Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND APPARATUS FOR CONTROLLING NETWORK ACCESS IN A WIRELESS COMMUNICATION SYSTEM
Document Type and Number:
WIPO Patent Application WO/2013/165139
Kind Code:
A1
Abstract:
The present invention is directed to a wireless communication system. Specifically, the present invention is directed to a method of controlling network access and an apparatus therefore, wherein the method comprises: receiving a first field for indicating network overload situation and a second field for indicating a network access priority; and receiving at least one of a N-bit field for indicating a first back-off window and a M-bit field for indicating a second back-off window, wherein if a configured priority is equal to or higher than the network access priority, a random access (RA) procedure is performed using the first back-off window, wherein if the configured priority is lower than the network access priority, the RA procedure is selectively barred or performed using at least one of the first back-off window and the second back-off window.

Inventors:
RYU KISEON (KR)
KIM SANGGOOK (US)
LEE KIDONG (KR)
Application Number:
PCT/KR2013/003675
Publication Date:
November 07, 2013
Filing Date:
April 29, 2013
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
LG ELECTRONICS INC (KR)
International Classes:
H04W74/08; H04W4/70
Domestic Patent References:
WO2004019630A12004-03-04
WO2011019551A12011-02-17
WO2011086097A12011-07-21
Foreign References:
US20120033613A12012-02-09
Attorney, Agent or Firm:
KIM, Yong In et al. (7th Floor Hyundae Building,175-9 Jamsil-dong,,Songpa-ku, Seoul 138-861, KR)
Download PDF:
Claims:
[CLAIMS]

[Claim 1 ]

A method of controlling network access at a wireless device in a wireless

communication system, the method comprising:

receiving a first field for indicating network overload situation and a second field for indicating a network access priority; and

receiving at least one of a N-bit field for indicating a first back-off window and a M- bit field for indicating a second back-off window,

wherein if a configured priority is equal to or higher than the network access priority, a random access (RA) procedure is performed using the first back-off window,

wherein if the configured priority is lower than the network access priority, the RA procedure is selectively barred or performed using at least one of the first back-off window and the second back-off window.

[Claim 2]

The method of claim 1 , wherein the first back-off window is smaller than the second back-off window.

[Claim 3 ]

The method of claim 1, wherein M is larger than N.

[Claim 4]

The method of claim 1 , wherein if the configured priority is lower than the network access priority and if the first field is set to 1, the RA procedure is barred; and

wherein if the configured priority is lower than the network access priority and if the first field is set to 0, the RA procedure is performed using the second back-off window. [Claim 5]

The method of claim 1 , further comprising: receiving a third 1 -bit field,

wherein if the configured priority is lower than the network access priority and if the third 1 -bit field is set to a value, the RA procedure is barred; and

wherein if the configured priority is lower than the network access priority and if the third 1 -bit field is set to the other value, the RA procedure is performed using the second back-off window.

[Claim 6]

The method of claim 1, further comprising: receiving a fourth 1-bit field, wherein if the configured priority is lower than the network access priority, and if the first field is set to 1, and if the fourth 1-bit field is set to a value, the RA procedure is barred; and

wherein if the configured priority is lower than the network access priority and if the fourth 1-bit field is set to the other value, the RA procedure is performed using one of the first back-off window of the second back-off window, based on whether a random- generated value is larger than a threshold value or not.

[Claim 7]

The method of claim 1, further comprising: receiving a fifth 1-bit field,

wherein if the configured priority is lower than the network access priority, and if the first field is set to 1 , and if the fifth 1-bit field is set to a value, the RA procedure is barred; and

wherein if the configured priority is lower than the network access priority and if the fifth 1-bit field is set to the other value, the RA procedure is either barred or performed using the second back-off window, based on whether a random-generated value is larger than a threshold value or not.

[Claim 8]

The method of claim 1, wherein the wireless device is a delay-tolerant wireless device.

[Claim 9]

A wireless device for used in a wireless communication system, the wireless device comprising:

a radio frequency unit; and

a processor, wherein the processor is configured to:

receive a first field for indicating network overload situation and a second field for indicating a network access priority; and

receive at least one of a N-bit field for indicating a first back-off window and a M- bit field for indicating a second back-off window,

wherein if a configured priority is equal to or higher than the network access priority, a random access (RA) procedure is performed using the first back-off window,

wherein if the configured priority is lower than the network access priority, the RA procedure is selectively barred or performed using at least one of the first back-off window and the second back-off window. [Claim 10]

The wireless device of claim 9, wherein the first back-off window is smaller than the second back-off window.

[Claim 11 ]

The wireless device of claim 9, wherein M is larger than N.

[Claim 12]

The wireless device of claim 9, wherein if the configured . priority is lower than the network access priority and if the first field is set to 1 , the RA procedure is barred; and wherein if the configured priority is lower than the network access priority and if the first field is set to 0, the RA procedure is performed using the second back-off window. [Claim 13]

The wireless device of claim 9, wherein the processor is further configured to receive a third 1 -bit field,

wherein if the configured priority is lower than the network access priority and if the third 1-bit field is set to a value, the RA procedure is barred; and

wherein if the configured priority is lower than the network access priority and if the third 1 -bit field is set to the other value, the RA procedure is performed using the second back-off window.

[Claim 14]

The wireless device of claim 9, wherein the processor is further configured to receive a fourth 1 -bit field,

wherein if the configured priority is lower than the network access priority, and if the first field is set to 1, and if the fourth 1-bit field is set to a value, the RA procedure is barred; and

wherein if the configured priority is lower than the network access priority and if the fourth 1 -bit field is set to the other value, the RA procedure is performed using one of the first back-off window of the second back-off window, based on whether a random- generated value is larger than a threshold value or not.

[Claim 15 ]

The wireless device of claim 9, wherein the processor is further configured to receive a fifth 1-bit field, wherein if the configured priority is lower than the network access priority, and if the first field is set to 1 , and if the fifth 1-bit field is set to a value, the RA procedure is barred; and

wherein if the configured priority is lower than the network access priority and if the fifth 1 -bit field is set to the other value, the RA procedure is either barred or performed using the second back-off window, based on whether a random-generated value is larger than a threshold value or not.

[Claim 16]

The wireless device of claim 9, wherein the wireless device is a delay-tolerant wireless device.

Description:
[DESCRIPTION]

[Invention Title]

METHOD AND APPARATUS FOR CONTROLLING NETWORK ACCESS IN A WIRELESS COMMUNICATION SYSTEM

[Technical Field]

[1] The present invention is directed to a method and an apparatus for being used in a wireless communication system. Specifically, the present invention is directed to a method and an apparatus of controlling network access. The wireless communication system can provide Machine-to-Machine (M2M) services.

