WO2002045386A2 - Retry limits for connection rescue procedures in telecommunication systems - Google Patents
Retry limits for connection rescue procedures in telecommunication systems Download PDFInfo
- Publication number
- WO2002045386A2 WO2002045386A2 PCT/US2001/044738 US0144738W WO0245386A2 WO 2002045386 A2 WO2002045386 A2 WO 2002045386A2 US 0144738 W US0144738 W US 0144738W WO 0245386 A2 WO0245386 A2 WO 0245386A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- rescue
- connection
- limitations
- potentially failing
- network
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/02—Resource partitioning among network components, e.g. reuse partitioning
- H04W16/06—Hybrid resource partitioning, e.g. channel borrowing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/30—Connection release
Definitions
- Embodiments of the present invention claim priority from U.S. provisional patent application Serial No. 60/253,612 entitled “Retry Limit for Drop Call Rescue Channel Procedures,” filed November 28, 2000, and are related to U.S. utility application Serial No. 09/978,974 entitled “Forward Link Based Rescue Channel Method and Apparatus for Telecommunication Systems,” filed October 16, 2001, the contents of which are incorporated herein by reference for all purposes.
- the present invention relates, generally, to communication network management and, in one embodiment, to methods and apparatus for providing an efficient and safe procedure to limit the number and concentration of attempts to rescue communication connections from dropping.
- FIG. 1 depicts an example of a mobile station (MS) 10 operated by a mobile user that roves through a geographic area served by a wireless infrastructure or network including a first base station (BS) 12 with wireless sectors A 14 and sector B 16, and a second BS 18, with a sector C 20.
- MS 10 travels from position A to position B to position C and will, as a matter of course, experience variations in signal strength and signal quality of the forward link associated with the BS(s) that it is in contact with.
- a connection as referred to herein includes, but is not limited to, voice, multimedia video or audio streaming, packet switched data and circuit switched data connections, short message sequences or data bursts, and paging.
- Dropped connections can range from being a nuisance to devastating for cellular telephone users. For example, a dropped emergency 911 connection can be critical or even fatal. Dropped connections can create consumer frustration significant enough to cause the consumer to change service providers. Thus, the prevention of dropped connections is of major importance to cellular network providers.
- FIG. 2 illustrates an exemplary communication link 22 between a
- a BS 26 is typically comprised of multiple sectors, usually three. Each sector includes a separate transmitter and antenna (transceiver) pointed in a different direction. Because the term BS is often used to generally identify a transceiver, it should be understood that the terms BS and sector are used herein somewhat interchangeably.
- the forward and reverse links utilize a number of forward and reverse channels.
- the BS 26 broadcasts on a plurality of forward channels. These forward channels may include, but are not limited to, one or more pilot channels, a sync channel, one or more paging channels, and multiple forward traffic channels.
- the pilot, sync, and paging channels are referred to as common channels because the BS 26 communicates those channels to all MSs. Generally, these common channels are not used to carry data, but are used to broadcast and deliver common information. In contrast, the multiple forward traffic channels are referred to as dedicated channels, because each forward traffic channel is intended for a specific MS 24 and may carry data.
- Each sector within BS 26 broadcasts a pilot channel that identifies that sector and is simple for a MS 24 to decode. Both sectors and pilot channels are distinguished by pseudo-noise (PN) offsets.
- PN pseudo-noise
- the word "pilot" can be used almost interchangeably with the term sector, because a pilot channel identifies a sector.
- the pilot channel implicitly provides timing information to the MS, and is also used for coherent demodulation, but it otherwise typically does not contain any data.
- a MS When a MS is first powered up, it begins searching for a pilot channel.
- a MS acquires (is able to demodulate) a pilot channel, the timing information implicit in the pilot channel allows the MS to quickly and easily demodulate a sync channel being transmitted by the network.
- the MS is then able to acquire a paging channel being transmitted by the same BS that is transmitting the pilot channel. That BS is known as the active BS.
- a "page" is transmitted to that MS on the paging channel of that BS.
- the MS may then monitor that paging channel while the MS is idle and waiting for incoming connections or an incoming message.
- each BS may utilize one pilot channel, one sync channel and one paging channel that are common for all MSs to receive.
- the reverse channels may include an access channel and one or more reverse traffic channels. After a MS receives an incoming page from a BS, the MS will initiate a connection setup using, in part, an access channel.
- the previously described channels may employ different coding schemes.
- time division multiple access multiple channels may be communicated at a particular frequency within a certain time window by sending them at different times within that window.
- channel X may use one set of time slots while channel Y may use a different set of time slots.
- frequency division multiple access FDMA
- multiple channels may be communicated at a particular time within a certain frequency window by sending them at different frequencies within that window.
- code division multiple access given a space of frequency and time, each channel is assigned various frequencies at various times, according to a particular Walsh code or quasi- orthogonal function (QOF). The code will define how a particular channel changes over frequency and time.
