss of coverage at the step 220, in accordance with various technologies. For example, the MS 15 may detect the loss of coverage by using a control channel, which is used for communication in a wireless communication network. Loss coverage you can find when MS 15 loses synchronization, such as, for example, synchronization of the physical layer (PHY)synchronization of the downlink (DL) or uplink synchronization link (UL). In other embodiments, the implementation can use different principles of detection of loss of coverage within 15 MS.

Steps to detect loss coverage last serving base station at step 210 and the timer T1 preserve the context(s) can provide sufficient time DL is in to 15 MS was able to detect loss of coverage on the stage 220 or to perform periodic determination of the range in order to reduce the possibility of non-synchronized state between the MS 15 and the last serving base station. "Unsynchronized state" refers to the condition where the last serving base station detects the loss of coverage, not 15 MS, or Vice versa.

After detection of the loss of coverage, the MS 15 scans or executes a periodic definition of the range for detection of RAN 20 (e.g., BS 40) to re-enter the network 100 BWA. The MS 15 may, for example, to scan and find last-serving base station (e.g., BS 40) or another base station (for example, BS 42) network 100 BWA.

The MS 15 may communicate with the detected base station to determine whether it is still valid security context that is used to secure communications between 15 MS and the network 100 BWA. For example, the MS 15 may receive the message via the detected base station, which indicates that the network 100 BWA is valid or invalid. The security context may be valid for a shorter period of time than other contexts static context for security reasons. For example, if the context of safety the activity or the static context is invalid in the core network 25, you may need to complete the authentication for re-entry 15 MS in the network 100 BWA. In another example, if 15 MS loses coverage in the network 100 BWA, which operates according to the IEEE 802.16m standard, and re-enters the network 100 BWA, which operates according to a different Protocol, the security context may not be valid, and you can perform a full authentication for re-entry 15 MS in the network 100 BWA. When the security context is invalid, the network can still save MSID MS 15 as an index so that, when MS 15 tries to log on to the network 100 BWA, MSID can be used to find a different security context for the MS 15, which has become invalid.

At step 226, 15 MS sends a message, such as a request message on the definition of the range (RNG-REQ) in the detected base station. The message includes the indication that the MS 15 is in recovery mode loss coverage. In the embodiment, the message includes a bit of recovery of loss coverage in order to show that MS 15 is in recovery mode loss coverage. Bit recovery loss coverage, for example, can be a bit #7 in the parameter indicating the purpose of determining the distance messages RNG-REQ. If bit #7 is set to 1, the MS 15 is in the mode vosstanovlenie the loss of coverage.

The message is sent to the MS 15 at step 226 may additionally include the latest used MSID for the identification of any stored and indexed contexts associated with the MSID, RAN 20 or core network 25. Another network that is assigned the ID can be used if the MS has previously received such appointment ID. The message is sent to the MS 15 may additionally include the last BSID of the service (for example, the last linked) to the base station. In the embodiment, BSID only included in the message if the detected base station (for example, BS 42) in step 222 to re-enter the network 100 is different from the last serving base station (e.g., BS 40), thereby reducing the costs of the transmitted information in the network 100 BWA.

The message sent to the MS 15 may additionally include information about the code authentication for secure communications between the base station and mobile station. According to different variants of implementation, information about the authentication code includes a digest of the SMAS. The key may be the same as in the scheme of re-entry when handover (BUT), which is defined in IEEE 802.16. In the embodiment, information about the code authentication may further include counting keys SMAS, when discovered, the basic is the first station (e.g., BS 42) differs from the last-serving base station (e.g., BS 40). Key recovery can be performed if the detected base station (for example, BS 42) differs from the last-serving base station (e.g., BS 40). The MS 15 may obtain AK and other keys SMAS from MSK/PMK higher level (e.g., which may be part of the static context) using the BSID detected base station if it is requested by the underlying network 25.

It should be noted that the action of the sequence of operations 200 that occur after the loss of 208 coverage, can take place in a manner that differs from that which is depicted. This may be because of the uncertainty of the duration of time loss coverage at 15 MS, which can determine the range, for example, on the order of seconds to hours depending on the situation. For example, according to different variants of implementation, the MS 15 may send a message at step 226 before or after the expiration of timer T1 preserve the context(s) in step 212. For another example, the base station is detected at the step 222 may determine whether one or more contexts in the last serving base station at step 228 before or after the expiration of timer T1 preserve the context(s) in step 212.

At step 228, the base camp of the Oia, detected at step 222 determines whether one or more contexts (e.g., dynamic and/or static) in the last serving base station. In one embodiment, the detected base station checks to determine whether the locally accessible one or more contexts (e.g., not yet deleted at step 218), if the base station (e.g., BS 40)detected at the step 222 is the same as the last serving base station (e.g., BS 40). Detected base station may check to determine whether the locally accessible one or more contexts by finding one or more contexts, indexed using the MSID in the media information associated with the detected base station.

In another embodiment, if the base station (for example, BS 42)detected at step 222, differs from the latter serving base station (e.g., BS 40), the detected base station checks to determine whether one or more contexts in the last serving base station. Detected base station may, for example, to establish a logical communication line (for example, through interface type R8) with the latter serving base station using the BSID, which is provided in the message sent to the MS 15 at step 226 to identify the last serving base station. Detected base station may check to determine whether one or more contexts in the last serving base station by finding one or more contexts, indexed using the MSID in the media associated with the latter serving base station.

