WO2012078000A2 - 무선통신 시스템에서 단말 및 기지국 간 접속 방법 및 그 장치 - Google Patents
무선통신 시스템에서 단말 및 기지국 간 접속 방법 및 그 장치 Download PDFInfo
- Publication number
- WO2012078000A2 WO2012078000A2 PCT/KR2011/009491 KR2011009491W WO2012078000A2 WO 2012078000 A2 WO2012078000 A2 WO 2012078000A2 KR 2011009491 W KR2011009491 W KR 2011009491W WO 2012078000 A2 WO2012078000 A2 WO 2012078000A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- base station
- authentication
- message
- invite message
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/10—Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC
- H04W52/30—TPC using constraints in the total amount of available transmission power
- H04W52/36—TPC using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
- H04W52/367—Power values between minimum and maximum limits, e.g. dynamic range
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/12—Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/20—Selecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the present specification relates to a method and an apparatus for accessing a terminal and a base station in a wireless communication system.
- a terminal requests information from a base station, and the base station sends information corresponding thereto to the terminal. That is, many communication systems up to now have been developed based on downlink.
- M2M M2M communication
- a terminal when a terminal first operates, it discovers neighboring networks and selects a network to be connected according to the result.
- a machine directly establishes a network. It cannot be selected and must be controlled by a predetermined base station or network.
- the method for searching and selecting a network by the terminal as described above may have the following problems.
- power consumption is large because the search process must be carried out until the UE finds a certain network in all channels.
- the M2M communication network assumes a very large number of terminals, which causes a waste of radio resources since many management frames have to be transmitted in order to perform network discovery and selection.
- the terminal when the terminal performs network search and selection, the terminal may not properly receive data or control commands to be transmitted by the base station, which may cause network management problems.
- the present specification provides a terminal and a base station access method and apparatus for reducing a function of an existing terminal and expanding a management function of a base station with an emphasis on a network search and selection function in an M2M communication network environment.
- the present disclosure provides a terminal and a base station access method and apparatus for performing a network search and selection process in an M2M communication network environment.
- an advertisement message including identification information for notifying the existence of the terminal is broadcasted to at least one base station. And receiving an invite message allowing access from the base station to the base station, and performing an access procedure with the base station according to the received invite message.
- the advertisement message may be characterized in that the advertisement message includes a sleep interval and a listening duration.
- the method may further include operating in a sleep mode when the invite message is not received during the listening interval.
- the advertisement message may include one or more of a MAC address of the terminal, a type of the terminal, and a service category.
- the invite message may include one or more of an address of the base station, an ID of the base station, a capability, a power constraint, and supported rates.
- the invite message may include authentication information including an authentication algorithm and an authentication key of the terminal.
- the performing of the access procedure may include performing an authentication procedure for authentication with the base station, wherein the authentication procedure is based on the invite message including the authentication information. Characterized in that it is performed by sending a response.
- the terminal disclosed herein is a terminal for accessing a base station in a wireless communication system, and a wireless communication unit for transmitting and receiving a wireless signal with the outside, and for controlling the wireless communication unit for the presence of the terminal to inform the presence of the terminal Broadcast an advertisement message containing identification information to at least one base station, receive an invite message allowing access from the base station to the base station, and perform an access procedure with the base station according to the received invite message. It characterized in that it comprises a control unit for.
- the advertisement message may include a sleep interval and a listening duration.
- the control unit may control to operate in a sleep mode when the invite message is not received during the listening interval.
- the advertisement message may include one or more of a MAC address of the terminal, a type of the terminal, and a service category.
- the invite message may include one or more of an address of the base station, an ID of the base station, a capability, a power constraint, and supported rates.
- the invite message may include authentication information including an authentication algorithm and an authentication key of the terminal.
- the processor may control the wireless communication unit to transmit an authentication response to the base station based on the invite message including the authentication information.
- the terminal broadcasts, the advertisement message including identification information for notifying the existence of the terminal; Receiving a message, transmitting an invite message to allow access to the base station to the terminal, and performing an access procedure with the terminal according to the invite message.
- the transmitting of the invite message may include determining whether to connect with the terminal based on the advertisement message, and transmitting the invite message to the terminal according to the determination result.
- the advertisement message may include a MAC address of the terminal, a type of the terminal, a service category, a sleep interval, and a listening duration.
- the invite message may include one or more of an address of the base station, an ID of the base station, a capability, a power constraint, and supported rates.
- the invite message may include authentication information including an authentication algorithm and an authentication key of the terminal.
- the performing of the access procedure may include performing an authentication procedure for authentication with the terminal, wherein the authentication procedure is based on the invite message including the authentication information. Characterized in that it is performed by receiving a response.
- the terminal can briefly inform its own information periodically without having to search the network and operate in the sleep mode for the remaining time, thereby reducing power consumption.
- the base station can select the terminal based on the information transmitted by the terminal, to prevent the connection request of the undesired terminal, and to adjust the number of connected terminals, such as active To manage the network.
- the terminal since the terminal needs to transmit its information only in the channel to be used, the terminal efficiently manages radio resources by preventing unnecessary channel discovery and frame transmission or collision between base stations. can do.
- FIG. 1 is a block diagram illustrating a wireless communication system.
- FIG. 2 is an internal block diagram of a terminal and a base station in a wireless communication system.
- FIG. 3 is a flowchart illustrating a combining process for data transmission in the wireless communication system of FIG. 1.
- FIG. 4 is a flowchart illustrating an access method between a terminal and a base station according to the first embodiment disclosed in the present specification.
- FIG. 5 is a diagram illustrating a frame format of an advertisement message according to a first embodiment of the present disclosure.
- FIG. 6 is a diagram illustrating a frame format of an invite message according to the first embodiment disclosed herein.
- FIG. 7 is a flowchart illustrating a method for accessing a base station by a terminal according to the first embodiment disclosed in the present specification.