[Background Art]

[2] Generally, a wireless communication system is being developed to diversely cover a wide range to provide such a communication service as an audio communication service, a data communication service and the like. The wireless communication is a sort of a multiple access system capable of supporting communications with multiple users by sharing available system resources (e.g., bandwidth, transmit power, etc.). The multiple access system may include one of a Code Division Multiple Access (CDMA) system, a Frequency Division Multiple Access (FDMA) system, a Time Division Multiple Access (TDMA) system, an Orthogonal Frequency Division Multiple Access (OFDMA) system, a Single Carrier Frequency Division Multiple Access (SC-FDMA) system and any combination thereof.

[3] Machine to Machine (M2M) communications involve the communication (using wired or wireless means, or a combination of both) between two machines without human intervention. The term "M2M communication" is also referred to as "Machine Type Communication (MTC)", or Device-to-Device (D2D) communication in certain literature. However, for consistency, only the term "M2M communication" is used herein. Some examples of M2M communications are: smart metering (e.g., remote reading of a utility meter), healthcare monitoring (e.g., remote monitoring of a patient's heart rate), agricultural monitoring (e.g., monitoring of a crop condition), fleet management tracking (e.g., monitoring current status of trucks on the road), security surveillance (e.g., automatic, real- time monitoring of a building or complex), billing transactions, inventory management (e.g., through monitoring of Point of Sale (POS) transactions in a supermarket) and the like. M2M communications typically use M2M communications-capable sensors or diagnostic devices (which may perform the metering, monitoring, etc., mentioned earlier) on one end and an M2M user device or receiver on the other end to receive data from the sensor devices and process the data.

[Disclosure]

[Technical Problem]

[4] An object of the present invention is to provide a method and an apparatus of efficiently resolving network access congestion in a wireless communication system. Another object of the present invention is to provide a method and an apparatus of efficiently controlling network access, particularly random access procedure for the network access. The wireless communication system can provide M2M services, and the network congestion/access may be for the M2M services.

[5] It will be appreciated by persons skilled in the art that the objects that can be achieved through the present invention are not limited to what has been particularly described hereinabove and the above and other objects that the present invention can achieve will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings.

[Technical Solution]

As an aspect of the invention, a method of controlling network access at a wireless device in a wireless communication system is provided, in which the method comprises: receiving a first field for indicating network overload situation and a second field for indicating a network access priority; and receiving at least one of a N-bit field for indicating a first back-off window and a M-bit field for indicating a second back-off window, wherein if a configured priority is equal to or higher than the network access priority, a random access (RA) procedure is performed using the first back-off window, wherein if the configured priority is lower than the network access priority, the RA procedure is selectively barred or performed using at least one of the first back-off window and the second back-off window.

As another aspect of the invention, a wireless device for used in a wireless communication system is provided, in which the wireless device comprises: a radio frequency unit; and a processor, wherein the processor is configured to: receive a first field for indicating network overload situation and a second field for indicating a network access priority; and receive at least one of a N-bit field for indicating a first back-off window and a M-bit field for indicating a second back-off window, wherein if a configured priority is equal to or higher than the network access priority, a random access (RA) procedure is performed using the first back-off window, wherein if the configured priority is lower than the network access priority, the RA procedure is selectively barred or performed using at least one of the first back-off window and the second back-off window.

Preferably, the first back-off window may be smaller than the second back-off window.

Preferably, M may be larger than N.

Preferably, if the configured priority is lower than the network access priority and if the first field is set to 1, the RA procedure is barred; and if the configured priority is lower than the network access priority and if the first field is set to 0, the RA procedure is performed using the second back-off window.

Preferably, a third 1 -bit field may be further received, wherein if the configured priority is lower than the network access priority and if the third 1 -bit field is set to a value, the RA procedure is barred; and wherein if the configured priority is lower than the network access priority and if the third 1-bit field is set to the other value, the RA procedure is performed using the second back-off window.

Preferably, a fourth 1-bit field may be further received, wherein if the configured priority is lower than the network access priority, and if the first field is set to 1 , and if the fourth 1-bit field is set to a value, the RA procedure is barred; and wherein if the configured priority is lower than the network access priority and if the fourth 1 -bit field is set to the other value, the RA procedure is performed using one of the first back-off window of the second back-off window, based on whether a random-generated value is larger than a threshold value or not.

Preferably, a fifth 1 -bit field may be further received, wherein if the configured priority is lower than the network access priority, and if the first field is set to 1 , and if the fifth 1 -bit field is set to a value, the RA procedure is barred; and wherein if the configured priority is lower than the network access priority and if the fifth 1-bit field is set to the other value, the RA procedure is either barred or performed using the second back-off window, based on whether a random-generated value is larger than a threshold value or not.

Preferably, the wireless device may be a delay-tolerant wireless device.

[Advantageous Effects]

[6] Exemplary embodiments of the present invention have the following effects. In accordance with the embodiments of the present invention, network access congestion can be efficiently resolved in a wireless communication system. In addition, network access, particularly random access procedure for the network access can be efficiently controlled.

[7] It will be appreciated by persons skilled in the art that the effects that can be achieved through the present invention are not limited to what has been particularly described hereinabove and other advantages of the present invention will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings.

[Description of Drawings]

[8] The accompanying drawings, which are included to provide a further understanding of the invention, illustrate embodiments of the invention and together with the description serve to explain the principle of the invention.

[9] FIG. 1 illustrates an exemplary Machine-to-Machine (M2M) service architecture using a cellular Access Network (AN).

[10] FIGs. 2-3 illustrate an example of access attempt.

[11] FIG. 4 illustrates an example of -ACH slot structure.

[12] FIG. 5 illustrates an example of random access procedure using R-ACH..

[13] FIGs. 6-9 illustrate examples of network access procedure in accordance with the present invention.

[14] FIG. 10 illustrates a block diagram of a wireless device 10.

[Mode for Invention]

[15] Reference will now be made in detail to the preferred embodiments of the present invention with reference to the accompanying drawings. The detailed description, which will be given below with reference to the accompanying drawings, is intended to explain exemplary embodiments of the present invention, rather than to show the only embodiments that can be implemented according to the invention. The following embodiments of the present invention can be applied to a variety of wireless access technologies, for example, CDMA, FDMA, TDMA, OFDMA, SC-FDMA, MC-FDMA, and the like. CDMA can be implemented by wireless communication technologies, such as Universal Terrestrial Radio Access (UTRA) or CDMA2000. 3rd Generation Partnership Project 2 (3GPP2) is developingCDMA2000-based technologies including

CDMA2000 lx, lxEV-DO (l x Evolution - Data Optimized, a.k.a HRPD (High Rate Packet Data), xHRPD (eXtended-cell High Rate Packet Data), the set of 3G standards based on the earlier cdmaOne 2G CDMA technologies. TDMA can be implemented by wireless communication technologies, for example, Global System for Mobile communications (GSM), General Packet Radio Service (GPRS), Enhanced Data rates for GSM Evolution (EDGE), etc. OFDMA can be implemented by wireless communication technologies, for example, IEEE 802.1 1 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, E-UTRA (Evolved UTRA), and the like. UTRA is a part of the Universal Mobile Telecommunications System (UMTS). 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) is a part of Evolved UMTS (E-UMTS) that uses E-UTRA. The LTE-Advanced (LTE-A) is an evolved version of 3GPP LTE.

