Method and apparatus for controlling communication of a portable terminal in a wireless communication system

ABSTRACT

The present disclosure relates to a 5 th  Generation (5G) or pre-5G communication system supporting a higher data transfer rate after a 4 th  Generation (4G) communication system such as Long Term Evolution (LTE). In particular, a method and an apparatus for controlling communication of a terminal in a wireless communication system are provided. The method includes receiving information regarding an operation of a second system by using a first communication module configured to support a first system and controlling an activation state of a second communication module configured to support the second system, based on the information regarding the operation of the second system.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This application is a continuation application of prior application Ser.No. 15/142,647, filed on Apr. 29, 2016, which claims the benefit under35 U.S.C. §119(a) of a Korean patent application filed on Apr. 29, 2015in the Korean Intellectual Property Office and assigned Serial number10-2015-0060647, and a Korean patent application filed on Jun. 29, 2015in the Korean Intellectual Property Office and assigned Serial number10-2015-0092378, the entire disclosure of each of which is herebyincorporated by reference.

TECHNICAL FIELD

The present disclosure relates to a method and an apparatus forcontrolling communication of a terminal supporting a multi-radio accesstechnology in a wireless communication system. More particularly, thepresent disclosure relates to a method and an apparatus for decreasingpower consumption of a terminal simultaneously supporting a licensedband communication system and an unlicensed band communication system ina licensed and unlicensed band multi-radio access technology (RAT)environment.

BACKGROUND

To meet a demand on wireless data traffic which has been in anincreasing trend after a 4^(th) Generation (4G) communication system wascommercialized, there is an ongoing effort to develop an improved 5^(th)Generation (5G) communication system or a pre-5G communication system.For this reason, the 5G communication system or the pre-5G communicationsystem is called a beyond 4G network communication system or a post longterm evolution (LTE) system.

To achieve a high data transfer rate, the 5G communication system isconsidered to be implemented in an mmWave band (e.g., such as a 60 GHzband). To reduce a propagation path loss at the mmWave band and toincrease a propagation delivery distance, beamforming, massive multipleinput multiple output (MIMO), full dimensional MIMO (FD-MIMO), arrayantenna, analog beam-forming, and large scale antenna techniques areunder discussion in the 5G communication system.

In addition, to improve a network of a system, techniques, such as anevolved small cell, an advanced small cell, a cloud radio access network(RAN), an ultra-dense network, device to device (D2D) communication, awireless backhaul, a moving network, cooperative communication,coordinated multi-points (COMP), and reception interferencecancellation, and the like, are being developed in the 5G communicationsystem.

In addition thereto, hybrid frequency shift keying and quadratureamplitude modulation (FQAM) and sliding window superposition coding(SWSC) as an advanced coding modulation (ACM) technique and filter bankmulti carrier (FBMC), non orthogonal multiple access (NOMA), and sparsecode multiple access (SCMA), and the like, as an advanced accesstechnology are being developed in the 5G system.

Further, recently, there is an ongoing discussion on a technique foreffectively operating a multi-modem terminal simultaneously supporting alicensed band communication system and an unlicensed band communicationsystem in a licensed and unlicensed band multi-radio access technology(RAT) environment.

The above information is presented as background information only toassist with an understanding of the present disclosure. No determinationhas been made, and no assertion is made, as to whether any of the abovemight be applicable as prior art with regard to the present disclosure.

SUMMARY

Aspects of the present disclosure are to address at least theabove-mentioned problems and/or disadvantages and to provide at leastthe advantages described below. Accordingly, an aspect of the presentdisclosure is to provide a method and an apparatus for decreasing powerconsumption of a terminal simultaneously supporting a licensed bandcommunication system and an unlicensed band communication system in alicensed and unlicensed band multi-radio access technology (RAT)environment.

Another aspect of the present disclosure is to provide a method and anapparatus for keeping an activation state of some communication modulesamong a plurality of communication modules supporting different RATs andincluded in a terminal in a licensed and unlicensed band multi-RATenvironment, and for controlling an activation state of the othercommunication modules.

Another aspect of the present disclosure is to provide a method and anapparatus for performing downlink monitoring for at least one differentterminal by one terminal in a licensed and unlicensed band multi-RATenvironment, and for controlling an activation state of at least onecommunication module for the at least one different terminal.

In accordance with an aspect of the present disclosure, a method ofcontrolling a terminal in a wireless communication system is provided.The method includes receiving information regarding an operation of asecond system by using a first communication module configured tosupport a first system, and controlling an activation state of a secondcommunication module configured to support the second system, based onthe information regarding the operation of the second system.

In accordance with another aspect of the present disclosure, a method ofa base station supporting a first system is provided. The methodincludes detecting a presence/absence of downlink traffic of a secondsystem for a terminal, and transmitting information regarding anoperation of the second system of the terminal to the terminal via alink of the first system based on the presence/absence of the downlinktraffic of the second system.

In accordance with another aspect of the present disclosure, a method ofa base station supporting a second system is provided. The methodincludes determining whether first information for indicating acommunication module state of a second system controlled by a firstsystem for a terminal is matched to second information for indicating acommunication module state of a second system of the terminal, andrequesting, if the first information is not matched to the secondinformation, to change the communication module state of the secondsystem of the terminal.

In accordance with another aspect of the present disclosure, anapparatus of a terminal in a wireless communication system is provided.The apparatus includes a first communication module configured tosupport a first system, a second communication module configured tosupport a second system, and a controller configured to receiveinformation regarding an operation of the second system by using thefirst communication module and, based on the information regarding theoperation of the second system, control an activation state of thesecond module.

In accordance with another aspect of the present disclosure, anapparatus of a base station supporting a first system is provided. Theapparatus includes a communication module, and a controller configuredto detect a presence/absence of downlink traffic of a second system fora terminal, and transmit information regarding an operation of thesecond system of the terminal to the terminal via a link of the firstsystem based on the presence/absence of the downlink traffic of thesecond system.

In accordance with another aspect of the present disclosure, anapparatus of a base station supporting a second system is provided. Theapparatus includes a communication module, and a controller configuredto determine whether first information for indicating a communicationmodule state of a second system controlled by a first system for aterminal is matched to second information for indicating a communicationmodule state of a second system of the terminal, and request, if thefirst information is not matched to the second information, to changethe communication module state of the second system of the terminal.

In accordance with another aspect of the present disclosure, a method ofcontrolling a terminal in a wireless communication system is provided.The method includes receiving, from a base station of a first system viaa first communication module configured to support the first system, asignal containing information for indicating whether downlink traffic isgenerated for at least one different terminal, and transmitting, to theat least one terminal, a signal for requesting to control an activationstate of a communication module corresponding to the downlink traffic.

In accordance with another aspect of the present disclosure, a method ofcontrolling a terminal in a wireless communication system is provided.The method includes receiving from a different terminal a signal forrequesting to control an activation state of a second communicationmodule corresponding to a second system via a first communication modulecorresponding to a first system, and controlling the activation state ofthe second communication module corresponding to the second system basedon the signal received from the different terminal.

In accordance with another aspect of the present disclosure, anapparatus of a terminal in a wireless communication system is provided.The apparatus includes a communication unit having a plurality ofcommunication modules supporting different systems, and a controllerconfigured to receive, from a base station of a first system via a firstcommunication module configured to support the first system, a signalcontaining information for indicating whether downlink traffic isgenerated for at least one different terminal, and transmit, to the atleast one terminal, a signal for requesting to control an activationstate of a communication module corresponding to the downlink traffic.

In accordance with another aspect of the present disclosure, anapparatus of a terminal in a wireless communication system is provided.The apparatus includes a communication unit having a plurality ofcommunication modules supporting different systems, and a controllerconfigured to receive from a different terminal a signal for requestingto control an activation state of a second communication modulecorresponding to a second system via a first communication modulecorresponding to a first system, and control the activation state of thesecond communication module corresponding to the second system based onthe signal received from the different terminal.

The present disclosure can decrease power consumption of a terminal in alicensed and unlicensed band multi-RAT environment in such a mannerthat, among a plurality of communication modules supporting differentRATs and included in the terminal, an activation state of a 1^(st)communication module supporting a 1^(st) RAT is kept, and at least onedifferent communication module is activated only in the presence oftraffic through a corresponding system and is deactivated in the absenceof traffic. The present disclosure also can decrease power consumptionin terminals in a group in such a manner that a group of a plurality ofterminals is formed and thereafter a representative terminal in thegroup performs downlink monitoring for different terminals in the group,and controls an activation state of a communication module for differentterminals in the group according to a result of the downlink monitoring.

Other aspects, advantages, and salient features of the disclosure willbecome apparent to those skilled in the art from the following detaileddescription, which, taken in conjunction with the annexed drawings,discloses various embodiments of the present disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

The above and other aspects, features, and advantages of certainembodiments of the present disclosure will be more apparent from thefollowing description taken in conjunction with the accompanyingdrawings, in which:

FIG. 1 illustrates a network system in a licensed band and unlicensedband multi-radio access technology (RAT) environment according to anembodiment of the present disclosure;

FIGS. 2A and 2B illustrate a network structure of a multi-RATenvironment according to various embodiments of the present disclosure;

FIG. 3 illustrates a power saving mode (PSM) mechanism of a wirelesslocal area network (WLAN) according to an embodiment of the presentdisclosure;

FIG. 4 illustrates a power consumption rate depending on a PSM operationof a user equipment (UE) according to an embodiment of the presentdisclosure;

FIG. 5 illustrates a situation in which an access point (AP) fails tooccupy a channel in an environment in which overlapping WLANs arecongested according to an embodiment of the present disclosure;

FIG. 6 illustrates a method of controlling an activation state of a2^(nd) access module of a UE supporting a multi-RAT according to anembodiment of the present disclosure;

FIG. 7 illustrates a signal flow for activating a 2^(nd) access moduleof a UE according to an embodiment of the present disclosure;

FIGS. 8A and 8B illustrate a signal flow for activating a 2^(nd) accessmodule of a UE according to an embodiment of the present disclosure;

FIG. 8C illustrates a UE operation and uplink resource allocation basedon beacon option information included in a 2^(nd) access moduleactivation signal according to an embodiment of the present disclosure;

FIG. 8D illustrates activation, deactivation, and transmission of a2^(nd) access module through 1^(st) access control transmissionaccording to an embodiment of the present disclosure, and a time andoperation of receiving a beacon signal of a 2^(nd) access evolved nodeB(eNB) by a UE according thereto;

FIG. 8E illustrates a traffic indication map (TIM) configuration of atypical beacon signal according to an embodiment of the presentdisclosure;

FIG. 8F illustrates a frame structure of a short beacon signal accordingto an embodiment of the present disclosure;

FIG. 8G illustrates information included in a short beacon signalaccording to an embodiment of the present disclosure;

FIG. 8H illustrates information included in a short beacon signal basedon a frame structure of a short beacon signal according to an embodimentof the present disclosure;

FIG. 8I illustrates beam training using a short beacon signal accordingto an embodiment of the present disclosure;

FIG. 9 illustrates a signal flow for a case where an eNB for a 2^(nd)access module of a UE is changed according to an embodiment of thepresent disclosure;

FIG. 10A illustrates a signal flow for deactivating a 2^(nd) accessmodule of a UE based on control transmission of a 1^(st) access eNBaccording to an embodiment of the present disclosure;

FIG. 10B illustrates an operation based on transmission/reception of alast packet number when a 2^(nd) access module of a UE is deactivatedaccording to an embodiment of the present disclosure;

FIG. 11A illustrates a signal flow for deactivating a 2^(nd) accessmodule autonomously by a UE based on initial deactivation timerinformation of the UE according to an embodiment of the presentdisclosure;

FIG. 11B illustrates a situation of deciding a state for a 2^(nd) accessmodule of a UE by the UE and a 1^(st) access eNB according to anembodiment of the present disclosure;

FIG. 12A illustrates a signal flow for controlling a state of a 2^(nd)access module by a 2^(nd) access eNB based on a timer mismatch of a UEand a 1^(st) access eNB according to an embodiment of the presentdisclosure;

FIG. 12B illustrates a signal flow for controlling a state of a 2^(nd)access module of a UE according to an embodiment of the presentdisclosure;

FIG. 12C illustrates a signal flow for prohibiting deactivation of a UEby a 2^(nd) access eNB according to an embodiment of the presentdisclosure;

FIG. 12D illustrates a cause of a state mismatch occurrence on a 2^(nd)access module of a UE and a method of correcting the state mismatchaccording to an embodiment of the present disclosure;

FIG. 13 illustrates a media access control (MAC) header for indicating astate of a 2^(nd) access module by a UE according to an embodiment ofthe present disclosure;

FIGS. 14A and 14B illustrate a procedure of operating a 1^(st) accesseNB according to an embodiment of the present disclosure;

FIG. 15 illustrates a procedure of operating a 2^(nd) access eNBaccording to an embodiment of the present disclosure;

FIGS. 16A and 16B illustrate a procedure of operating a UE according toan embodiment of the present disclosure;

FIG. 17 illustrates a block diagram of a 1^(st) access eNB according toan embodiment of the present disclosure;

FIG. 18 illustrates a block diagram of a 2^(nd) access eNB according toan embodiment of the present disclosure;

FIG. 19 illustrates a block diagram of a UE according to an embodimentof the present disclosure;

FIG. 20 illustrates an operation of a UE and each AP in an environmentin which an operator AP and a private AP coexist according to anembodiment of the present disclosure;

FIG. 21 illustrates an operation state of an AP according to anembodiment of the present disclosure;

FIGS. 22A to 22D illustrate a user interface for an operation of a UE inan environment in which an operator AP and a private AP coexistaccording to an embodiment of the present disclosure;

FIG. 23 illustrates a system structure in which a UE controls anactivation state of an access module for at least one different UEaccording to an embodiment of the present disclosure;

FIG. 24 illustrates an operation of forming a group of a UE according toan embodiment of the present disclosure;

FIG. 25 illustrates an operation of a master UE according to anembodiment of the present disclosure;

FIG. 26 illustrates an operation of a slave UE according to anembodiment of the present disclosure;

FIG. 27 illustrates a situation in which one group is formed of aplurality of UEs owned by a user according to an embodiment of thepresent disclosure;

FIG. 28 illustrates a radio access technology supported by UEs in agroup according to an embodiment of the present disclosure;

FIG. 29 illustrates an activation state of a WLAN module for a casewhere UEs in a group has access to an operator AP according to anembodiment of the present disclosure;

FIG. 30 illustrates an activate state of a WLAN module for a case whereUEs in a group have access to a private AP according to an embodiment ofthe present disclosure; and

FIG. 31 is a block diagram of a UE for controlling an access module byforming a group with different UEs according to an embodiment of thepresent disclosure.