- FIG. 8 is a flowchart illustrating an access procedure through authentication between a terminal and a base station according to a second embodiment of the present disclosure.
- FIG. 9 is a flowchart illustrating an access procedure through authentication with a base station of a terminal according to the second embodiment of the present disclosure.
- CDMA code division multiple access
- FDMA frequency division multiple access
- TDMA time division multiple access
- OFDMA orthogonal frequency division multiple access
- SC-FDMA single carrier frequency division multiple access
- CDMA may be implemented with a radio technology such as Universal Terrestrial Radio Access (UTRA) or CDMA2000.
- TDMA may be implemented with wireless technologies such as Global System for Mobile communications (GSM) / General Packet Radio Service (GPRS) / Enhanced Data Rates for GSM Evolution (EDGE).
- GSM Global System for Mobile communications
- GPRS General Packet Radio Service
- EDGE Enhanced Data Rates for GSM Evolution
- OFDMA may be implemented in a wireless technology such as IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802-20, Evolved UTRA (E-UTRA), or the like.
- IEEE 802.16m is an evolution of IEEE 802.16e and provides backward compatibility with systems based on IEEE 802.16e.
- UTRA is part of the Universal Mobile Telecommunications System (UMTS).
- 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) is part of Evolved UMTS (E-UMTS) using Evolved-UMTS Terrestrial Radio Access (E-UTRA), which employs OFDMA in downlink and SC in uplink -FDMA is adopted.
- LTE-A Advanced is the evolution of 3GPP LTE.
- FIG. 1 is a block diagram illustrating a wireless communication system.
- the wireless communication system is widely deployed to provide various communication services such as voice and packet data.
- the wireless communication system includes a mobile station (MS) 10 and a base station 20 (BS).
- the terminal 10 may be fixed or mobile and may be called by other terms such as a user equipment (UE), a user terminal (UT), a subscriber station (SS), a wireless device, and an advanced mobile station (AMS). Can be.
- UE user equipment
- UT user terminal
- SS subscriber station
- AMS advanced mobile station
- the base station 20 generally refers to a fixed station communicating with the terminal 10, and may be referred to as other terms such as a NodeB, a base transceiver system (BTS), and an access point. have. At least one cell may exist in one base station 20.
- BTS base transceiver system
- the wireless communication system may be an Orthogonal Frequency Division Multiplexing (OFDM) / Orthogonal Frequency Division Multiple Access (OFDMA) based system.
- OFDM Orthogonal Frequency Division Multiplexing
- OFDMA Orthogonal Frequency Division Multiple Access
- OFDM uses multiple orthogonal subcarriers. OFDM uses orthogonality between inverse fast fourier transforms (IFFTs) and fast fourier transforms (FFTs).
- IFFTs inverse fast fourier transforms
- FFTs fast fourier transforms
- the transmitter data is sent by performing an IFFT.
- the receiver performs FFT on the received signal to recover the original data.
- the transmitter uses an IFFT to combine multiple subcarriers, and the receiver uses a corresponding FFT to separate multiple subcarriers.
- a slot is also the minimum possible data allocation unit, defined by time and subchannels.
- a subchannel may be composed of a plurality of tiles.
- the subchannel consists of 6 tiles, and one burst in uplink may consist of 3 OFDM symbols and 1 subchannel.
- each tile may include 4 contiguous subcarriers on 3 OFDM symbols.
- each tile may comprise three contiguous subcarriers on three OFDM symbols.
- the bin includes 9 contiguous subcarriers on the OFDM symbol.
- a band refers to a group of four rows of bins, and an adaptive modulation and coding (AMC) subchannel consists of six contiguous bins in the same band.
- AMC adaptive modulation and coding
- FIG. 2 is an internal block diagram of a terminal and a base station in a wireless communication system.
- the terminal 10 may include a controller 11, a memory 12, and a radio communication (RF) unit 13.
- RF radio communication
- the terminal 10 may include a display unit, a user interface unit, and the like.
- the controller 11 implements a proposed function, process and / or method. Layers of a radio interface protocol may be implemented by the controller 11.
- the memory 12 is connected to the control unit 11 to store a protocol or parameter for performing wireless communication. That is, it stores the terminal driving system, the application, and the general file.
- the RF unit 13 is connected to the control unit 11 to transmit and / or receive a radio signal.
- the display unit displays various information of the terminal, and may use well-known elements such as liquid crystal display (LCD) and organic light emitting diodes (OLED).
- the user interface may be a combination of a well-known user interface such as a keypad or a touch screen.
- the base station 20 may include a control unit 21, a memory 22, and a radio frequency unit (RF) unit 23.
- RF radio frequency unit
- the controller 21 implements the proposed function, process and / or method. Layers of a radio interface protocol may be implemented by the controller 21.
- the memory 22 is connected to the control unit 21 to store a protocol or parameter for performing wireless communication.
- the RF unit 23 is connected to the control unit 21 to transmit and / or receive a radio signal.
- the controllers 11 and 21 may include an application-specific integrated circuit (ASIC), another chipset, a logic circuit, and / or a data processing device.
- the memories 12 and 22 may include read-only memory (ROM), random access memory (RAM), flash memory, memory cards, storage media and / or other storage devices.
- the RF unit 13 and 23 may include a baseband circuit for processing a radio signal.
- the above-described technique may be implemented as a module (process, function, etc.) for performing the above-described function.
- the module may be stored in the memories 12 and 22 and executed by the controllers 11 and 21.
- the memories 12 and 22 may be inside or outside the controllers 11 and 21, and may be connected to the controllers 11 and 21 by various well-known means.
- FIG. 3 is a flowchart illustrating a combining process for data transmission in the wireless communication system of FIG. 1.
- the combining process for data transmission between the terminal 10 and the base station 20 in the wireless communication system 100 includes a scanning process (S310) and an authentication process (Authentication, S320). It may include a process (Association, S330).