[16] Although the following embodiments of the present invention will hereinafter describe inventive technical characteristics on the basis of the 3GPP2 system, it should be noted that the following embodiments will be disclosed only for illustrative purposes and the scope and spirit of the present invention are not limited thereto. Specific terms used for the exemplary embodiments of the present invention are provided to aid in understanding of the present invention. These specific terms may be replaced with other terms within the scope and spirit of the present invention.

[17] FIG. 1 illustrates an exemplary M2M service architecture 10 using a cellular Access Network (AN) 12. The architecture 10 shows a cellular AN 12 connecting to an M2M Service Provider (SP) network 14. The AN 12 may include a Radio Access Network (RAN) portion (comprising, for example, a base station) of a cellular carrier network, and other portions (e.g., cellular backhaul and core network) as well. Similarly, the terms "M2M Service Provider" or "M2M SP" and "M2M SP network" may be used interchangeably herein to refer to the M2M SP network 14.

[18] Referring to FIG. 1, the cellular AN 12 may include multiple cell sites 16-18, each of which is under the radio coverage of a Base Station (BS) or Base Transceiver Station (BTS) 20-22. Base stations 20-22 may receive wireless signals (via exemplary radio links 23A-23C) from various M2M communication entities 24-32 operating in an M2M device domain 34, and forward the received signals to an M2M core 36 of the cellular network 12. The M2M core 36 may include a cellular backhaul 38 and a cellular Core Network (CN) 40. The backhaul 38 and base stations 20-22 may be considered to comprise the RAN portion of the network 12. The Core Network (CN) 40 may provide logical, service, and control functions (e.g., subscriber account management, billing, subscriber mobility management, etc.), Internet Protocol (IP) connectivity and interconnection to other networks (e.g., the Internet) or entities, roaming support, etc.

[19] In FIG. 1 , M2M User 44 (which is also referred to herein as "M2M user device," and may also be referred to as "MTC User" or "D2D User" in certain literature) communicates with the M2M AS 46. The M2M User 44 may be an MTC capable device that can communicate with various M2M communication entities 24-32 and may even (remotely) control or operate them. For example, if an M2M communication entity is a building surveillance sensor or unit, the M2M User 44 in that case may be a remote data collection/processing unit that may instruct the surveillance sensor to transmit surveillance data thereto at predefined time intervals. The combination of M2M AS 46 and the M2M SC 42 may facilitate transfer of relevant application-specific data or other content between the M2M User 44 and respective M2M communication entity/entities.

[20] FIGs. 2-5 illustrate Access Channel (ACH) procedures by a wireless device (e.g., a mobile station). ACH procedure may be used for sending control signaling and short data. ACH procedure is used for various purposes including network access.

[21] FIGs. 2~3 illustrate an example of access attempt. Access attempt means entire process of sending one Layer 2 encapsulated Protocol Data Unit (PDU) and receiving (or failing to receive) an acknowledgment for the PDU at a mobile station. One access attempt consists of one or more access sub-attempts (FIG. 2). Each transmission in the access sub-attempt is called an access probe (FIG. 3). Each access probe consists of a Reverse Access Channel (R-ACH) preamble and an R-ACH message capsule. In the description, R-ACH is interchangeably used with ACH.

[22] Within an access sub-attempt, access probes are grouped into access probe sequences. The R-ACH used for each access probe sequence is chosen pseudo-randomly from among all the R-ACHs associated with current Forward Paging Channel (F-PCH). If there is only one R-ACH associated with the F-PCH, all access probes within an access probe sequence are transmitted on the same R-ACH. If there is more than one R-ACH associated with the current F-PCH, access probes within an access probe sequence may be transmitted on different R-ACHs associated with the current F-PCH. Each access probe sequence consists of up to 1 + NUM STEPs access probes. The first access probe of each access probe sequence is transmitted at an initial power level determined by a physical layer relative to the nominal open loop power level. Each subsequent access probe within an access probe sequence is transmitted at a power level that is a function of Power Levels (PWR_LVLs), calculated by a Signaling Radio Burst Protocol (SRBP) entity of the mobile station.

[23] FIG. 4 illustrates an example of R-ACH slot structure. The timing of access probes and access probe sequences is expressed in terms of 2 R-ACH slots. [24] Referring to FIG. 4, the transmission of an access probe begins at the start of an R- ACH slot. The timing of the start of each access probe sequence is determined pseudo- randomly. For every access probe sequence, a back-off delay, RS, from 0 to 1 + BKOFFs slots is generated pseudo-randomly. In other words, RS means an inter-probe sequence back-off, e.g., delay in slots generated (pseudo-randomly) by the mobile station following an unsuccessful access probe sequence or prior to the first access probe in a response attempt. An additional delay is imposed by the use of a random persistence test that determines the value of the Persistence Delay (PD) based on the parameter P of the MAC- SDUReady.Request primitive.

[25] For each slot after the random back-off delay, RS, the SRBP entity performs a pseudo-random test based on the parameter P of the MAC-SDUReady. Request primitive. If the test passes, the first access probe of the sequence begins in that slot. If the test fails, the access probe sequence is deferred until at least the next slot.

[26] The delay between access probes of an access probe sequence is generated pseudo- randomly. Upon reception of an acknowledgment from the base station, the upper layer terminates the access by no longer sending the MAC-SDUReady. Request primitive.

[27] If a MAC-SDUReady.Request primitive with (seqno mod (NUM_STEPs + 1)) not equal to 0 is received:

[28] · If all the access probes within an access probe sequence are transmitted on the same R-ACH associated with the current F-PCH, the next access probe is transmitted after an additional random back-off delay, RT, from 0 to 1 + PROBE BKOFFs slots. In other words, RT means an inter-probe back-off, e.g., delay in slots generated (pseudo- randomly) by the mobile station following an unacknowledged access probe.

[29] · If an R-ACH is pseudo-randomly selected from among all R-ACHs associated with the current F-PCH, the next access probe is transmitted after an additional random back-off delay, RT, from 0 to PROBE BKOFFs slots.

[30] The precise timing of the Access Channel transmissions in an access attempt is determined by a procedure called Pseudo-random Number (PN) randomization. For each access sub-attempt, the SRBP entity computes a delay, RN, from 0 to 2 PROBE - PN - RANs - 1 PN chips using a hash function.