Throughout the drawings, it should be noted that like reference numbersare used to depict the same or similar elements, features, andstructures.

DETAILED DESCRIPTION

The following description with reference to the accompanying drawings isprovided to assist in a comprehensive understanding of variousembodiments of the present disclosure as defined by the claims and theirequivalents. It includes various specific details to assist in thatunderstanding but these are to be regarded as merely exemplary.Accordingly, those of ordinary skill in the art will recognize thatvarious changes and modifications of the various embodiments describedherein can be made without departing from the scope and spirit of thepresent disclosure. In addition, descriptions of well-known functionsand constructions may be omitted for clarity and conciseness.

The terms and words used in the following description and claims are notlimited to the bibliographical meanings, but, are merely used by theinventor to enable a clear and consistent understanding of the presentdisclosure. Accordingly, it should be apparent to those skilled in theart that the following description of various embodiments of the presentdisclosure is provided for illustration purpose only and not for thepurpose of limiting the present disclosure as defined by the appendedclaims and their equivalents.

It is to be understood that the singular forms “a,” “an,” and “the”include plural referents unless the context clearly dictates otherwise.Thus, for example, reference to “a component surface” includes referenceto one or more of such surfaces.

By the term “substantially” it is meant that the recited characteristic,parameter, or value need not be achieved exactly, but that deviations orvariations, including for example, tolerances, measurement error,measurement accuracy limitations and other factors known to those ofskill in the art, may occur in amounts that do not preclude the effectthe characteristic was intended to provide.

A mobile station (MS) according to an embodiment of the presentdisclosure may be fixed or mobile, and may also be called other terms,such as a user equipment (UE), a mobile terminal (MT), a user terminal(UT), a subscriber station (SS), a wireless device, a personal digitalassistant (PDA), a handheld device, and the like.

Further, a base station (BS) according to an embodiment of the presentdisclosure is generally a fixed station which communicates with the MS,and may also be called other terms, such as an evolved-nodeB (eNB), abase transceiver system (BTS), an access point, and the like.

The present disclosure described hereinafter relates to a method and anapparatus for decreasing power consumption of a UE simultaneouslysupporting a licensed band communication system and an unlicensed bandcommunication system in a licensed and non-licensed band multi-radioaccess technology (RAT) environment.

FIG. 1 illustrates a network system in a licensed band and unlicensedband multi-RAT environment according to an embodiment of the presentdisclosure.

Referring to FIG. 1, according to an embodiment of the presentdisclosure, in an environment in which a macro cell network of alicensed band and a small cell network of an unlicensed band coexist, aUE 120 may communicate with a macro eNB 100 of the licensed band andsmall eNBs 111 to 117 of the unlicensed band. Therefore, the UE 120according to the embodiment of the present disclosure may include acommunication module for communicating with the macro eNB 100 of thelicensed band and a communication module for communicating with thesmall eNBs 111 to 117 of the unlicensed band. Herein, the macro eNB 100may occupy a channel by using the licensed band, have a wide coverage,use a narrow bandwidth, and provide a low data transfer rate. On theother hand, the small eNBs 111 to 117 may occupy a channel by using theunlicensed band, have a narrow coverage, use a wide bandwidth, andprovide a high data transfer rate.

For example, if the macro eNB 100 of the licensed band is assumed as aneNB 200 of a long term evolution (LTE) system and if the small eNBs 111to 117 of the unlicensed band are assumed as an access point (AP) 210 ofa wireless local area network (WLAN), a network structure of a multi-RATenvironment for communicating with the UEs 120 and 220 may be the sameas shown in FIG. 2A or 2B.

FIGS. 2A and 2B illustrate a network structure of a multi-RATenvironment according to various embodiments of the present disclosure.

Referring to FIGS. 2A and 2B, a UE 220 may transmit/receive data andsignaling to/from an eNB 200 and an AP 210. In this case, the AP 210according to an embodiment of the present disclosure directlytransmits/receives data for the UE 220 to/from a gateway (GW)/homesubscriber server (HSS) 240, but may transmit/receive signaling for theUE 220 to/from a mobility management entity (MME) 230 and the GW/HSS 240via the eNB 200. Further, the AP 210 according to the embodiment of thepresent disclosure may transmit/receive data and signaling for the UE220 to/from the MME 230 and the GW/HSS 240 via the eNB 200.

For example, the small eNBs 111 to 116 (e.g., the AP 210) according tothe embodiment of the present disclosure may transmit/receive signalingfor the UEs 120 and 220 via the macro eNB 100 (e.g., the eNB 200).Further, the small eNBs 111 to 116 (e.g., the AP 210) according to theembodiment of the present disclosure may transmit/receive data for theUEs 120 and 220 via the macro eNB 100, or may directly transmit/receivethe data to/from a higher network node.

For convenience of explanation, a case where the small eNBs 111 to 116(e.g., the AP 210) transmit/receive data and signaling via the macro eNB100 (e.g., the eNB 200) is assumed hereinafter in the embodiment of thepresent disclosure described. However, the embodiment of the presentdisclosure described hereinafter may also be applied to a case where thesmall eNBs 111 to 116 (e.g., the AP 210) transmit/receive signaling viathe eNB 100 (e.g., the eNB 200) and directly transmit/receive datato/from a higher network node. Only a difference occurring when thesmall eNBs 111 to 116 directly transmit/receive data for the UE to/fromthe higher network node is described below.

FIG. 3 illustrates a power saving mode (PSM) mechanism of a WLANaccording to an embodiment of the present disclosure.

Referring to FIG. 3, in general, a UE supporting a WLAN of an unlicensedband uses a PSM mechanism to decrease power consumption. The PSMmechanism implies a mechanism in which a communication module supportingthe WLAN of the UE operates in an awake status in a beacon durationperiodically repeated, and if it is identified that there is no downlinktraffic through a received beacon, operates in a sleep mode until a nextbeacon duration. For example, an AP 210 of the WLAN periodicallytransmits a beacon 310, and in this case, a traffic indication map (TIM)included in the beacon indicates a presence/absence of traffic to a UE220. Therefore, the UE 220 receives the beacon 310 by operating a WLANcommunication module in the awake status according to a periodictransmission duration of the beacon 310. Upon identifying of the absenceof downlink traffic based on the received beacon 310, the UE 220 mayoperate the WLAN communication module in the sleep state until a nextduration of the beacon 310.

As described above, the UE operating according to the PSM mechanism mustoperate the WLAN communication module in the awake status in everybeacon transmission duration periodically repeated even though there isno downlink data, and thus may periodically consume a great amount ofpower.

FIG. 4 illustrates a power consumption rate depending on a PSM operationof a UE according to an embodiment of the present disclosure.

Referring to FIG. 4, an amount of power consumed in a duration in whichthe UE operates in the awake status (e.g., a warming-up time durationand an active time duration) is greater than an amount of power consumedin a sleep duration. For example, power consumed in the warming-up timeduration is 27.5 mW, which is greater by more than 8000 times the power0.0033 mW consumed in the sleep time duration. Therefore, in a situationin which there is no downlink data for the UE, the UE operates in theawake status to periodically receive a beacon, thereby unnecessarilyconsuming power. To address such an unnecessary power consumption issue,there is a method of increasing a beacon transmission period, which maycause a delay in downlink data transmission to the UE.

In addition, the UE operating according to the PSM mechanisms may not beable to receive downlink data due to a failure in occupying a channel ofan AP in an environment in which a plurality of APs are congested.

FIG. 5 illustrates a situation in which an AP fails to occupy a channelin an environment in which overlapping WLANs are congested according toan embodiment of the present disclosure.

Referring to FIG. 5, in an environment in which a plurality of APshaving an overlapping coverage are congested, each AP 210 may not beable to occupy a channel in a pre-set beacon transmission period. Inthis case, the AP 210 may transmit a beacon signal at a different timeother than a time corresponding to the pre-set beacon transmissionperiod. For example, if the AP 210 succeeds in the channel occupation, abeacon is transmitted at time points a, b, c, d, and e, whereas if theAP 210 fails in the channel occupation, a situation may occur in whichthe beacon cannot be transmitted at the time point b 500 and thus thebeacon is transmitted at a time point b′ 501. A UE operates in an awakestatus only in the pre-set beacon transmission period according to thePSM mechanism, and thus cannot receive the beacon transmitted at thetime point b′ 501. Therefore, even if information for indicating apresence of downlink data for the UE 220 exists in the beacontransmitted at the time point b′ 501, the UE 220 cannot recognize thisand thus operates in the sleep status.

Accordingly, an embodiment of the present disclosure describes a methodand an apparatus for avoiding a downlink data transmission delay and/ordata reception failure situation while minimizing unnecessary powerconsumption of a UE.

The embodiment of the present disclosure described hereinafter is forkeeping an activation state of some communication modules among aplurality of communication modules supporting different RATs andincluded in the UE in a licensed and unlicensed band multi-RATenvironment, and is for controlling an activation state of the othercommunication modules. In the embodiment described hereinafter, a macrocell network of a licensed band is called a 1^(st) access system, and asmall cell network of an unlicensed band is called a 2^(nd) accesssystem. However, the embodiment described hereinafter may also beequally applied to a case where the 1^(st) access system is the smallcell network of the unlicensed band, and the 2^(nd) access system is themacro cell network of the licensed band. In addition, although theembodiment of the present disclosure is described hereinafter under theassumption that the UE supports the 1^(st) access system and the 2^(nd)access system for convenience of explanation, various embodiments of thepresent disclosure may also be equally applied to a case where the UEsupports three or more access systems.

FIG. 6 illustrates a method of controlling an activation state of a2^(nd) access module of a UE supporting a multi-RAT according to anembodiment of the present disclosure.

Referring to FIG. 6, a UE 620 includes a 1^(st) access module supportinga 1^(st) access system and a 2^(nd) access module supporting a 2^(nd)access system. The access module according to the embodiment of thepresent disclosure may include at least one of a modem, a radiofrequency (RF) module, and a power amplifier (PA).

The UE 620 according to the embodiment of the present disclosure maycommunicate with a 1^(st) access eNB 600 while keeping an activationstate of a 1^(st) access module 621. Further, the UE 620 according tothe embodiment of the present disclosure may activate or deactivate a2^(nd) access module 622 based on information received from the 1^(st)access eNB 600 while keeping the activation state of the 1^(st) accessmodule 621. For example, the UE 620 according to the embodiment of thepresent disclosure detects a presence/absence of traffic to be receivedvia a 2^(nd) access link, based on information received via a link ofthe 1^(st) access system from the 1^(st) access eNB 600. The UE 620activates the 2^(nd) access module 622 in the presence of traffic to bereceived via the 2^(nd) access link, and deactivates the 2^(nd) accessmodule 622 in the absence of the traffic to be received via the 2^(nd)access link. In the embodiment of the present disclosure, an activationstate of an access module implies that the access module operates in anawake status (or mode), and a deactivation state of the access modulemay imply that the access module operates in a sleep status (or mode).

For example, the 1^(st) access eNB 600 detects generation of downlinktraffic to be transmitted to the UE 620 via a 2^(nd) access eNB 610.When downlink data is received from a higher network node, the 1^(st)access eNB 600 may detect the generation of downlink traffic. The 1^(st)access eNB 600 may transmit a signal for instructing activation of the2^(nd) access module 622 to the UE 620 via a 1^(st) access link.Accordingly, the UE 620 activates the 2^(nd) access module 622 in adeactivation state in preparation for receiving a signal from the 2^(nd)access eNB via the 2^(nd) access link. The 1^(st) access eNB 600transmits the detected downlink data to the 2^(nd) access eNB 610. The2^(nd) access eNB 610 transmits to the UE 620 the downlink data receivedfrom the 1^(st) access eNB 600 via the 2^(nd) access link. The UE 620receives the downlink data from the 2^(nd) access eNB 610 by using theactivated 2^(nd) access module 622.

In addition, according to the embodiment of the present disclosure, ifdownlink data is no longer received from the higher network node withina pre-set time after the downlink data is transmitted to the 2^(nd)access eNB 610, the 1^(st) access eNB 600 may transmit a signal forinstructing deactivation of the 2^(nd) access module 622 to the UE 620via the 1^(st) access link. The UE 620 may deactivate the 2^(nd) accessmodule 622, based on the deactivation instruction signal of the 2^(nd)access module 622 from the 1^(st) access eNB 600.

According to another embodiment of the present disclosure, if downlinkdata is no longer received from the 2^(nd) access eNB 610 within apre-set time after the downlink data is received, the UE 620 mayautomatically deactivate the 2^(nd) access module 622. For example, theUE 620 may deactivate the 2^(nd) access module 622 by using a timer,instead of receiving the deactivation instruction signal of the 2^(nd)access module 622 from the 1^(st) access eNB 600. Information on thetimer may be received from the 1^(st) access eNB 600, or may be storedin the UE 620.

FIG. 7 illustrates a signal flow for activating a 2^(nd) access moduleof a UE according to an embodiment of the present disclosure. It isassumed herein that the 2^(nd) access module of the UE is in adeactivation state.

Referring to FIG. 7, in operation 701, a 1^(st) access eNB 600 detectsdownlink traffic to be transmitted to a UE 620 via a 2^(nd) access eNB610. For example, the 1^(st) access eNB 600 receives downlink data for a2^(nd) access system of the UE 620 from a higher network node. Inoperation 703, the 1^(st) access eNB 600 identifies that the 2^(nd)access module of the UE 620 is in the deactivation state. For example,the 1^(st) access eNB 600 may identify that the 2^(nd) access module isin the deactivation state, based on pre-stored state information for the2^(nd) access module of the UE 620.