- the terminal 10 and the base station 20 perform a data transmission process (Data Transmission, S340) via the above processes (S310, S320, S330).
- the discovery process S310 is a process of finding a base station 20 in the vicinity using a beacon or a probe message.
- the beacon message contains various capabilities (speed, encryption, etc.) that the base station 20 can support, and SSID (Service Set ID), which is a service group name to which the base station 20 belongs.
- the authentication process (S320) is a process in which the terminal 10 having selected the appropriate base station 20 by the discovery process S310 proves that the terminal 10 is a valid terminal. That is, the authentication process (S320) is a process in which the terminal 10 negotiates an authentication procedure and an encryption method with the base station 20. In this case, since most of them use an open system authentication method, the base station 20 authenticates the authentication request from the terminal 10 unconditionally.
- Enhanced authentication methods include IEEE 802.1x-based EAP-TLS, EAP-TTLS, EAP-FAST, and PEAP.
- the association process (S330) is a process in which the terminal 10 accesses the base station 20 after successful authentication.
- the connection process (S330) means to establish an identifiable connection between the terminal 10 and the base station 20.
- the terminal 10 can communicate with other terminals via the base station 20.
- the base station 20 stores an association ID (AID) that can be distinguished from other terminals. This is done by sending an Association Response.
- AID association ID
- the terminal 10 and the base station 20 perform a data transmission process (Data Transmission, S340) via the above processes (S310, S320, S330).
- the reconnection process is a process of connecting the base station 20 to another base station 20 to which the terminal 10 is connected.
- the reconnection process is a process of establishing a new combination of another new base station.
- M2M Device to Device Communication
- M2M Communication device-to-device communication
- Machine to Machine (M2M) communication hereinafter refers to communication between an electronic device and an electronic device as it is. In other words, it means communication between things. In general, although it refers to wired or wireless communication between electronic devices or communication between a device controlled by a person and a machine, it is used to mean a wireless communication between an electronic device and an electronic device, that is, between devices. In addition, M2M terminals used in a cellular network are inferior in performance or capability to general terminals.
- the characteristics of the M2M environment is as follows.
- M2M machine to machine
- MTC machine type communication
- M2M terminals in a cell having the above characteristics may transmit or receive signals between terminals or to a base station using a multi-hop configuration or using a hierarchical structure.
- each M2M terminals may be connected to each other in an upper / lower structure to transmit a signal. It is also possible to apply the same concept of parent / child.
- MS1 receives a signal transmitted by a base station and transmits it to MS2.
- the MS1 may transmit a signal not only to the MS2 but also to another terminal MS below.
- MS2 refers to a terminal below MS1.
- MS2 Upon receiving the signal from MS1, MS2 transmits the received signal to the lower MS, and up to MS N in this manner.
- many terminals may be connected in a multi-hop form or hierarchically between MS2 and MS N.
- a signal may be transmitted as follows for signal transmission between M2M terminals.
- the lower M2M terminal may transmit a signal to another M2M terminal or a base station using the upper M2M terminal.
- Machine-to-Machine (M2M) communication An information exchange that can be performed without user involvement between user devices through a base station or between a server and a device in a core network through a base station.
- M2M ASN Refers to an access service network capable of supporting an M2M (M2M) service.
- M2M Device Refers to a terminal having (or supporting) M2M function.
- M2M subscriber A consumer of M2M service.
- M2M Server An entity that can communicate with M2M devices.
- the M2M server provides an interface that can be accessed by M2M subscribers.
- M2M feature A unique feature of M2M applications supported by the M2M ASN. One or more features may be needed to support the application.
- M2M group refers to a group of M2M terminals including a common and / or identical M2M subcriber, that is, sharing one or more features.
- an 802.11 system will be described as an example, but the method proposed in the present specification is not limited to the 802.11 system, and it can be used in a system such as LTE, LTE-A, and the like.
- the first embodiment provides a method for accessing a terminal and a base station defined in an 802.11 system by using an advertising message and an invitation message.
- FIG. 4 is a diagram illustrating a network access method in a wireless communication system according to a first embodiment of the present specification.
- the terminal 10 broadcasts an advertisement message to at least one base station 20 (S410).
- the terminal 10 may broadcast the advertisement message to notify the existence of the terminal 10 to at least one base station 20 existing within a communication range.
- the terminal 10 may arbitrarily select one of the available channels of the terminal 10 to broadcast the advertisement message.
- the advertisement message may include identification information for notifying the existence of the terminal 10.
- the advertisement message may include information necessary for requesting a connection for data communication to the base station 20.
- the advertisement message may include a sleep interval and a listening duration of the terminal 10.
- the terminal 10 may repeatedly broadcast the advertisement message.
- the terminal 10 may operate in a sleep mode to reduce power.
- the terminal 10 may operate in a sleep mode during the sleep period, wake up after the sleep period passes, and broadcast the advertisement message again.
- the terminal 10 may repeat this operation and periodically broadcast the advertisement message.
- the base station 20 may perform scanning to receive the advertisement message (S420).
- the base station 20 may find an advertisement message broadcast from the terminal 10 while changing all available channels of the base station 20. When the advertisement message is found in a specific channel, the base station 20 may stop changing channels, receive the advertisement message, and perform an operation for establishing a connection with the terminal 10.
- the base station 20 transmits an invite message to the terminal 10 (S430).
- the base station 20 may transmit an invite message to allow the access to the base station 20 to the terminal 10.
- the terminal 10 may operate in the sleep mode. Accordingly, when the base station 20 receives the advertisement message, the base station 20 sends the invite message to the terminal 10 when the listening interval has not passed, referring to the listening interval included in the advertisement message. ) Can be sent.
- the base station 20 may determine whether to access the terminal 10 based on the advertisement message, and transmit the invite message to the terminal 10 according to the determination result.