[31] Table 1 shows variables that are related to the random access procedures

[32] Table 1 Delay test (run every slot) passes.

RA R-ACH Number Random between 0 and ACC_CHANs; 0 to 3 1

generated before every access probe sequence

or every access probe.

RN PN Hash using RN HASH KEYs between 0 and 0 to 51 1 chips

2 PROBE_PN_RAN S . j . generated Qnce a{ ^

Randomization

Delay beginning of each access sub-attempt.

RS Sequence BackRandom between 0 and 1 + BKOFFs; O to 16 slots off generated before every sequence of an access

sub-attempt (except the first sequence).

RT Probe Back-off Random between 0 and 1 + PROBE BKOFFs; O to 16 or slots generated before subsequent probes if the O to 15

mobile station transmits all access probes within

an access probe sequence on the same R-ACH.

Random between 0 and PROBE BKOFFs;

generated before subsequenct probes if the

common channel multiplex sublayer pseudo- randomly selects an R-ACH from among all R- ACHs associated with the current Paging

Channel.

[33] FIG. 5 illustrates an example of random access procedure using R-ACH.

[34] Referring to FIG. 5, upon reception of a MAC-SDUReady. Request (channel type, size, P, seqno) primitive with channel type set to "ACH frame", the SRBP entity may do the following:

[35] · If seqno is equal to 0:

[36] - The SRBP entity sends a MAC-SDUReady. YLesponse(access_mode) primitive with access jnode set to NULL.

[37] - The SRBP entity computes a number, RN, from 0 to (2 PR0BE - PN - RANs - l ).

[38] - The SRBP entity performs a persistence test for each R-ACH slot until the test passes. To perform the persistence test, the SRBP entity generates a random number RP,

0 < RP < 1. The persistence test is said to pass when RP is less than the value of P.

[39] - A common channel multiplex sub-layer generates a random number, RA, from

0 to ACC CHANs. ACC_CHAN means the number of Access Channels.

[40] · If seqno is non-zero and (seqno mod (NUM_STEPs+l)) is equal to 0:

[41] - The SRBP entity generates a random number, RS, from 0 to (BKOFFs + 1).

[42] - The SRBP entity waits for RS R-ACH slots and then performs a persistence test for each R-ACH slot until the test passes.

[43] - The common channel multiplex sub-layer generates a random number, RA, from 0 to ACC_CHANs.

[44] · If (seqno mod (NUM_STEPs+l)) is non-zero:

[45] - If the common channel multiplex sub-layer transmits all access probes within an access probe sequence on the same R-ACH, the SRBP entity generates a random number, RT, from 0 to 1 + PROBE BKOFFs

[46] - If the common channel multiplex sub-layer pseudo-randomly selects an R-ACH among all the R-ACHs associated with the current F-PCH, the SRBP entity generates a random number, RT, from 0 to PROBE BKOFFs. If there is more than one R-ACH associated with the current Paging Channel, the common channel multiplex sublayer generates a random number, RA, from 0 to ACC CHANs.

[47] When transmitting an access probe, the SRBP entity does the following:

[48] · Set PWR_LVLs to (seqno mod (NUM_STEPs+l)).

[49] - The common channel multiplex sub-layer sends a PHY-ACHPreamble. Request (ra, pwr_lvl, rn, num_preamble_frames) primitive to the physical layer with

[50] · ra set to RA;

[51] · pwr lvl set to PWRJLVLs;

[52] · rn set to RN; and

[53] · num_preamble_frames set to (1 + PAM SZs).

[54] After the transmission of the preamble, the SRBP entity sends a MAC- Availability. Indication primitive and waits for the reception of the matching MAC- Data.Request primitive, for each R-ACH frame, until all the fragments of the Layer 2 encapsulated PDU are transmitted. When sending the MAC-Availability.Indication primitive, the SRBP entity sets max size to ACH FRAME SIZE, and system_time to the System Time at which the frame will be transmitted.

[55] Upon reception of the MAC-Data.Request (channel_type, data, size) primitive with non-zero size and channel type set to "R-ACH frame", the SRBP entity performs the following:

[56] · The SRBP entity appends (ACH FRAME SIZE - size) '0' bits to data to form a Physical Layer R-ACH SDU.

[57] · The common channel multiplex sub-layer sends a PHY-ACH.Request (ra, pwr lvl, rn, sdu) primitive to the Physical Layer with:

[58] - ra set to RA;

[59] - pwr lvl set to PWR LVLs;

[60] - rn set to RN; and

[61] - sdu set to the assembled R-ACH SDU.

[62] Besides the ACH procedure of FIGs. 2-5, the access probe can be transmitted as a part of an Enhanced Access Channel (EACH) procedure. The EACH procedure includes basic access mode and reservation access mode, in which the access probe is transmitted via a Reverse Enhanced Access Channel (R-EACH) (basic mode) or a Reverse Common Control Channel (R-CCCH) (reservation access mode). In the description, R-EACH is interchangeably used with EACH. In the basic mode, overall procedure is substantially identical with the ACH procedure, except that enhanced access probe (sequence), R- EACH frame structure and the like are employed instead. Thus, in order to avoid repetitive descriptions, explanations on the basic mode are omitted here and can be referred to explanations of FIGs. 2-5.

[63] The ACH / EACH procedures are performed depending on various access-related parameters. The access-related parameters are broadcast by a base station, by using a message such as an Access Parameters Message (APM), an Enhanced Access Parameters Message (EAPM), a Generic Access Parameters Message (GAPM) and the like.

[64] In particular, access attempts can be performed as follows:

[65] If the mobile station monitors the Paging Channel, then:

[66] · If base station does not transmit the Generic Access Parameters Message or the mobile station does not support EACH, then the mobile station transmits on the ACH using a random access procedure. Many parameters of the random access procedure are supplied by the base station in the Access Parameters Message.

[67] · If base station does transmit the Generic Access Parameters Message and the mobile station supports EACH, then the mobile station transmits on the EACH using a random access procedure. Many parameters of the random access procedure are supplied by the base station in the Generic Access Parameters Message.

[68] If the mobile station monitors the Forward Common Control Channel / Primary Broadcast Control Channel, the mobile station transmits on the EACH using a random access procedure. Many parameters of the random access procedure are supplied by the base station in the Enhanced Access Parameters Message.

[69] Before the mobile station transmits an access probe to a new base station on the ACH, the mobile station shall update parameters based on the System Parameters Message, the Access Parameters Message and the Extended System Parameters Message on the associated new Paging Channel and process parameters from the messages Before the mobile station transmits an access probe to a new base station on the EACH, if the mobile station is monitoring Primary Broadcast Control Channel, the mobile station shall update parameters based on the Enhanced Access Parameters Message on the associated new Primary Broadcast Control Channel and process parameters from the messages.