If one or more contexts found in the last serving base station at step 228, one or more contexts stored base station, is used in step 230 to determine that the information associated with the instructions to re-log, must be included in the message, such as message response determine the range (RNG-RESP) 15 MS at step 236. However, if one or more contexts is not found in the last serving base station at step 228, the base station is detected at step 222, may signal to the network node (e.g., ASN-GW45 interface type R6) to request a static context at step 232 stored in the core network 25 at step 216 using MSID or using information about the MSID and/or BSID, sent with a message from MS 15 at step 226. At step 234, the static context stored by the network, is used in step 230 to determine whether the information associated with the instructions to re-log on, be included in the message for the MS 15 to etape.

The base station sends a message to the MS 15 at step 236, in order to show what steps to re-sign (e.g., MAC control messages), you need to perform to ensure re-entry 15 MS in the network 100 BWA. In the embodiment where the base station is detected at step 222, uses a dynamic context and static context, stored in the last-serving base station at step 230, the message sent at 15 MS at step 236, shows that the action for re-entry includes partial authentication, which includes the exchange of authentication code. Additionally, or alternatively, the message sent to the MS at step 236, may show that the action for re-entry includes a request that the mobile station supports the previous state automatically resend request (ARQ) of the mobile station, and mobile station updates the state of the ARQ via explicit confirmation in the base station. Steps to re-sign can show that you only need to perform a quick exchange authentication code in the MAC messages to perform re-entry 15 MS in the network 100 BWA. For clarity, the steps to re-enter in this embodiment do not include a complete authentication and negotiation of capabilities and, thus the m enable MS 15 re-entry into the BWA network without any action on full authentication and matching opportunities. Such actions for re-entry can generally follow the scheme of the process of handover, which is defined in IEEE 802.16, according to different variants of implementation.

In another embodiment, where the base station is detected at step 222, uses a static context stored in the core network 25 at step 234, the message sent to the MS at step 236, indicates that the action for re-entry include partial authentication, which includes the exchange of authentication code and reinstalling the data transmission channel of the MAC layer. To have actions for re-entry can show that only a quick exchange authentication code in the message MAC and reinstall/restart data transmission channel of the MAC layer (e.g., STID, the ARQ buffer, and so on) must be performed for re-entry 15 MS in the network 100 BWA. For clarity, the steps to re-enter in this embodiment do not include a complete authentication and negotiation of capabilities and, thus, allow 15 MS to re-enter the BWA network without any action on full authentication and matching opportunities. Such actions to re-enter can usually follow the red scheme is entering standby mode, which is defined in IEEE 802.16, according to different variants of implementation.

Steps for re-entry can be displayed in one or more MAC control message or in the bitmap optimization re-entry, which is included in the message at step 236. The message sent to the MS at step 236, may optionally include a digest of the SMAS.

At step 238, MS 15 performs the steps for re-entry activity-based re-entry, which is shown in the message, adopted at step 236. In the case where the base station detects the loss of coverage on the stage 210, and 15 MS does not detect a loss of coverage on the stage 220 (e.g., unsynchronized state), the MS may attempt to resume their normal operation, connection/activity step 206 using the latest serving base station. The last serving base station allows the MS 15 to resume normal operation without requiring re-enter the network 100 BWA. That is, the MS 15 may not send the message to the base station at step 226 in such a scenario. The last serving base station can only run a query on whether the MS 15 to adjust or synchronize the PHY level.

Figure 3 shows the sequence of operations of the method 300 for storing one or more contexts associated with the mobile station, is under some variants of implementation. In the embodiment, method 300 is performed after the loss of coverage (for example, at step 208 in figure 2) using a base station (e.g., BS 40 in figure 1), which communicates with a mobile station in active mode (for example, in contrast to the standby mode when there is a loss of coverage (for example, at step 208 figure 2). According to different variants of implementation, the steps of method 300 are performed using a base station of a radio access network (for example, the RAN 20 figure 1-2) or network module with a radio that can communicate with the base station.

At step 302, method 300 includes maintaining a static context and/or the dynamic context associated with the mobile station and a base station. According to different variants of implementation as a static context and dynamic context is stored in the base station.

At step 304, the method 300 optionally includes detecting, via the base station, the loss of coverage of a mobile station (for example, 15 MS figure 1-2) on the wireless network. At step 306, the method 300 additionally includes starting a timer (e.g. timer T1 preserve the context(s) in step 212 (2)) in response to detection of the loss of coverage area the mobile station. At step 308, the method 300 additionally includes a signaling network node (e.g., ASN-GW45(1)) for remote save (for example, in the core network 25 (2)) static context associated with the mobile station on the basis or in response to expiration of the timer. At step 310, the method 300 additionally includes the static context and/or the dynamic context, which is stored in the base station and associated with the mobile station. Dynamic and static contexts can be removed after the signaling network node.

Figure 4 shows the sequence of operations of another method 400 for one or more contexts associated with a mobile station, according to some variants of implementation. In the embodiment, the steps of method 400 performed before and/or after the loss of coverage (for example, at step 208 (figure 2)using the base station (e.g., BS 40 (figure 1), which communicates with a mobile station in idle mode (for example, in contrast to active mode), when there is a loss of coverage (for example, at step 208 (2)). According to different variants of implementation, the steps of method 400 are performed using a base station of a radio access network (for example, the RAN 20 (Fig.1-2)) or network module with a radio that can communicate with the base station.