- the base station 20 determines whether to access the terminal 10 based on the advertisement message. That is, the base station 20 is based on the information of the terminal 10 included in the advertisement message, whether the terminal 10 is a terminal capable of supporting the base station 20 or normal data with the base station 20 It is possible to determine whether or not communication is possible. If it is determined that the determination result is to be connected to the terminal 10, the base station 20 may transmit the invite message to the terminal 10.
- the terminal 10 may perform an access procedure for data communication with the base station 20 according to the received inbound message.
- the access procedure may include an authentication procedure between the terminal 10 and the base station 20 as necessary.
- FIG. 5 is a diagram illustrating a frame format of an advertisement message according to a first embodiment of the present disclosure.
- the advertisement message 500 includes an address 510, a station type 520, a sleep interval 530, and a listening duration 540. And a service category 550.
- the address 510 may include a MAC address of the terminal 10 for identifying the terminal 10.
- the terminal type 520 may include information indicating the type of the terminal 10. That is, when the terminal 10 is an M2M terminal, the type of the M2M terminal may be very diverse, so the terminal type 520 may include information indicating the type of the M2M terminal to distinguish the type of the M2M terminal. Can be.
- the terminal type 520 may have different values. have.
- the terminal type 520 may be used to provide a terminal management function supported by the base station 20 according to the type of the terminal 10. In addition, the terminal type 520 may be used to determine an access procedure or an authentication procedure for access with the base station 20.
- the sleep period 530 includes time information indicating the length of time that the terminal 10 operates in the sleep mode. While operating in the sleep mode, the terminal 10 may not receive downlink data for power saving. In addition, while operating in the sleep mode, the terminal 10 may not supply power to one or more physical components, and may not communicate with the base station 20.
- the sleep period 530 may indicate a time interval in which the terminal 10 transmits the advertisement message. That is, if the terminal 10 does not receive a response for a predetermined time after broadcasting the advertisement message, the terminal 10 may operate in a sleep mode and wake up again after the sleep period 530 passes and resend the advertisement message. .
- the listening interval 540 may include time information indicating a length of time for which the terminal 10 waits for a response.
- the listening interval 540 may indicate a time waiting for reception of the invite message from the base station 20 with respect to the advertisement message broadcast by the terminal 10. have.
- the service category 550 may include information about requirements that may be supported by the terminal 10 according to the type of the terminal 10.
- the service category 550 may include the type of application supported by the terminal 10, location information, delay constraints, minimum rate, and maximum rate. ), Traffic intervals and security requirements.
- the service category 550 may be used for network access control of the base station 20.
- the advertisement message 500 may further include an identifier, a service set identifier (SSID), a timestamp, and the like of the terminal 10.
- SSID service set identifier
- the frame components of the advertisement message 500 disclosed in FIG. 5 are not all required components, and the advertisement message 500 may be configured by fewer or more components. In addition, there is no particular limitation on the order or number of bits of the frame component of the advertisement message 500 herein.
- FIG. 6 is a diagram illustrating a frame format of an invite message according to the first embodiment disclosed herein.
- the invite message 600 includes an address 610, a basic service set ID (BSSID) 620, a capability 630, a power constraint 640, and support. Supported rates 650.
- BSSID basic service set ID
- the address 610 may include the MAC address of the base station 20 for identifying the base station 20.
- the basic service set ID 620 may include information indicating an identifier of the basic service set managed by the base station 20 transmitting the invite message 600.
- the performance capability 630 may include information indicating the performance capability of the base station 20.
- the power limit 640 may include information regarding the radio regulation requirements and the transmission power limit by the base station 20. In this case, the transmission power limit should be less than or equal to the radio wave regulation requirement. The value of the power limit 640 may vary fluidly with time.
- the support rate 650 may include information about a transmission rate that the base station 20 can support in transmitting or receiving a frame or data.
- FIG. 7 is a flowchart illustrating a method for accessing a base station by a terminal according to the first embodiment disclosed in the present specification.
- the terminal 10 broadcasts an advertisement message to at least one base station 20 (S710).
- the terminal 10 may broadcast the advertisement message to notify the existence of the terminal 10 to at least one base station 20 existing within a communication range.
- the advertisement message may include identification information for notifying the existence of the terminal 10 and / or a sleep interval and a listening duration of the terminal 10.
- the terminal 10 determines whether an invite message is received within the listening interval (S720).
- the terminal 10 may receive an invite message allowing the access from the base station 20 to the base station 20.
- the terminal 10 When receiving the invite message within the listening interval, the terminal 10 performs a procedure with the base station 20 (S730).
- the terminal 10 may perform an access procedure for data communication with the base station 20 according to the received inbound message.
- the access procedure may include an authentication procedure between the terminal 10 and the base station 20 as necessary.
- the terminal 10 If the invite message is not received within the listening interval, the terminal 10 operates in a sleep mode during the sleep period (S740). When it is determined that there is no base station to which the terminal 10 can connect, the terminal 10 may operate in a sleep mode during the sleep period to reduce power. Thereafter, when the sleep period has elapsed, the terminal 10 may wake up from the sleep mode and broadcast the advertisement message again.
- the second embodiment provides a method for a terminal and a base station defined in an 802.11 system to perform authentication and connection using an invitation message.
- FIG. 8 is a flowchart illustrating an access procedure through authentication between a terminal and a base station according to a second embodiment of the present disclosure.
- the base station 20 transmits an invite message to the terminal 10 (S810).
- the base station 20 may transmit an invite message to allow the access to the base station 20 to the terminal 10.
- the invite message may include one or more of an address of the base station 20, a basic base station ID, a performance capability, a power limit, and a support rate.
- the invite message may include authentication information for performing an authentication procedure with the terminal 10.
- the invite message includes an authentication algorithm between the base station 20 and the terminal 10, a parameter required for the algorithm, a challenge text, and a shared key. can do.
- the terminal 10 transmits an authentication response (authentication responce) to the base station 20 (S820).