[70] Before the mobile station transmits an access probe to a new base station on the EACH, if the mobile station is monitoring Paging Channel, the mobile station shall update parameters based on the Access Parameters Message, and Generic Access Parameters

Message on the associated new Paging Channel.

[71] Table 2 shows a part of Access Parameters Message.

[72] Table 2

[73]

to the pilot PN sequence offset for this base station, in units of 64 PN chips.

[74] - NOM PWR: Nominal transmit power offset. The base station may set this field to the correction factor to be used by a mobile station in the open loop power estimate, expressed as a two's complement value in units of 1 dB

[75] - INIT PWR: Initial power offset. The base station may set this field to the correction factor to be used by a mobile station in the open loop power estimate for the initial transmission on an Enhanced Access Channel, expressed as a two's complement value in units of 1 dB.

[76] - PWR_STEP: Power increment. The base station shall set this field to the value by which a mobile station is to increase their transmit power between successive access probes in an access probe sequence, in units of 1 dB.

[77] - NUM_STEP: Number of access probes. The base station shall set this field to one less than the maximum number of access probes a mobile station is to transmit in a single access probe sequence.

[78] - PSIST(0-9): Persistence value for access overload classes 0 through 9. If mobile stations in access overload classes 0 through 9 are permitted to transmit requests on the ACH, the base station may set this field to the persistence value to be used. If such mobile stations are not permitted to transmit requests on the ACH, the base station may set this field to '1 1 1 1 1'.

[79] - PSIST(X): Persistence value for access overload class X where 10 <= X<=15.

[80] - PROBE BKOFF: Access Channel probe back-off range. The base station may set this field to one less than the maximum number of slots a mobile station is to delay due to random back-off between consecutive enhanced access probes.

[81] - BKOFF: Access Channel probe sequence back-off range. The base station may set this field to one less than the maximum number of slots a mobile station is to delay due to random back-off between successive enhanced access probe sequences.

[82] Table 3 shows a part of Enhanced Access Parameters Message. Below table mainly shows parameters related with basic access mode. Generic Access Parameters Message has a similar structure to the Enhanced Access Parameters Message.

[83] Table 3

NUM_EACH_BA 5

EACH BAJRATES SUPPORTED 8

[84] - PILOT_PN is same as defined in APM.

[85] - PSIST(0-9)_EACH and PSIST(X)_EACH are same as PSIST(0-9) and PSIST(X) but optionally included in accordance with PSIST_PARMS_INCL.

[86] - NUM MODE PARM REC: The number of mode-specific parameter records. The base station may set this field to the number of mode-specific parameter records included in the message, minus one. The mode includes a basic access mode and a reservation access mode.

[87] - EACH NOMJPWR, EACH_INIT_PWR, EACH_PWR_STEP and EACH NUM STEP are same as NUM_PWR, INIT_PWR, PWR STEP and NUM_STEP except that these fields are used for the Enhanced Access Channel.

[88] - EACH PROBE BKOFF and EACH BKOFF are same as PROBE BKOFF and BKOFF, except that these fields are used for the Enhanced Access Channel.

[89] - EACH PREAMBLE ENABLED: Preamble enabled indicator for the Enhanced Access Channel. The base station shall set this field to T if EACH preambles related information is included; otherwise, the base station may set this field to 'Ο'.

[90] - EACH PRE AMBLE NUM FRAC : The number of fractional preambles on the Enhanced Access Channels. If EACH PREAMBLE ENABLED is set to Ί ', the base station may set this field to the number of fractional preambles minus one on the Enhanced Access Channels; otherwise, the base station may omit this field.

[91] - EACH_PREAMBLE_FRAC_DURATION: Fractional preamble duration on the

Enhanced Access Channels. If EACH PREAMBLE ENABLED is set to Ί ', the base station may set this field to the fractional preamble duration minus one on an Enhanced Access Channel, in units of 1.25 ms; otherwise, the base station may omit this field.

[92] - EACH PREAMBLE OFF DURATION: Fractional preamble gated-off duration on the Enhanced Access Channels. If EACH_PREAMBLE_ENABLED is set to T, the base station may set this field to the fractional preamble gated-off duration (in units of 1.25 ms) after the transmission of each fractional preamble on an Enhanced Access Channel; otherwise, the base station shall omit this field.

[93] - EACH PREAMBLE ADD DURATION: Additional preamble duration on the Enhanced Access Channels. If EACH_PREAMBLE_ENABLED is set to Ί ', the base station may set this field to the additional preamble duration on an Enhanced Access Channel, in units of 1.25 ms; otherwise, the base station may omit this field. [94] - EACH SLOT: Slot duration for the Enhanced Access Channels. The base station may set this field to N where the slot duration of the Enhanced Access Channel is (N+l) * 1.25 ms. The base station may set this field to a value between 0 and 63.

[95] - EACH SLOT OFFSETl : First slot offset for the Enhanced Access Channels. The base station may set this field so that the Enhanced Access Channel has a slot offset equal to (EACH ID * EACH SLOT OFFSET2 + EACH SLOT OFFSETl) mod (EACH SLOT + 1), where EACH_ID is the Enhanced Access Channel Index. The base station may set this field to a value between 0 and 63, in units of 1.25 ms.

[96] - EACH_SLOT_OFFSET2: Relative slot offset for the Enhanced Access Channels. The base station may set this field so that the Enhanced Access Channel has a slot offset equal to (EACH ID * EACH_SLOT_OFFSET2 + EACH SLOT OFFSET 1 ) mod (EACH SLOT + 1), where EACH ID is the Enhanced Access Channel Index. The base station may set this field to a value between 0 and 63, in units of 1.25 ms.

[97] - NUM EACH BA: Number of Enhanced Access Channels used for the Basic Access Mode. The base station may set it to the number of Enhanced Access channels used for the Basic Access mode minus one.

[98] - NUM BAJ ATES SUPPORTED: Supported rate words for the Basic Access mode on the Enhanced Access Channels. The base station may set each subfield of the EACH BA RATES SUPPORTED field as follows: the base station may set the subfield to Ί ' if the corresponding mode in Table 4 is allowed; otherwise the base station may set the subfield to 'Ο'.

[99] Table 4: EACH and R-CCCH Data Rate and Frame Size

[100] Example

[101] In the conventional random access procedures, access parameters are defined for normal mobile station, which means non-M2M mobile station in the description. And, in conventional random access procedures, congestion is controlled in accordance with a persistence test using a persistence probability value. The persistence probability value is signaled through PSIST fields in APM, EAPM and the like.