At step 402, method 400 includes detecting, via the base station, the loss of coverage area the mobile station in the wireless network St is zi. At step 404, the method 400 additionally includes a signaling network node for remote save a static context associated with the mobile station. The static context may be associated with the MSID of the mobile station for the purpose of paging. According to different variants of implementation, at step 404 can be performed signaling network node before or after the detection of the loss of coverage at the step 402. In one embodiment, the signaling network node at step 404 is performed when the base station detects that the mobile station is in idle mode. Signaling at step 404 can be performed in response to the above-mentioned detection of the loss of coverage at the step 402 in different variants of implementation. At step 406, the method 400 additionally includes starting a timer in response to detection of the loss of coverage area the mobile station. At step 408, the method 400 additionally includes removing the dynamic context and static context, which is stored in the base station and associated with a mobile station (for example, using MSID), and the removal is performed in response to expiration of the timer.

Figure 5 shows a sequence of operations of the method 500 for recovery of loss of coverage, according to some variants of implementation. The method 500 can be performed by using the transmitter/receiver (e.g., BS 40 (Fig. 1)) the network radio access (for example, the RAN 20 (Fig.1-2)) or module that can communicate with the transmitter/receiver.

At step 502, the method 500 includes receiving a message (e.g., RNG-REQ at step 226 (2)) from the mobile station (for example, 15 MS (figure 1-2)), which shows that the mobile station is in recovery mode loss coverage. Bit recovery loss can be used to show that the mobile station is in a state of loss coverage. The message from the mobile station may further include an identifier of the mobile station (e.g., MSID) to identify the mobile station. The message from the mobile station may further include an identifier of the base station (e.g., BSID), if the base station receiving the message differs from the previous serving base station to the mobile station. Previous serving base station may be a last serving base station to the mobile station before the loss of coverage. The identifier of the base station can be used to help determine whether to keep the dynamic context and/or a static context in the previous serving base station to the mobile station at step 504. The message from the mobile station can further include the step in the digest message authentication codes, based on the encryption (SMAS), to ensure secure communications between the base station and mobile station.

At step 504, the method 500 additionally includes determining whether the dynamic context and/or a static context in the previous serving base station to the mobile station. If the base station receiving the message from the mobile station at step 502 is the same as the previous serving base station, the base station may check the local conservation of the base station using the identifier of the mobile station to locate and obtain dynamic context and/or a static context. If the base station receiving the message from the mobile station at step 502, differs from the previous serving base station, the base station can establish a logical communication line with the previous serving base station using the identifier of the base station and to determine the location and to obtain a dynamic context and/or a static context using the ID of the mobile station.

At step 506, the method further includes signaling network node to obtain a static context associated with the identifier of the mobile station and stored on sitevision (for example, in the core network 25 (1-2)), if the base station cannot determine the location of the dynamic context and/or a static context in the previous serving base station to the mobile station.

At step 508, the method 500 additionally includes a message (e.g., RNG-RESP in MS at step 236 (2)) in the mobile station in order to show what actions to re-enter you must do. Steps for re-entry may include, essentially, several actions as opposed to those performed by the mobile station performs the initial entry into the network to ensure rapid re-enter the network (for example, in network 100 BWA) after a temporary loss of coverage area of the mobile station. Steps for re-entry is shown in the message to the mobile station at step 508 may be based in part on said determining whether saved or not dynamic context and/or the static context of the previous serving base station to the mobile station at step 504.

In one embodiment, if it is determined that the dynamic context associated with the identification of the mobile station, saved from a previous serving base station to the mobile station, the message in the mobile station can show that the action for re-entry includes SEB is (i) partial authentication includes currency authentication code. Action to re-enter does not include, for example, (i) full authentication and (ii) coordination capabilities.

In another embodiment, if it is determined that the dynamic context associated with the identification of the mobile station, is not saved in the previous serving base station to the mobile station, the message in the mobile station can show that the action for re-entry includes (i) a partial authentication, which includes the exchange of authentication code and (ii) reinstallation of the data transmission channel of the MAC layer. Steps for re-entry do not include, for example, (i) full authentication and (ii) coordination capabilities.

Figure 6 shows the sequence of operations of another method 600 for recovery of loss of coverage, according to some variants of implementation. The method 600 can be performed using a mobile station (for example, 15 MS (figure 1-2)) in a wireless communication network (e.g., network 100 BWA (1)).

At step 602, method 600 includes detecting, by a mobile station, the loss of coverage of a mobile station in a wireless communication network. At step 604, the method 600 optionally includes scanning for the detection of the base station (e.g., BS 40) 1)) to re-login to the wireless network. With animowane may include, for example, periodic determination of distance. After the base station has been detected for the re-entry of a mobile station in a wireless communications network, the mobile station determines whether it is still valid security context associated with the mobile station in a wireless communication network. If the security context is invalid, the mobile station should perform a full authentication request objects (for example, AAA server core network 25 (Fig 1) or BS 40 (1)) wireless communication network. The mobile station may, for example, to receive a new message authentication code.

At step 608, the method 600 optionally includes transmitting, by a mobile station in a base station of wireless communication network, the message (e.g., RNG-REQ to the BS at step 226 (2)), which involves identifying that the mobile station is in recovery mode loss coverage and protect the integrity security, if it applies. Bit recovery loss can be used to indicate that the mobile station is in recovery mode loss coverage. The message in the base station may further include an identifier of the mobile station (e.g., MSID). The message in the base station may further include an identifier of the base is the first station (e.g., BSID). For example, the message in the base station may include BSID, if the base station intended to receive messages from the mobile station, differs from the previous service (e.g., last serving) base station mobile station. The message in the base station may further include a digest of the SMAS, if it applies (for example, queried over the network). The message in the base station may further include the newly received message authentication code and/or a request for full authentication to restore all security keys, if at step 606 it is determined that the security context is invalid.