- CDMA code division multiple access
- the data from each channel is coded using Walsh codes or QOFs and then combined into a composite signal.
- This composite signal is spread over a wide frequency range at a particular time.
- the original data may be extracted.
- Walsh codes and QOFs create coded data that, when combined, don't interfere with each other, so that the data can be separated out at a later point in time to recover the information on the various channels.
- two coded sequences of data are added together to produce a third sequence, by correlating that third sequence with the original codes, the original sequences can be recovered.
- knowledge of the other codes is not necessary.
- CDMA wireless communication system is fully described by the following standards, all or which are published by the TELECOMMUNICATIONS INDUSTRY ASSOCIATION, Standards & Technology Department, 2500 Wilson Blvd., Arlington, VA 22201, and all of which are herein incorporated by reference: TIA/EIA-95B, published February 1, 1999; and TIA/EIA/IS-2000, Volumes 1-5, Release A, published March 1, 2000.
- the Walsh codes or QOFs are used to code a particular channel.
- the simple to decode pilot channel may be the all one coded Wo Walsh code.
- the sync channel may use the alternating polarity W 32 Walsh code and again, these codes are fixed and known.
- Each MS groups the channels into various sets, which may include, but is not limited to, an active set, a neighbor set, a candidate set, and a remaining set.
- the MS active set contains the pilots or PN offset identifiers that a MS is utilizing at any point in time.
- the active set for that MS will contain that BS pilot or PN offset identifier as its only member.
- a MS is being handed off from one BS or sector to another, and during this handoff may actually be in communication with multiple BSs or sectors at the same time. When this occurs, multiple active pilots will be in the active set at the same time.
- a MS in communication with BS “A” will begin to communicate with a BS “B” without first dropping BS “A,” and as a result both BS “A” and “B” will be in the active set.
- a MS in communication with sector “A” in BS “A” will begin to communicate with a sector “B” in BS “A” without first dropping sector “A,” and as a result both sector “A” and “B” will be in the active set.
- a MS in communication with BS “A” will begin to communicate with a BS “B” only after first dropping BS “A,” and as a result either BS “A” or “B” will be in the active set at any one time, but not both.
- the MS assigns rake receiver fingers to multiple channels from one or more sectors at the same time.
- the MS should be receiving the same data from both of those BSs.
- the data may be the same, it may be communicated differently from different BSs because the channels may be different.
- the rake receiver will therefore receive encoded data from different sectors on different channels, demodulate those sectors independently, and then combine the data.
- the data from a strong channel may be weighted more heavily than data from a weak channel, which is likely to have more errors.
- the data with a higher likelihood of being correct is given higher weight in generating the final result.
- a neighbor set which includes BSs that are neighbors to the active BS is received by the MS on a common channel.
- the neighbor set is updated on a traffic channel.
- any other BSs in the network that are not in the active, neighbor, or candidate sets comprise the remaining set.
- the network whether a MS is idle or active, the network repeatedly sends overhead messages 30, 32 and 34 to the MS. These overhead messages contain information about the configuration of the network. For example, the extended neighbor list overhead message 34 tells the MS what neighbors exist and where to look for them. These neighbor identifiers are stored, at least temporarily, within the memory of the MS.
- the candidate set is a set of BSs that the MS has requested as part of its active set, but have not yet been promoted to the active set.
- FIG. 4 depicts a generic structure of a wireless infrastructure 56.
- a client MS 36 continually monitors the strength of pilot channels it is receiving from neighboring BSs, such as BS 38, and searches for a pilot that is sufficiently stronger than a "pilot add threshold value.”
- the neighboring pilot channel information may be communicated to the MS through network infrastructure entities including BS controllers (BSC) 40 that may control a cell cluster 42, or a mobile switching center (MSC) 44.
- BSC BS controllers
- MSC mobile switching center
- the MS and one or more of these network infrastructure entities contain one or more processors for controlling the functionality of the MS and the network.
- the processors include memory and other peripheral devices well understood by those skilled in the art.
- the MS 36 As the MS 36 moves from the region covered by one BS 38 to another, the MS 36 promotes certain pilots from the Neighbor Set to the Candidate Set, and notifies the BS 38 or BSs of the promotion of certain pilots from the Neighbor Set to the Candidate Set via a Pilot Strength Measurement Message (PSMM).
- PSMM also contains information on the strength of the received pilot signals.
- the BS 38 determines a BS or network Active Set according to the Pilot Strength Measurement Message, and may notify the MS 36 of the new Active Set via an HDM. It should be noted, however, that the new active set may not always exactly comply with the MS's request, because the network may have BS resource considerations to deal with.