- the terminal 10 may transmit the authentication response to the base station 20 based on the invite message including the authentication information.
- the authentication response may have a function of acknowledgment (ACK) for the invite message.
- the authentication response may include a shared key for authentication and a plain text encrypted using the shared key.
- the terminal 10 and the base station 20 may perform an authentication procedure with only the authentication response by omitting the necessary process in 2-way handshaking through the invite message.
- the base station 20 transmits an association request to the terminal 10 (S830).
- the base station 20 may transmit a connection request for combining with the terminal 10.
- the connection request includes information required for the base station 20 to combine with the terminal 10, for example, supported data rates, a service set identifier (SSID), and a combined ID. It may include one or more of (association ID; AID).
- Some of the information may be included in the invite message in advance. In this case, the information previously included in the invite message may be omitted.
- the terminal 10 transmits an association response to the base station 20 (S840).
- the terminal 10 may transmit the connection response to the base station 20 in response to the connection request.
- the connection response may include only some additional information.
- the connection response may include one or more of a connection acceptance, a service set identifier, and a binding ID.
- FIG. 9 is a flowchart illustrating an access procedure through authentication with a base station of a terminal according to the second embodiment of the present disclosure.
- the terminal 10 receives an invite message from the base station 20 (S910).
- the base station 20 may transmit an invite message to allow the access to the base station 20 to the terminal 10.
- the invite message may include an authentication algorithm between the base station 20 and the terminal 10, a parameter required for the algorithm, a challenge text, and a shared key.
- the terminal 10 transmits an authentication response to the base station 20 (S920).
- the terminal 10 may transmit the authentication response to the base station 20 based on the invite message including the authentication information.
- the authentication response may include a shared key for the authentication and the shared key. It may include plain text encrypted using a shared key.
- the terminal 10 receives a connection request from the base station 20 (S930).
- the base station 20 may transmit a connection request for combining with the terminal 10.
- the connection request includes information required for the base station 20 to combine with the terminal 10, for example, supported data rates, a service set identifier (SSID), and a combined ID. It may include one or more of (association ID; AID).
- the terminal 10 transmits a connection response to the base station 20 (S940).
- the terminal 10 may transmit the connection response to the base station 20 in response to the connection request.
- the connection response may include only some additional information.
- the connection response may include one or more of a connection acceptance, a service set identifier, and a binding ID.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (20)
- 무선통신 시스템에서 단말이 기지국과 접속하기 위한 방법에 있어서,상기 단말의 존재를 알리기 위한 식별 정보를 포함하는 광고 메시지를 적어도 하나의 기지국에 브로드캐스트 하는 단계;상기 기지국으로부터 상기 기지국으로의 접속을 허용하는 인바이트 메시지를 수신하는 단계; 및상기 수신된 인바이트 메시지에 따라 상기 기지국과 접속 절차를 수행하는 단계를 포함하는 것을 특징으로 하는 방법.
- 제1항에 있어서, 상기 광고 메시지는,상기 광고 메시지는 슬립 주기(sleep interval) 및 리스닝 간격(listening duration)를 포함하는 것을 특징으로 하는 방법.
- 제2항에 있어서,상기 리스닝 간격 동안 상기 인바이트 메시지를 수신하지 못한 경우,슬립 모드로 동작하는 단계를 더 포함하는 것을 특징으로 하는 방법.
- 제1항에 있어서, 상기 광고 메시지는,단말의 MAC 주소, 단말의 타입(type) 및 서비스 카테고리(service category) 중 하나 이상을 포함하는 것을 특징으로 하는 방법.
- 제1항에 있어서, 상기 인바이트 메시지는,상기 기지국의 주소, 상기 기지국의 ID, 수행 능력(capability), 전력 제한(power constraint) 및 지원 속도(supported rates) 중 하나 이상을 포함하는 것을 특징으로 하는 방법.
- 제1항에 있어서, 상기 인바이트 메시지는,상기 단말의 인증 알고리즘 및 인증 키를 포함하는 인증 정보를 포함하는 것을 특징으로 하는 방법.
- 제6항에 있어서, 상기 접속 절차를 수행하는 단계는,상기 기지국과 인증을 위한 인증 절차를 수행하는 단계를 포함하되,상기 인증 절차는,상기 인증 정보를 포함하는 상기 인바이트 메시지에 기초하여, 상기 기지국으로 인증 응답을 전송함으로써 수행되는 것을 특징으로 하는 방법.
- 무선통신 시스템에서 기지국과 접속하는 단말로서,외부와 무선 신호를 송수신하기 위한 무선통신부; 및상기 무선통신부를 제어하여 상기 단말의 존재를 상기 단말의 존재를 알리기 위한 식별 정보를 포함하는 광고 메시지를 적어도 하나의 기지국에 브로드캐스트 하고, 상기 기지국으로부터 상기 기지국으로의 접속을 허용하는 인바이트 메시지를 수신하고, 상기 수신된 인바이트 메시지에 따라 상기 기지국과 접속 절차를 수행하기 위한 제어부를 포함하는 것을 특징으로 하는 단말.
- 제8항에 있어서, 상기 광고 메시지는,슬립 주기(sleep interval) 및 리스닝 간격(listening duration)를 포함하는 것을 특징으로 하는 단말.
- 제9항에 있어서, 상기 제어부는,상기 리스닝 간격 동안 상기 인바이트 메시지를 수신하지 못한 경우,슬립 모드로 동작하도록 제어하는 것을 특징으로 하는 단말.
- 제8항에 있어서, 상기 광고 메시지는,단말의 MAC 주소, 단말의 타입(type) 및 서비스 카테고리(service category) 중 하나 이상을 포함하는 것을 특징으로 하는 단말.
- 제8항에 있어서, 상기 인바이트 메시지는,상기 기지국의 주소, 상기 기지국의 ID, 수행 능력(capability), 전력 제한(power constraint) 및 지원 속도(supported rates) 중 하나 이상을 포함하는 것을 특징으로 하는 단말.
