Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHODS, APPARATUSES, AND COMPUTER-READABLE STORAGE MEDIA FOR RELAYING TRAFFIC IN D2D COMMUNICATIONS
Document Type and Number:
WIPO Patent Application WO/2013/131234
Kind Code:
A1
Abstract:
Methods, apparatuses and computer readable memories are provided for receiving a signal comprising at least one of a first identifier, a first location, a first traffic type, or a first traffic size for a first user equipment; and also comprising at least one of a second identifier, a second location, a second traffic type, or a second traffic size for a second user equipment. Upon determining that the first and second user equipments are both eligible for performing a traffic relay function, generating a signal for the second user equipment confirming that the traffic relay function is to be performed. The traffic relay function comprises providing D2D communication between the first and second user equipments to relay traffic from a network access node to the first user equipment; to provide communications between the first and second user equipments; or to provide communications between the first user equipment and a third user equipment.

Inventors:
HONG WEI (CN)
GAO CHUNYAN (CN)
HAN JING (CN)
BAI WEI (CN)
WANG HAIMING (CN)
SUN PENGFEI (CN)
Application Number:
PCT/CN2012/071937
Publication Date:
September 12, 2013
Filing Date:
March 05, 2012
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
RENESAS MOBILE CORP (JP)
HONG WEI (CN)
GAO CHUNYAN (CN)
HAN JING (CN)
BAI WEI (CN)
WANG HAIMING (CN)
SUN PENGFEI (CN)
International Classes:
H04W88/04; H04W72/12
Domestic Patent References:
WO2011063300A12011-05-26
Foreign References:
CN101997582A2011-03-30
US20110117907A12011-05-19
Attorney, Agent or Firm:
KING & WOOD MALLESONS (East Tower World Financial Centre,,No. 1 Dongsanhuan Zhonglu, Chaoyang District, Beijing 0, CN)
Download PDF:
Claims:
What is Claimed is:

1. An apparatus comprising:

at least one processor and at least one memory storing a computer program;

in which the at least one memory with the computer program is configured with the at least one processor to cause the apparatus to at least:

receive a relay verification signal comprising at least one of a first identifier, a first location, a first traffic type, or a first traffic size for a first user equipment; and comprising at least one of a second identifier, a second location, a second traffic type, or a second traffic size for a second user equipment; and

upon determining that the first user equipment and the second user equipment are both eligible for performing a traffic relay function, generating a relay confirmation signal for the second user equipment confirming that the traffic relay function is to be performed;

wherein the traffic relay function comprises providing device-to-device communication between the first user equipment and the second user equipment to relay traffic from a network access node to the first user equipment, or to provide communications between the first user equipment and the second user equipment, or to provide communications between the first user equipment and a third user equipment.

2. The apparatus according to claim 1, in which the at least one memory with the computer program is configured with the at least one processor to cause the apparatus to identify at least one user equipment that has paired with the apparatus by using one or more received responses to discovery signals.

3. An apparatus comprising:

at least one processor and at least one memory storing a computer program;

in which the at least one memory with the computer program is configured with the at least one processor to cause the apparatus to at least:

identify a second user equipment that has paired with a first user equipment for device-to-device communication; and

generate a relay request signal for the second user equipment for requesting that the second user equipment relay traffic to the first user equipment, wherein the relay request signal includes at least one of an identifier, a location, a traffic type, or a traffic load corresponding to the first user equipment.

4. The apparatus according to claim 3, in which the at least one memory with the computer program is configured with the at least one processor to cause the apparatus to identify the second user equipment that is paired with the first user equipment by using one or more received responses to discovery signals.

5. The apparatus according to any of claims 3 or 4, in which the at least one memory with the computer program is configured with the at least one processor to cause the apparatus to identify the second user equipment that is paired with the first user equipment by determining that an identifier corresponding to the first user equipment is included in a device list of one or more user equipments which have responded to the second user equipment.

6. The apparatus according to any of claims 3-5 wherein the apparatus is configured to generate a relay modification signal for the second user equipment instructing the second user equipment to inform the first user equipment that the second user equipment is not capable of performing the traffic relay function.

7. The apparatus according to any of claims 3-6 wherein the relay modification signal includes an identifier that specifies a third user equipment which is capable of performing the traffic relay function. 8. A method comprising:

receiving a relay verification signal comprising at least one of a first identifier, a first location, a first traffic type, or a first traffic size for a first user equipment; and comprising at least one of a second identifier, a second location, a second traffic type, or a second traffic size for a second user equipment; and

upon determining that the first user equipment and the second user equipment are both eligible for performing a traffic relay function, generating a relay confirmation signal for the second user equipment confirming that the traffic relay function is to be performed;

wherein the traffic relay function comprises providing device-to-device communication between the first user equipment and the second user equipment to relay traffic from a network access node to the first user equipment, or to provide communications between the first user equipment and the second user equipment, or to provide communications between the first user equipment and a third user equipment. 9. The method according to claim 8 further comprising identifying at least one user equipment that has paired with the apparatus by using one or more received responses to discovery signals.