At step 610, the method 600 further includes receiving messages (e.g., RNG-RESP in MS at step 236 (2)) from the base station, which indicates what action to re-enter you must perform to ensure the re-entry of a mobile station in a wireless communications network. At step 612, the method 600 optionally includes the steps for re-entry are shown in the message passed from the base station.

7 schematically depicts an exemplary system based on the processor that can be used to implement various embodiments described herein. % Sorna system 2000 may be a desktop computer, portable personal computer, a pocket personal computer, tablet computer, personal digital assistant (PDA), a server, an Internet device and/or any other type of computing device. In some embodiments, the implementation, the processor system 2000 may function as a mobile station (for example, 15 MS (figure 1-2)), a base station (e.g., BS 40 or 42) wireless communication network or to provide the logic that performs similar functions.

Processor system 2000 shown in Fig.7 includes a microprocessor kit 2010, which includes a controller 2012 and memory controller 2014 input/output (I / O). Microprocessor kit 2010 provides the memory and control functions I / o, and can provide a number of General purpose registers and/or special purpose, timers, etc. that are accessible or used by the processor 2020. The processor 2020 can be implemented using one or more processors, WLAN components, components, WMAN, WWAN components and/or other suitable processor components. The processor 2020 may include a cache memory 2022, which can be implemented using unified cache (L1) of the first level unified cache (L2) second-level unified cache (L3) of the third level and/or any other the x suitable structures for data storage. The processor 2020 may be performed with the opportunity to communicate with the mobile station or one or more servers OTA wireless network.

The controller 2012 memory can perform functions that enable the processor 2020 to provide access and connectivity memory 2030 includes volatile memory 2032 and non-volatile memory 2034, via the bus 2040. Although figure 7 shows the bus 2040 for communication of the various components with each other, other options for implementation may include additional/ alternative interfaces.

Volatile memory 2032 can be implemented using synchronous dynamic memory with random access (SDRAM), dynamic memory with random access (DRAM), a dynamic memory with random access, developed by RAMBUS (RDRAM), and/or any other type of storage device with random access. Non-volatile memory 2034 can be implemented using flash memory, permanent memory (ROM), electronically-programmable permanent memory (EEPROM) and/or any other type of storage device.

Below is disclosed product. The product may include computer-readable media having instructions stored thereon, which, if the execution result in the actions described here. Parking is itemy media may include, for example, components of RAM 2030 and/or mass storage device(a) 2080, or any other suitable medium.

The processor system 2000 may also include a scheme 2050 interface, which is connected with the bus 2040. Scheme 2050 interface can be implemented using any type of interface standard, such as an Ethernet interface, a universal serial bus (USB)interface based on the input/output interface of the third generation (ZOE), and/or any other suitable type of interface.

One or more devices 2060 input can be connected to the circuit 2050 interface. Input device(s) 2060 allows a person to enter data and commands into the processor 2020. For example, device(s) 2060 input can be implemented using a keyboard, mouse, touch screen, touch pad, trackball for cursor control, manipulator Isopoint, and/or a voice recognition system.

One or more devices 2070 output can also be connected to the circuit 2050 interface. For example, device(s) 2070 output can be implemented using display devices (for example, light-emitting display (LED), liquid crystal display (LCD), a display based on the cathode-ray tube (CRT), a printer and/or loudspeaker). Scheme 2050 interface may include, among other things, CT is the graphics driver.

The processor system 2000 may also include one or more mass storage device 2080 for storing software and data. Examples of such mass storage device (s) 2080 include floppy disks and drives, floppy disk drives, hard disk drives, CD-drives and digital versatile disk (DVD) drives.

Scheme 2050 interface can also include a communications device such as a modem or network interface card to ensure exchange of data with external computers via a network. The line of communication between the processor system 2000 and the network may be any type of network connection such as an Ethernet connection, a digital subscriber line (DSL), telephone line, cellular telephone system, coaxial cable, etc.

In some embodiments, the implementation, the processor system 2000 may be associated with antenna structure (figure not shown) to provide access to other devices on the network. In some embodiments, the implementation, the antenna structure may include one or more directional antennas that radiate or receive, mainly in one direction (for example, within 120 degrees) and are connected to each other to provide essentially omnidirectional review; or one or more Omni-directional antennas, which is suchaut or receive equally well in all directions. In some embodiments, the implementation, the antenna structure may include one or more directional and/or Omni-directional antennas, including, for example, a symmetric array antenna, unbalanced vibrator antenna, patch antenna, loop antenna, a microstrip antenna or any other type of antenna suitable for transmitting/receiving OTA RF signals.

The controller 2014 I / o can control access to the device (s) 2060 input device(s) 2070 o, mass storage device (mass storage devices) 2080 and/or network. In particular, the controller 2014 I / o can perform functions that enable the processor 2020 to communicate with the device(s) 2060 input device(s) 2070 o, mass storage device (mass storage devices) 2080 and/or network via the bus 2040 and schema 2050 interface.

Although the components shown in Fig.7, are depicted as separate blocks within the processor system 2000, the functions performed by some of these blocks can be combined within a single semiconductor circuit or 'can be implemented using two or more separate integrated circuits. For example, although the controller 2012 and memory controller 2014 I / o are depicted as separate blocks within the microprocessor set 2010, USB circuits is p 2012 memory and the controller, 2014 I / o can be combined within a single semiconductor circuit.

Although some embodiments of have been shown and described herein for purposes of description, a wide variety of alternate and/or equivalent embodiments or implementations that are designed to achieve the same goals, can be used instead of embodiments shown and described without deviating from the scope of the present invention. This application is intended to cover any improvements and modifications of the embodiments described herein. It is therefore evident that the embodiments of described herein, will be limited only by the claims and its equivalents.

