摘要:
Methods and apparatus are disclosed for distributing access information in a multi-operator scenario. In a multi-operator network (100), network nodes (130, 140, 150) are configured to transmit one or more system signatures and one or more access information tables. A terminal device (200) can use a received system signature to retrieve a set of system information from an access information table. The retrieved system information is used by the terminal device (200) to initiate a random access procedure to gain access to an operator network.
摘要:
Systems and methods related to a synchronization signal particularly well suited for wireless devices in an extended coverage area of a cell of a cellular communications network are disclosed. In one embodiment, a base station transmits a synchronization signal including multiple repetitions of a basic synchronization block during a coherence time of a downlink channel over which the synchronization signal is transmitted. The multiple repetitions of the basic synchronization block during the coherence time enable coherent combining during detection of the synchronization signal at wireless devices located in the cellular communications network. This coherent combining enables, for example, wireless devices located in an extended coverage area of a cell served by the base station to synchronize to the cell using a shorter synchronization signal than that which would be required if only non-coherent combining were used.
摘要:
A radio network node (12) communicates with user equipments, UEs, (10) over a radio interface and estimates one or more quality factors, associated with each of a first and second network, that depend on a load or an expected UE behavior or an uplink channel quality for one or both of first and second networks. The node (12) determines one or more network selection parameters based on the estimated one or more quality factors, and communicates the one or more network selection parameters to at least one UE (10) for enabling the UE to select one of the first and second networks for subsequent access by the at least one UE. The UE receives from the radio network node one or more network selection parameters. The UE uses the one or more network selection parameters to select one of first and second radio networks and then accesses the selected radio network.
摘要:
A wireless device is configured with a plurality of channel-sensing resources, each channel-sensing resource being associated with at least one corresponding transmission resource. The wireless device evaluates (810), in response to a determination that first data is ready to be transmitted by the wireless device, whether one or more of the plurality of channel-sensing resources are occupied, and transmits (820) at least a part of the first data on at least one transmission resource associated with at least one channel-sensing resource, in response to detecting that the at least one of the plurality of channel-sensing resources is not occupied. The wireless device further receives (830) a grant for a scheduled transmission at least partly overlapping with at least one of said plurality of channel-sensing resources; and transmits (840) second data in accordance with the received grant.
摘要:
The disclosure relates to connection setup between a wireless device and a mobile communication network using random access, and more specifically to dynamic random access resource configuration and selection. The disclosure provides for a method in a wireless device, of selecting random access resources for performing a random access procedure to a wireless network. The method comprises the step receiving information from a radio network node comprised in a cell of the wireless network, wherein the received information indicates at least a first and a second random access resource having different resource sizes. The method further comprises selecting one of said at least first and a second random access resources based on an expected uplink power received by the radio network node and transmitting a random access message to said wireless network using the selected resource. The disclosure further relates to methods for providing random access resources, as well as to a wireless device, and to radio network nodes of a wireless network.
摘要:
It is presented a method, performed in a network node, for sending system information. The method comprises the steps of: broadcasting, using at least one message, a system information table and a version indicator of the system information table, wherein each entry of the system information table comprises an entry identifier and a set of system access parameters, such that a radio node broadcasting an entry identifier is accessible through system access by a wireless terminal having access to the system in formation table; and broadcasting, a version message comprising the version indicator of the system information table, the version message omitting the system information table. A corresponding network node and wireless terminal are also presented.
摘要:
The invention relates to a method and an arrangement for reducing power consumption of a receiver in a mobile communication network comprising a sender transmitting packet data on a downlink channel to one or more receivers over a radio interface. Inactive time instants and listening time instants are defined according to provided rules. The receiver is arranged to listen for information from the sender during the listening time instants and to sleep during the inactive time instants. Thus, less power will be consumed during the inactive time instants.
摘要:
There is provided mechanisms for synchronization in a wireless communications network. A method is performed by a transmitting device. The method comprises transmitting a first synchronization signal on a first time/frequency resource in a time/frequency grid. The method comprises receiving a response to the first synchronization signal from a receiving device. The method comprises transmitting a second synchronization signal on a second time/frequency resource in the time/frequency grid to the receiving device, wherein the second time/frequency resource spans a larger portion of the time/frequency grid than the first time/frequency resource.
摘要:
A telecommunications system comprises a serving radio base station and a candidate radio base station which are different with respect to at least one of frequency and radio access technology. The serving radio base station comprises a radio base station to which a wireless mobile station provides measurement reports. A method comprises the serving radio base station allowing the mobile station to obtain information broadcasted by the candidate radio base station. The information is either information for locating Cell Global Identity (CGI) of the candidate radio base station or the Cell Global Identity (CGI) itself of the radio base station. The mobile station obtains the information from the candidate radio base station during at least one reading gap. The reading gap is a time period in which the mobile station does not receive information from the serving radio base station.
摘要:
One aspect of the teachings herein involves the temporary transfer of radio identities from one service area of a wireless communication network to another service area, where the individual radio identities are used to differentiate individual radio connections between the network and respective wireless nodes supported by the network. In particular, the temporary transfer of a given radio identity from its default service area for use in another service is limited temporally and/or geographically. Limiting the temporal and/or geographic scope of the radio identity transfer allows the network to substantially maintain default associations of radio identities and their respective service areas, which allows the network to prevent or reduce the use of conflicting radio identities in the same service area. Transfer signaling may be used transfer radio identities, and such signaling may include the temporal and/or geographic restrictions, to control the migration or spread of borrowed identities in the network.