10. A method comprising:

identifying a second user equipment that has paired with a first user equipment for device-to-device communication, by using one or more received responses to discovery signals, or by determining that an identifier corresponding to the first user equipment is included in a device list of one or more user equipments which have responded to the second user equipment; and

generating a relay request signal for the second user equipment for requesting that the second user equipment relay at least one of signaling, paging, or data to the first user equipment, wherein the relay request signal includes at least one of an identifier, a location, a traffic type, or a traffic size corresponding to the first user equipment. 11. The method of claim 10 wherein identifying the second user equipment that is paired with the first user equipment is performed by using one or more received responses to discovery signals. 12. The method of any of claims 10 or 11 wherein identifying the second user equipment that is paired with the first user equipment is performed by determining that an identifier corresponding to the first user equipment is included in a device list of one or more user equipments which have responded to the second user equipment.

13. The method of any of claims 10-12 wherein the second user equipment receives the relay request signal and, in response thereto, transmits a rejection message. 14. The method of any of claims 10-12 wherein the second user equipment relays back a response message from the first user equipment to an enhanced Node B (eNB).

15. The method of claim 14 wherein the eNB transmits a grouped Relay Acquisition Signal (RAS) to find one or more possible candidate user equipments for relaying to or from the eNB.

16. A computer readable memory tangibly storing a computer program executable by at least one processor, the computer program comprising code for:

receiving a relay verification signal comprising at least one of a first identifier, a first location, a first traffic type, or a first traffic size for a first user equipment; and comprising at least one of a second identifier, a second location, a second traffic type, or a second traffic size for a second user equipment; and

upon determining that the first user equipment and the second user equipment are both eligible for performing a traffic relay function, generating a relay confirmation signal for the second user equipment confirming that the traffic relay function is to be performed;

wherein the traffic relay function comprises providing device-to-device communication between the first user equipment and the second user equipment to relay traffic from a network access node to the first user equipment, or to provide communications between the first user equipment and the second user equipment, or to provide communications between the first user equipment and a third user equipment.

17. The computer readable memory according to claim 16 further comprising code for identifying at least one user equipment that has paired with the apparatus by using one or more received responses to discovery signals. 18. A computer readable memory tangibly storing a computer program executable by at least one processor, the computer program comprising code for:

identifying a second user equipment that has paired with a first user equipment for device-to-device communication, by using one or more received responses to discovery signals, or by determining that an identifier corresponding to the first user equipment is included in a device list of one or more user equipments which have responded to the second user equipment; and

generating a relay request signal for the second user equipment for requesting that the second user equipment relay at least one of signaling, paging, or data to the first user equipment, wherein the relay request signal includes at least one of an identifier, a location, a traffic type, or a traffic size corresponding to the first user equipment.

19. The computer readable memory according to claim 18, wherein identifying a second user equipment that has paired with a first user equipment is performed by using one or more received responses to discovery signals.

20. The computer readable memory according to any of claims 18-1 wherein identifying a second user equipment that has paired with a first user equipment is performed by determining that an identifier corresponding to the first user equipment is included in a device list of one or more user equipments which have responded to the second user equipment.

21. An apparatus comprising:

receiving means for receiving a relay verification signal comprising at least one of a first identifier, a first location, a first traffic type, or a first traffic size for a first user equipment; and comprising at least one of a second identifier, a second location, a second traffic type, or a second traffic size for a second user equipment; and

determining means for determining that the first user equipment and the second user equipment are both eligible for performing a traffic relay function;

generating means, operatively coupled to the determining means, for generating a relay confirmation signal for the second user equipment confirming that the traffic relay function is to be performed;

wherein the traffic relay function comprises providing device-to-device communication between the first user equipment and the second user equipment to relay traffic from a network access node to the first user equipment, or to provide communications between the first user equipment and the second user equipment, or to provide communications between the first user equipment and a third user equipment.

22. The apparatus according to claim 21, further comprising identification means for identifying at least one user equipment that has paired with the apparatus by using one or more received responses to discovery signals.

23. An apparatus comprising:

identification means for identifying a second user equipment that has paired with a first user equipment for device-to-device communication; and

generating means, operatively coupled to the identification means, for generating a relay request signal to the second user equipment for requesting that the second user equipment relay traffic to the first user equipment, wherein the relay request signal includes at least one of an identifier, a location, a traffic type, or a traffic size corresponding to the first user equipment, 24. The apparatus according to claim 23 further comprising identification means for identifying the second user equipment that is paired with the first user equipment by using one or more received responses to discovery signals. 25. An apparatus comprising:

at least one processor and at least one memory storing a computer program;

in which the at least one memory with the computer program is configured with the at least one processor to cause the apparatus to at least:

transmit a relay verification signal comprising at least one of an identifier, a location, a traffic type, or a traffic size for the apparatus; and

receive a relay confirmation signal confirming that a traffic relay function is to be performed, wherein the traffic relay function comprises providing device-to-device communication between the apparatus and a first user equipment to relay traffic from a network access node to the apparatus, or to provide communications between the apparatus and the first user equipment, or to provide communications between the apparatus and a second user equipment. 26. The apparatus according to claim 25, in which the at least one memory with the computer program is configured with the at least one processor to cause the apparatus to identify at least one user equipment that has paired with the apparatus by using one or more received responses to discovery signals.

27. An apparatus comprising:

at least one processor and at least one memory storing a computer program;

in which the at least one memory with the computer program is configured with the at least one processor to cause the apparatus to at least:

transmit a signal for identifying a first user equipment that has paired with the apparatus for device-to-device communication; and

receive a relay request signal for the first user equipment for requesting that the first user equipment relay traffic to the apparatus, wherein the relay request signal includes at least one of an identifier, a location, a traffic type, or a traffic load corresponding to the apparatus. 28. The apparatus according to claim 27, in which the at least one memory with the computer program is configured with the at least one processor to cause the apparatus to identify the first user equipment that is paired with the apparatus by using one or more received responses to discovery signals. 29. The apparatus according to any of claims 27 or 28, in which the at least one memory with the computer program is configured with the at least one processor to cause the apparatus to identify the first user equipment that is paired with the apparatus by determining that an identifier corresponding to the apparatus is included in a device list of one or more user equipments which have responded to the first user equipment.