Thereafter, in operation 705, the 1^(st) access eNB 600 transmits asignal for instructing activation of the 2^(nd) access module to the UE620 via a 1^(st) access link. According to the embodiment of the presentdisclosure, if the 1^(st) access eNB 600 is an LTE system of a licensedband, the 1^(st) access eNB 600 may instruct the UE 620 to activate the2^(nd) access module by using a radio resource control (RRC)reconfiguration message. According to another embodiment of the presentdisclosure, if the 1^(st) access eNB 600 is the LTE system of thelicensed band, the 1^(st) access eNB 600 may instruct the UE 620 toactivate the 2^(nd) access module by using a media access control (MAC)common emitter (CE) signal for controlling an activation state of asecondary (S) cell. According to another embodiment of the presentdisclosure, if the 1^(st) access eNB 600 is the LTE system of thelicensed band, the 1^(st) access eNB 600 may instruct the UE 620 toactivate the 2^(nd) access module by using a physical downlink controlchannel (PDCCH). In the aforementioned embodiments of the presentdisclosure, since the RRC reconfiguration message, the MAC CE, and thePDCCH have different transmission rates or transmission delays, any oneof the RRC reconfiguration message, the MAC CE, and the PDCCH may beselected based on how quickly the 2^(nd) access module of the UE 620must be activated.

In operation 707, the 1^(st) access eNB 600 stores the state informationfor the 2^(nd) access module of the UE 620 by changing its state to anactivation state. In operation 709, the 1^(st) access eNB 600 transmitsdownlink data to the 2^(nd) access eNB 610. According to the embodimentof the present disclosure, an order of performing operations 705, 707,and 709 may be changed depending on a design rule.

The UE 620 receives the signal for instructing activation of the 2^(nd)access module via the 1^(st) access module, and in operation 721,activates the 2^(nd) access module.

The 2^(nd) access eNB 610 receives downlink data from the 1^(st) accesseNB 600, and in operation 711, transmits the downlink data to the UE 620via the 2^(nd) access link.

Accordingly, the UE 620 may receive the downlink data transmitted fromthe 2^(nd) access eNB 610 via the 2^(nd) access module.

In addition, although not shown in FIG. 7, the UE 620 may activate the2^(nd) access module, and thereafter may transmit a response signal forthe signal for instructing activation of the 2^(nd) access module to the1^(st) access eNB 600. According to the embodiment of the presentdisclosure, the UE 620 may transmit the response signal to the 1^(st)access eNB 600 via the 1^(st) access link. According to anotherembodiment of the present disclosure, the UE 620 may transmit theresponse signal to the 2^(nd) access eNB 610 via a 2^(nd) access link.In this case, the 2^(nd) access eNB 610 may deliver the response signalto the 1^(st) access eNB 600.

In addition, the 1^(st) access eNB 600 may transmit the stateinformation for the 2^(nd) access module of the UE 620 to the 2^(nd)access eNB 610. For example, whenever the state information for the2^(nd) access module of the UE 620 is changed, the 1^(st) access eNB 600may transmit the changed state information to the 2^(nd) access eNB 610.For another example, the 1^(st) access eNB 600 may periodically transmitthe state information for the 2^(nd) access module of the UE 620.

FIG. 8A illustrates a signal flow for activating a 2^(nd) access moduleof a UE according to an embodiment of the present disclosure.

FIG. 8D illustrates activation, deactivation, and transmission of a2^(nd) access module through 1^(st) access control transmission, and atime and operation of receiving a beacon signal of a 2^(nd) access eNBby a UE according to another embodiment of the present disclosure.

FIG. 8E illustrates a TIM configuration of a typical beacon signal. Itis assumed herein that the 2^(nd) access module of the UE is in adeactivation state according to an embodiment of the present disclosure.

Referring to FIGS. 8A, 8D, and 8E, in operation 801, a 1^(st) access eNB600 detects downlink traffic to be transmitted to a UE 620 via a 2^(nd)access eNB 610. For example, the 1^(st) access eNB 600 receives downlinkdata for a 2^(nd) access system of the UE 620 from a higher networknode. In operation 803, the 1^(st) access eNB 600 identifies that the2^(nd) access module of the UE 620 is in the deactivation state. Forexample, the 1^(st) access eNB 600 may identify that the 2^(nd) accessmodule is in the deactivation state, based on pre-stored stateinformation for the 2^(nd) access module of the UE 620.

Thereafter, in operation 805, the 1^(st) access eNB 600 transmits asignal for instructing activation of the 2^(nd) access module to the UE620 via a 1^(st) access link. According to the embodiment of the presentdisclosure, if the 1^(st) access eNB 600 is an LTE system of a licensedband, the 1^(st) access eNB 600 may instruct the UE 620 to activate the2^(nd) access module by using an RRC reconfiguration message. Accordingto another embodiment of the present disclosure, if the 1^(st) accesseNB 600 is the LTE system of the licensed band, the 1^(st) access eNB600 may instruct the UE 620 to activate the 2^(nd) access module byusing an MAC CE signal for controlling an activation state of an S cell.According to another embodiment of the present disclosure, if the 1^(st)access eNB 600 is the LTE system of the licensed band, the 1^(st) accesseNB 600 may instruct the UE 620 to activate the 2^(nd) access module byusing a PDCCH. In the aforementioned embodiments of the presentdisclosure, since the RRC reconfiguration message, the MAC CE, and thePDCCH have different transmission rates or transmission delays, any oneof the RRC reconfiguration message, the MAC CE, and the PDCCH may beselected based on how quickly the 2^(nd) access module of the UE 620must be activated.

In operation 807, the 1^(st) access eNB 600 stores the state informationfor the 2^(nd) access module of the UE 620 by changing its state to anactivation state. The 1^(st) access eNB 600 instructs the 2^(nd) accesseNB 610 to transmit a short beacon in operation 809, and transmitsdownlink data to the 2^(nd) access eNB 610 in operation 811. Accordingto the embodiment of the present disclosure, an order of performingoperations 805 to 811 may be changed depending on a design rule.

The UE 620 receives the signal for instructing activation of the 2^(nd)access module via the 1^(st) access module, and in operation 821,activates the 2^(nd) access module.

The 2^(nd) access eNB 610 transmits the short beacon in operation 813according to the short beacon transmission instruction received from the1^(st) access eNB 600. Thereafter, in operation 815, the 2^(nd) accesseNB 610 transmits the downlink data to the UE 620 via a 2^(nd) accesslink. As shown in FIG. 8D, a short beacon 852 is not transmitted at atime of transmitting a periodically repeated beacon 850 but istransmitted at a time point between beacon transmission periods. This isfor allowing the UE 620 to receive a 2^(nd) access module activationsignal via the 1^(st) access module, to activate the 2^(nd) accessmodule, thereafter to receive the short beacon 852 instead of waitinguntil a next beacon reception duration, and thereafter to immediatelyreceive downlink data. As shown in FIG. 8E, the short beacon may beconfigured by including only some pieces of information required by theUE 620 to receive downlink data among a plurality of pieces ofinformation included in a well-known beacon signal. A configuration forthe short beacon will be described below with reference to FIGS. 8F to8H.

Accordingly, the UE 620 may receive the downlink data transmitted fromthe 2^(nd) access eNB 610 via the 2^(nd) access module. According to theembodiment of the present disclosure, the UE 620 of which the 2^(nd)access module is activated may acquire additional information requiredto receive downlink data by receiving the short beacon 852 in operation813, and thus may receive the downlink data via the 2^(nd) access modulein operation 815 without having to wait until a next beacon transmissiontime. Therefore, a wake-up delay of the UE 620 can be decreased.

According to another embodiment of the present disclosure, operations809 and 811 may be skipped, and the 1^(st) access eNB 600 may transmitadditional information included in the 2^(nd) access module activationinstruction signal to be transmitted to the UE 620. The additionalinformation may be information regarding downlink data to be transmittedvia the 2^(nd) access eNB 610.

In addition, although not shown in FIG. 8A, the UE 620 may activate the2^(nd) access module, and thereafter may transmit a response signal forthe signal for instructing activation of the 2^(nd) access module to the1^(st) access eNB 600. According to the embodiment of the presentdisclosure, the UE 620 may transmit the response signal to the 1^(st)access eNB 600 via the 1^(st) access link. According to anotherembodiment of the present disclosure, the UE 620 may transmit theresponse signal to the 2^(nd) access eNB 610 via the 2^(nd) access link.In this case, the 2^(nd) access eNB 610 may deliver the response signalto the 1^(st) access eNB 600.

In addition, the 1^(st) access eNB 600 may transmit the stateinformation for the 2^(nd) access module of the UE 620 to the 2^(nd)access eNB 610. For example, whenever the state information for the2^(nd) access module of the UE 620 is changed, the 1^(st) access eNB 600may transmit the changed state information to the 2^(nd) access eNB 610.For another example, the 1^(st) access eNB 600 may periodically transmitthe state information for the 2^(nd) access module of the UE 620.

FIG. 8B illustrates a signal flow for activating a 2^(nd) access moduleof a UE according to an embodiment of the present disclosure.

FIG. 8D illustrates a time of transmitting a beacon signal of a 2^(nd)access eNB and receiving a beacon signal of a UE according to anembodiment of the present disclosure.

FIG. 8E illustrates a frame structure of a typical beacon signalaccording to another embodiment of the present disclosure.

Referring to FIGS. 8B, 8D, and 8E, a UE 620 may activate only a 1^(st)access module in operation 820. For example, a 2^(nd) access module maybe deactivated. In this case, a 2^(nd) access eNB 611 and a 2^(nd)access eNB 612 may transmit a beacon in a beacon transmission period inoperation 822. However, since only the 1^(st) access module is in anactivation state, the UE 620 cannot receive the beacon signal of the2^(nd) access eNB 611 and the 2^(nd) access eNB 612.

Meanwhile, in operation 824, a 1^(st) access eNB 600 detects traffic forthe 2^(nd) access system. For example, the 1^(st) access eNB 600receives downlink traffic to be transmitted to the 2^(nd) access eNB 611or to the UE 620 via the 2^(nd) access eNB 611 from a higher networknode. The 1^(st) access eNB 600 identifies that the 2^(nd) access moduleof the UE 620 is in a deactivation state, and in operation 826,transmits a 2^(nd) access module activation instruction signal to the UE620. For example, based on pre-stored state information for the 2^(nd)access module of the UE 620, the 1^(st) access eNB 600 may identify thatthe 2^(nd) access module is in the deactivation state. According to theembodiment of the present disclosure, the 2^(nd) access moduleactivation instruction signal may include beacon option information anduplink resource allocation information. The beacon option informationmay indicate a type of a beacon signal transmitted by the 2^(nd) accesseNB 611 or 612. In other words, the beacon option information mayindicate whether a short beacon signal is transmitted by the 2^(nd)access eNB 611 or 612. For example, if the beacon option information is“0”, it may indicate that the short beacon signal is not transmitted bythe 2^(nd) access eNB 611 or 612, and if the beacon option informationis “1”, it may indicate that the short beacon signal is transmitted bythe 2^(nd) access eNB 611 or 612. Further, the uplink resourceallocation information may indicate information of uplink resourcesallocated to transmit an activation response signal of the UE 620.Herein, the activation response signal implies a signal for informingthe 1^(st) access eNB of whether the UE 620 has received the beaconsignal of the 2^(nd) access eNB. Further, without an additionalscheduling request (SR) of the UE, uplink resources allocation isperformed for a beacon reception response. This uplink resourceallocation may vary depending on whether a short beacon is transmitted.For example, if the beacon option information is “0”, since the UEresponds to whether a beacon is received via a 1^(st) access uplinkafter periodic beacon reception is achieved, the 1^(st) access eNBallocates an uplink resource to the UE after a next periodic beacon.Otherwise, if the beacon option information is “1”, it is adjusted suchthat an uplink resource is allocated after a short beacon. It is assumedin FIG. 8B that the 1^(st) access eNB 600 transmits a 2^(nd) accessmodule activation response signal including “beacon option=1” as thebeacon option information. In addition, the 2^(nd) access moduleactivation response signal in operation 826 may be transmitted based onany one of an RRC reconfiguration message, an MAC CE, and a PDCCH.

In operation 830, the 1^(st) access eNB 600 transmits downlink data tothe 2^(nd) access eNB 611 to which the UE 620 has access. In operation832, the 2^(nd) access eNB 611 buffers downlink data received for the UE620 from the 1^(st) access eNB 600.

The UE 620 receives a 2^(nd) access module activation instruction signalvia the 1^(st) access module, and in operation 828, activates the 2^(nd)access module. Thereafter, in operation 834, the UE 620 transmits a2^(nd) access module activation response signal to the 2^(nd) access eNB611 via the 2^(nd) access module. In operation 836, the UE 620 may drivea short beacon reception (SBR) timer for receiving a short beaconsignal. According to a design rule, operations 834 and 836 may beperformed simultaneously, or operation 834 may be performed afteroperation 836 is performed.

Upon receiving the 2^(nd) access module activation response signal fromthe UE 620 in a state where the downlink data for the UE 620 isbuffered, in operation 838, the 2^(nd) access eNB 611 may recognize thatthe short beacon signal must be transmitted immediately. Thereafter, inoperation 840, the 2^(nd) access eNB 611 may transmit the short beaconsignal, and may transmit the buffered downlink data. Herein, thedownlink data may be transmitted together with the short beacon, or maybe transmitted immediately after the short beacon is transmitted.Further, as shown in FIG. 8E, the short beacon may be configured byincluding only some pieces of information required by the UE 620 toreceive the downlink data among a plurality of TIM information includedin the well-known beacon signal. A configuration for the short beaconwill be described below with reference to FIGS. 8F to 8H.