- the MS 36 may maintain communication with both the old BS 38 and the new BS so long as the pilots for each BS are stronger than a "pilot drop threshold value.” When one of the pilots weakens to less than the pilot drop threshold value, the MS 36 notifies the BSs of the change. The BSs may then determine a new Active Set, and notify the MS 36 of that new Active Set. Upon notification by the BSs, the MS 36 then demotes the weakened pilot to the Neighbor Set. This is one example of a handoff scenario. It is typical for a MS 36 to be starting a handoff or in the process of handoff when connections fail. This is expected because poor coverage or weak signal environments generally exist near cell boundaries, in areas of pilot pollution, or areas significantly affected by cell breathing, all which are well known in the art.
- FIG. 5 shows a situation known in the art as a Layer 2 Acknowledgment Failure for a CDMA wireless network.
- the MS is transmitting a PSMM 48 requiring an acknowledgment by the BS.
- the BS may be receiving it correctly, but in the case shown in FIG. 5, the MS is not receiving the BS's acknowledgment (ACK) 46.
- FIG. 6 shows a second situation for which recovery is possible using the current invention in a CDMA wireless network.
- This situation is known in the art as a Forward Link Fade Failure.
- a fade is a period of attenuation of the received signal power.
- a channel 58 may be broken up into slots 60, or superframes, typically of 80 millisecond duration. Each slot may be divided into three phases 62. These phases are numbered: 0, 1 and 2. Overlapping on top of the phases are four frames 64. These four frames are aligned with the three phases at the superframe boundaries. Each frame 64 is therefore typically 20 milliseconds long. Within each frame 64 is a header area 66, some signaling information 68 and perhaps some data 70. It should be understood that the content of the frames 64 can differ. One frame may contain signaling and data, another may contain only signaling, and yet another may contain only data.
- Each frame 64 may also have a different data rate, which can be changed on a frame-by-frame basis.
- information may be transmitted at a one-eighth frame rate, which would be beneficial because less power or bandwidth is required to communicate information at a slower rate.
- it is neither realistic nor desirable to target an error rate of zero percent (i.e., all frames received properly). Rather, a frame error rate of one percent, for example, is targeted. Power control loops actually control this frame error rate.
- the power control loop might increase the power of signals transmitted by the MS so that the frame error rate decreases to approximately one percent.
- the power control loop may reduce transmitted power to save power and allow the frame error rate to move up to one percent.
- the BS may therefore continuously instruct the MS, through power control bits in a configuration message, to transmit at various power levels to maintain an error rate of approximately one percent as the MS moves around in a particular area, or other types of interferences begin or end.
- the MS typically abides by the power levels that are being recommended to it by the BS.
- the BS can also change its transmitter power for a particular channel.
- both the BS and the MS may continuously provide each other feedback in order to change the other's power levels.
- the BS may not necessarily change its transmitter power levels based on the feedback from the MS.
- error rates may not be controllable to about one percent as a MS moves about in a cellular network and experiences variations in signal strength and signal quality due to physical impediments, interference from adjacent channels, and positions near the edges of sectors, and as the error rates rise to intolerable levels, dropped connections become a problem.
- a connection as referred to herein includes, but is not limited to, voice, multimedia video and audio streaming, packet switched data and circuit switched data connections, short message sequences or data bursts, and paging.
- the procedure which will be generally referred to herein as the Forward Rescue Procedure (FRP), allows systems to recover from failures at the MS or BS that would otherwise result in dropped connections. Examples of failure scenarios that can be overcome using the FRP include forward link Layer 2 (L2) acknowledgement failures and loss of forward link signal due to a fade that causes loss of signal for a period of time exceeding a threshold value.
- L2 forward link Layer 2
- a MS will autonomously add BS pilot channels to the active set of its rake receiver in order to rescue the connection in danger of dropping. Concurrently, the network infrastructure will initiate transmission on alternative forward link channels that are likely to be monitored by the MS during an FRP. If the same channels are monitored by the MS and transmitted on by the infrastructure, the connection in danger of dropping can be rescued.
- the general FRP includes a MS FRP, and may also include an infrastructure FRP.
- FIG. 8 illustrates an example of the timeline of the MS FRP and infrastructure FRP in a typical connection rescue. As mentioned above, although the MS FRP is central to any rescue, the infrastructure FRP, although recommended, is not strictly necessary.
- Triggering of the MS FRP depends upon the type of failure that occurs. In the case of a Layer 2 failure, the FRP is activated upon a number of failed retransmissions of a message requiring acknowledgments. In the case of a Forward Link Fade Failure, the FRP is activated if there exists a loss of signal for a period of time exceeding a threshold value (see reference character 72).
- the MS starts an FRP timer at the time the rescue attempt is started (see reference character 74). If the FRP timer expires before the rescue is complete, then the connection is dropped. In addition, at the time the rescue attempt is started, the MS turns off its transmitter and selects a new active set (see reference character 74).
- the MS effectively assumes a handoff direction based on the PSMM(s) that it has sent (whether or not the PSMM was actually sent, successfully sent, or acknowledged).
- the MS then begins to cycle through this new Active set searching for a rescue channel.