30. The apparatus according to any of claims 27-29 wherein the apparatus is configured to generate a relay modification signal for the first user equipment instructing the first user equipment to inform the apparatus that the first user equipment is not capable of performing the traffic relay function.

31. The apparatus according to any of claims 27-30 wherein the relay modification signal includes an identifier that specifies a second user equipment which is capable of performing the traffic relay function.

32. A method comprising:

transmitting a relay verification signal comprising at least one of an identifier, a location, a traffic type, or a traffic size; and

receiving a relay confirmation signal confirming that a traffic relay function is to be performed; wherein the traffic relay function comprises providing device-to-device communication between a first user equipment and a second user equipment to relay traffic from a network access node to the first user equipment, or to provide communications between the first user equipment and the second user equipment, or to provide communications between the first user equipment and a third user equipment.

33. The method according to claim 32 further comprising identifying at least one user equipment that has paired with the first user equipment by using one or more received responses to discovery signals. 34. A method comprising:

a first user equipment identifying a second user equipment that has paired with the first user equipment for device-to-device communication, by using one or more received responses to discovery signals, or by determining that an identifier corresponding to the first user equipment is included in a device list of one or more user equipments which have responded to the second user equipment; and

the first user equipment generating a relay request signal for the second user equipment for requesting that the second user equipment relay at least one of signaling, paging, or data to the first user equipment, wherein the relay request signal includes at least one of an identifier, a location, a traffic type, or a traffic size corresponding to the first user equipment.

35. The method of claim 34 wherein identifying the second user equipment that is paired with the first user equipment is performed by using one or more received responses to discovery signals.

36. The method of any of claims 34 or 35 wherein identifying the second user equipment that is paired with the first user equipment is performed by determining that an identifier corresponding to the first user equipment is included in a device list of one or more user equipments which have responded to the second user equipment.

37. The method of any of claims 34-36 wherein the second user equipment receives the relay request signal and, in response thereto, transmits a rejection message.

38. The method of any of claims 34-37 wherein the second user equipment relays back a response message from the first user equipment to an enhanced Node B (eNB).

39. The method of claim 38 wherein the eNB transmits a grouped Relay Acquisition Signal (RAS) to find one or more possible candidate user equipments for relaying to or from the eNB. 40. A computer readable memory tangibly storing a computer program executable by at least one processor, the computer program comprising code for:

transmitting a relay verification signal comprising at least one of an identifier, a location, a traffic type, or a traffic size; and

receiving a relay confirmation signal confirming that a traffic relay function is to be performed;

wherein the traffic relay function comprises providing device-to-device communication between a first user equipment and a second user equipment to relay traffic from a network access node to the first user equipment, or to provide communications between the first user equipment and the second user equipment, or to provide communications between the first user equipment and a third user equipment.

41. The computer readable memory according to claim 40 further comprising code for identifying at least one user equipment that has paired with the first user equipment by using one or more received responses to discovery signals.

42. A computer readable memory tangibly storing a computer program executable by at least one processor, the computer program comprising code for:

a first user equipment identifying a second user equipment that has paired with the first user equipment for device-to-device communication, by using one or more received responses to discovery signals, or by determining that an identifier corresponding to the first user equipment is included in a device list of one or more user equipments which have responded to the second user equipment; and

the first user equipment generating a relay request signal for the second user equipment for requesting that the second user equipment relay at least one of signaling, paging, or data to the first user equipment, wherein the relay request signal includes at least one of an identifier, a location, a traffic type, or a traffic size corresponding to the first user equipment. 43. The computer readable memory according to claim 42, wherein identifying a second user equipment that has paired with a first user equipment is performed by using one or more received responses to discovery signals. 44. The computer readable memory according to any of claims 42-43 wherein identifying a second user equipment that has paired with a first user equipment is performed by determining that an identifier corresponding to the first user equipment is included in a device list of one or more user equipments which have responded to the second user equipment,

45. An apparatus comprising:

transmitting means for transmitting a relay verification signal comprising at least one of an identifier, a location, a traffic type, or a traffic size; and

determining means for determining that a first user equipment and a second user equipment are both eligible for performing a traffic relay function;

generating means, operatively coupled to the determining means, for generating a relay confirmation signal for the second user equipment confirming that the traffic relay function is to be performed;

wherein the traffic relay function comprises providing device-to-device communication between the first user equipment and the second user equipment to relay traffic from a network access node to the first user equipment, or to provide communications between the first user equipment and the second user equipment, or to provide communications between the first user equipment and a third user equipment.

46. The apparatus according to claim 45, further comprising identification means for identifying at least one user equipment that has paired with the apparatus by using one or more received responses to discovery signals. 47. An apparatus comprising:

identification means for identifying a first user equipment that has paired with the apparatus for device-to-device communication; and

generating means, operatively coupled to the identification means, for generating a relay request signal to the first user equipment for requesting that the first user equipment relay traffic to the apparatus, wherein the relay request signal includes at least one of an identifier, a location, a traffic type, or a traffic size corresponding to the apparatus. 48. The apparatus according to claim 47 further comprising identification means for identifying the first user equipment that is paired with the apparatus by using one or more received responses to discovery signals.