[102] As a result, Access Parameters other than the persistence probability cannot be customized during congestion. This is not matter since normal mobile stations cause network access congestion under controllable extent even though only the persistence probability is employed. However, for M2M mobile stations in cdma2000 and other systems, possible enormous number of M2M mobile stations being involved in congestion may lead to serious problems. For example, access attempts from normal mobile stations can be blocked due to large number of M2M mobile stations being involved in congestion. This kind of situation will be aggravated when more M2M mobile stations try to access a network system, e.g., in emergency situation. That is, for a M2M situation, mere control of persistence probability can increase the number of backlogged M2M mobile stations that has not received a permission to access the network system

[103] It is thus desirable to devise a mechanism that distributes M2M mobile stations in access attempts (preferably, in addition to the control of persistence probability), thus maintaining the reasonable numbers of M2M mobile stations successfully accommodated in the network system. In this regard, in order to solve the problem of large number of simultaneous access by M2 devices, various contributions were submitted in 3GPP2. Among the various contributions, C22-20120425-004 (A Priority Based Access Overload Control Scheme for l x RevF) and C22-20120416-020 (Control of Access Parameters for M2M Communications to Resolve Congestion) provides following solutions.

[104] Table 5: Solution of C22-20120425-004

BS operations

BS monitors a load on the access channel. When congestion occurs, BS advertises a 3-bit Network Access Priority (NAP) level in APM/GAPM. When there is no congestion, BS uses a 1 - bit Network Overload Indicator (NOI) in the APM/GAPM to indicate access priority control is off.

When access priority control is enabled, BS adjusts the NAP according to the network load. BS may also adjust a Persistence value for class Access Overload Control (ACCOLC) 15 when NAP is changed, to accommodate a potentially large number of devices suddenly becoming active.

MS operations

If NOI bit is not included in the GAPM/APM

- MS uses the last digit of its International Mobile Subscriber Identifier M (IMSI M) to determine its access overload class (e.g., ACCOLC 0-9)

- MS follows a normal access procedure.

If NOI bit is included in the GAPM/APM

- A M2M device uses overload classes ACCOLC 14 or 15 for access.

- Each M2M device is provisioned or preconfigured with a Device Access Priority (DAP) parameter.

- M2M device shall check NOI in GAPM/APM before it initiates an access attempt.

- If NOI is '0' (i.e. there is no congestion), M2M device shall perform the normal access procedure using ACCOLC 14.

- If NAP is T (i.e. there is congestion), MS shall compare its DAP with the advertised NAP.

- If its DAP is smaller than the advertised NAP, it shall hold off its access attempt and try again only when the overhead message has changed.

- If its DAP is equal to the advertised NAP, it shall perform the normal access procedure using overload class ACCOLC 15.

- If its DAP is larger than the advertised NAP, it shall perform the normal access procedure using overload class ACCOLC 14.

- When M2M device responds to Forward Link (FL) messages, DAP NAP process is disabled.

- In case of emergency, a M2M device should bypass the above access priority control procedures and access the network using parameters of the emergency access class.

- In case of urgent data, a M2M device should bypass the above access priority control procedures and access the network using its appropriate overload class (based on the last digit of IMSI_M), ACCOLC 0 through ACCOLC 9.

[105] Table 5: Solution of C22-20120425-004

BS operations

A message, that carries access-related parameter(s), may include an optional separate section which conveys access parameters (e.g., EACH PROBE BKOFF, EACH B OFF; see, table 3) which is not persistence probability, to be used by the M2M MS for access. The inclusion of such parameter(s) is indicated by a flag, which signals whether system is under congestion or not.

- When a flag is "ON", M2M MSs will use access parameter(s) designed for congestion.

- One more bit is allocated to each of these 2 parameters for possible longer values.

[106] However C22-20120425-004 has following problems:

[107] - First, if congestion occurs (i.e., NOI = 1) and DAP < NAP, access of M2M device is blocked unless NOI and/or NAP value is changed.

[108] - Second, BS broadcasts NAP & NOI in the GAPM and APM periodically and less frequently, which means that access of M2M devices may be blocked so long time.

[109] - Third, congestion level can be increased severely right after NAP & NOI setting allows them to access because M2M devices which have been blocked try to access simultaneously.

[110] In addition, C22-20120416-020 has following problems:

[111] - If congestion occurs (e.g., flag is "ON"), all the M2M devices use longer back-off parameters such as EACH PROBE BKOFF, EACH BKOFF, which can increase the access latency of M2M devices with high priority. [112] Therefore, in order to address above problems of the prior art, a solution to meet the following requirements is needed even in congestion case:

[113] - High priority M2M device can access with less latency.

[114] - Low priority M2M device can access at least even with long delay.

[115] - When network overloaded condition is released, sudden congestion should be avoided.

[116] Hereinafter, the present invention will be described in detail. In the description, "normal Back-Off (BO) or normal Access Procedure" may mean an access procedure using normal access parameter(s) (e.g., PROBE BKOFF, BKOFF; see, table 2). In addition, "extended Back-Off (BO) or extended Access Procedure" may mean an access procedure using extended access parameter(s) (e.g., EACH PROBE BKOFF, EACHJBKOFF; see, table 3). PROBE BKOFF and BKOFF are N-bits (e.g., 4-bits). EACH PROBE BKOFF, EACH BKOFF are M-bits (M>N) (e.g., 5-bits). Thus, a backoff window in the extended back-off can be larger than a back-off window in the normal back-off, thereby M2M devices can be distributed more widely and long delayed.

[117] Case 1

[118] In case 1, when a congestion occurs, BS may indicate either blocking of access from low priority M2M devices (e.g., M2M devices with DAP < NAP & NOI =1) or allowance of access from the low priority M2M devices with long delay (e.g., extended back-off operation). The indication is carried out by using a newly defined indicator field (hereinafter, New Indicator field, NI field or simply NI) or by re-using a value of a predefined field (e.g., NOI).

[119] FIG. 6 illustrates an example of network access procedure, in which a newly defined indicator field is used for access control of low priority devices.

[120] Referring to FIG. 6, a BS may transmit, to a wireless device (e.g., M2M device), a message including at least one of a Network Access Priority (NAP) field, a Network Overload Indicator (NOI) field, and a New Indicator (NI) field (S602). In this example, for the purpose of explanation, it is assumed that the NOI field is set to a value indicating for example a congestion situation (e.g., NOI=l). The message may be for example GAPM, APM, etc. A value of the NAP field may indicate a network access priority level.

A value of the NOI field may indicate a network overload level. The value of the NOI field may be 1 -bit indicator indicating one of congestion or non-congestion. In addition to the NOI field, the NI field may be used for the BS to control network access of the M2M device, in consideration of various conditions including network congestion situation. In particular, the value of the NI field may be 1-bit flag indicating whether network access of the M2M device is allowed or blocked.