- rescue channel encompasses the various schemes for defining channels as utilized by the various communication protocols, for purposes of simplifying the disclosure, a rescue channel will herein be identified as an Assumed Code Channel (ACC) (see reference character 78).
- ACC Assumed Code Channel
- the infrastructure FRP although recommended, is not strictly necessary for every BS in the network. If the infrastructure FRP is implemented (see reference character 80), the infrastructure (network) selects sectors from which it will transmit the ACC. In one embodiment of the FRP, null (blank) data is transmitted over the ACC during rescue. In other embodiments, data may be communicated over the ACC, although a MS would only hear this data if it actually finds and successfully demodulates that ACC.
- the MS will find and demodulate N 3M good frames of the ACC (see reference character 82), turn on its transmitter, and begins to transmit back to the BS.
- the rescue is completed (see reference character 84) and the BS may re-assign the MS to more permanent channels. Additionally, the network may re-assign the ACCs via overheads, for example.
- the BSs may also re-assign the MS active set to clean up after the rescue by sending a Rescue
- Completion Handoff message 86 which can re-use any existing handoff messages such as General or Universal Handoff Direction messages.
- any existing handoff messages such as General or Universal Handoff Direction messages.
- connection rescue methods such as those described above typically attempt to re-establish the connection by finding an alternative or different active set, i.e. a set of BS sectors to hand-off with, in order to maintain the connection. Regardless of the methodology, it is clear that some connection rescue attempts will fail.
- a connection fails repeatedly, rescue procedures may continue attempting rescues indefinitely for an extended period of time. This may result in undue muting of user audio in voice connections.
- quality of service parameters such as data throughput will be negatively impacted. If a connection fails repeatedly and rescue attempts are repeatedly executed with success, then resources may be tied up for rescue purposes. This may negatively impact quality of service and capacity for the individual MS that is experiencing connection failures as well as for other MSs and network infrastructure elements.
- Connection rescue methods are procedures designed to rescue connections from dropping due to communication failures such as Forward Link Fades or Layer 2 Acknowledgement retry timeouts.
- a MS could repeatedly retry rescues if the connection continues to fail. This can create situations in which users are subject to very long periods of muting or poor audio, leading to frustration and an increased chance that the user may switch to another service provider.
- capacity and performance of the system as a whole will be impacted by repeated transmissions.
- the present invention provides an efficient and safe procedure to limit the number and concentration of attempts to rescue communication connections from dropping. The degree of limitation on rescue attempts may depend on network resources and their availability.
- a network operation may prefer that rescuing be limited.
- Another impact is that the user may experience a large amount of muting. For example, if a connection spends 80% of its time in rescue and 20% of its time in poor conditions where the Frame Error Rate (FER) is very high (say above 30%), then it may not be worthwhile to maintain that connection. Maintaining such a connection may not be worth the resources required to rescue it because the essentially unused bandwidth reserved for rescue could be used for other connections with a better quality of service.
- FER Frame Error Rate
- One method would be to limit the number of rescues per connection. Another method would be to allow a rescue only if a certain amount of time has passed since the last rescue. Yet another method would be to limit the total number of rescues per predetermined amount of time. In addition, combinations of these limitations may be employed. Additionally, it may be preferable to alert a voice user that the connection is dropping rather than simply have the audio muted for a long time. In one case, the audio could possibly be indefinitely muted, particularly if the user is stationary in a poor coverage area. Alternatively, the MS could alert the user after a certain number of successful rescues in rapid succession (or within some short period of time) whether the rescuing should continue or the connection should be dropped.
- the MS could keep track of the percentage of good frames that were received over some period of time and check it against a threshold to determine if it is too low to maintain a conversation. Additionally, the MS could keep track of the reverse transmissions, i.e. how many frames were actually transmitted during a period of time (% of frames transmitted versus all frames). This frame count should include only frames transmitted, and not necessarily all generated frames. If the percentage becomes too low (or a long burst of inactivity occurs), then the MS can use this as input to the decision of whether or not to keep rescuing the connection.
- FIG. 1 illustrates a roving mobile station moving amongst different locations between sectors in a wireless communication system.
- FIG. 2 illustrates an exemplary communication link between a mobile station and a base station in a wireless communication system.
- FIG. 3 illustrates overhead messages communicated from a base station to a mobile station in a wireless communication system.
- FIG. 4 illustrates a wireless communication infrastructure in communication with a roving mobile station.
- FIG. 5 is a message sequence between a mobile station and a base station resulting in a dropped connection due to Layer 2 Acknowledgement failure.
- FIG. 6 is a timeline that is representative of a dropped connection resulting from fading of the forward link in a wireless telecommunications network.
- FIG. 7 is a timeline of a superframe, divided into three phases and four frames, for use in a wireless telecommunications network.
- FIG. 8 is a timeline of one embodiment of the Forward Rescue
- FIG. 9 illustrates an example of the enforcement of retry limits according to an embodiment of the present invention.