1. How to simplify re-enter the wireless communications network, comprising stages, which are:
receive, via the base station wireless communication network from the mobile station, a message that includes:
bit having a value indicating that the mobile station is in recovery mode coverage, and
the ID of the mobile station to identify the mobile station, and
the identifier of the base station if the base station performing the above message is received from the mobile station, differs from the previous serving base station to the mobile station;
determine that you saved the static context and/or dynamic context, svyazannyis the ID of the mobile station, in a previous serving base station at least partially based on the identifier of the base station; and
transmit the message to the mobile station in order to show what actions to re-enter must be performed to ensure the re-entry of a mobile station in a wireless communications network, in which the steps for re-entry is based, at least in part on said determining that you saved the static context and/or the dynamic context associated with the mobile station, in a previous serving base station to the mobile station, in which the above-mentioned transfer message to the mobile station indicates that the action for re-entry include a request for that mobile station supports the previous state of the automatic request retransmission (ARQ) of the mobile station and updates the state of the ARQ through clear evidence base station, and in which the steps for re-entry do not include a complete authentication and negotiation of capabilities, if it is determined that the static context and/or the dynamic context associated with the identifier of the mobile station, saved from a previous serving base station to the mobile station.

2. The method according to claim 1, additionally containing a stage, on which:
signalizer the Ute in a network node for receiving a static context associated with the ID of the mobile station, which is stored remotely on the network side, if it is determined that the static context and/or the dynamic context is not saved in the previous serving base station to the mobile station.

3. The method according to claim 2, in which the above-mentioned transfer message to the mobile station indicates that the action for re-entry include reinstallation of the data link level access control for transmission medium (MAC) and partial authentication exchange authentication code and do not include a complete authentication and negotiation of capabilities, if it is determined that the static context and/or the dynamic context is not saved in the previous serving base station to the mobile station.

4. The method according to claim 1, further comprising stages, which are:
detect, using the previous serving base station, the loss of coverage area the mobile station;
start the timer based on the aforementioned detection of the loss of coverage; and
remove the dynamic context, which is stored in the previous serving base station and associated with the identifier of the mobile station, and the above-mentioned deletion of dynamic context occurs after the expiration of the timer.

5. The method according to claim 4, additionally comprising stages, which are:
rings which are lysed in a network node for remote storing static context associated with the ID of the mobile station;
in which the above-mentioned deletion of dynamic context perform the following signaling network node.

6. The method according to claim 5, in which said alarm network node for remote storing static context associated with the ID of the mobile station is performed in response to expiration of the timer.

7. The method according to claim 1, wherein the message received from the mobile station additionally includes a digest message authentication codes based encryption (SMAS), to ensure secure communications between the base station and mobile station.

8. The method according to claim 1, in which a bit is a bit in the parameter indicating the purpose of determining the distance messages RNG-REQ (request for a definition of the range).

9. The method according to claim 1, wherein the base station is made with the possibility of receiving messages from the mobile station using a Protocol compliant with the 802.16 standard Institute of electrical and electronics (IEEE) or WiMAX (worldwide interoperability of broadband wireless access).

10. How to simplify re-enter the wireless communications network, comprising stages, which are:
transmit, using the mobile station to the base station wireless communication network, a message that includes:
bits have a second value, indicates that the mobile station is in recovery mode coverage, and
the ID of the mobile station to identify the mobile station, and
the identifier of the base station if the base station differs from the previous serving base station to the mobile station, the identifier of the base station is designed to determine the base station whether the static context and/or the dynamic context associated with the mobile station, on the previous serving base station; and
take the message from the base station that indicates what action to re-enter must be performed to ensure the re-entry of a mobile station in a wireless communications network,
in which the said message is received from the base station indicates that the action for re-entry include a request for that mobile station maintains the state of the previous automatic resend request (ARQ) of the mobile station and updates the state of the ARQ through clear evidence base station, and in which the steps for re-entry do not include a complete authentication and negotiation of capabilities, if it is determined that the static context and/or the dynamic context associated with the ID of the mobile station stored in radiusa serving base station to the mobile station.

11. The method according to claim 10, in which the said message is received from the base station indicates that the action for re-entry include partial authentication exchange authentication code and do not include a complete authentication and negotiation capabilities.

12. The method according to claim 10, in which the said message is received from the base station indicates that the action for re-entry include reinstallation of the data link level access control for transmission medium (MAC) and partial authentication exchange authentication code and do not include a complete authentication and negotiation capabilities.

13. The method according to claim 10, further comprising stages, which are:
find out with a mobile station, the loss of coverage area the mobile station; and
scan to detect the base station to re-enter the wireless network, and referred to the scan mentioned before sending the message.

14. The method according to item 13, additionally containing phase, which determines, using the mobile station, whether a valid security context used by the mobile station in the wireless communication system, in which the above-mentioned transfer message includes an authentication code of the newly received message and/or request for full authentication is to update all security keys if it is determined that the security context is invalid.

15. The method according to claim 10, further containing a stage on which to perform, using the mobile station, the steps for re-entry is shown in the message passed from the base station to provide re-entry of a mobile station in a wireless communications network.