Meanwhile, before an SBR timer expires, the UE 620 may receive the shortbeacon signal via the 2^(nd) access module, and may receive downlinkdata. According to the embodiment of the present disclosure, the UE 620of which the 2^(nd) access module is activated may acquire additionalinformation required to receive downlink data by receiving a shortbeacon, and thus may receive downlink data from the 2^(nd) access eNB611 without having to wait until a next beacon transmission time. The UE620 receives the short beacon from the 2^(nd) access eNB 611, and if theSBR timer expires in operation 842, may transmit an activation responsesignal to the 1^(st) access eNB 600 in operation 844. According to adesign rule, the UE 620 may transmit the activation response signal tothe 1^(st) access eNB 600 before the SBR timer expires. According to theembodiment of the present disclosure, the activation response signal mayinclude information for indicating whether an eNB change is necessary.For example, if the short beacon is received via the 2^(nd) accessmodule before the SBR timer expires, the UE 620 may transmit information“AP change=0” for indicating that an AP change is not necessary since itis a situation in which signal reception from an AP is possible. Foranother example, although not shown, if the short beacon is not receivedvia the 2^(nd) access module before the timer expires, the UE 620 maytransmit information “AP change=1” for indicating that the AP change isnecessary since it is a situation in which signal reception from the APis impossible. A case where the AP change of the UE 620 is necessarywill be described below with reference to FIG. 9.

Referring to FIG. 8B described above, the UE 620 may determine a 2^(nd)access module activation time based on the beacon option informationincluded in the 2^(nd) access module activation instruction signal.

FIG. 8C illustrates a UE operation and uplink resource allocation basedon beacon option information included in a 2^(nd) access moduleactivation signal according to an embodiment of the present disclosure.

Referring to FIG. 8C, if the beacon option information included in the2^(nd) access module activation instruction signal is “0”, the UE 620may activate the 2^(nd) access module by waiting until a pre-set beacontransmission time, and may receive a beacon based on the method of therelated art via the activated 2^(nd) access module. In this case, uplinkresource allocation information included in the 2^(nd) access moduleactivation instruction signal may include information regarding aresource after a beacon reception time based on the method of therelated art. Further, if the beacon option information included in the2^(nd) access module activation instruction signal is “1”, the UE 620may activate the 2^(nd) access module immediately after the 2^(nd)access module activation instruction signal is received, and may receivethe short beacon via the activated 2^(nd) access module. In this case,the uplink resource allocation information included in the 2^(nd) accessmodule activation instruction signal may include information regardingthe resource after the short beacon reception time.

FIG. 8F illustrates a frame structure of a short beacon signal accordingto an embodiment of the present disclosure.

FIG. 8G illustrates information included in a short beacon signalaccording to an embodiment of the present disclosure.

FIG. 8H illustrates information included in a short beacon signal basedon a frame structure of a short beacon signal according to an embodimentof the present disclosure.

Referring to FIGS. 8F, 8G, and 8H, the frame structure of the shortbeacon signal may include at least one of a short training field, afield for channel estimation, a header, and data. For example, it may beeffective to configure the short beacon signal with a size less than 88bits, i.e., a size of a control physical header. As illustrated, theshort beacon signal may be configured by using the following threemethods.

According to a first method, the short beacon signal may include only ashort training field. In this case, as shown in FIG. 8H, the shortbeacon signal may be configured with a minimum length of 3.636 us, andthe short beacon signal does not include additional information.

According to a second method, the short beacon signal may include ashort training field, a field for channel estimation, and a header. Inthis case, the header of the short beacon signal may include beamformingrelated information and a partial physical cell identifier (PCID). Forexample, as shown in FIG. 8G, the header of the short beacon signal mayinclude direction information, beam identifier information, antennaidentifier information, and partial PCID information. Herein, thedirection information may include uplink and downlink transmissionrecognition information and information for recognizing a compressedbeacon and a best beam feedback, and the beam identifier information mayinclude transmission beam ID information of an AP. Further, the antennaidentifier information may include antenna ID information, and thepartial PCID may include a sequence of the short training field.According to a design rule, the short beacon signal may include only oneheader, or may include two headers. As illustrated, the directioninformation, the beam identifier information, the antenna identifierinformation, and the partial PCID information may consist of 14 bits intotal. A control physical layer header may include 88-bit information,and in this case, the existing physical layer header consists of 40bits, and the remaining 48 bits are reserved bits. Therefore, among the48-bit reserved bits according to the embodiment of the presentdisclosure, 14-bit information can be additionally used. If the shortbeacon signal includes one header, a length of the short beacon signalis 8.93 us, and may be 88 bits in total. On the other hand, if the shortbeacon signal includes two headers, the length of the short beaconsignal is 13.69 us, and may be 176 bits in total.

According to a third method, the short beacon signal may include a shorttraining field, a field for channel estimation, a header, and data. Inthis case, the header of the short beacon field may include informationas shown in FIG. 8G. Further, in this case, the data may include only a14-byte MAC header, or may include a 14-byte MAC header and 10-bytedata, or may include a 14-byte MAC header and 86-byte data.

FIG. 8I illustrates beam training using a short beacon signal accordingto an embodiment of the present disclosure.

Referring to FIG. 8I, when the beam training is performed using theshort beacon signal, the short beacon signal may be transmitted/receivedrepetitively by the number of transmit antenna beams of an AP and thenumber of receive antenna beams of a UE. Since the short beacon signalmay be configured to be significantly shorter than a legacy beaconsignal, not only a beam training time can be decreased but also anoverhead caused by the beam training can be decreased.

FIG. 9 illustrates a signal flow for a case where an eNB for a 2^(nd)access module of a UE is changed according to an embodiment of thepresent disclosure.

It is assumed in FIG. 9 that a UE 620 fails to receive a short beaconsignal from a 2^(nd) access eNB 611 before an SBR timer expires in theaforementioned situation of FIG. 8B. Further, it is assumed in FIG. 9that the UE 620 detects a situation in which signal reception from the2^(nd) access eNB 611 is impossible during downlink data is receivedfrom the 2^(nd) access eNB 611. For example, it is assumed that thesituation in which the signal reception from the 2^(nd) access eNB 611is impossible is detected due to a movement of the UE 620 or a change ina channel state with respect to the 2^(nd) access eNB 611. Herein, a1^(st) access module for transmitting/receiving a signal to/from a1^(st) access eNB 600 may be persistently kept in an activation state.

Referring to FIG. 9, in operation 910, the UE 620 may transmit anactivation response signal to the 1^(st) access eNB 600. The activationresponse signal may include information for indicating whether an eNBchange is necessary and short beacon request information. For example,the UE 620 fails to receive a short beacon via a 2^(nd) access modulebefore an SBR time expires, and thus may determine that it is asituation in which an AP change is necessary and may transmit theactivation response signal which includes information “AP change=1” forindicating that the AP change is necessary and which includesinformation for requesting for the short beacon signal. For anotherexample, the UE 620 may determine that it is a situation in whichadditional signal reception is impossible via the 2^(nd) access eNB 611,and may transmit the activation response signal including theinformation “AP change=1” for indicating that the AP change is necessaryand the information for requesting for the short beacon signal.According to a design rule, the UE 620 may deactivate the 2^(nd) accessmodule if the SBR timer expires in a state where the short beacon signalis not received. Further, irrespective of the SBR timer, the UE 620 maydeactivate the 2^(nd) access module by using an additional timer fordetermining a time of deactivating the 2^(nd) access module at a timewhen the 2^(nd) access module is activated. For example, after runningthe additional timer at the time when the 2^(nd) access module isactivated, the UE 620 may deactivate the 2^(nd) access module if theadditional timer expires in a state where downlink signal is notdetected via the 2^(nd) access module.

In response to the activation response signal received from the UE 620,in operation 912, the 1^(st) access eNB 600 transmits a short beaconrequest signal to the 2^(nd) access eNB 611 and a 2^(nd) access eNB 612.Herein, the short beacon request signal may be transmitted to the 2^(nd)access eNB 611 and/or at least one 2^(nd) access eNB neighboring to the2^(nd) access eNB 611. The 1^(st) access eNB 600 may select at least one2^(nd) access eNB for transmitting the short beacon request signal,based on a pre-registered 2^(nd) access eNB list. The 2^(nd) access eNBlist may include location information of each 2^(nd) access eNB and/orinformation of a 2^(nd) access eNB neighboring to each 2^(nd) accesseNB. Further, the 1^(st) access eNB 600 may select at least one 2^(nd)access eNB for transmitting the short beacon request signal, based on alocation of the UE 620.

In operation 914, the 1^(st) access eNB 600 retransmits an uplinkresource allocation signal for transmitting an activation responsesignal of the UE 620. Herein, upon receiving the uplink resourceallocation signal from the 1^(st) access eNB 600 via the 1^(st) accessmodule, the UE 620 may activate the 2^(nd) access module.

In operation 916, the 2^(nd) access eNB 611 and the 2^(nd) access eNB612 transmit the short beacon signal. The 2^(nd) access eNB 611 and the2^(nd) access eNB 612 may transmit the short beacon signal immediatelyafter the short beacon request signal is received, or may transmit theshort beacon signal based on a short beacon signal transmission timeincluded in the short beacon request signal. If the 2^(nd) access eNB611 or the 2^(nd) access eNB 612 does not support short beacon signaltransmission, a corresponding 2^(nd) access eNB may transmit a legacybeacon signal at a pre-set beacon signal transmission time.

In operation 918, the UE 620 receives a short beacon (and/or a beaconsignal) via the 2^(nd) access module. Herein, to describe a case wherethe UE 620 changes the AP, it is assumed a case where the UE 620 failsto receive the short beacon signal from the 2^(nd) access eNB 611 andreceives the beacon signal from the 2^(nd) access eNB 612. Further, itis assumed a case where the UE 620 receives the short beacon signal fromthe 2^(nd) access eNB 611 and the 2^(nd) access eNB 612, but receptionstrength of the short beacon signal from the 2^(nd) access eNB 611 isless than a threshold and reception strength of the short beacon signalfrom the 2^(nd) access eNB 612 is greater than or equal to thethreshold. In operation 920, the UE 620 determines a handover to the2^(nd) access eNB 612, based on a result of receiving the short beaconsignal. In operation 921, the UE 620 transmits an activation responsesignal to the 1^(st) access eNB 600. In this case, the activationresponse signal may include information for indicating that an AP changeis necessary and identification information for a target AP. Forexample, the activation response signal may include “AP change=1” forindicating that the AP change is necessary and “target AP=AP2” forindicating the identification information for the target AP. Herein,after transmitting the activation response signal, the UE 620 maydeactivate the 2^(nd) access module.

The 1^(st) access eNB 600 identifies the target 2^(nd) access eNB 611 towhich the UE 620 intends to be handed over from the activation responsesignal received from the UE 620, and in operation 922, transmits an addrequest signal to the 2^(nd) access eNB 612. The add request signal mayinclude information regarding the UE 620. In operation 924, the 2^(nd)access eNB 612 transmits an add request acknowledgment (ACK) signal tothe 1^(st) access eNB 600. Herein, the 2^(nd) access eNB 612 maytransmit the add request ACK signal by considering a load depending onthe number of UEs currently having access thereto. Thereafter, inoperation 926, the 1^(st) access eNB 600 and the 2^(nd) access eNB 612configure a data path for the UE 620.

In operation 928, the 1^(st) access eNB 600 transmits a radio resourcecontrol connection reconfiguration signal to the UE 620. In operation930, the UE 620 transmits a radio resource control connectionreconfiguration complete signal to the 1^(st) access eNB 600. Herein,upon receiving downlink data from the 2^(nd) access eNB 611 to which theUE 620 previously has access, information (e.g., packet data convergenceprotocol (PDCP) sequence number (SN)) for last received downlink datamay be transmitted to the 1^(st) access eNB 600.

Upon receiving the radio resource control connection reconfigurationcomplete signal, in operation 932, the 1^(st) access eNB 600 transmitsdownlink data for the UE 620 to the 2^(nd) access eNB 612. Uponreceiving the PDCP SN for the last downlink data from the UE 620, the1^(st) access eNB 600 may deliver downlink data subsequent to the PDCPSN to the 2^(nd) access eNB 612.

Meanwhile, after transmitting the radio resource control connectionreconfiguration complete signal to the 1^(st) access eNB 600, the UE 620may activate the 2^(nd) access module, and in operation 934, maytransmit to the 2^(nd) access eNB 612 a 2^(nd) access module activationresponse signal for indicating that the 2^(nd) access module isactivated. According to a design rule, after activating the 2^(nd)access module, the UE 620 may not transmit the 2^(nd) access moduleactivation response signal.

Thereafter, in operation 936, the UE 620 may receive downlink data fromthe 2^(nd) access eNB 612.

FIG. 10A illustrates a signal flow for deactivating a 2^(nd) accessmodule of a UE based on control transmission of a 1^(st) access eNBaccording to an embodiment of the present disclosure. It is assumedherein that the 2^(nd) access module of the UE is in an activationstate.

Referring to FIG. 10A, in operation 1001, a 1^(st) access eNB 600transmits downlink data for a UE 620 to a 2^(nd) access eNB 610. Forexample, the 1^(st) access eNB 600 may recognize that a 2^(nd) accessmodule of the UE 620 is in an activation state, and may transmit thedownlink data for the UE 620 to the 2^(nd) access eNB 610.

In operation 1003, the 1^(st) access eNB 600 measures a pre-set time bystarting a 1^(st) timer at a time when downlink data is transmitted. Ifdownlink data to be transmitted to the UE 620 via the 2^(nd) access eNB610 is additionally detected before the 1^(st) timer expires or before apre-set time elapses, returning to operation 1001, the 1^(st) access eNB600 transmits downlink data for the UE 620 to the 2^(nd) access eNB 610.In this case, the 1^(st) timer is reset at a time when the additionallydetected downlink data is transmitted, and thus the pre-set time ismeasured again. According to the embodiment of the present disclosure, aset time of the 1^(st) timer may be determined according to a type of a2^(nd) access module activation signal. For example, the set time of the1^(st) timer may be determined by considering which one is used totransmit a 2^(nd) access module activation instruction among an RRCreconfiguration message, an MAC CE, and a PDCCH.

In operation 1007, the 2^(nd) access eNB 610 transmits to the UE 620 thedownlink data received from the 1^(st) access eNB 600.

Meanwhile, in operation 1005, the 1^(st) access eNB 600 may detect anexpiry of the 1^(st) timer. If the 1^(st) timer expires since additionaldownlink data is not detected within a pre-set time from the time whenthe downlink data for the UE 620 is transmitted to the 2^(nd) access eNB160, the 1^(st) access eNB 600 may determine that last downlink data istransmitted.