- FIG. 10 is a table illustrating a exemplary limitation parameter lookup function according to an embodiment of the present invention.
- FIG. 11 is an order message table illustrating an example of connection rescue control messaging on the forward link according to an embodiment of the present invention.
- FIG. 12 is a flow chart illustrating the process of controlling rescue attempts according to an embodiment of the present invention.
- FIGs. 13A through 13F are exemplary message and event sequence charts illustrating embodiments of the invention.
- FIG. 9 illustrates an example of the enforcement of retry limits according to an embodiment of the present invention.
- a MS fails at time 88, is rescued at time 90, fails again at time 92, is rescued again at time 94, and continues this pattern of failing and being rescued. If this MS uses a rescue channel for a relatively long cumulative period of time such as 30% of the time, for example, this may create several problems. First, the high number of failures creates a lot of muting for the user. Second, resources such as codes, power, and the like are being wasted. Third, the numerous rescues may create excessive interference with other channels. To overcome this problem, retry limits may be placed on the connections in need of rescue. Embodiments of the present invention employ a number of methods to enforce retry limits. One method would be to limit the number of rescues per connection. As illustrated in FIG.
- M rescues of M failures may be permitted, and when that number is exceeded, the Nth failure at time 96 is not allowed, and the connection will be dropped.
- Another method would be to allow a rescue only if a certain amount of time has passed since the last rescue. In FIG. 9, if the time between the last rescue and the next failure ti is more than a predetermined amount of time TIMEl, then the connection will be rescued. However, if the time between the last rescue and the next failure t 2 is less than TIMEl, then rescue will not be allowed. Yet another method would be to limit the total number of rescues per predetermined amount of time. In FIG.
- a timer may be started to count out a predetermined amount of time T3. During the time period T3, only a fixed number of failures may be rescued, and once that number is reached, any further failures within time period T3 (such as failure N at time 96 in the example of FIG. 3) will result in a dropped connection. In addition, combinations of these limitations may be employed.
- Retry limits can be enforced for occurrences that trigger rescue procedures, such as L2 Acknowledgement and Forward Link Fade failures, or occurrences that fall short of failures needing rescue. Both of these occurrences are referred to herein as potentially failing connections. Occurrences that fall short of failures needing rescue generally indicate a poor connection. For example, if the MS detects that a percentage of good frames received over a period of time was less than some predetermined threshold, subsequent failures may not be rescued. Additionally, if the MS detects that the number of frames transmitted over a period of time was less than some predetermined threshold, subsequent failures may not be rescued.
- rescue decision can be controlled by rescue orders, which are directed messages between a MS and a BS. These rescue orders would be communicated when the connection is not failing, and may occur just after a rescue had occurred, at the start of a connection, at each handoff, or at other significant points in time.
- Specific rescue orders such as connection rescue "allow” or “disallow” orders sent to the MS may instruct the MS that further rescues are permitted, or that no further rescues are permitted.
- the BS typically utilizes its processor to make the rescue decision. For example, the BS may maintain a count of rescues per connection, and send "allow” orders until the maximum count has been exceeded, whereupon the BS will then send "disallow” orders for the remainder of the connection.
- Rescue control orders may also be transmitted to the MS to communicate rescue parameters needed for the rescue decision, such as the number of further rescues allowed, the time delay before another rescue is allowed, the frequency or concentration of rescues, and the like.
- FIG. 10 is a table showing one example embodiment of a limitation parameter lookup function.
- the rescue control order may specify limitations by providing indices 98 into lookup tables. This allows for more efficient communication of the information using fewer bits.
- the rescue control orders may also contain specific control information for each type of drop (e.g., L2 or fade). For example, the rescue control order may instruct the MS not to rescue subsequent fade failures, or wait one minute before allowing a subsequent L2 failure, etc.
- rescue records characterized by different parameters such as the type of failure may be maintained, and that data may be re-applied to the decisionmaking.
- a network may find that L2 acknowledgment failures are generally more likely to be quickly rescued and do not require further rescuing, and therefore the network may encourage 2 nd , 3 r , and further rescues of L2 failed connections while refusing re-rescue of faded connections.
- the rescue control orders may also contain specific control information for each cause of the drop (coverage, handoff speed, pilot pollution, and the like). For example, a MS may fail because it is moving out of the coverage area. In addition, some failures are caused because the handoff was too fast, or too slow.
- a failure may occur because the handoff was too fast. If, on the other hand, a MS is transitioning from sector A to sector B, and sector B is added and sector A is dropped, but not until the MS had already lost its connection with the MS, the failure occurred because the handoff was too slow.
- a connection may fail because of pilot pollution, where a transitioning MS may be confused by the presence of several pilots of similar or marginal signal strength, and fail before a suitable pilot is located.
- Such causes of failures may be detectable or predictable by the network using locational information, PSMMs (no other pilots are strong enough to rescue the connection), a series of PSMMs, other measurements taken but not transmitted as part of a message, and the like.