16. System for easy re-entry in a wireless communications network, comprising:
a processor, configured to communicate with the mobile station wireless communication network through a base station wireless communication network; and
the storage medium associated with the processor, the storage medium has instructions stored thereon that, if execution of the processor result in:
receiving a message that includes:
bit having a value indicating that the mobile station is in recovery mode coverage, and
the ID of the mobile station to identify the mobile station, and
the identifier of the base station if the base station differs from the previous serving base station to the mobile station;
definition, you saved the static context and/or the dynamic context associated with the identifier of the mobile station, in a previous serving base station at least castignano the basis of the identifier of the base station; and
send the message to the mobile station in order to show what actions to re-enter must be performed to ensure the re-entry of a mobile station in a wireless communications network, in which the steps for re-entry is based, at least in part on said determining that you saved the static context and/or the dynamic context associated with the mobile station, in a previous serving base station to the mobile station, in which the above-mentioned transfer message to the mobile station indicates that the action for re-entry include a request for that mobile station supports the previous state of the automatic request retransmission (ARQ) of the mobile station and updates the state of the ARQ through clear evidence base station, and in which the steps for re-entry do not include a complete authentication and negotiation of capabilities, if it is determined that the static context and/or the dynamic context associated with the identifier of the mobile station, saved from a previous serving base station to the mobile station.

17. System according to clause 16, in which the instructions, in case of their execution, further cause:
the preservation of the static context and/or the dynamic context associated with the mobile station is in her base station;
detecting, via the base station, the loss of coverage area the mobile station; and
the signaling network node for remote storing static context associated with the mobile station.

18. System 17, in which the instructions, in case of their execution, further cause:
to start the timer based on the aforementioned detection of the loss of coverage area the mobile station; and
to remove a static context and/or the dynamic context, which is stored in the base station, and referred to the static context and/or dynamic context occurs after the expiration of the timer.

19. System p, in which said alarm network node for remote storing static context associated with the mobile station is performed in response to expiration of the timer.

20. System according to clause 16, in which the instructions, in case of their execution, further cause the signaling network node to obtain a static context associated with the mobile station, which is stored remotely on the network side, if it is determined that the static context and/or the dynamic context is not saved in the base station.

21. System according to clause 16, in which the above-mentioned transfer message to the mobile station indicates that the action for re-entry include Perea is the stop of the data transmission channel level control access to the transmission medium (MAC) and partial authentication exchange authentication code and do not include a complete authentication and negotiation capabilities if it is determined that the static context and/or the dynamic context is not saved in the base station.

22. The device re-enter the wireless communications network, comprising:
antenna;
the processor is configured to communicate with the base station wireless communication network via the antenna; and
the storage medium associated with the processor, the storage medium has instructions stored thereon that, if their execution by the processor result in:
detecting, by a mobile station, the loss of coverage area the mobile station;
transmitting, by a mobile station in a base station of wireless communication, which includes:
bit having a value indicating that the mobile station is in recovery mode coverage,
the ID of the mobile station to identify the mobile station, and
the identifier of the base station if the base station differs from the previous serving base station to the mobile station, the identifier of the base station is designed to determine the base station whether the static context and/or the dynamic context associated with the mobile station, on the previous serving base station; and
receiving messages from the base station that indicates what action is to re login should be performed to ensure the re-entry of a mobile station in a wireless communications network,
in which the said message is received from the base station indicates that the action for re-entry include a request for that mobile station maintains the state of the previous automatic resend request (ARQ) of the mobile station and updates the state of the ARQ through clear evidence base station, and in which the steps for re-entry do not include a complete authentication and negotiation of capabilities, if it is determined that the static context and/or the dynamic context associated with the identifier of the mobile station, saved from a previous serving base station to the mobile station.

23. The device according to item 22, wherein the instructions, in case of their implementation, further result in receiving messages from the base station that indicates what action to re-enter must be performed to ensure the re-entry of a mobile station in a wireless communications network.

24. The device according to item 23, in which the said message is received from the base station indicates that the action for re-entry include partial authentication exchange authentication code and do not include a complete authentication and negotiation capabilities.

25. The device according to item 23, in which the said message is received from the base station indicates that the action is to re-enter include reinstallation of the transmission channel level control access to the transmission medium (MAC) and partial authentication exchange authentication code and do not include a complete authentication and coordination capabilities.

26. The device according to item 22, wherein the instructions, in case of their execution, further cause:
scanning to detect the base station to re-login to the wireless communications network; and
determining, by a mobile station, whether a valid security context used by the mobile station in the wireless communication system, in which the above-mentioned transfer message includes the newly received message authentication code based on the encryption (SMAS), and/or request for full authentication to update all keys security, if the security context is invalid.



 

Same patents:

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to wireless communication. The invention discloses, in particular, a method of transmitting control information in a WLAN, which comprises transmitting first control information by beam formation with diversity with cyclic shift delay and transmitting second control information. The first control information comprises information needed for each of a plurality of target stations from the second control information in order to receive the second control information. The second control information is transmitted to the plurality of target stations by beam formation.

EFFECT: invention is intended to provide control information and transmit frames in a wireless local area network (WLAN) which supports a multiple-antenna technology at the transmitting side and the receiving side for multiple users.

29 cl, 38 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to multi-user multiple input multiple output (MU-MIMO) wireless communication systems. An aspect of the invention consists in improving an apparatus and a method for providing and using control information in a mobile communication system. The invention particularly discloses a method for outputting control information in MU-MIMO wireless communication systems, which includes receiving a plurality of resource elements (RE) including downlink control information (DCI), determining, using the DCI, a set of RE to which a plurality of downlink reference signals (DRS) may be mapped, determining remaining RE as RE to which data are mapped, and demodulating the data using a precoding vector of a DRS corresponding to the MS.

EFFECT: improved communication.