In operation 1009, the 1^(st) access eNB 600 transmits a signal forinstructing deactivation of the 2^(nd) access module to the UE 620 via a1^(st) access link. According to the embodiment of the presentdisclosure, the signal for instructing deactivation of the 2^(nd) accessmodule may include a sequence number for a last downlink packettransmitted by the 1^(st) access eNB 600 to the 2^(nd) access eNB 610.Further, the signal for instructing deactivation of the 2^(nd) accessmodule may include a PDCP SN of the last downlink packet for the UE 620.For example, the signal for instructing deactivation of the 2^(nd)access module may include a PDCP SN of a last downlink packet to bereceived by the UE 620.

Further, according to the embodiment of the present disclosure, the1^(st) access eNB 600 may instruct deactivation of the 2^(nd) accessmodule by using a probe request signal.

The UE 620 may receive the signal for instructing deactivation of the2^(nd) access module via the 1^(st) access link, and in operation 1011,may acquire a sequence number for a last packet from the 2^(nd) accessmodule deactivation instruction signal. The UE 620 may detect that thelast packet is received based on the sequence number for the last packetacquired in operation 1011. For example, based on the sequence numberacquired from the 2^(nd) access eNB 610, the UE 620 may determine thatall plackets are received including up to the last downlink data packet.According to the embodiment of the present disclosure, if the sequencenumber for the last packet is not included in the 2^(nd) access moduledeactivation instruction signal, operation 1011 may be skipped. Further,the UE 620 may acquire a PDCP SN of the last downlink packet from thesignal for instructing deactivation of the 2^(nd) access module, and maydetermine that all packets are received including up to the lastdownlink data packet based on the acquired PDCP SN.

The UE 620 transmits to the 1^(st) access eNB 600 a signal forindicating that the 2^(nd) access module is deactivated in operation1013, and deactivate the 2^(nd) access module in operation 1015.According to the embodiment of the present disclosure, the UE 620 mayindicate that the 2^(nd) access module is deactivated by using a proberequest signal. According to another embodiment of the presentdisclosure, the UE 620 may indicate that the 2^(nd) access module isdeactivated by using a PDCP feedback signal for indicating a sequencenumber of a received last packet. According to another embodiment of thepresent disclosure, the UE 620 may not transmit the signal forindicating that the 2^(nd) access module is deactivated.

Upon receiving the signal for indicating that the 2^(nd) access moduleis deactivated, in operation 1017, the 1^(st) access eNB 600 stores thestate information for the 2^(nd) access module of the UE 620 by changingits state to a deactivation state. According to another embodiment ofthe present disclosure, the signal for indicating that the 2^(nd) accessmodule is deactivated may not be received from the UE 620. In this case,the 1^(st) access eNB 600 may determine whether the UE 620 receives alast packet based on an automatic repeat request (ARQ) response signalfor a downlink data packet received from the UE 620, and may store thestate information for the 2^(nd) access module of the UE 620 by changingits state to the deactivation state. Herein, the ARQ response signal maybe received directly from the UE 620 via the 1^(st) access link or maybe received via the 2^(nd) access eNB 610.

In various embodiments of the present disclosure, when the UE 620deactivates the 2^(nd) access module, it implies that the 2^(nd) accessmodule is changed to a sleep mode and is kept persistently in the sleepmode. For example, when the 2^(nd) access module is in the deactivationstate, the UE 620 does not perform an operation of monitoring a presenceof downlink traffic for the 2^(nd) access link until the 2^(nd) accessmodule activation instruction signal is received.

The UE 620 according to the embodiment of the present disclosure mayperform any one of the following operations 1 to 3 to deactivate the2^(nd) access module.

Operation 1: If the 2^(nd) access eNB 610 is an eNB of a licensed bandLTE system, the UE 620 may prohibit to perform a periodic on-durationoperation of an RRC connected state performed generally in a state wherethe 2^(nd) access module is connected to the 2^(nd) access system, andmay allow the 2^(nd) access module to immediately transition to an RRCidle state. For example, according to an LTE standard, the UE 620 in theRRC connected state must periodically monitor a PDCCH based on a longdiscontinuous reception (DRX) or a short DRX via the 2^(nd) accessmodule. However, according to the embodiment of the present disclosure,the UE 620 in the RRC connected state may prohibit the 2^(nd) accessmodule to periodically monitor the PDCCH based on the long DRX or theshort DRX, and may control it to transition to the idle state.

Operation 2: If the 2^(nd) access eNB 610 is an eNB in a licensed bandLTE system, the UE 620 sets a period for an on-duration in the existingRRC connected state to be much longer, and operates in an RRC mediatestate for avoiding a loss of UE context while decreasing an overheadcaused by monitoring of a random access channel (RACH), paging, and thelike, for synchronization. For example, if the UE 620 operates in theRRC idle state for longer than a specific time, a warming-up time isincreased when transitioning from the sleep status to the activationstate due to the loss of the UE context. However, since the context ismaintained in the embodiment of the present disclosure, the warming-uptime can be prevented from being increased.

Operation 3: If the 2^(nd) access eNB 610 is an AP of an unlicensed bandWLAN system, the UE 620 may prohibit the 2^(nd) access module to performa periodic on-duration operation for receiving a beacon according to aPSM mechanism.

Referring to FIG. 10A described above, it is described that, if a PDCPSN of a last downlink packet for the UE 620 is included in the 2^(nd)access module deactivation instruction signal, the UE 620 determineswhether to receive the last downlink packet reception based on the PDCPSN, and transmits the signal for indicating that the 2^(nd) accessmodule is deactivated by including the PDCP SN of the last downlinkpacket received by the UE 620.

However, the UE 620 and the 1^(st) access eNB 600 may operate based onany one scenario among four types of scenarios as shown in FIG. 10Baccording to various embodiments of the present disclosure. For example,it is described under the assumption that the 2^(nd) access moduledeactivation instruction signal is a WLAN sleep request signal, and thesignal for indicating that 2^(nd) access module is deactivated is a WLANsleep response signal.

According to a first scenario as shown in FIG. 10B, the 1^(st) accesseNB 600 transmits to the UE 620 a WLAN sleep request signal notincluding PDCP SN information of the last downlink packet to be receivedby the UE 620. The UE 620 does not know information regarding the lastdownlink packet, and thus may deactivate the 2^(nd) access moduleimmediately after the WLAN sleep request signal is received. Thereafter,the UE 620 transmits a WLAN sleep response signal to the 1^(st) accesseNB 600. In this case, the WLAN sleep response signal does not includethe PDCP SN information of the last downlink packet. Therefore, the1^(st) access eNB 600 and the UE 620 cannot recognize a differencebetween the PDCP SN of the last downlink packet to be received by the UE620 and a PDCP SN of a last downlink packet actually received by the UE620, which may result in a packet loss.

According to a second scenario, the 1^(st) access eNB 600 transmits tothe UE 620 the WLAN sleep request signal not including the PDCP SNinformation of the last downlink packet to be received by the UE 620.The UE 620 does not know information regarding the last downlink packet,and thus may deactivate the 2^(nd) access module immediately after theWLAN sleep request signal is received. Thereafter, the UE 620 transmitsa WLAN sleep response signal to the 1^(st) access eNB 600. In this case,the WLAN sleep response signal may include the PDCP SN information ofthe downlink packet last received by the UE 620. Therefore, the 1^(st)access eNB 600 may recognize the difference between the PDCP SN of thelast downlink packet to be received by the UE 620 and a PDCP SN of alast downlink packet actually received by the UE 620. If it isdetermined that the UE 620 has failed to receive up to the last downlinkpacket as a result of comparing the PDCP SN of the last downlink packetto be received by the UE 620 and the PDCP SN of the last downlink packetactually received by the UE 620, the 1^(st) access eNB 600 may transmitdownlink packets, which are not received by the UE 620, to the UE 620via the 1^(st) access link. Therefore, the UE 620 may receive downlinkdata, which has a PDCP SN greater than the PDCP SN transmitted to the1^(st) access eNB, via the 1^(st) access link.

According to a third scenario, the 1^(st) access eNB 600 transmits tothe UE 620 the WLAN sleep request signal including the PDCP SNinformation of the last downlink packet to be received by the UE 620.Therefore, the UE 620 can know information regarding the last downlinkpacket, and thus keeps an activation state of the 2^(nd) access moduleuntil the last downlink packet is received, and deactivates the 2^(nd)access module when the last downlink packet is received. Thereafter, theUE 620 may not transmit a response signal to the 1^(st) access eNB 600.For example, according to the third scenario, the UE 620 may recognize adifference between a PDCP SN of a last downlink packet to be receivedand a PDCP SN of a received downlink packet. Thereafter, the UE 620 mayreceive up to the last downlink packet based on the PDCP SN included inthe WLAN sleep request signal, and may deactivate the 2^(nd) accessmodule after detecting that up to the last downlink packet is received.

According to a fourth scenario, the 1^(st) access eNB 600 transmits tothe UE 620 the WLAN sleep request signal including the PDCP SNinformation of the last downlink packet to be received by the UE 620.Therefore, the UE 620 may know information regarding the last downlinkpacket. In this case, the UE 620 may deactivate the 2^(nd) access moduleafter receiving all packets including up to the last downlink packet,and may transmit to the 1^(st) access eNB 600 a WLAN sleep responsesignal including the PDCP SN information of the downlink packet lastreceived by the UE 620. Further, the UE 620 may deactivate the 2^(nd)access module immediately when the WLAN sleep request signal isreceived, and may transmit to the 1^(st) access eNB 600 the WLAN sleepresponse signal including the PDCP SN information of the downlink packetlast received by the UE 620. Therefore, the 1^(st) access eNB 600 andthe UE 620 may recognize the difference between the PDCP SN of the lastdownlink packet to be received by the UE 620 and a PDCP SN of a lastdownlink packet actually received by the UE 620. If it is determinedthat the UE 620 has failed to receive up to the last downlink packet asa result of comparing the PDCP SN of the last downlink packet to bereceived by the UE 620 and the PDCP SN of the last downlink packetactually received by the UE 620, the 1^(st) access eNB 600 may transmitdownlink packets, which are not received by the UE 620, to the UE 620via the 1^(st) access link.

FIG. 11A illustrates a signal flow for deactivating a 2^(nd) accessmodule autonomously by a UE based on initial deactivation timerinformation of the UE according to an embodiment of the presentdisclosure. It is assumed herein that the 2^(nd) access module is in anactivation state.

Referring to FIG. 11A, in operation 1101, a 1^(st) access eNB 600 maytransmit an RRC configuration message including deactivation timerinformation in an initial setup process for an RRC connection with a UE620. According to the embodiment of the present disclosure, thedeactivation timer information includes time information used todetermine whether the 2^(nd) access module is deactivated. Thedeactivation timer information may be determined according to a type ofa 2^(nd) access module activation signal transmitted by the 1^(st)access eNB to the UE 620. For example, time information of adeactivation timer may be determined by considering which one is used totransmit a 2^(nd) access module activation instruction among an RRCreconfiguration message, an MAC CE, and a PDCCH.

In operation 1103, the 1^(st) access eNB 600 transmits downlink data forthe UE 620 to a 2^(nd) access eNB 610. For example, the 1^(st) accesseNB 600 may recognize that the 2^(nd) access module of the UE 620 is inan activation state, and may transmit the downlink data for the UE 620to the 2^(nd) access eNB 610.

In operation 1105, the 1^(st) access eNB 600 measures a pre-set time bystarting a 1^(st) timer at a time when downlink data is transmitted. Ifdownlink data to be transmitted to the UE 620 via the 2^(nd) access eNB610 is additionally detected before the 1^(st) timer expires or before apre-set time elapses, returning to operation 1103, the 1^(st) access eNB600 transmits downlink data for the UE 620 to the 2^(nd) access eNB 610.In this case, the 1^(st) timer is reset at a time when the additionallydetected downlink data is transmitted, and thus the pre-set time ismeasured again. According to the embodiment of the present disclosure,the set time of the 1^(st) time may be determined based on deactivationtimer information transmitted to the UE 620 in operation 1101. Accordingto the embodiment of the present disclosure, the set time of the 1^(st)timer may be equal to or different from time information of thedeactivation timer.

In operation 1107, the 1^(st) access eNB 600 may detect an expiry of the1^(st) timer. If the 1^(st) timer expires since additional downlink datais not detected within a pre-set time from the time when the downlinkdata for the UE 620 is transmitted to the 2^(nd) access eNB 160, the1^(st) access eNB 600 may determine that last downlink data istransmitted. In operation 1109, the 1^(st) access eNB 600 stores thestate information for the 2^(nd) access module by changing its state toa deactivation state.

Meanwhile, in operation 1111, the 2^(nd) access eNB 610 transmits to theUE 620 the downlink data received from the 1^(st) access eNB 600.

The UE 620 receives downlink data from the 2^(nd) access eNB 610 inoperation 1111, and starts a 2^(nd) timer at a time when downlink datais received in operation 1113, thereby measuring a pre-set time. The2^(nd) timer may be set based on deactivation timer information includedin an RRC configuration message. According to the embodiment of thepresent disclosure, the set time of the 2^(nd) timer may be equal to ordifferent from the time information of the deactivation timer.

Further, according to the embodiment of the present disclosure, the settime of the 2^(nd) timer may be equal to or different from the set timeof the 1^(st) timer operated by the 1^(st) access eNB 600. The set timeof the 2^(nd) timer may be set by considering a delivery delay betweenthe 1^(st) access eNB 600 and the 2^(nd) access eNB 610 and/or adelivery delay between the 2^(nd) access eNB 610 and the UE 620. Whendownlink data is additionally detected by the 2^(nd) access module via a2^(nd) access link before the 2^(nd) timer expires, that is, before apre-set time elapses, the UE 620 receives the downlink data. In thiscase, the 2^(nd) timer is reset at a time when the additionally detecteddownlink data is received, and thus the pre-set time is measured again.

In operation 1115, the UE 620 may detect an expiry of the 2^(nd) timer.The UE 620 may determine that last downlink data is received if the2^(nd) timer expires since additional data downlink is not detectedwithin a pre-set time from a time of receiving downlink data via the2^(nd) access link by using the 2^(nd) access module. In operation 1117,the UE 620 stores the state information for the 2^(nd) access module bychanging its state to a deactivation state.