- 제8항에 있어서, 상기 인바이트 메시지는,상기 단말의 인증 알고리즘 및 인증 키를 포함하는 인증 정보를 포함하는 것을 특징으로 하는 단말.
- 제13항에 있어서, 상기 프로세서는,상기 무선통신부를 제어하여, 상기 인증 정보를 포함하는 상기 인바이트 메시지에 기초하여, 상기 기지국으로 인증 응답을 전송하는 것을 특징으로 하는 단말.
- 무선 통신 시스템에서 기지국이 단말과 접속하기 위한 방법에 있어서,상기 단말이 브로드캐스트하고, 상기 단말의 존재를 알리기 위한 식별 정보를 포함하는 광고 메시지를 수신하는 단계;상기 단말로 상기 기지국으로의 접속을 허용하는 인바이트 메시지를 전송하는 단계; 및상기 인바이트 메시지에 따라 상기 단말과 접속 절차를 수행하는 단계를 포함하여 이루어지는 것을 특징으로 하는 방법.
- 제15항에 있어서, 상기 인바이트 메시지를 전송하는 단계는,상기 광고 메시지를 기초로 상기 단말과 접속할 것인지 판단하고, 상기 판단 결과에 따라 상기 단말로 상기 인바이트 메시지를 전송하는 단계를 포함하는 것을 특징으로 하는 방법.
- 제15항에 있어서, 상기 광고 메시지는,단말의 MAC 주소, 단말의 타입(type), 서비스 카테고리(service category), 슬립 주기(sleep interval) 및 리스닝 간격(listening duration)를 포함하는 것을 특징으로 하는 방법.
- 제15항에 있어서, 상기 인바이트 메시지는,상기 기지국의 주소, 상기 기지국의 ID, 수행 능력(capability), 전력 제한(power constraint) 및 지원 속도(supported rates) 중 하나 이상을 포함하는 것을 특징으로 하는 방법.
- 제15항에 있어서, 상기 인바이트 메시지는,상기 단말의 인증 알고리즘 및 인증 키를 포함하는 인증 정보를 포함하는 것을 특징으로 하는 방법.
- 제19항에 있어서, 상기 접속 절차를 수행하는 단계는,상기 단말과 인증을 위한 인증 절차를 수행하는 단계를 포함하되,상기 인증 절차는,상기 인증 정보를 포함하는 상기 인바이트 메시지에 기초하여, 상기 단말로부터 인증 응답을 수신함으로써 수행되는 것을 특징으로 하는 방법.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/885,559 US9497690B2 (en) | 2010-12-09 | 2011-12-08 | Access method between a terminal and a base station in a wireless communication system and apparatus thereof |
KR1020137012449A KR101785667B1 (ko) | 2010-12-09 | 2011-12-08 | 무선통신 시스템에서 단말 및 기지국 간 접속 방법 및 그 장치 |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US42162010P | 2010-12-09 | 2010-12-09 | |
US61/421,620 | 2010-12-09 | ||
US201061424676P | 2010-12-20 | 2010-12-20 | |
US61/424,676 | 2010-12-20 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2012078000A2 true WO2012078000A2 (ko) | 2012-06-14 |
WO2012078000A3 WO2012078000A3 (ko) | 2012-08-23 |
Family
ID=46207622
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2011/009491 WO2012078000A2 (ko) | 2010-12-09 | 2011-12-08 | 무선통신 시스템에서 단말 및 기지국 간 접속 방법 및 그 장치 |
PCT/KR2011/009509 WO2012078007A2 (ko) | 2010-12-09 | 2011-12-09 | 무선랜 시스템에서 통신 방법 |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2011/009509 WO2012078007A2 (ko) | 2010-12-09 | 2011-12-09 | 무선랜 시스템에서 통신 방법 |
Country Status (3)
Country | Link |
---|---|
US (2) | US9497690B2 (ko) |
KR (1) | KR101785667B1 (ko) |
WO (2) | WO2012078000A2 (ko) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014046453A3 (ko) * | 2012-09-18 | 2014-05-22 | 엘지전자 주식회사 | 무선랜 시스템에서 청취 간격 업데이트 방법 및 장치 |
EP2882208A4 (en) * | 2012-07-30 | 2016-04-13 | China Mobile Comm Corp | METHOD, APPARATUS, SYSTEM AND RELATED DEVICE FOR DATA TRANSMISSION |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9743434B2 (en) | 2012-10-30 | 2017-08-22 | Lg Electronics Inc. | Method and device for fast link synchronization in WLAN system |
US10356640B2 (en) | 2012-11-01 | 2019-07-16 | Intel Corporation | Apparatus, system and method of cellular network communications corresponding to a non-cellular network |
US9414392B2 (en) | 2012-12-03 | 2016-08-09 | Intel Corporation | Apparatus, system and method of user-equipment (UE) centric access network selection |
KR102004915B1 (ko) * | 2012-12-04 | 2019-07-30 | 삼성전자주식회사 | 단말기의 컨텐츠 수신 장치 및 방법 |
US9432862B2 (en) * | 2012-12-06 | 2016-08-30 | Airmagnet, Inc. | OTA mobile device classification |
CN106899971B (zh) | 2013-01-17 | 2022-03-04 | 苹果公司 | 在蜂窝网络上通信非蜂窝接入网信息的装置、系统以及方法 |
US9160515B2 (en) | 2013-04-04 | 2015-10-13 | Intel IP Corporation | User equipment and methods for handover enhancement using scaled time-to-trigger and time-of-stay |
EP2897418B1 (en) * | 2014-01-20 | 2016-06-01 | Alcatel Lucent | Advertising storage capabilities accessible via a wireless local area network |
US20150235052A1 (en) * | 2014-02-17 | 2015-08-20 | Samsung Electronics Co., Ltd. | Electronic device and method for protecting users privacy |
US10003581B2 (en) * | 2014-12-09 | 2018-06-19 | Avago Technologies General Ip (Singapore) Pte. Ltd. | Secure connection establishment |
CN107925893B (zh) * | 2015-08-04 | 2021-04-09 | 日本电信电话株式会社 | 无线环境信息收集系统以及方法 |
CN105676991A (zh) * | 2015-12-28 | 2016-06-15 | 小米科技有限责任公司 | 一种管理应用程序的方法和装置 |