12 cl, 39 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to wireless communication using a multiple-user multiple input, multiple output (MU-MIMO) system and discloses a method for communication in a network including a primary station and at least a first secondary station, wherein the first secondary station transmits to the primary station an indication of a first set of precoding vectors, and the number of first precoding vectors is greater than a preferred rank of transmission from the primary station to the first secondary station.

EFFECT: improved communication.

17 cl, 2 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to a wireless mobile communication system and is intended to improve system performance by reducing signalling overhead. The method comprises steps of: setting a rank of uplink control information to a rank of uplink data; multiplexing a first control information item output from the control information with the data; channel interleaving the multiplexed output with control information other than the first control information item from said control information; and transmitting the interleaved signal.

EFFECT: invention discloses a method of transmitting uplink data and control information in a wireless mobile communication system that supports multiple transmitting antennae and multiple receiving antennae (MIMO).

14 cl, 18 dwg

FIELD: radio engineering, communication.

SUBSTANCE: during precoding, channel coherence and system capacity are taken into account. A base station adjusts phase and/or amplitude of a precoding matrix corresponding to each precoded unit to maintain coherence of associated information of the entire precoding channel. The associated information of the precoding channel includes, for example, channel status information (CSI) or eigenvalue matrix of the precoding channel. Further, a mobile terminal performs channel estimation based on reference signals of multiple precoded units, thereby eliminating the limitation in prior art that a mobile terminal can perform channel estimation only within one or more resource blocks limited by a precoding granularity.

EFFECT: high accuracy of precoding.

15 cl, 11 dwg

FIELD: radio engineering, communication.

SUBSTANCE: radio communication method includes periodic calibration in each calibration interval to obtain a Node B calibration vector, wherein periodic calibration involves selecting a group of user equipment UE for calibration, and groups of UE are selected based on channel quality indicators (CQI) received from said UE; and forming a beam pattern for at least one UE in each calibration interval and applying said calibration vector, obtained for said calibration interval in which periodic calibration involves, in each calibration interval, calculation of at least one initial calibration vector for each UE in the selected group, and calculation of a Node B calibration vector based on the initial calibration vectors for all UE in the selected group.

EFFECT: high quality of radio communication.

11 cl, 13 dwg

FIELD: information technology.

SUBSTANCE: set of physical transmit antennae can be divided into a plurality of groups of physical transmit antennae. Further, a precoding vector for a particular group of physical transmit antennae from the plurality of groups of physical transmit antennae can be formulated. Furthermore, the particular group of physical transmit antennae can form a particular virtual antenna. By way of another example, another precoding vector for another group of physical transmit antennae from the plurality of groups of physical transmit antennae can be formulated, and the other group of physical transmit antennae can form another virtual antenna. The precoding vector can be applied to a signal for transmission over the particular virtual antenna, and the other precoding vector can be applied to another signal for transmission over the other virtual antenna.

EFFECT: efficient use of a physical transmit antenna and power amplifiers associated with the physical transmit antenna.

24 cl, 12 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention discloses a method and an apparatus for transmitting a correction code in a wireless communication system. A base station (BS) generates a correction code sequence for each of a plurality of antennae and transmits the correction code sequence to user equipment for each antenna. The location of a subcarrier to which each correction code sequence is mapped is determined based on a frequency reuse factor (FRF).

EFFECT: creating a robust correction code structure by which the user terminal can correctly detect a correction code irrespective of the number of transmit antennae.

14 cl, 39 dwg

FIELD: radio engineering, communication.

SUBSTANCE: precoders are cycled according to a precoder sequence for each data symbol transmission. When the last precoder is selected the cycle can begin again, a new precoder sequence can be received or defined. A precoder sequence related to a subset of precoders present in a wireless device is defined sequentially, cyclically shifted according to an identifier or one or more communication parameters, randomly, pseudo-randomly according to an identifier or one or more communication parameters. In addition, the precoder sequence can be utilised to select a precoder for one or more retransmissions. Such cycling of precoders can increase transmission diversity.

EFFECT: easier cycling of precoders for transmitting data in a wireless network in a time domain, which enables to increase transmission diversity.

52 cl, 11 dwg

FIELD: radio engineering, communication.

SUBSTANCE: method involves determining individual statistics for a plurality of channel tap coefficients of a communication channel between a transmitting station and a receiving terminal; and individually quantising said plurality of channel tap coefficients at corresponding quantisation bit rates which are determined based on said statistics to generate quantised channel tap coefficients, wherein the total number of bits allocated to said plurality of channel tap coefficients is fixed; and transmitting said quantised channel tap coefficients from the receiving terminal to the transmitting station.

EFFECT: implementing methods of compressing channels status feedback, which are adapted for different channel tap distributions.

52 cl, 11 dwg

FIELD: mobile communications.

SUBSTANCE: proposed distributed system of intelligent antennas has N antennas, N radio-frequency transceivers, main frequency band digital signal processor in base station of wireless communication system, feeders, and data bus; N antennas and N radio-frequency transceivers are grouped to obtain a number of radio-frequency transceiver groups disposed at different consistent-reception locations of base station, including different buildings or different floors of one building.

EFFECT: improved consistency of reception.

12 cl, 4 dwg

FIELD: communication systems with distributed transmission, in particular, method and device for non-zero complex weighing and space-time encoding of signals for transmission by multiple antennas.

SUBSTANCE: method and device provide for expansion of space-time block code N×N' to space-time block code M×M', where M>N, with utilization of leap-like alternation of symbols phase in space-time block code N×N', to make it possible to transfer space-time block code from distributed antennas in amount, exceeding N'.

EFFECT: distribution of transmission from more than two antennas.

2 cl, 16 dwg

FIELD: automatic adaptive high frequency packet radio communications.