In the aforementioned embodiment of FIGS. 10A and 10B, the 1^(st) accesseNB 600 transmits deactivation timer information to the UE 620 during aninitial connection establishment of the UE 620 and the 1^(st) access eNB600, and thus a deactivation state change time for the 2^(nd) accessmodule of the UE 620 is determined by each of the 1^(st) access eNB 600and the UE 620 based on the deactivation timer information. However, inanother embodiment of the present disclosure, the 1^(st) access eNB 600may not transmit the deactivation timer information to the UE 600, butthe UE 620 may transmit timer information which is pre-set in the UE 620to the 1^(st) access eNB 600. In this case, each of the 1^(st) accesseNB 600 and the UE 620 may determine the deactivation state change timefor the 2^(nd) access module of the UE 620. In another embodiment of thepresent disclosure, the 1^(st) access eNB 600 and the UE 620 may notexchange timer information for deactivation of the 2^(nd) access module,but may determine the deactivation state change time for the 2^(nd)access module of the UE 620 based on timer information which is pre-setin each of the 1^(st) access eNB 600 and the UE 620.

In various embodiments of the present disclosure, when the UE 620deactivates the 2^(nd) access module, it implies that the 2^(nd) accessmodule is changed to a sleep mode and is kept persistently in the sleepmode. For example, when the 2^(nd) access module is in the deactivationstate, the UE 620 does not perform an operation of monitoring a presenceof downlink traffic for the 2^(nd) access link until the 2^(nd) accessmodule activation instruction signal is received. According to theembodiment of the present disclosure, the UE 620 may perform any one ofthe aforementioned operations 1 to 3 to deactivate the 2^(nd) accessmodule.

In various embodiments of the present disclosure, there may be asituation in which state information of the 2^(nd) access module managedby the 1^(st) access eNB 600 is not matched to a state of the 2^(nd)access module of the UE 620. For example, state information of the2^(nd) access module recognized by the 1^(st) access eNB 600 may be notmatched to an actual state of the 2^(nd) access module of the UE 620 dueto a clock draft in each entity, a control signal transmission delay ineach entity, and the like.

FIG. 11B illustrates a situation in which a state for a 2^(nd) accessmodule of a UE is determined in the UE and a 1^(st) access eNB accordingto an embodiment of the present disclosure.

Referring to FIG. 11B, state information of a 2^(nd) access modulemanaged by a 1^(st) access eNB 600 and a state of a 2^(nd) access moduleof a UE 620 are shown in FIG. 11B. In FIG. 11B, ‘ON’ indicates anactivation state of the 2^(nd) access module, and ‘OFF’ indicates aninactivate state of the 2^(nd) access module.

If a state of the 2^(nd) access module of the UE 620 is ‘ON’ and stateinformation of the 2^(nd) access module managed by the 1^(st) access eNB600 is ‘ON’, the UE 620 may transmit/receive data without any problem.

If the state of the 2^(nd) access module of the UE 620 is ‘ON’ and thestate information of the 2^(nd) access module managed by the 1^(st)access eNB 600 is ‘OFF’, the state information of the 2^(nd) accessmodule is mismatched, but the UE 620 may receive downlink data withoutany problem. For example, upon detecting downlink data in a state wherethe state information of the 2^(nd) access module is ‘OFF’, since the1^(st) access eNB 600 transmits a signal for changing the 2^(nd) accessmodule to an activation state and transmits downlink data via the 2^(nd)access eNB 610, the downlink data can be transmitted without anyproblem. However, when the state information of the 2^(nd) access modulemanaged by the 1^(st) access eNB 600 is ‘OFF’, it implies a situation inwhich downlink data for the HE 620 is not generated. Therefore, sincethe 2^(nd) access module of the UE 620 operates in the activation statein the situation in which the downlink data for the UE 620 is notgenerated, power of the UE 620 may be wasted.

If the state of the 2^(nd) access module of the UE 620 is ‘OFF’ and thestate information of the 2^(nd) access module managed by the 1^(st)access eNB 600 is ‘ON’, the UE 620 may be unable to receive downlinkdata due to a mismatch of the state information of the 2^(nd) accessmodule. For example, upon detecting downlink data in a state where thestate information of the 2^(nd) access module is ‘ON’, the 1^(st) accesseNB 600 does not transmit a signal for changing the 2^(nd) access moduleof the UE 620 to the activation state but transmits downlink data viathe 2^(nd) access eNB 610. However, in this case, since the state of the2^(nd) access module of the UE 620 is ‘OFF’, the UE 620 is unable toreceive downlink data transmitted from the 2^(nd) access eNB 610 via the2^(nd) access link.

If the state of the 2^(nd) access module of the UE 620 is ‘OFF’ and thestate information of the 2^(nd) access module managed by the 1^(st)access eNB 600 is ‘OFF’, it implies a state where there is no downlinkdata for the UE 620. The UE 620 may decrease unnecessary powerconsumption by deactivating the 2^(nd) access module in a situation inwhich the downlink data does not exist.

As described above, if the state of the 2^(nd) access module of the UE620 is ‘OFF’ and the state information of the 2^(nd) access modulemanaged by the 1^(st) access eNB 600 is ‘ON’, the UE 620 may be unableto receive downlink data due to a mismatch of the state information ofthe 2^(nd) access module. Therefore, in the embodiment of the presentdisclosure, the 2^(nd) access eNB 610 may detect a situation in whichthe state information of the 2^(nd) access module is mismatched and thenmay match the state information of the 2^(nd) access module.

FIG. 12A illustrates a signal flow for controlling a state of a 2^(nd)access module by a 2^(nd) access eNB based on a timer mismatch of a UEand a 1^(st) access eNB according to an embodiment of the presentdisclosure. It is assumed herein that the 2^(nd) access module of the UEis in an activation state.

Referring to FIG. 12A, in operation 1201, a 1^(st) access eNB 600transmits downlink data for a UE 620 to a 2^(nd) access eNB 610. Forexample, the 1^(st) access eNB 600 may recognize that a 2^(nd) accessmodule of the UE 620 is in an activation state, and may transmit thedownlink data for the UE 620 to the 2^(nd) access eNB 610.

In operation 1203, the 1^(st) access eNB 600 measures a pre-set time bystarting a 1^(st) timer at a time when downlink data is transmitted. Ifdownlink data to be transmitted to the UE 620 via the 2^(nd) access eNB610 is additionally detected before the 1^(st) timer expires or before apre-set time elapses, returning to operation 1201, the 1^(st) access eNB600 transmits downlink data for the UE 620 to the 2^(nd) access eNB 610.In this case, the 1^(st) timer is reset at a time when the additionallydetected downlink data is transmitted, and thus the pre-set time ismeasured again.

Meanwhile, if downlink data for the UE 620 is received from the 1^(st)access eNB 600 in operation 1201, the 2^(nd) access eNB 610 starts anetwork timer in operation 1211 to measure a pre-set time. According tothe embodiment of the present disclosure, the network timer may be setbased on deactivation timer information received in advance from the1^(st) access eNB 600. The deactivation timer information may includeinformation for a set time of the 1^(st) timer of the 1^(st) access eNB.For another example, the network timer may be set based on informationpre-stored in the 2^(nd) access eNB. The set time of the network timermay be equal to or different from the set time of the 1^(st) timer. Theset time of the network timer may be set by considering a delivery delaybetween the 1^(st) access eNB 600 and the 2^(nd) access eNB 610. Ifdownlink data for the UE 620 is additionally received from the 1^(st)access eNB 600 before the network timer expires, the 2^(nd) access eNB610 measures again the pre-set time by resetting the network timer.

In operation 1213, the 2^(nd) access eNB 610 transmits the downlink datato the UE 620 via the 2^(nd) access link. In operation 1215, the 2^(nd)access eNB 610 measures a pre-set time by starting the 1^(st) timer at atime when downlink data is transmitted. According to the embodiment ofthe present disclosure, a UE timer may be set based on deactivationtimer information previously received from the 1^(st) access eNB 600.The deactivation timer information may include information regarding theset time of the Pt timer of the 1^(st) access eNB. For another example,the UE timer may be set based on information pre-stored in the 2^(nd)access eNB. The set time of the UE timer may be equal to or differentfrom the set time of the 1^(st) timer and/or the set time of the networktimer. The set time of the UE timer may be set by considering a deliverydelay between the 1^(st) access eNB 600 and the 2^(nd) access eNB 610and/or a delivery delay between the 2^(nd) access eNB 610 and the UE620. If downlink data for the UE 620 is additionally received from the1^(st) access eNB 600 before the UE timer expires, and if theadditionally received downlink data is additionally transmitted to theUE 602, the 2^(nd) access eNB 610 measures again the pre-set time byresetting the UE timer.

If downlink data is received through the 2^(nd) access link from the2^(nd) access eNB 610 in operation 1213, the UE 620 measures the pre-settime by starting a 2^(nd) timer in operation 1214. According to theembodiment of the present disclosure, the 2^(nd) timer may be set basedon the deactivation timer information previously received from the1^(st) access eNB 600. According to the embodiment of the presentdisclosure, the set time of the 2^(nd) timer may be equal to ordifferent from the time information of the deactivation timer. Further,according to the embodiment of the present disclosure, the set time ofthe 2^(nd) timer may be equal to or different from the set time of the1^(st) timer operated by the 1^(st) access eNB 600. Furthermore, the settime of the 2^(nd) timer may be equal to or different from the set timeof the UE timer operated by the 2^(nd) access eNB 610. The set time ofthe 2^(nd) timer may be set by considering a delivery delay between the1^(st) access eNB 600 and the 2^(nd) access eNB 610 and/or a deliverydelay between the 2^(nd) access eNB 610 and the UE 620. If downlink datais additionally received from the 2^(nd) access module via the 2^(nd)access link before the 2^(nd) timer expires, the UE 620 measures againthe pre-set time by resetting the 2^(nd) timer.

Meanwhile, in operation 1217, the 2^(nd) access eNB 610 may monitor astate of the UE timer and the network timer to detect a mismatchoccurrence. For example, if the network timer is in a running state(e.g., an ON state) and the UE timer is in an expiry state (e.g., an OFFstate), the 2^(nd) access eNB 610 may detect that the mismatch occursdue to the timer. In this case, the 2^(nd) access eNB 610 may recognizethat a state of the 2^(nd) access module of the UE 620 is a deactivationstate and that state information of the 2^(nd) access module managed bythe 1^(st) access eNB 600 indicates an activation state. For anotherexample, if the network timer is in the expiry state (e.g., the OFFstate) and the UE timer is in the running state (e.g., the ON state),the 2^(nd) access eNB may detect that the mismatch occurs due to thetimer. In this case, the 2^(nd) access eNB 610 may recognize that thestate of the 2^(nd) access module of the UE 620 is the activation state,and the state information of the 2^(nd) access module managed by the1^(st) access eNB 600 indicates a deactivation state.

In operation 1219, the 2^(nd) access eNB 610 transmits to the 1^(st)access eNB 600 a signal for requesting to control a state of the 2^(nd)access module of the UE 620. For example, the 2^(nd) access eNB 610 maytransmit the signal for requesting to control the state of the 2^(nd)access module based on the state information of the 1^(st) access eNB600. For example, if the state of the 2^(nd) access module of the UE 620is the deactivation state and the state information of the 2^(nd) accessmodule managed by the 1^(st) access eNB 600 indicates the activationstate, the 2^(nd) access eNB 610 may transmit a signal for requesting tochange the state of the 2^(nd) access module of the UE 620 from thedeactivation state to the activation state. For another example, if thestate of the 2^(nd) access module of the UE 620 is the activation stateand the state information of the 2^(nd) access module managed by the1^(st) access eNB 600 indicates the deactivation state, the 2^(nd)access eNB 610 may transmit the signal for requesting to change thestate of the 2^(nd) access module of the UE 620 from the activationstate to the deactivation state. In another embodiment of the presentdisclosure, the 2^(nd) access eNB 610 may transmit only informationindicating that the state of the 2^(nd) access module of the UE 620 isthe activation state. In another embodiment of the present disclosure,the 2^(nd) access eNB 610 may transmit only information indicating thatthe state of the 2^(nd) access module of the UE 620 is different fromthe state information of the 2^(nd) access module managed by the 1^(st)access eNB 600.

Based on the state control request signal for the 2^(nd) access moduleof the UE 620, in operation 1221, the 1^(st) access eNB 600 transmits asignal for instructing a state change of the 2^(nd) access module of theUE 620. The signal for instructing the state change of the 2^(nd) accessmodule may be a signal for instructing activation of the 2^(nd) accessmodule or a signal for instructing deactivation of the 2^(nd) accessmodule. The signal for instructing the state change of the 2^(nd) accessmodule may be transmitted by using any one of an RRC reconfigurationmessage, an MAC CE, and a PDCCH.

The UE 620 may receive the signal for instructing the state change ofthe 2^(nd) access module from the 1^(st) access eNB 600, and may changethe state of the 2^(nd) access module based on the received signal.Although not shown, the UE 620 may transmit a signal for indicating thatthe state of the 2^(nd) access module is changed to the 1^(st) accesseNB 600 via the 1^(st) access link, or may transmit it to the 2^(nd)access eNB 610 via the 2^(nd) access link.

Meanwhile, although not shown, after detecting that the mismatch occursdue to the timer, the 2^(nd) access eNB 610 may buffer downlink datafrom the 1^(st) access eNB 600 instead of transmitting it to the UE 620.Upon receiving a signal for indicating that the 2^(nd) access module ofthe UE 620 is activated from the UE 620 or from the 1^(st) access eNB600, the 2^(nd) access eNB 610 may start transmission of the buffereddownlink data. Further, when a specific time elapses from a time atwhich the state control of the 2^(nd) access module is requested to the1^(st) access eNB 600, the 2^(nd) access eNB 610 may start transmissionof the buffered downlink data.