- the parameters of the rescue control orders may vary. It should be understood that rescue parameters specific to the cause of a drop anticipate causes of dropped connections, and are communicated or established in advance of any failing connection. When a failing connection is detected and the cause of the failing connection is determined, rescue parameters specific to the cause of the failing connection may affect the rescue decision.
- the rescue control orders may also contain specific control information for each context (type of connection (data, voice, etc.), sector, geographic location, MS, MS vendor, and the like).
- a benefit of the network being able to closely control the rescue attempts is that it can maximize the efficient use of resources. For example, if a MS enters an area where it is generally inefficient to perform more than one rescue, then the network can limit the rescues on a per sector basis. This is one of the advantages of setting the parameters after handoff s.
- Rescue control orders may therefore communicate predetermined information (rescue parameters) needed for the rescue decision, such as the number of further rescues allowed, the time delay before another rescue is allowed, and the like, or connection-specific information related to the type of drop (e.g., L2 or fade), cause of the drop (coverage, handoff speed, pilot pollution, and the like), or context (type of connection (data, voice, etc.), sector, geographic location, MS, MS vendor, and the like).
- this information need not be communicated via rescue control orders.
- either the MSs or the network may store predetermined rescue parameters, or may determine connection-specific rescue parameters independently in advance of, or at the time of, a failing connection, and use this information in their rescue decisionmaking processes.
- Other embodiments of MS or network rescue control include rescue restrictions based on the success of previous rescue attempts in the same geographical area or time period or for a particular MS. For example, if the network or MS notices that the MS was rescued in such a way that subsequent rescues will be necessary, no further rescues may be permitted.
- the rescue limitations could be learned adaptively from recent or current connections in the vicinity. For example, if one MS attempts a rescue but fails, all other MSs with failing connections and experiencing the same conditions may not be allowed to rescue.
- Another embodiment of the present invention defines rescue limitations on how fast the last rescue(s) executed. The faster the better, because more time will be spent in the connection and less time in the rescue effort. The slower the rescue, the more resources are wasted and fewer rescues can be performed in a given period of time. Thus, MSs that are able to rescue quickly may be allowed subsequent rescues, while MSs that took a long time to rescue may not be allowed subsequent rescues.
- Another embodiment defines rescue limitations on how much cumulative (or percentage of) time was spent muted (reverse or forward link, or both).
- the above-described rescue control messages may be stand-alone messages, or may be embedded in handoff direction messages, in-traffic system parameters messages, or in a neighbor list update message in order to convey per- sector parameters.
- the rescued MS may be assigned to specific channels using channel assignment messages. Rescue control messages are particularly suited to be contained in these channel assignment messages at the end of a rescue.
- FIG. 11 is an exemplary order message table illustrating embodiments of connection rescue control messaging on the forward link.
- FIG. 11 shows directed messaging embodiments of control of rescue retries. Note that connection rescue control order parameters are specified in ORDQ 100.
- FIG. 11 shows the implementation of rescue orders in the form used for specifying orders in the IS- 2000-A standard but are applicable to overheads, handoff directions, channel assignments and other such messages for over-the-air protocols in general. It is straightforward to extend these ideas to bearers other than cdma2000.
- the MS when a MS receives a control order from the network, the MS may utilize its processor to make the rescue decision. For example, if a MS receives a control order containing the time delay before the next rescue is allowed, the MS may then maintain a counter or timer for the requisite time, then enable itself to rescue further failures.
- Rescue orders may also be transmitted from the MS to the BS. For example, if the MS receives a control order containing the time delay before the next rescue is allowed, and the MS maintains a counter or timer to count out this time period, the MS may send specific orders to the BS during this time period, instructing the BS not to attempt a rescue of the connection. When the time period elapses, and the MS enable itself to rescue further failures, the MS may then send a specific order to the BS, instructing the BS to attempt to rescue further failures.
- the MSs may maintain their own strategies for establishing retry limits, independent of the BS.
- the MS may implement its own retry limit procedure which is stricter that the network retry limit criteria, wherein if a certain limited number of rescues occur during a single connection, no further rescues will be permitted.
- the MS like the network described above, may detect the type, cause, or context of a failure, and change its rescue control orders accordingly.
- the retry limit strategies discussed herein although directed primarily to network retry limit strategies for purposes of simplifying the disclosure, are equally applicable to MS retry limit strategies.
- the MS may alert the user after a certain number of successful rescues in rapid succession (or within some short period of time) whether the rescuing should continue or the connection should be dropped. For example, after a predetermined number of rescues, the MS may play a voice memo, notifying the user that the connection is failing, and giving the user an option of pressing certain keys or speaking voice commands to either attempt further rescues, or end the connection.
- the MS may also prompt the user to enter certain user-configurable rescue parameters, such as the number of rescues the user will permit for a given connection.
- These user-configurable rescue parameters would be subject to, and limited by, overall MS or network retry limit criteria.