Description:
METHODS, APPARATUSES, AND COMPUTER-READABLE STORAGE MEDIA FOR RELAYING TRAFFIC IN D2D COMMUNICATIONS

TECHNICAL FIELD:

[0001] The exemplary and non-limiting embodiments of this invention relate generally to wireless communication methods, apparatuses and computer readable storage media, and more specifically to relaying traffic using device to device (D2D) communication between user equipments (UEs). BACKGROUND:

[0002] With continuing pressure on wireless network operators to support greater data volumes and numbers of users, much recent research has focused upon D2D communications as a means for enhancing the efficiency of radio resource utilization. D2D operation may reduce power consumption at both the network access node and the directly communicating UEs. Moreover, D2D operation offers another avenue for networks to offload some cellular traffic, as well as the possibility of enabling new services in the future.

[0003] It is expected that there will be many types of D2D arrangements, such as a one to one D2D pair, a one-to-M D2D cluster where M is an integer greater than one (meaning one participating device would be a cluster head), and possibly one D2D device communicating with different D2D pairs/clusters simultaneously. There can also be different peak data rates for these different types of D2D networks. From the network operators' perspective, oftentimes it is advantageous to maintain control over some aspects of D2D communication, such as link set up and the total radio resources used, in order to control interference and the content transmitted between D2D devices.

[0004] It is anticipated that a new study item for D2D proposed by Qualcomm, Inc. will be agreed upon by the 3 GPP members (see document Tdoc-RP- 110706 entitled ON THE NEED

FOR A 3GPP STUDY ON LTE DEVICE-TO-DEVICE DISCOVERY AND COMMUNICATION; 3GPP TSG-RAN #52 (plenary); Bratislava, Slovakia; 31 May to 3 June 2011). One of the main targets of this study item is to evolve the Long Term Evolution (LTE) platform in order to meet the demand of proximity-based applications. This demand can be addressed by studying enhancements to the LTE radio layers that allow devices to discover each other directly over the air and to communicate directly where such functionality would make sense from a management point of view. The radio-based discovery process should be coupled with a system architecture and a security architecture that allow the 3 GPP operators to retain control of device behavior. For example, constraints may be specified as to which devices will be allowed to emit discovery signals, as well as when and where these discovery signals will be permitted, what types of information these discovery signals will convey, and what actions the devices should perform once they discover each other.

[0005] At present, a services group of 3 GPP designated as SA WG1 is directed to setting high level requirements for various services and features. The SA WG1 group is discussing and defining use cases and service requirements for D2D. One objective is to study use cases and identify potential requirements for an operator network controlled discovery and communications method between devices that are in proximity, under continuous network control, and within the coverage area of a 3GPP network. A broad spectrum of use cases and service requirements will be studied including network operator control, authentication, authorization, accounting, and regulatory aspects. Exemplary use cases include commercial use, social use, network offloading, public safety, and the integration of current infrastructure services. Integration of services may be performed to assure consistency of the user experience including reachability and mobile aspects. Additionally, use cases and potential requirements will be addressed for public safety systems in the absence of cellular coverage. The operation of public safety systems is subject to regional regulation and operator policies, and may be limited to certain specific public safety-designated frequency bands and terminals.

[0006] In situations where cellular coverage is lacking, public safety considerations may come into play. Some recent proposals, including Sl-113115, "Discussion on Public Safety Needs", 3 GPP TSG-SA WG1 Meeting #56, November 2011 ; and Sl-113135, "FS_ProSe USE CASE: Safety Support", 3 GPP TSG-SA WG1 Meeting #56, November 2011, indicate that the network operator could use proximity-based services (ProSe) to control the relay of network services between user equipments (UEs) using direct communication between the UEs. However, the specific manner in which the relay of network services could be controlled in the context of ProSe is not described. Another approach is described in U.S. Patent Application Publication No. 2011/0117907, wherein a terminal device selects a connection type on the basis of monitored parameters of the communications environment of the terminal device. The selection is made between a direct cellular radio connection and a relayed cellular radio connection. However, what is needed is an improved method for utilizing D2D to provide public safety communications in situations where cellular coverage may be inconsistent or lacking.

SUMMARY:

[0007] The foregoing and other problems are overcome, and other advantages are realized, by the use of the exemplary embodiments of this invention.

[0008] In a first exemplary embodiment of the invention there is an apparatus comprising at least one processor and at least one memory storing a computer program. In this embodiment the at least one memory with the computer program is configured with the at least one processor to cause the apparatus to at least receive a relay verification signal comprising at least one of a first identifier, a first location, a first traffic type, or a first traffic size for a first user equipment; and comprising at least one of a second identifier, a second location, a second traffic type, or a second traffic size for a second user equipment; and upon determining that the first user equipment and the second user equipment are both eligible for performing a traffic relay function, generating a relay confirmation signal for the second user equipment confirming that the traffic relay function is to be performed; wherein the traffic relay function comprises providing device-to-device communication between the first user equipment and the second user equipment to relay traffic from a network access node to the first user equipment, or to provide communications between the first user equipment and the second user equipment, or to provide communications between the first user equipment and a third user equipment.