US10372388B2 (en) * | 2016-03-31 | 2019-08-06 | Canon Kabushiki Kaisha | Communication system, communication device, and control method |
WO2023215288A1 (en) * | 2022-05-02 | 2023-11-09 | Aclara Technologies Llc | Systems and methods for orphaned sensor discovery and reporting |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20080079961A (ko) * | 2007-02-28 | 2008-09-02 | 엘지전자 주식회사 | 광대역 무선 접속 시스템에서의 레인징 수행 방법 |
KR20090050533A (ko) * | 2007-11-16 | 2009-05-20 | 삼성전자주식회사 | 아이엠에스 망에서 멀티캐스트 및 브로드캐스트 서비스를위한 장치 및 방법 |
KR20100125611A (ko) * | 2009-05-21 | 2010-12-01 | 주식회사 세아네트웍스 | 멀티캐스트 브로드캐스트 서비스 지원방법 및 장치 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4905234A (en) * | 1987-06-03 | 1990-02-27 | General Electric Company | Apparatus and method for transmitting digital data over a radio communications channel |
US5627882A (en) * | 1993-06-02 | 1997-05-06 | U.S. Philips Corporation | Enhanced power saving method for hand-held communications system and a hand-held communications system therefor |
US6169943B1 (en) * | 1999-07-14 | 2001-01-02 | Eaton Corporation | Motor vehicle diagnostic system using hand-held remote control |
EP1523129B1 (en) * | 2002-01-18 | 2006-11-08 | Nokia Corporation | Method and apparatus for access control of a wireless terminal device in a communications network |
WO2005002116A2 (en) * | 2003-06-13 | 2005-01-06 | Docomo Communications Laboratories Usa, Inc. | Proxy active scan for wireless networks |
US7706326B2 (en) * | 2004-09-10 | 2010-04-27 | Interdigital Technology Corporation | Wireless communication methods and components that implement handoff in wireless local area networks |
KR100708204B1 (ko) * | 2005-11-07 | 2007-04-16 | 삼성전자주식회사 | 무선랜에서 스테이션들간의 매체 접근에 대한 공정성을보장하는 방법 및 장치 |
US20070147332A1 (en) * | 2005-12-28 | 2007-06-28 | Antti Lappetelainen | Multimode support for wireless communications |
US9137012B2 (en) * | 2006-02-03 | 2015-09-15 | Emc Corporation | Wireless authentication methods and apparatus |
US8880104B2 (en) * | 2006-03-03 | 2014-11-04 | Qualcomm Incorporated | Standby time improvements for stations in a wireless network |
JP4455537B2 (ja) | 2006-05-24 | 2010-04-21 | 日本電信電話株式会社 | 無線通信を介して測定データを収集するためのネットワークシステム |
JP2008061110A (ja) * | 2006-09-01 | 2008-03-13 | Toshiba Corp | 電子機器およびデバイス検出方法 |
US8295216B2 (en) * | 2006-12-21 | 2012-10-23 | Nokia Corporation | Broadcast and multicast transmission techniques for powersave devices in wireless networks |
US20080170497A1 (en) * | 2007-01-11 | 2008-07-17 | Moo Ryong Jeong | Proactive Per-Class Load Management |
KR100981127B1 (ko) * | 2007-07-30 | 2010-09-10 | 영남대학교 산학협력단 | 인프라스트럭처 무선 랜 환경에서 폴링을 이용한 스테이션들 간의 직접 데이터 전송방법 |
KR100930795B1 (ko) * | 2008-03-03 | 2009-12-09 | 고려대학교 산학협력단 | 인프라스트럭쳐 무선랜에서의 스테이션간 직접 통신 방법 |
JP5025585B2 (ja) * | 2008-07-10 | 2012-09-12 | 株式会社リコー | 通信装置、通信プログラムおよび記憶媒体 |
JP5239665B2 (ja) | 2008-09-12 | 2013-07-17 | 富士通株式会社 | 無線lanシステムにおけるハンドオーバ方法およびその方法において使用される装置 |
US9306813B2 (en) * | 2009-12-23 | 2016-04-05 | Apple Inc. | Efficient service advertisement and discovery in a peer-to-peer networking environment with cooperative advertisement |
-
2011
- 2011-12-08 KR KR1020137012449A patent/KR101785667B1/ko active IP Right Grant
- 2011-12-08 WO PCT/KR2011/009491 patent/WO2012078000A2/ko active Application Filing
- 2011-12-08 US US13/885,559 patent/US9497690B2/en not_active Expired - Fee Related
- 2011-12-09 WO PCT/KR2011/009509 patent/WO2012078007A2/ko active Application Filing
- 2011-12-09 US US13/992,682 patent/US9497691B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20080079961A (ko) * | 2007-02-28 | 2008-09-02 | 엘지전자 주식회사 | 광대역 무선 접속 시스템에서의 레인징 수행 방법 |
KR20090050533A (ko) * | 2007-11-16 | 2009-05-20 | 삼성전자주식회사 | 아이엠에스 망에서 멀티캐스트 및 브로드캐스트 서비스를위한 장치 및 방법 |
KR20100125611A (ko) * | 2009-05-21 | 2010-12-01 | 주식회사 세아네트웍스 | 멀티캐스트 브로드캐스트 서비스 지원방법 및 장치 |
Non-Patent Citations (1)
Title |
---|