- the retry limit strategies discussed herein are equally applicable to both reverse and forward based rescue procedures.
- the network's rescue intent may be based on its own rescue decisionmaking and/or the MS's rescue intent, because the MS may independently make its own rescue decisions and pass them along to the network.
- the network informs the MS of its rescue intent, so that if a rescue will not be attempted, the MS will simply drop the connection rather than wait and look for the rescue channel.
- the MS's rescue intent may be based on its own rescue decisionmaking and/or the network's rescue intent, because the network may independently make its own rescue decisions and pass them along to the MS.
- the MS informs the network of its rescue intent, so that if a rescue will not be attempted, the network will simply drop the connection rather than wait and look for the rescue channel.
- FIG. 12 is a flowchart summarizing the general process of controlling rescue attempts according to embodiments of the present invention described above.
- a network entity such as the MS or BS monitors the connection 110 to determine if the connection is failing and if rescue is required or should be attempted.
- both a MS and BS(s) may execute the procedures of FIG. 12.
- the monitoring entity checks if the connection is failing 120, and continues monitoring 110 if it is not. If the connection is failing then the process determines what, if any, active limitations exist on rescue attempts 130. This may involve recalling rescue limitations that were transmitted to the MS by the network, pre-configured parameters or reading a database entry.
- Block 130 also includes determining information applicable to limitations such as the number of rescue attempts already made for the current connection.
- the entity then checks in block 140 if, based on the limitations and the current conditions, a rescue is permitted. If no rescue is permitted because such a rescue would exceed the limitations or restrictions set forth for rescues, then the connection is not rescued and may result in a dropped connection 170. If a rescue is permitted, the entity initiates the rescue attempt 150, which, if successful 160, re-establishes the connection. The entity then continues to monitor for any further failures 110. If the rescue fails, then the connection is dropped 170.
- FIGs. 13A through 13F are message and event sequence charts showing example embodiments of the invention.
- Embodiments of the present invention include a signaling mechanism that may be used to influence the MS or BS(s) decision regarding whether or not to rescue a connection, or whether or not to continue to rescue a connection that keeps failing.
- Embodiments of the present invention include limiting the number of rescues within one connection, limiting the number of rescues within a certain period of time, limiting the time between rescues, (i.e. do not allow another rescue until a certain time has passed), or some combination of these. In the case of limiting the time between rescues, the connection will be dropped if the connection fails soon after a successful rescue.
- FIG. 13 A shows a MS 180 communicating with a reference BS 190.
- the reference BS 190 may send a Connection Rescue Disallow Order 210 specifying that the MS 180 is not permitted further rescue.
- the reference BS 190 may then send a Connection Rescue Allow Order 230 to signal to the MS 180 that if a failure occurs, that MS 180 is allowed to attempt to rescue the connection.
- FIG. 13B illustrates an alternate embodiment where a Connection Rescue Control Order 240, which is sent to the MS 180 after the successful rescue procedure 200, informs the MS 180 of specific connection rescue limitations currently in effect.
- the Connection Rescue Control Order 240 may specify that the MS 180 may not rescue again until a time period represented by block 250 expires.
- FIG. 13C shows how a reference BS 190 may communicate general rescue limitations in overhead messages 260 to MS 180.
- overhead messages include paging channel system parameters messages or in- traffic system parameters messages.
- Some examples of embodiments include specifying the number of rescues (per connection or per period of time or otherwise) to be fixed in the standard or implementation, specifying this information in overheads 260 (paging channel or other common channel messaging), specifying the information per connection (per MS), for example, at the start of a connection or at each handoff, or specifying the parameters at the time of, or just after, a successful rescue.
- a limitation specified in the overhead message 260 may include a time between rescue attempts.
- FIG. 13C shows a time period 270 exceeding such a time limit and therefore permitting a second rescue 280 after the time 270 has passed since the first successful rescue 290.
- FIG. 13C also shows that a handoff message 300 may also include modified connection rescue limitation information and provide such parametric information in a timely manner.
- FIG. 13D shows how a handoff message 310 may update limitations previously specified in a overhead message 320 before any rescues occur. For example, the time limitation 330 may be changed.
- FIG. 13E shows that after a handoff message 310 is received, a new overhead message 340 may update previously specified limitations before any rescues occur. Again, an example is shown where the time limitation 330 is changed.
- FIG. 13F shows an embodiment where a number of rescues are permitted in a period of time. This limitation is communicated in a Connection Rescue Control Order 350 in the embodiment of FIG. 13F. Note that although a number of connection rescues were completed at 360a through 360c, the MS could not initiate rescue 350d until an additional period of time 370 passed because too many rescues would have been performed in too short of a time period. It should be understood that, in FIGs. 13A-13F, if a failure occurs during any of the indicated time periods, the connection would be dropped.
- the retry limit concepts described hereinabove used a CDMA cellular network as an example, the basic concept of establishing retry limits for rescues of connections in danger of being dropped are applicable to or may be extended to other wireless protocols and technologies such as paging systems, satellite communication systems, cordless phone systems, fleet communication systems, and the like.