[121] Then, the M2M device may check whether it is a low priority M2M device or not, by comparing its Device Access Priority (DAP) with the NAP (S604). In the description, "DAP < NAP" means that the M2M device is a low priority M2M device. As a result, if the M2M device is not a low priority M2M device (i.e., DAP >= NAP), the M2M device may perform a normal back-off operation (S606). However, if the M2M device is the low priority M2M device (i.e., DAP < NAP), the M2M device may check, by using the NI field, whether network access of a low priority M2M device is allowed or not (S608). If the NI field is set to a value (e.g., NI=1) allowing network access of low priority M2M device, the M2M device can perform an extended back-off operation based on the extended back-off parameter (S610). Meanwhile, if the NI field is set to a value (e.g., NI=0) blocking network access of low priority M2M device, network access of the M2M device is blocked (S612).

[122] FIG. 7 illustrates an example of network access procedure, in which a pre-defined field is re-used for access control of low priority devices. FIG. 7 is substantially identical with FIG. 6, except that NOI field is re-used for access control of low priority devices.

[123] Referring to FIG. 7, a BS may transmit, to a wireless device (e.g., M2M device), a message including at least one of a Network Access Priority (NAP) field and a Network Overload Indicator (NOI) field (S702). The message may be for example GAPM, APM, etc. In this example, the NOI field may be used to indicate a network overload level as well as used for the BS to control network access of the M2M device, in consideration of various conditions including network congestion situation. For example, the value of the NOI field may be also used to indicate whether network access of the M2M device, preferably a low priority M2M device, is allowed or blocked.

[124] Then, the M2M device may check whether it is the low priority M2M device or not, by comparing its Device Access Priority (DAP) with the NAP (S704). As a result, if the M2M device is not the low priority M2M device (i.e., DAP >= NAP), the M2M device can perform a normal back-off operation for network access (S706). However, if the M2M device is the low priority M2M device (i.e., DAP < NAP), the M2M device may check, by using the NOI field, whether network access of a low priority M2M device is allowed or not (S708). In particular, if the NOI field is not included or if the NOI field is included and set to a value (e.g., NOI=0) corresponding to a non-congestion, the network access of low priority M2M device can be allowed with an extended back-off operation based on the extended back-off parameter (S710). Meanwhile, if the NOI field is included and set to a value (e.g., NOI=l) corresponding to a congestion, network access of the M2M device is blocked (S712).

[125] Case 2

[126] In case 2, when a congestion occurs, a BS may indicate either blocking of access from low priority M2M devices (e.g., M2M devices with DAP < NAP & NOI =1) or allowance of access from low priority M2M devices. In case 2, low priority M2M devices may perform a normal random back-off operation or an extended random back-off operation based on the result of probability check (see, FIG. 5). To this end, a newly defined indication field (e.g., Back-off Type field, BOtype field) can be used for a low priority M2M device to check whether it performs a normal random back-off operation or an extended random back-off operation based on the result of probability check.

[127] FIG. 8 illustrates an example of network access procedure, in which a newly defined indicator field is used for access control of low priority devices.

[128] Referring to FIG. 8, a BS may transmit, to a wireless device (e.g., M2M device), a message including at least one of a Network Access Priority (NAP) field, a Network Overload Indicator (NOI) field, and a New Indicator field (e.g., BOtype field) (S802). In this example, for the purpose of explanation, it is assumed that the NOI field is set to a value indicating for example a congestion situation (e.g., NOI=l). The message may be for example GAPM, APM, etc. In addition to the NOI field, the BOtype field may be used for the BS to control network access of the M2M device, in consideration of various conditions including network congestion situation. In particular, the value of the BOtype field may be 1-bit flag indicating whether network access of the M2M device is allowed (based on the result of probability check) or blocked.

[129] Then, the M2M device may check whether it is a low priority M2M device or not, by comparing its Device Access Priority (DAP) with the NAP (S804). As a result, if the M2M device is not a low priority M2M device (i.e., DAP >= NAP) (S804), the M2M device may perform a normal back-off operation (S806). However, if the M2M device is the low priority M2M device (i.e., DAP < NAP) (S804), the M2M device may check, by using the BOtype field, whether network access of a low priority M2M device is allowed or not (S808). If the BOtype field is set to a value (e.g., BOtype=0) blocking network access of the low priority M2M device (S808), network access of the M2M device is blocked (S810). Meanwhile, if the BOtype field is set to a value (e.g., BOtype=l) allowing network access of the low priority M2M device (S808), the M2M device can perform either a normal back-off operation or an extended back-off operation based on the result of probability check (S812-S818). In the probability check, the M2M device select a random number and checks if the selected random number meets the certain threshold to decide whether performing normal back-off operation or extended back-off operation. In particular, the M2M device draws a random value P (S812). Then, if the random value P is less than a threshold value (TH) (S814), the extended back-off operation can be performed for network access (S816). But, if the random value P is no less than the threshold value (TH) (S814), the normal back-off operation can be performed for network access (S816).

[130] FIG. 9 illustrates an example of network access procedure, in which a newly defined indicator field is used for access control of low priority devices.

[131] Referring to FIG. 9, a BS may transmit, to a wireless device (e.g., M2M device), a message including at least one of a Network Access Priority (NAP) field, a Network Overload Indicator (NOI) field, and a New Indicator field (e.g., BOtype field) (S802). n this example, for the purpose of explanation, it is assumed that the NOI field is set to a value indicating for example a congestion situation (e.g., NOI=l). The message may be for example GAPM, APM, etc. In addition to the NOI field, the BOtype field may be used for the BS to control network access of the M2M device, in consideration of various conditions including network congestion situation.

Then, the M2M device may check whether it is a low priority M2M device or not, by comparing its Device Access Priority (DAP) with the NAP (S904). As a result, if the M2M device is not a low priority M2M device (i.e., DAP >= NAP) (S904), the M2M device may perform a normal back-off operation (S906). However, if the M2M device is the low priority M2M device (i.e., DAP < NAP) (S904), the M2M device may check, by using the BOtype field, whether network access of a low priority M2M device is allowed or not (S908). If the BOtype field is set to a value (e.g., BOtype=0) allowing network access of the low priority M2M device without restriction (S908), the M2M device can perform a normal back-off operation (S910). Meanwhile, if the BOtype field is set to a value (e.g., BOtype=l) restricting network access of the low priority M2M device (S908), network access of the M2M device is either blocked or can be performed by using an extended back-off operation based on the result of probability check (S912-S918). In particular, the M2M device draws a random value P (S912). Then, if the random value P is less than a threshold value (TH) (S914), network access of the M2M device is blocked (S916). But, if the random value P is no less than the threshold value (TH) (S914), the extended back-off operation can be performed for network access (S916).

[132] In combination with the above examples, access priority among low priority M2M devices can be broken down (or, re-assigned or re-configured) according to their DAP as follows when newly defined indication flag is "ON"

[133] For CASE 1, different extended back-off window can be defined. In particular, M2M device with lower DAP can have a longer extended back-off window. To this end, extended back-off window depending on DAP can be explicitly signaled by a BS or implicitly calculated by M2M device based on its DAP, as follows.