KERSTINE JOHNSON ET AL.: 'Suggested Updates on Requirements for Low Power Consumption' IEEE 802.16 BROADBAND WIRELESS ACCESS WORKING GROUP, IEEE C802.16P-10/0009R3 10 November 2010, * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2882208A4 (en) * | 2012-07-30 | 2016-04-13 | China Mobile Comm Corp | METHOD, APPARATUS, SYSTEM AND RELATED DEVICE FOR DATA TRANSMISSION |
WO2014046453A3 (ko) * | 2012-09-18 | 2014-05-22 | 엘지전자 주식회사 | 무선랜 시스템에서 청취 간격 업데이트 방법 및 장치 |
CN104641692A (zh) * | 2012-09-18 | 2015-05-20 | Lg电子株式会社 | 在无线lan系统中更新收听间隔的方法和设备 |
KR20150067171A (ko) * | 2012-09-18 | 2015-06-17 | 엘지전자 주식회사 | 무선랜 시스템에서 청취 간격 업데이트 방법 및 장치 |
KR101672289B1 (ko) * | 2012-09-18 | 2016-11-03 | 엘지전자 주식회사 | 무선랜 시스템에서 청취 간격 업데이트 방법 및 장치 |
US9538470B2 (en) | 2012-09-18 | 2017-01-03 | Lg Electronics Inc. | Method and apparatus for updating listen interval in wireless LAN system |
US9794878B2 (en) | 2012-09-18 | 2017-10-17 | Lg Electronics Inc. | Method and apparatus for updating listen interval in wireless LAN system |
Also Published As
Publication number | Publication date |
---|---|
US20130250834A1 (en) | 2013-09-26 |
US9497691B2 (en) | 2016-11-15 |
US9497690B2 (en) | 2016-11-15 |
US20130237192A1 (en) | 2013-09-12 |
KR101785667B1 (ko) | 2017-10-16 |
WO2012078000A3 (ko) | 2012-08-23 |
WO2012078007A3 (ko) | 2012-08-02 |
KR20130140005A (ko) | 2013-12-23 |
WO2012078007A2 (ko) | 2012-06-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2012078000A2 (ko) | 무선통신 시스템에서 단말 및 기지국 간 접속 방법 및 그 장치 | |
WO2011136620A2 (ko) | 무선 접속 시스템에서 단말 식별자(stid) 할당 방법 및 장치 | |
WO2011162572A2 (ko) | 다중 무선 접속 기술을 지원하는 무선 통신 시스템에서의 단말 간 협력 통신 | |
WO2019013571A1 (en) | METHOD AND APPARATUS FOR CONFIGURING CONTROL RESOURCE SET FOR 5G NEXT RADIO SYSTEM | |
WO2011162565A2 (ko) | 무선 접속 시스템에서 상향링크 데이터 전송 방법 및 장치 | |
WO2015167317A1 (en) | System and method for timing alignment of lte cells and inter-operator co-existence on unlicensed spectrum | |
WO2011136524A2 (ko) | 무선 접속 시스템에서 데이터 송수신 방법 및 장치 | |
WO2016117940A1 (en) | Method for selecting of sidelink grant for a d2d ue in a d2d communication system and device therefor | |
WO2018070845A1 (ko) | 무선 통신 시스템에서 단말에 의해 수행되는 사이드링크 동기화 신호 전송 방법 및 상기 방법을 이용하는 단말 | |
WO2016108680A1 (ko) | 무선 통신 시스템에서 d2d 동작 수행 방법 및 상기 방법을 이용하는 단말 | |
WO2012093882A2 (en) | Data communication method and apparatus via interlock between heterogeneous networks in radio access system supporting multi radio access technology | |
WO2018174537A1 (ko) | 무선 통신 시스템에서 전송 다이버시티 기법에 의하여 전송된 v2x 신호의 디코딩 방법 및 상기 방법을 이용하는 단말 | |
WO2020145633A1 (ko) | 무선 통신 시스템에서 송신 전력을 할당하기 위한 방법 및 장치 | |
WO2013009090A2 (ko) | 피어 투 피어 통신 시스템에서 우선순위에 기반한 데이터 송신 방법 | |
WO2017026791A1 (en) | Method for discoveering relay ue via d2d link at ue in wireless communication system and apparatus therefor | |
WO2014182090A1 (ko) | 무선랜 시스템에서 숨겨진 노드 문제의 완화 방법 | |
WO2019022477A1 (en) | CARRIER SELECTION METHOD AND APPARATUS FOR LATERAL LINK TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM | |
WO2017192006A2 (ko) | 무선 통신 시스템에서 단말에 의해 수행되는 신호 전송 방법 및 상기 방법을 이용하는 단말 | |
WO2012074337A2 (en) | Apparatus and method for transceiving multicast traffic in a wireless access system supporting machine-to-machine communication | |
WO2010143925A9 (ko) | 광대역 무선 접속시스템에서 효율적인 캐리어 관리 방법 | |
WO2013008966A1 (ko) | 단말 협력 전송을 지원하는 무선 접속 시스템에서 협력 단말의 상향링크 데이터 전송을 위한 자원 할당 방법 및 장치 | |
WO2016018080A1 (en) | Method and apparatus for scanning access point in wireless lan system | |
WO2012053842A1 (en) | Method of transmitting and receiving data in a multi radio access technology system using an access point and apparatus therefor | |
WO2017026763A1 (en) | Method for performing realy functions at ue in wireless communication system and apparatus therefor | |
WO2017126950A1 (ko) | 무선 통신 시스템에서 단말에 의해 수행되는 v2x 동작 방법 및 상기 방법을 이용하는 단말 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11846978 Country of ref document: EP Kind code of ref document: A2 |
|
ENP | Entry into the national phase |
Ref document number: 20137012449 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13885559 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11846978 Country of ref document: EP Kind code of ref document: A2 |