[0009] In a second exemplary embodiment of the invention there is an apparatus comprising at least one processor and at least one memory storing a computer program. In this embodiment the at least one memory with the computer program is configured with the at least one processor to cause the apparatus to at least: identify a second user equipment that has paired with a first user equipment for device-to-device communication; and generate a relay request signal for the second user equipment for requesting that the second user equipment relay traffic to the first user equipment, wherein the relay request signal includes at least one of an identifier, a location, a traffic type, or a traffic load corresponding to the first user equipment.

[0010] In a third exemplary embodiment of the invention there is a method comprising receiving a relay verification signal comprising at least one of a first identifier, a first location, a first traffic type, or a first traffic size for a first user equipment; and comprising at least one of a second identifier, a second location, a second traffic type, or a second traffic size for a second user equipment; and upon determining that the first user equipment and the second user equipment are both eligible for performing a traffic relay function, generating a relay confirmation signal for the second user equipment confirming that the traffic relay function is to be performed; wherein the traffic relay function comprises providing device-to-device communication between the first user equipment and the second user equipment to relay traffic from a network access node to the first user equipment, or to provide communications between the first user equipment and the second user equipment, or to provide communications between the first user equipment and a third user equipment.

[0011] In a fourth exemplary embodiment of the invention there is a method comprising: identifying a second user equipment that has paired with a first user equipment for device-to-device communication, by using one or more received responses to discovery signals, or by determining that an identifier corresponding to the first user equipment is included in a device list of one or more user equipments which have responded to the second user equipment; and generating a relay request signal to the second user equipment for requesting that the second user equipment relay at least one of signaling, paging, or data to the first user equipment, wherein the relay request signal includes at least one of an identifier, a location, a traffic type, or a traffic size corresponding to the first user equipment.

[0012] In a fifth exemplary embodiment of the invention there is a computer readable memory tangibly storing a computer program executable by at least one processor, the computer program comprising code for receiving a relay verification signal comprising at least one of a first identifier, a first location, a first traffic type, or a first traffic size for a first user equipment; and comprising at least one of a second identifier, a second location, a second traffic type, or a second traffic size for a second user equipment; and upon determining that the first user equipment and the second user equipment are both eligible for performing a traffic relay function, generating a relay confirmation signal for the second user equipment confirming that the traffic relay function is to be performed; wherein the traffic relay function comprises providing device-to-device communication between the first user equipment and the second user equipment to relay traffic from a network access node to the first user equipment, or to provide communications between the first user equipment and the second user equipment, or to provide communications between the first user equipment and a third user equipment.

[0013] In a sixth exemplary embodiment of the invention there is a computer readable memory tangibly storing a computer program executable by at least one processor, the computer program comprising: code for A computer readable memory tangibly storing a computer program executable by at least one processor, the computer program comprising code for identifying a second user equipment that has paired with a first user equipment for device-to-device communication, by using one or more received responses to discovery signals, or by determining that an identifier corresponding to the first user equipment is included in a device list of one or more user equipments which have responded to the second user equipment; and generating a relay request signal for the second user equipment for requesting that the second user equipment relay at least one of signaling, paging, or data to the first user equipment, wherein the relay request signal includes at least one of an identifier, a location, a traffic type, or a traffic size corresponding to the first user equipment. BRIEF DESCRIPTION OF THE DRAWINGS:

[0014] FIG. 1 is a diagrammatic representation of an illustrative system for relaying traffic according to an exemplary embodiment of the invention. [0015] FIGs. 2A and 2B together comprise a flow diagram illustrating a method for using D2D communications to perform uplink relaying of traffic in accordance with an exemplary embodiment of the invention.

[0016] FIG. 3 is a flow diagram illustrating a method for using D2D communications to perform downlink relaying of traffic in accordance with an exemplary embodiment of the invention.

[0017] FIG. 4 is a simplified block diagram illustrating various electronic devices and apparatuses that are suitable for use in practicing the exemplary embodiments of this invention.

DETAILED DESCRIPTION:

[0018] FIG, 1 is a diagrammatic representation of an illustrative system for relaying traffic according to an exemplary embodiment of the invention. After entering a tunnel 105, a first user equipment (UE) 101 loses communication with a base station or enhanced node B (eNB) 106 of a macro cell 104. While the first UE 101 remains inside the tunnel 105, it is difficult or impractical to establish a direct wireless communication link between the eNB 106 and the first UE 101. While inside the tunnel 105, it may also be difficult or impractical for the first UE 101 to communicate with one or more other UEs. However, the first UE 101 may still need to transmit/receive data to/from the eNB 106 to get services or to communicate data with other UEs. This data may include, for example, critical public safety information.

[0019] A second UE 102 and a third UE 103 are both situated within the macro cell 104 and within wireless communicating range of the eNB 106. The second UE 102 and the third UE 103 are also both situated within wireless communicating range of the first UE 101. Thus, it is possible to establish a first wireless communication link 111 between the second UE 102 and the eNB 106, and it is also possible to establish a second wireless communication link 112 between the second UE 102 and the first UE 101. Likewise, it is possible to establish a third wireless communication link 113 between the first UE 101 and the third UE 103, and it is also possible to establish a fourth communication link 114 between the third UE 103 and the eNB 106.