- the concept of a BS described herein encompasses repeaters or different antenna diversity schemes, a cordless base, a satellite or another telephone, and the like.
- the concept of a MS described herein encompasses a pager, a satellite phone, a cordless phone, a fleet radio, and the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2002546398A JP4082215B2 (en) | 2000-11-28 | 2001-11-28 | Method for preventing aborts due to connection communication failures |
AU2002217945A AU2002217945A1 (en) | 2000-11-28 | 2001-11-28 | Retry limits for connection rescue procedures in telecommunication systems |
KR1020037007122A KR100613420B1 (en) | 2000-11-28 | 2001-11-28 | Retry limits for connection rescue procedures in telecommunication systems |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US25361200P | 2000-11-28 | 2000-11-28 | |
US60/253,612 | 2000-11-28 | ||
US09/978,974 US7133675B2 (en) | 2000-10-17 | 2001-10-16 | Forward link based rescue channel method and apparatus for telecommunication systems |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002045386A2 true WO2002045386A2 (en) | 2002-06-06 |
WO2002045386A3 WO2002045386A3 (en) | 2003-08-21 |
Family
ID=27737149
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/044738 WO2002045386A2 (en) | 2000-11-28 | 2001-11-28 | Retry limits for connection rescue procedures in telecommunication systems |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2002045386A2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009046374A1 (en) * | 2007-10-05 | 2009-04-09 | Qualcomm Incorporated | Adjusting multi-carrier allocation in wireless networks |
US8660527B2 (en) | 2005-02-17 | 2014-02-25 | Qualcomm Incorporated | Control of data call origination based on prior origination attempts |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6337983B1 (en) * | 2000-06-21 | 2002-01-08 | Motorola, Inc. | Method for autonomous handoff in a wireless communication system |
US6445918B1 (en) * | 1999-11-01 | 2002-09-03 | Telefonaktiebolaget L M Ericsson (Publ) | Method and system for saving dropped calls |
US6512927B2 (en) * | 2000-11-14 | 2003-01-28 | Denso Corporation | Method and apparatus for simultaneous rescue of multiple connections in telecommunication systems |
-
2001
- 2001-11-28 WO PCT/US2001/044738 patent/WO2002045386A2/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6445918B1 (en) * | 1999-11-01 | 2002-09-03 | Telefonaktiebolaget L M Ericsson (Publ) | Method and system for saving dropped calls |
US6337983B1 (en) * | 2000-06-21 | 2002-01-08 | Motorola, Inc. | Method for autonomous handoff in a wireless communication system |
US6512927B2 (en) * | 2000-11-14 | 2003-01-28 | Denso Corporation | Method and apparatus for simultaneous rescue of multiple connections in telecommunication systems |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8660527B2 (en) | 2005-02-17 | 2014-02-25 | Qualcomm Incorporated | Control of data call origination based on prior origination attempts |
WO2009046374A1 (en) * | 2007-10-05 | 2009-04-09 | Qualcomm Incorporated | Adjusting multi-carrier allocation in wireless networks |
Also Published As
Publication number | Publication date |
---|---|
WO2002045386A3 (en) | 2003-08-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7187930B2 (en) | Retry limits for connection rescue procedures in telecommunication systems | |
US7133675B2 (en) | Forward link based rescue channel method and apparatus for telecommunication systems | |
US6512927B2 (en) | Method and apparatus for simultaneous rescue of multiple connections in telecommunication systems | |
US7006821B2 (en) | Method and apparatus for dynamically determining a mobile station's active set during a connection rescue procedure | |
US6996391B2 (en) | Forward-link rescue synchronization method and apparatus | |
US7010319B2 (en) | Open-loop power control enhancement for blind rescue channel operation | |
EP1203499B1 (en) | Method for autonomous handoff in a wireless communication system | |
US7012993B2 (en) | Telecommunications modem deactivation control method and apparatus | |
JP4713601B2 (en) | Method and apparatus for call recovery in a wireless communication system | |
US6928285B2 (en) | Minimum interference multiple-access method and system for connection rescue | |
EP1211910B1 (en) | System and method for preventing dropped calls | |
WO2002045386A2 (en) | Retry limits for connection rescue procedures in telecommunication systems | |
JP4089432B2 (en) | Method for simultaneous rescue of multiple connections in a telecommunications system | |
WO2002041605A2 (en) | System for rescuing multiple mobile station connections | |
CN100527863C (en) | Forward link based rescue channel method and apparatus for telecommunication systems | |
WO2002058363A2 (en) | Open-loop power control enhancement for blind rescue channel operation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 01819554.7 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2002546398 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020037007122 Country of ref document: KR |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWP | Wipo information: published in national office |
Ref document number: 1020037007122 Country of ref document: KR |
|
122 | Ep: pct application non-entry in european phase |