SUBSTANCE: each high frequency ground station contains at least one additional high frequency receiver for "surface to surface" communication and at least one additional "surface to surface" demodulator of one-tone multi-positional phase-manipulated signal, output of which is connected to additional information input of high frequency controller of ground station, and input is connected to output of additional high frequency "surface to surface" receiver, information input of which is connected to common high frequency receiving antenna, while control input is connected to additional control output of high frequency controller of ground station.

EFFECT: prevented disconnection from "air to surface" data exchange system of technically operable high frequency ground stations which became inaccessible for ground communications sub-system for due to various reasons, and also provision of possible connection to high frequency "air to surface" data exchange system of high frequency ground stations, having no access to ground communication network due to absence of ground communication infrastructure at remote locations, where these high frequency ground stations are positioned.

2 cl, 12 dwg, 2 tbl

FIELD: radio engineering, in particular, signal transfer method (variants) and device for realization thereof (variants), possible use, for example, in cellular radio communication systems during transmission of information signal in direct communication channel from backbone station to mobile station.

SUBSTANCE: technical result is achieved due to correction of spectrum of copies of information signal being transferred, transferring copies of information signal from each adaptive antenna array in each effective transmission direction, estimating transfer functions of direction transmission channels on basis of pilot signals transferred from each antenna element, on basis of pilot signals for distributed transmission, sent from each adaptive antenna array in each one of effective transmission directions, and also combining two given estimates.

EFFECT: increased efficiency of transmission of information signal in direct communication channel, and, therefore, maximized quality of receipt of information signal at mobile station.

5 cl, 10 dwg

FIELD: wireless communication receivers-transmitters and, in particular, wireless communication receivers-transmitters which use a multi-beam antenna system.

SUBSTANCE: when controlling a multi-beam antenna system for a downstream line of wireless communications, generation of polar pattern and signaling of distribution during transmission in closed contour are combined, each beam signal is adjusted at transmitter on basis of check connection from wireless communication mobile station in such a way, that signals received by wireless communication mobile station may be coherently combined.

EFFECT: increased traffic capacity and productivity of the system, improved power consumption, cell coverage and communication line quality characteristics.

2 cl, 5 dwg

FIELD: method for estimating a channel in straight direction in radio communication systems.

SUBSTANCE: in accordance to the method, in straight direction, beam is created by a set of antennas, and at least one vector is created for beam generation, subject to application for connection of at least one base station to at least one mobile station, is defined by at least one client station and from at least one client station to at least one base station information is transmitted, which contains information about aforementioned at least one beam generation vector. In accordance to the invention, at least one base station transmits information about beam generation vector used for connection of at least one base station to at least one client station, to at least one client station, on basis of which at least one client station estimates the channel.

EFFECT: transmission of information about beam generation vector due to selection and transmission of pilot-signal series.

2 cl, 2 dwg

FIELD: physics, communications.

SUBSTANCE: invention concerns data transfer, particularly frequency-time-space block coding in a transmitter with three transmitting Tx antennae. Input symbol sequence is transferred by three Tx antennae according to permutation method via selected transmission matrix.

EFFECT: increased data transfer speed.

28 cl, 10 dwg

FIELD: physics; communications.

SUBSTANCE: present invention pertains to communication techniques. The transmitting object carries out spatial processing using control matrices, so that data transmission is held in a set of "effective" channels, formed on the real channel used for transmitting data, and control matrices, used for PRTS. Control matrices can be formed by sampling a base matrix, which can be a Walsh or Fourier matrix. Different combinations of scalars are then chosen, each combination of which consists of at least one scalar, of at least row of the base matrix. Each scalar can be a real or complex value. Different control matrices are formed by multiplying the base matrix by each of the different combinations of scalars. Control matrices are different transpositions of the base matrix.

EFFECT: generation and use of control matrices for pseudorandom transmission control (PRTS).

55 cl, 3 dwg, 1 tbl

FIELD: physics.

SUBSTANCE: invention is related to device and method for beams shaping in telecommunication system of mobile communication CDMA with application of intellectual antennas technology, using specified device and method, multiple fixed beams are shaped in sector, and multiple fixed beams are used to shape traffic channel with narrow beams and common channel with sector beams in one and the same intellectual antenna system, and problem of phases discrepancy is solved in appropriate channels due to differences in time and temperature oscillations without application of complicated correcting technology. Since fixed beams in some area correlate and interact with each other, or considerably weaken due to correlative summation of space vectors of every fixed beam in process of common channels transfer in CDMA system with multiple antennas, then appropriate ratio is established between power of pilot channel and traffic channel in coverage area, and signal-noise ratio is increased for signals received by mobile communication station. As a result of addition of optical transceivers system between system of the main frequency band and system of radio frequency transceivers (TRX), the main frequency band system services more sectors. Radio frequency unit is located in close proximity to antennas, and consumed power is reduced accordingly.

EFFECT: increased throughput capacity and efficiency of CDMA system with multiple antennas.

15 cl, 6 dwg

FIELD: information technologies.

SUBSTANCE: separation of transmitting antennas with feedback is applied to special channel of downstream communications line, and separation of transmitting antennas without feedback is applied to control channel of downstream communications line in accordance with high-efficiency method of transmission over upstream communications line. The objective of present invention is to determine how the station with separation during transmission which implements advanced upstream communications line (EUL) should apply separation of transmitting antennas to level 1 confirmation information transmission channels (E-HICH), relative transmission rate channels (E-RGCH) and absolute transmission rate channels (E-AGCH).

EFFECT: providing communications system stability and reliability.

9 cl, 15 dwg

Up!