[0020] In situations such as that depicted in FIG. 1 where establishing a direct wireless communication link between the eNB 106 and the first UE 101 is difficult or impractical, information may be relayed between the eNB 106 and the first UE 101 by using at least one of the second UE 102 or the third UE 103. For example, the second UE 102 may relay downlink information from the eNB 106 to the first UE 101 over the first communication link 111 and the second communication link 112. The third UE 103 may relay uplink information from the first UE 101 to the eNB 106 over the third communication link 113 and the fourth communication link 114. Alternatively or additionally, the second UE 102 may be used to relay downlink as well as uplink information over the first and second communication links 111 and 112, or the third UE 103 may be used to relay downlink as well as uplink information over the third and fourth communication links 1 13 and 114.

[0021] FIGs. 2 A and 2B together comprise a flow diagram illustrating a method for using D2D communications to perform uplink relaying of traffic in accordance with an exemplary embodiment of the invention. The operational sequence commences at block 201 (FIG. 2A) where a communication link between a first user equipment (UE) 101 (FIG. 1) and an enhanced Node B (eNB) 106 is broken or cannot be established. Termination of a previously existing communication link may be detected by the eNB 106, or the first UE 101, or both. At block 203 (FIG. 2A), the first UE 101 (FIG. 1) commences scanning of discovery signals transmitted by one or more other UEs including at least a second UE 102 (FIG. 1). The sequence progresses to block 205 (FIG. 2A) where the first UE 101 (FIG. 1) identifies a discovery signal from the second UE 102. [0022] A decision is made at block 207 (FIG. 2 A) as to whether or not a relay capability of the second UE 102 (FIG. 1) is enabled. This decision may be performed by the second UE 102, or by the eNB 106, or by both the second UE 102 and the eNB 106. The negative branch from block 207 (FIG. 2A) leads back to block 203 (described previously). The affirmative branch from block 207 leads to block 209 where the first UE 101 (FIG. 1) transmits a Relay Request Signal (RRS) to the second UE 102. The second UE 102 then receives the RRS signal from the first UE 101 at block 211 (FIG. 2A). Illustratively, the RRS signal may be a Layer 1 (LI) signal or a Media Access Layer (MAC) Control Element (CE). Illustratively, the RRS signal may contain at least one of a first parameter that specifies a traffic type for a UE, a second parameter that specifies a traffic size for the UE, or a third parameter that specifies a geographic location for the UE.

[0023] A decision is made at block 212 to ascertain whether or not the second UE 102 (FIG. 1) will relay traffic for the first UE 101 in response to the second UE 102 receiving the RRS signal. This decision may, but need not, be based on whether the second UE 102 is already engaged in communication with the eNB 106, the third UE 103, or another eNB or UE. Alternatively or additionally, this decision may, but need not, be based on whether or not the second UE 102 is temporarily unable to implement the requested relay of traffic due to network bandwidth limitations, processing limitations, or other limitations. Alternatively or additionally, this decision may, but need not, be based on one or more applications that are currently running on the second UE 102, or one or more applications that are currently not running on the second UE 102. For example, the second UE 102 may relay traffic only when a specific application is running on the second UE 102 or, alternatively, the second UE 102 may relay traffic only when the specific application is not running on the second UE 102.

[0024] The negative branch from block 212 (FIG. 2A) leads to block 215 (FIG. 2B) where the second UE 102 (FIG. 1) transmits a Relay Objection Signal (ROS) to the eNB 106. The sequence then loops back to block 203 (FIG. 2A). The affirmative branch from block 212 leads to block 213 (FIG. 2B) where the second UE 102 (FIG. 1) transmits a Relay Verification Signal (RVS) to the eNB 106 for the eNB to ascertain whether or not the first UE and the second UE 102 are able to perform a traffic relay function for relaying traffic between the eNB 106 and the first UE 101 using the second UE 102. For example, this RVS may cause the eNB 106 to check whether the first UE 101 and the second UE 102 are eligible to perform a ProSe (D2D) transmission which is different from regular cellular communication such as when UE 101 may have previously been connected to the eNB 106. Illustratively, the RVS signal may be a Media Access Layer (MAC) Control Element (CE). Illustratively, the RVS signal may contain at least one of a first parameter that is an identifier for the first UE 101, a second parameter that is an identifier for the second UE 102, a third parameter that specifies a traffic type for the first and second UEs 101 and 102, a fourth parameter that specifies a traffic buffer size, and a fifth parameter that specifies a geographic location for the first UE 101.

[0025] At block 217 (FIG. 2B), the eNB performs a test to ascertain whether or not the first UE 101 (FIG. 1) and the second UE 102 are both capable of performing the traffic relay function. The affirmative branch from block 217 (FIG. 2B) leads to block 221 where the eNB transmits a Relay Confirmation Signal (RCS) to the second UE 102 (FIG. 1) to confirm that the traffic relay function is to be performed. The negative branch from block 217 (FIG. 2B) leads to block 219 where the eNB 106 (FIG. 1) performs a test to ascertain whether or not the first UE 101 is capable of performing the traffic relay function. The negative branch from block 219 (FIG. 2B) leads back to block 203 (FIG. 2 A) described previously. Illustratively, the RCS signal may be a Media Access Layer (MAC) Control Element (CE). Illustratively, the RCS signal may include one or more power control parameters. Illustratively, the RCS signal may contain a parameter indicative of transmit/receive resources for use in a D2D link 112 (FIG. 1) between the first and second UEs 101, 102 to guarantee no interference to Macro services.