In the embodiment of FIG. 12A described above, the 2^(nd) access eNB 610requests the 1^(st) access eNB 600 to change the state of the 2^(nd)access module of the UE 620. However, according to various embodimentsof the present disclosure, if the state of the 2^(nd) access module ofthe UE 620 is the activation state and the state information of the2^(nd) access module managed by the 1^(st) access eNB 600 indicates thedeactivation state, the 2^(nd) access eNB 610 may transmit a signal forrequesting to change the state of the 2^(nd) access module from theactivation state to the deactivation state to the UE 620 via the 2^(nd)access link. An operation for matching the state of the 2^(nd) accessmodule by the 2^(nd) access eNB based on a timer mismatch of the UE andthe 1^(st) access eNB is described above with reference to FIG. 12A.However, even if the state information of the 2^(nd) access module ismismatched due to a control signal delay, and the like, the 2^(nd)access eNB may transmit the signal for requesting to control the stateof the 2^(nd) access module to the 1^(st) access eNB 600 or the UE 620.

FIG. 12B illustrates a signal flow for controlling a state of a 2^(nd)access module of a UE according to an embodiment of the presentdisclosure.

Various embodiments for controlling a state of a 2^(nd) access moduleare shown in FIG. 12B when a state mismatch occurs in the 2^(nd) accessmodule of the UE. More particularly, as shown in FIG. 11B, if a state ofthe 2^(nd) access module of a UE 620 is ‘OFF’ and state information of a2^(nd) access module managed by a 1^(st) access eNB 600 is ‘ON’ amongvarious states, a situation may occur in which the UE 620 is unable toreceive downlink data due to a mismatch of the state information of the2^(nd) access module. Therefore, various embodiments for a method foraddressing this issue are described.

Referring to FIG. 12B, in operation 1230, a 2^(nd) access eNB 610 maydetect whether a state mismatch occurs in the 2^(nd) access module forthe UE 620. For example, the 2^(nd) access eNB 610 may detect that the2^(nd) access module of the UE 620 is in a deactivation state or the2^(nd) access module of the UE 620 managed by the 1^(st) access eNB 600is in an activation state. This may be detected by managing the timersdescribed with reference to FIG. 12A. When the state mismatch of the2^(nd) access module for the UE 620 occurs, in operation 1232, the2^(nd) access eNB 610 may transmit a signal for instructing deactivationof the 2^(nd) access module to the 1^(st) access eNB 600. Accordingly,the 1^(st) access eNB 600 may recognize that the 2^(nd) access module ofthe UE 620 is in the deactivation state, and may manage the stateinformation of the 2^(nd) access module of the UE 620 as thedeactivation state.

For another option, when the state mismatch occurs in the 2^(nd) accessmodule for the UE 620, in operation 1234, the UE 620 may transmit to the1^(st) access eNB 600 a signal for indicating that the state of the2^(nd) access module is the deactivation state. Of course, in this case,the UE 620 cannot recognize that the occurrence of the state mismatch ofthe 2^(nd) access module for the UE 620 is detected by the 2^(nd) accesseNB 610. Therefore, the UE 620 must periodically transmit to the 1^(st)access eNB 600 the signal for indicating that the state of the 2^(nd)access module is the deactivation state, or must transmit to the 1^(st)access eNB 600 the signal for indicating that the state of the 2^(nd)access module is the deactivation state whenever the state of the 2^(nd)access module is deactivated. Accordingly, the 1^(st) access eNB 600 mayrecognize that the 2^(nd) access module of the UE 620 is in thedeactivation state, and may manage the state information of the 2^(nd)access module of the UE 620 as the deactivation state.

Upon recognizing that the 2^(nd) access module of the UE 620 is in thedeactivation state through operation 1232 or 1234, the 1^(st) access eNB600 may detect a presence of downlink data for the UE 620 via the 2^(nd)access eNB 610. In this case, the 1^(st) access eNB 600 may transmit asignal for requesting to activate the 2^(nd) access module to the UE 620in operation 1236. As described above, the signal for requesting toactivate the 2^(nd) access module may include beacon option informationfor indicating whether a short beacon is transmitted and uplink resourceallocation information for transmission of an activation responsesignal.

Accordingly, the 2^(nd) access module of the UE 620 is activated inoperation 1238, and 2^(nd) access module state information of the UE620, which is stored in the 1^(st) access eNB 600 and the 2^(nd) accesseNB 610, may be matched as an activation state in operations 1242 and1240, respectively.

Referring to FIG. 12B described above, in case of using a method inwhich the 2^(nd) access eNB 610 detects a state mismatch as to the2^(nd) access module of the UE 620 by using a timer and transmits asignal for controlling the state mismatch to the 1^(st) access eNB 600,a latency may occur to some extents due to an X2 interface between the2^(nd) access eNB 610 and the 1^(st) access eNB. However, this methodhas an advantage in that a system load is small since the 2^(nd) accesseNB 610 transmits the signal for controlling the state mismatch to the1^(st) access eNB only when the state mismatch occurs.

Meanwhile, in FIG. 12B described above, in case of using a method inwhich the UE 620 transmits the signal for controlling the state mismatchto the 2^(nd) access eNB 610, there is an advantage in that a latency isvery short since the 1^(st) access link is used. However, in thismethod, a system load may be increased since the UE 620 transmits thesignal for controlling the state mismatch to the 1^(st) access eNBeither periodically or whenever the state of the 2^(nd) access modulechanges.

Referring to FIGS. 12A and 12B described above, an operation formatching the state of the 2^(nd) access module has been described basedon the state mismatch for the 2^(nd) access module of the UE. However,according to another embodiment of the present disclosure, instead oftransmitting the signal for requesting to control the state of the2^(nd) access module, the 2^(nd) access eNB 610 may not transmitdownlink data but buffer it until the state of the 2^(nd) access moduleof the UE 620 is matched to the state information of the 2^(nd) accessmodule managed by the 1^(st) access eNB 600. For example, if the 1^(st)access eNB 600 transmits a signal for instructing activation of the2^(nd) access module to the UE 620 to activate the 2^(nd) access module,a transmission delay may occur in the signal for instructing activationof the 2^(nd) access module. Accordingly, although the state informationof the 2^(nd) access module managed by the 1^(st) access eNB 600 is anactivation state, the 2^(nd) access module of the UE 620 may be actuallyin a deactivation state. In this case, the 2^(nd) access eNB 610 maytransmit downlink data to the UE 620 after buffering the downlink datafor a specific period of time based on an expected time at which the2^(nd) access module is activated.

For another example, when it is expected that the 2^(nd) access moduleof the UE 620 is changed to the deactivation state within a specificperiod of time in a state where downlink data to be transmitted to theUE 620 is buffered, the 2^(nd) access eNB 610 may explicitly transmit asignal for prohibiting deactivation of the 2^(nd) access module to theUE 620.

FIG. 12C illustrates a signal flow for prohibiting deactivation of a UEby a 2^(nd) access eNB according to an embodiment of the presentdisclosure.

Referring to FIG. 12C, in operation 1251, a 1^(st) access eNB 600transmits downlink data for a UE 620 to a 2^(nd) access eNB 610. Forexample, the 1^(st) access eNB 600 may recognize that a 2^(nd) accessmodule of the UE 620 is in an activation state, and may transmit thedownlink data for the UE 620 to the 2^(nd) access eNB 610.

In operation 1253, the 1^(st) access eNB 600 measures a pre-set time bystarting a 1^(st) timer at a time when downlink data is transmitted. Ifdownlink data to be transmitted to the UE 620 via the 2^(nd) access eNB610 is additionally detected before the 1^(st) timer expires or before apre-set time elapses, returning to operation 1251, the 1^(st) access eNB600 transmits downlink data for the UE 620 to the 2^(nd) access eNB 610.In this case, the 1^(st) timer is reset at a time when the additionallydetected downlink data is transmitted, and thus the pre-set time ismeasured again.

Meanwhile, if downlink data for the UE 620 is received from the 1^(st)access eNB 600 in operation 1251, the 2^(nd) access eNB 610 starts anetwork timer in operation 1255 to measure a pre-set time. According tothe embodiment of the present disclosure, the network timer may be setbased on deactivation timer information received in advance from the1^(st) access eNB 600. The deactivation timer information may includeinformation for a set time of the 1^(st) timer of the 1^(st) access eNB.For another example, the network timer may be set based on informationpre-stored in the 2^(nd) access eNB. The set time of the network timermay be equal to or different from the set time of the 1^(st) timer. Theset time of the network timer may be set by considering a delivery delaybetween the 1^(st) access eNB 600 and the 2^(nd) access eNB 610. Ifdownlink data for the UE 620 is additionally received from the 1^(st)access eNB 600 before the network timer expires, the 2^(nd) access eNB610 measures again the pre-set time by resetting the network timer.

In operation 1257, the 2^(nd) access eNB 610 transmits the downlink datato the UE 620 via the 2^(nd) access link. In operation 1259, the 2^(nd)access eNB 610 measures a pre-set time by starting the 1^(st) timer at atime when downlink data is transmitted. According to the embodiment ofthe present disclosure, a UE timer may be set based on deactivationtimer information previously received from the 1^(st) access eNB 600.The deactivation timer information may include information regarding theset time of the 1^(st) timer of the 1^(st) access eNB. For anotherexample, the UE timer may be set based on information pre-stored in the2^(nd) access eNB. The set time of the UE timer may be equal to ordifferent from the set time of the 1^(st) timer and/or the set time ofthe network timer. The set time of the UE timer may be set by cinderinga delivery delay between the 1^(st) access eNB 600 and the 2^(nd) accesseNB 610 and/or a delivery delay between the 2^(nd) access eNB 610 andthe UE 620. If downlink data for the UE 620 is additionally receivedfrom the 1^(st) access eNB 600 before the UE timer expires, and if theadditionally received downlink data is additionally transmitted to theUE 602, the 2^(nd) access eNB 610 measures again the pre-set time byresetting the UE timer.

If downlink data is received through the 2^(nd) access link from the2^(nd) access eNB 610 in operation 1257, the UE 620 measures the pre-settime by starting a 2^(nd) timer in operation 1261. According to theembodiment of the present disclosure, the 2^(nd) timer may be set basedon the deactivation timer information previously received from the1^(st) access eNB 600. According to the embodiment of the presentdisclosure, the set time of the 2^(nd) timer may be equal to ordifferent from the time information of the deactivation timer. Further,according to the embodiment of the present disclosure, the set time ofthe 2^(nd) timer may be equal to or different from the set time of the1^(st) timer operated by the 1^(st) access eNB 600. Furthermore, the settime of the 2^(nd) timer may be equal to or different from the set timeof the UE timer operated by the 2^(nd) access eNB 610. The set time ofthe 2^(nd) timer may be set by considering a delivery delay between the1^(st) access eNB 600 and the 2^(nd) access eNB 610 and/or a deliverydelay between the 2^(nd) access eNB 610 and the UE 620. If downlink datais additionally received from the 2^(nd) access module via the 2^(nd)access link before the 2^(nd) timer expires, the UE 620 measures againthe pre-set time by resetting the 2^(nd) timer.

Meanwhile, in operation 1263, the 2^(nd) access eNB 610 detects whetherthe UE timer will expire within a specific time. For example, the 2^(nd)access eNB 610 detects whether the UE timer will expire within thespecific time in a state where the downlink data for the UE 620 is nottransmitted to the UE 620 but is buffered. If it is determined that theUE timer will expire within the specific time, in operation 1265, the2^(nd) access eNB 610 may transmit the signal for prohibitingdeactivation of the 2^(nd) access module to the UE 620. In this case,the signal for prohibiting deactivation of the 2^(nd) access module mayinclude information regarding a time of prohibiting deactivation of the2^(nd) access module. Therefore, during the time of prohibitingdeactivation of the 2^(nd) access module, the UE 620 may not deactivatethe 2^(nd) access module but may receive downlink data from the 2^(nd)access eNB 610 via the 2^(nd) access module. The signal for prohibitingdeactivation of the 2^(nd) access module may be a signal for requestingto keep the activation state of the 2^(nd) access module.

According to the embodiment of the present disclosure, instead oftransmitting the signal for prohibiting deactivation of the 2^(nd)access module, the 2^(nd) access eNB 610 may increase a priority fordownlink data transmission of the UE 620. For example, if there isdownlink data for a plurality of UEs, the 2^(nd) access eNB 610 maytransmit downlink data for the UE 620 expected to be deactivated withina specific time by preferentially scheduling it.

FIG. 12D illustrates a cause of a state mismatch occurrence on a 2^(nd)access module of a UE and a method of correcting the state mismatchaccording to an embodiment of the present disclosure.

Referring to FIG. 12D, a state mismatch for the 2^(nd) access module ofthe UE 620 may occur due to a channel access delay of an unlicensedband. For example, since a channel occupation for transmitting downlinkdata to the UE 620 is delayed in the 2^(nd) access eNB 610 which usesthe unlicensed band, the state mismatch may occur for the 2^(nd) accessmodule of the UE. In this case, the state for the 2^(nd) access moduleof the UE may be matched by the 2^(nd) access eNB 610 by using themethod described above with reference to FIGS. 12A and 12B.

Further, the state mismatch for the 2^(nd) access module of the UE 620may occur when control signal transmission is delayed due to aninterface between the 2^(nd) access eNB 610 and the 1^(st) access eNB600. In this case, the state for the 2^(nd) access module of the UE maybe matched by the 2^(nd) access eNB 610 by using a method of bufferingdownlink data.

Further, the state mismatch for the 2^(nd) access module of the UE 620may occur when downlink data using the 2^(nd) access module is generatedin the UE 620 and thus the 2^(nd) access module is activated. In thiscase, the state for the 2^(nd) access module may be matched by the UE620 by using a method of transmitting a signal for indicating activationof the 2^(nd) access module to the 1^(st) access eNB.

Further, the state mismatch for the 2^(nd) access module of the UE 620may occur due to a clock draft of the UE 620 and the 1^(st) access eNB600. In this case, the state for the 2^(nd) access module of the UE maybe matched by using a method of applying an activation margin to a timeof a timer managed in the UE 620, the 1^(st) access eNB 600, and/or the2^(nd) access eNB 610.

In addition, in the embodiment of the present disclosure, upon detectingthat the 2^(nd) access module needs to be changed from the activationstate to the deactivation state, the UE 620 may use a WLAN 802.11 MACheader to indicate that the 2^(nd) access module will operate by beingchanged to the deactivation state.