[134] Example of explicit signaling

[135] If NAP value equals 4, following extended back-off window parameters can be signaled by BS, for DAP(s) lower than the NAP=4.

[136] - for DAP 3 : information indicating the extended back-off window = 4.

[137] - for DAP 2: information indicating the extended back-off window = 8.

[138] - for DAP 1 : information indicating the extended back-off window = 16.

[139] - for DAP 0: information indicating the extended back-off window = 32.

[140] Example of implicit calculation

[141] Extended back-off window can be calculated by using DAP as follows:

[142] Equation 1 :

Extended back-off window = (normal back-off window) x N^^ ~ DAP)

where the normal back-off window is calculated by using BKOFF and

PROBE BKOFF (see, table 2). N is an integer of 2 or more, and can be signaled by the network node (e.g., BS) or predefined. The NAP and the DAP are same as defined above

[143] For example, if NAP = 4, normal back-off window = 4, N = 2 and DAP = 3, then extended back-off window = 8.

[144] For CASE 2, different random number selection criterion can be defined for following two cases. M2M device with lower DAP can have high priority to select the random number performing an extended random back-off operation. Alternatively, M2M device with lower DAP can have high priority to select the random number blocking its access. To this end, a threshold value and a random number window can be explicitly signaled by BS or implicitly calculated by M2M device based on its DAP.

[145] Example of explicit signaling

[146] If NAP value equals 4, following extended back-off window parameters can be signaled by BS, for DAP(s) lower than the NAP=4.

[147] - for DAP 3 : information indicating the threshold = 0.1. [148] - for DAP 2: information indicating the threshold = 0.2.

[149] - for DAP 1 : information indi.cating the threshold = 0.4.

[150] - for DAP 0: information indicating the threshold = 0.8.

[151] * It is assumed that random value is selected between 0 and 1. Extended back-off window can be also signaled in a similar way.

[152] Example of implicit calculation

[153] The threshold can be calculated by using DAP as follows:

[154] Equation 2:

The threshold = (random number window) / {N x (NAP-DAP)}

where the random number window represents a range of a random number. For example, if the random number is selected between 0 and 100, the random number window is 100. N is an integer of 2 or more, and can be signaled by the network node (e.g., BS) or predefined. The NAP and the DAP are same as defined above.

[155] For example, if NAP = 4, random number window = 16, N= 2, and DAP = 2, then, the threshold is 4.

[156] Above description exemplifies cases that the NOI is 1 -bit field, but multiple-bit representation for NOI is also provided. In particular, the NOI field can be defined by more than one bit (e.g., 2 bits) in order to provide the level of overload to the M2M devices with respectively different levels of priority. And, if the periods of Extended Back-off (BO) are not explicitly or implicitly signaled, the multiple-bit NOI can be used for a low priority M2M device to decide how long it is supposed to wait.

[157] FIG. 10 illustrates a block diagram of a wireless device 1000. The wireless device 1000 includes a M2M device or a delay-tolerant device. The wireless device 1000 includes a processor (or digital signal processor) 1010, RF module 1035, power management module 1005, antenna 1040, battery 1055, display 1015, keypad 1020, memory 1030, SIM card 1025 (which may be optional), speaker 1045 and microphone 1050.

[158] A user enters instructional information, such as a telephone number, for example, by pushing the buttons of a keypad 1020 or by voice activation using the microphone 1050. The microprocessor 1010 receives and processes the instructional information to perform the appropriate function, such as to dial the telephone number. Operational data may be retrieved from the Subscriber Identity Module (SIM) card 1025 or the memory module 1030 to perform the function. Furthermore, the processor 1010 may display the instructional and operational information on the display 1015 for the user's reference and convenience.

[159] The processor 1010 issues instructional information to the RF module 1035, to initiate communication, for example, transmits radio signals comprising voice communication data. The RF module 1035 comprises a receiver and a transmitter to receive and transmit radio signals. An antenna 1040 facilitates the transmission and reception of radio signals. Upon receiving radio signals, the RF module 1035 may forward and convert the signals to baseband frequency for processing by the processor 1010. The processed signals would be transformed into audible or readable information outputted via the speaker 1045, for example. The processor 1010 also includes the protocols and functions necessary to perform the various processes described herein.

[160] The aforementioned embodiments are achieved by combination of structural elements and features of the present invention in a predetermined fashion. Each of the structural elements or features should be considered selectively unless specified otherwise. Each of the structural elements or features may be carried out without being combined with other structural elements or features. Also, some structural elements and/or features may be combined with one another to constitute the embodiments of the present invention. The order of operations described in the embodiments of the present invention may be changed. Some structural elements or features of one embodiment may be included in another embodiment, or may be replaced with corresponding structural elements or features of another embodiment. Moreover, it will be apparent that some claims referring to specific claims may be combined with other claims referring to the other claims other than the specific claims to constitute the embodiment or add new claims by means of amendment after the application is filed.

[161] The embodiments of the present invention have been described based on data transmission and reception between a BS and a wireless device. A specific operation which has been described as being performed by the eNB (or BS) may be performed by an upper node of the BS as the case may be. In other words, it will be apparent that various operations performed for communication with the wireless device in the network which includes a plurality of network nodes along with the BS can be performed by the BS or network nodes other than the BS. The BS may be replaced with terms such as fixed station, Node B, eNode B (eNB), and access point. Also, the term wireless device may be replaced with terms such as mobile station (MS), mobile subscriber station (MSS), M2M device, M2M MS, MTC device, MTC MS, D2D device, D2D MS, a delay-tolerant device, a delay-tolerant MS and a user equipment (UE). [162] The embodiments according to the present invention can be implemented by various means, for example, hardware, firmware, software, or combinations thereof. If the embodiment according to the present invention is implemented by hardware, the embodiment of the present invention can be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), processors, controllers, microcontrollers, microprocessors, etc.

[163] If the embodiment according to the present invention is implemented by firmware or software, the embodiment of the present invention may be implemented by a module, a procedure, or a function, which performs functions or operations as described above. Software code may be stored in a memory unit and then may be driven by a processor. The memory unit may be located inside or outside the processor to transmit and receive data to and from the processor through various well known means.

[164] It will be apparent to those skilled in the art that the present invention can be embodied in other specific forms without departing from the spirit and essential characteristics of the invention. Thus, the above embodiments are to be considered in all respects as illustrative and not restrictive. The scope of the invention should be determined by reasonable interpretation of the appended claims and all change which comes within the equivalent scope of the invention are included in the scope of the invention.

[Industrial Applicability]

[165] The present invention can be used for a method, a wireless device, a base station, a relay in a wireless communication system.