[0026] The affirmative branch from block 219 (FIG, 2B) leads to block 225 where the eNB 106 (FIG. 1) transmits a Relay Modification Signal (RMS) to the second UE 102 to instruct the second UE 102 to inform the first UE 101 that the second UE 102 is not capable of performing the traffic relay function. Illustratively, the RMS signal may be a Media Access Layer (MAC) Control Element (CE). Illustratively, the RMS signal may contain a request for the second UE 102 to inform the first UE 101 that the second UE 102 is not capable of relaying traffic. The RMS signal optionally includes an identifier that specifies a third UE 103 which is capable of performing the traffic relay function. The RMS signal may optionally provide an indication to the first UE 101 of a possible relay that could be performed by the third UE 103 based upon geographic location information corresponding to the first UE 101. [0027] For purposes of illustration, there may be no RMS signal if the eNB 106 requests the second UE 102 to relay traffic for the first UE 101. After the second UE 102 receives a relay request signal from the eNB 106, the second UE 102 may transmit a Rejection message, and/or the second UE 102 may relay back a response message from the first UE 101. Illustratively, the eNB 106 sends a grouped Relay Acquisition Signal (RAS) to find possible relay candidate UEs.

[0028] The sequence may then progress to optional block 223 (FIG. 2B) or optional block 227 or both. At optional block 223, the eNB 106 (FIG. 1) sends a Discovery Signal Signaling (SDSS) request to the third UE 103 to request that the third UE 103 transmit a discovery signal so that the first UE 101 may contact the third UE 103 to relay traffic. At optional block 227 (FIG. 2B), the eNB 106 (FIG. 1) sends a Discovery Signal Scanning Signalling (DSSS) request to the third UE 103 to permit the third UE 103 to discover the first UE 101 voluntarily. [0029] FIG. 3 is a flow diagram illustrating a method for using D2D communications to perform downlink relaying of traffic in accordance with an exemplary embodiment of the invention. The operational sequence commences at block 301 where a communication link between a first user equipment (UE) 101 (FIG. 1) and an enhanced Node B (eNB) 106 is broken or cannot be established. The eNB performs a test at block 303 (FIG. 3) to identify one or more UEs that are engaged in device-to-device (D2D) communication or paired with the first UE 101 (FIG. 1). Next, at block 305 (FIG. 3), the eNB 106 (FIG. 1) uses one or more received responses to discovery signals to identify a second UE 102 that is pairing with the first UE 101 for D2D communication, or alternatively or additionally, the eNB 106 determines that an identifier corresponding to the first UE 101 is included in a device list of the one or more UEs which have responded to a discovery signal transmitted by the second UE 102.

[0030] The operational sequence of FIG. 3 progresses to block 307 where the eNB 106 (FIG. 1) transmits a Relay Request Signal (RRS) to the second UE 102 to request that the second UE 102 relay at least one of signaling, paging, or data from the eNB 106 to the first UE 101. The RRS signal may include any of an identifier for the first UE101, or an information type request for requesting the second UE 102 to relay information comprising at least one of signaling, paging, or data to the first UE 101. Next, at block 309 (FIG. 3), the second UE 102 (FIG. 1) performs a test to ascertain whether or not the second UE 102 is capable of performing the relay of the information to the first UE 101 using D2D communication, For example, assume that the second UE 102 is in low power mode and does not have extra power to relay traffic for the first UE 101. So the second UE 102 could reject this request at block 309 (FIG. 3).

[0031] The affirmative branch from block 309 leads to block 31 1 where the second UE 102 (FIG. 1) receives the RSS signal from the eNB 106 and sends a confirmation message to the eNB 106. Then, at block 313 (FIG. 3), the second UE 102 (FIG. 1) relays the information to the first UE 101 using a defined Media Access Layer (MAC) Control Element (CE).

[0032] The negative branch from block 309 (FIG. 3) leads to block 315 where the second UE 102 (FIG. 1) receives the RRS signal from the eNB 106 and sends a rejection message to the eNB 106. Next, at block 317 (FIG. 3), the eNB 106 performs a search to locate one or more additional UEs other than the second UE 102 that are potential candidates for performing the relay of the information.

[0033] The relaying of traffic using D2D communications detailed by examples herein may be used to significantly improve the efficiency with which traffic is relayed for both the downlink and the uplink. One significant technical effect is that the eNB is able to exercise full control over the traffic relay procedure.

[0034] FIGs. 2 A, 2B, and 3 comprise logic flow diagrams which may be considered to illustrate the operation of methods, and results of execution of a computer program stored in a computer readable memory, and specific manners in which components of an electronic device are configured to cause that electronic device to operate. The various blocks shown in FIGs. 2A, 2B, and 3may also be considered as a plurality of coupled logic circuit elements constructed to carry out the associated function(s), or specific result of strings of computer program code stored in a memory.

[0035] Such blocks and the functions they represent are non-limiting examples, and may be practiced in various components such as integrated circuit chips and modules, and that the exemplary embodiments of this invention may be realized in an apparatus that is embodied as an integrated circuit. The integrated circuit, or circuits, may comprise circuitry (as well as possibly firmware) for embodying at least one or more of a data processor or data processors, a digital signal processor or processors, baseband circuitry and radio frequency circuitry that are configurable so as to operate in accordance with the exemplary embodiments of this invention. [0036] As used in this application, the term 'circuitry' refers to all of the following:

(a)hardware-only circuit implementations (such as implementations in only analog and/or digital circuitry) and (b) to combinations of circuits and software (and/or firmware), such as (as applicable): (i) to a combination of processor(s) or (ii) to portions of processor(s)/software (including digital signal processor(s)), software, and memory(ies) that work together to cause an apparatus, such as a mobile phone or server, to perform various functions) and (c) to circuits, such as a microprocessor(s) or a portion of a microprocessor(s), that require software or firmware for operation, even if the software or firmware is not physically present.

[0037] This definition of 'circuitry' applies to all uses of this term in this application, including in any claims. As a further example, as used in this application, the term "circuitry" would also cover an implementation of merely a processor (or multiple processors) or portion of a processor and its (or their) accompanying software and/or firmware. The term "circuitry" would also cover, for example and if applicable to the particular claim element, a baseband integrated circuit or applications processor integrated circuit for a mobile phone or a similar integrated circuit in server, a cellular network device, or other network device."

[0038] Reference is now made to FIG. 4 for illustrating a simplified block diagram of various electronic devices and apparatuses that are suitable for use in practicing the exemplary embodiments of this invention.

[0039] A first device 20 includes processing means such as at least one data processor (DP) 20 A, storing means such as at least one computer-readable memory (MEM) 20B storing at least one computer program (PROG) 20C, communicating means such as a transmitter TX 20D and a receiver RX 20E for bidirectional wireless communications over cellular link 21 with the eNB 24 and over D2D link 25 with the second device 22 via one or more antennas 20F. While only one transmitter and receiver are shown, it is understood there may be more than one transmitter, more than one receiver, or more than one transmitter as well as more than one receiver. Inherent in the first device is also a clock from which various software-defined timers are run. Also stored in the MEM 20B at reference number 20G are the rules and signaling protocol discussed in connection with FIGs. 2 A, 2B and 3 for implementing a traffic relay function using D2D communications. The second device 22 is functionally similar with blocks 22A, 22B, 22C, 22D, 22F and 22G and cellular link 23. The first and second devices 20, 22 communicate with one another directly according to the various described embodiments using the direct wireless link 25.

[0040] The eNB 24, or more generally the network access node/serving cell, also includes processing means such as at least one data processor (DP) 24A, storing means such as at least one computer-readable memory (MEM) 24B storing at least one computer program (PROG) 24C, and communicating means such as a transmitter TX 24D and a receiver RX 24E for bidirectional wireless communications with the UEs 20, 22 via one or more antennas 24F. The eNB 22 also stores in its memory at 22G the rules and signaling protocol shown at FIGs. 2A, 2B, and 3 for D2D relay establishment signaling from its perspective. A mobility management entity (MME) 26 also has its own MEM 26B storing a PROG 26C executable by a DP 26 A and operates to control the eNB 24 and demodulates data sent over the SI link using a modem 26 D/E.

[0041] While not particularly illustrated for the user devices 20, 22 or the network access node 24, those apparatus are also assumed to include as part of their wireless communicating means a modem which may be inbuilt on an RF front end chip within those devices 20, 22, 24 and which also carries the TX 20D/22D/24D and the RX 20E/22E/24E. Such a modem 26D/E is shown for the MME 26. [0042] At least one of the PROGs 20C/22C/24C in the first device (first UE 20), the second device (second UE 22), and the eNB 24 is assumed to include program instructions that, when executed by the associated DP 20A/22A/24A, enable the device/eNB to operate in accordance with the exemplary embodiments of this invention, as was discussed above in detail. In these regards the exemplary embodiments of this invention may be implemented at least in part by computer software stored on the MEM 20B/22B/24B which is executable by the DP 20A of the device 20, by the DP 22A of the device 22, and/or by the DP 24A of the network access nodes 24; or by hardware, or by a combination of tangibly stored software and hardware (and tangibly stored firmware). Electronic devices implementing these aspects of the invention need not be the entire apparatus 20, 22, 24 as shown, but exemplary embodiments may be implemented by one or more components of same such as the above described tangibly stored software, hardware, firmware and DP, or a system on a chip SOC or an application specific integrated circuit ASIC or a digital signal processor DSP.

[0043] In general, the various embodiments of the first device 20 and the second device 22 can include, but are not limited to: data cards, USB dongles, user equipments, cellular telephones; personal portable digital devices having wireless communication capabilities including but not limited to laptop/palmtop/tablet computers, digital cameras and music devices, Internet appliances, remotely operated robotic devices or machine-to-machine communication devices.

[0044] Various embodiments of the computer readable MEMs 20B/22B/24B/26B include any data storage technology type which is suitable to the local technical environment, including but not limited to semiconductor based memory devices, magnetic memory devices and systems, optical memory devices and systems, fixed memory, removable memory, disc memory, flash memory, DRAM, SRAM, EEPROM and the like. Various embodiments of the DPs 20A/22A/24A/26A include but are not limited to general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and multi-core processors. [0045] Various modifications and adaptations to the foregoing exemplary embodiments of this invention may become apparent to those skilled in the relevant arts in view of the foregoing description. While the exemplary embodiments have been described above in the context of the E-UTRAN (LTE/LTE-A) system, it should be appreciated that the exemplary embodiments of this invention are not limited for use with only this one particular type of wireless communication system, and that they may be used to advantage in other wireless communication systems such as for example WCDMA, UTRAN and others which operate or are adapted in the future to operate using multiple component carriers. [0046] Some of the various features of the above non- limiting embodiments may be used to advantage without the corresponding use of other described features. The foregoing description should therefore be considered as merely illustrative of the principles, teachings and exemplary embodiments of this invention, and not in limitation thereof.