FIG. 13 illustrates a media access control (MAC) header for indicating astate of a 2^(nd) access module by a UE according to an embodiment ofthe present disclosure.

Referring to FIG. 13, the UE 620 may set values of a Power Mgmt 1300 andMore Data 1301 in a frame control field of the WLAN 802.11 MAC headerrespectively to 1 and 1, and may transmit the values to the 2^(nd)access eNB 610. According to a WLAN 802.11 standard, ‘Power Mgmt=0’indicates an activation mode, ‘Power Mgmt=1’ indicates a PSM mode, andthe More Data 1301 is in a state of not being defined for a specificusage. Therefore, in the present disclosure, it may be set to ‘PowerMgmt=1, More Data=1’ to indicate that the 2^(nd) access module of the UE620 will operate by being changing to the inactive module. The 2^(nd)access eNB 610 may analyze the Power Mgmt 1300 and More Data 1301included in the WLAN 802.11 MAC header received from accessed UEs, andthus may determine whether all of the accessed UEs indicate the changeto the deactivation state of the 2^(nd) access module. If all of theaccessed UEs indicate the change to the deactivation state of the 2^(nd)access module, the 2^(nd) access eNB 610 may not perform an operation ofperiodically transmitting a beacon signal. In this case, the 2^(nd)access eNB 610 may perform the operation of transmitting the beaconsignal under the control of the 1^(st) access eNB. For example, uponreceiving downlink data to be transmitted to the UE 620 from the 1^(st)access eNB, the 2^(nd) access eNB 610 may detect that it is required toresume the operation of periodically transmitting the beacon signal, andmay periodically transmit the beacon signal.

The aforementioned embodiments of the present disclosure have beendescribed under the assumption that the 1^(st) access eNB receivesdownlink data for a 2^(nd) access system of the UE 620 from a highernetwork node, and transmits the received downlink data to the 2^(nd)access system. However, according to an embodiment of the presentdisclosure, the 2^(nd) access eNB may receive the downlink data for the2^(nd) access system of the UE 620 from the higher network node and maytransmit it to the UE 620. In this case, the 2^(nd) access eNB 610 maytransmit a signal for indicating a presence/absence of downlink data tobe transmitted to the UE 620 or a signal for requesting to control theactivation state for the 2^(nd) access module of the UE 620, so that the1^(st) access eNB can control the activation state of the 2^(nd) accessmodule of the UE 620.

Further, the aforementioned embodiments of the present disclosure mayalso be equally applied to a case where downlink data is delivered to a2^(nd) access eNB to distribute a load caused by downlink data to betransmitted to a UE by a 1^(st) access eNB via a link of a 1^(st) accesssystem.

FIGS. 14A and 14B illustrate a procedure of operating a 1^(st) accesseNB according to an embodiment of the present disclosure.

Referring to FIGS. 14A and 14B, in operation 1401, the 1^(st) access eNB600 detects traffic to be transmitted to the UE 620 via a 2^(nd) accesseNB. According to the embodiment of the present disclosure, the 1^(st)access eNB 600 may detect traffic to be transmitted to the UE 620 viathe 2^(nd) access eNB from a higher network node. According to anotherembodiment of the present disclosure, the 1^(st) access eNB 600 mayreceive a downlink traffic generation report signal from the 2^(nd)access eNB 610, and thus may detect a presence of the traffic to betransmitted to the UE 620 via the 2^(nd) access eNB. According toanother embodiment of the present disclosure, to distribute a load for a1^(st) access link, the 1^(st) access eNB 600 may determine to transmitto the 2^(nd) access eNB 610 downlink data to be transmitted to the UE620, and may detect the generation of the traffic to be transmitted tothe UE 620 via the 2^(nd) access eNB.

In operation 1403, the 1^(st) access eNB 600 identifies stateinformation of the 2^(nd) access module of the UE 620. If the stateinformation of the 2^(nd) access module of the UE 620, which is storedin the 1^(st) access eNB 600, indicates an activation state, the 1^(st)access eNB 600 directly proceeds to operation 1411.

On the other hand, if the state information of the 2^(nd) access moduleof the UE 620, which is stored in the 1^(st) access eNB 600, indicates adeactivation state, in operation 1405, the 1^(st) access eNB 600transmits a signal for instructing activation of the 2^(nd) accessmodule to the UE via the 1^(st) access link. The signal for instructingactivation of the 2^(nd) access module may be transmitted by using anyone of an RRC reconfiguration message, a MAC CE, and a PDCCH based onhow quickly the 2^(nd) access module of the UE 620 must be activated.Further, the signal for instructing activation of the 2^(nd) accessmodule may include information for indicating whether the 2^(nd) accesseNB 610 transmits a short beacon.

In operation 1407, the 1^(st) access eNB 600 stores the stateinformation of the 2^(nd) access module of the UE 620 by changing fromthe deactivation state to the activation state.

Thereafter, in operation 1409, the 1^(st) access eNB 600 instructs the2^(nd) access eNB 610 to transmit a short beacon. According to theembodiment of the present disclosure, operation 1409 may be skipped.

In operation 1410, the 1^(st) access eNB 600 examines whether a signalfor changing the 2^(nd) access eNB is received. For example, the 1^(st)access eNB 600 may receive from the UE 620 a signal includinginformation for indicating whether there is a need to change the 2^(nd)access eNB. If the signal for changing the 2^(nd) access eNB is notreceived, the 1^(st) access eNB 600 proceeds to operation 1411. Forexample, if the 1^(st) access eNB 600 receives a signal for indicatingthat there is no need to change the 2^(nd) access eNB, the 1^(st) accesseNB 600 may proceed to operation 1411.

Meanwhile, if the signal for changing the 2^(nd) access eNB is received,in operation 1423, the 1^(st) access eNB 600 instructs a neighboring2^(nd) access eNB to transmit a short beacon signal. Herein, the signalfor instructing transmission of the short beacon signal may betransmitted to the 2^(nd) access eNB to which the UE 620 has accessand/or at least one different 2^(nd) access eNB neighboring to the2^(nd) access eNB. The 1^(st) access eNB 600 may select at least one2^(nd) access eNB based on a pre-registered 2^(nd) access eNB list, andmay transmit the signal for instructing transmission of the short beaconsignal to the selected as least one 2^(nd) access eNB. The 2^(nd) accesseNB list may include location information of each of 2^(nd) access eNBsand/or information of a 2^(nd) access eNB neighboring to each of the2^(nd) access eNBs. Further, the 1^(st) access eNB 600 may select atleast one 2^(nd) access eNB based on a location of the UE 620.

Thereafter, the 1^(st) access eNB 600 receives information regarding a2^(nd) access eNB to which the UE 620 will be handed over in operation1425, and performs a handover process on the 2^(nd) access eNB 610 ofthe UE 620 in operation 1427. Thereafter, the 1^(st) access eNB 600 mayproceed to operation 1411. According to the embodiment of the presentdisclosure, operations 1410, 1426, 1425, and 1427 may be skipped.Further, operations 1410, 1426, 1425, and 1427 are not necessarilyperformed after operation 1409, but may be performed during the UE 620receives downlink data from the 2^(nd) access eNB 610.

The 1^(st) access eNB 600 transmits downlink traffic to the 2^(nd)access eNB 610 in operation 1411, and starts an operation of a 1^(st)timer in operation 1413. If downlink data of the UE 620 is additionallydetected via the 2^(nd) access eNB 610 during the 1^(st) timer isrunning, the 1^(st) access eNB 600 may transmit the additionallydetected downlink traffic to the 2^(nd) access eNB 610, and may resetthe 1^(st) timer.

Thereafter, proceeding to operation 1415, the 1^(st) access eNB 600examines whether the timer expires. For example, when the downlink dataof the UE 620 is not additionally detected via the 2^(nd) access eNB 610during the 1^(st) timer is running, it is examined whether the 1^(st)timer expires by measuring a pre-set time.

If the 1^(st) timer does not expire, in operation 1417, the 1^(st)access eNB 600 examines whether a signal for requesting to control astate of the 2^(nd) access module of the UE 620 is received from the2^(nd) access eNB 610. If the signal for requesting to control the stateof the 2^(nd) access module is not received, in operation 1421, the1^(st) access eNB 600 examines whether downlink traffic to betransmitted to the UE 620 is additionally detected via the 2^(nd) accesseNB 610. If the downlink traffic to be transmitted to the UE 620 isadditionally detected via the 2^(nd) access eNB 610, returning tooperation 1411, the 1^(st) access eNB 600 transmits the additionallydetected downlink data to the 2^(nd) access eNB 610, and starts theoperation of the 1^(st) timer in operation 1413. For example, the 1^(st)access eNB 600 resets the 1^(st) timer. On the other hand, if thedownlink traffic to be transmitted to the UE 620 is not additionallydetected via the 2^(nd) access eNB 610, returning to 1413, the 1^(st)access eNB 600 re-examines whether the 1^(st) timer expires.

Meanwhile, if an examination result of operation 1417 shows that thesignal for requesting to control the 2^(nd) access module state of theUE 620 is received, in operation 1419, the 1^(st) access eNB 600transmits the signal for instructing activation of the 2^(nd) accessmodule of the UE 620 to the UE 620 via the 1^(st) access link. Forexample, if the state information stored in the 1^(st) access eNB 600and regarding the 2^(nd) access module of the UE 620 is not matched tothe actual state of the 2^(nd) access module of the UE 620, the 1^(st)access eNB 600 may receive the signal for requesting to control thestate of the 2^(nd) access module from the 2^(nd) access eNB 610.According to the embodiment of the present disclosure, the signal forinstructing activation of the 2^(nd) access module may includeinformation for indicating whether a short beacon of the 2^(nd) accesseNB 610 is transmitted.

If the 1^(st) timer expires, in operation 1423, the 1^(st) access eNB600 may transmit a signal for instructing deactivation of the 2^(nd)access module to the UE 620 via the 1^(st) access link. The signal forinstructing deactivation of the 2^(nd) access module may be a proberequest signal. The signal for instructing deactivation of the 2^(nd)access module may include a sequence number of a last downlink packettransmitted by the 1^(st) access eNB 600 to the 2^(nd) access eNB 610.According to various embodiments of the present disclosure, if the1^(st) access eNB 600 transmits timer information for deactivation tothe UE 620 during an initial setup process with respect to the UE 620 orif the UE 620 has timer information pre-stored therein for deactivation,the 1^(st) access eNB 600 may not perform operations 1423 and/or 1425but may directly proceed to operation 1427.

In operation 1425, the 1^(st) access eNB 600 may receive a signal forindicating that the 2^(nd) access module is deactivated from the UE 620via the 1^(st) access link. The signal for indicating that the 2^(nd)access module is deactivated may be a probe response signal. Accordingto the embodiment of the present disclosure, a process in which the1^(st) access eNB 600 receives the signal for indicating that the 2^(nd)access link is deactivated may be skipped. In this case, the 1^(st)access eNB 600 may determine whether the UE 620 has received a lastpacket based on an ARQ response signal received from the UE 620.

The 1^(st) access eNB 600 stores state information of the 2^(nd) accessmodule of the UE 620 by changing to a deactivation state in operation1427, and then ends the procedure according to the embodiment of thepresent disclosure.

FIG. 15 illustrates a procedure of operating a 2^(nd) access eNBaccording to an embodiment of the present disclosure.

Referring to FIG. 15, in operation 1501, the 2^(nd) access eNB 610examines whether a short beacon delivery instruction is received. If theshort beacon delivery instruction is not received, the 2^(nd) access eNB610 directly proceeds to operation 1505.

In operation 1503, the 2^(nd) access eNB 610 transmits a short beacon tothe UE 620. The short beacon may be configured by including only somepieces of information among a plurality of pieces of informationincluded in a well-known beacon signal. Further, as shown in FIG. 8B, ashort beacon 852 is not transmitted at a time of transmitting theperiodically repeated beacon 850 but is transmitted at a time pointbetween beacon transmission periods. This is for allowing the UE 620 toactivate the 2^(nd) access module, thereafter to receive the shortbeacon 852 instead of waiting until a next beacon reception duration,and thereafter to immediately receive downlink data. According to theembodiment of the present disclosure, the 2^(nd) access eNB 610 may skipoperations 1501 and 1503.

In operation 1505, the 2^(nd) access eNB 610 transmits downlink datareceived from the 1^(st) access eNB, to the UE 620 via the 2^(nd) accesslink. Thereafter, in operation 1507, the 2^(nd) access eNB 610determines whether a state mismatch of the 2^(nd) access module isdetected according to a 1^(st) timer and a 2^(nd) timer. Herein, the1^(st) timer starts an operation at a time when the 2^(nd) access eNB610 receives downlink data from the 1^(st) access eNB 600. Further, the2^(nd) timer starts an operation at a time when the 2^(nd) access eNB610 transmits downlink data to the UE 620. For example, the 1^(st) timerand the 2^(nd) timer may be respectively the aforementioned networktimer or UE timer of FIGS. 12A, 12B, 12C, and 12D. If the 1^(st) timeris in a running state (e.g., an ON state) and the 2^(nd) timer is in anexpiry state (e.g., an OFF state), the 2^(nd) access eNB 610 maydetermine that a state mismatch of the 2^(nd) access module is detected.In this case, the 2^(nd) access eNB 610 may recognize that a state ofthe 2^(nd) access module of the UE 620 is a deactivation state and thatstate information of the 2^(nd) access module managed by the 1^(st)access eNB 600 indicates an activation state.

Upon detecting the state mismatch of the 2^(nd) access module accordingto the 1^(st) timer and the 2^(nd) timer, in operation 1509, the 2^(nd)access eNB 610 transmits to the 1^(st) access eNB 600 a signal forrequesting to control the state of the 2^(nd) access module of the UE620. For example, if the state of the 2^(nd) access module of the UE 620is the deactivation state and the state information of the 2^(nd) accessmodule managed by the 1^(st) access eNB 600 indicates the activationstate, the 2^(nd) access eNB 610 may transmit a signal for requesting tochange the state of the 2^(nd) access module of the UE 620 from thedeactivation state to the activation state. Thereafter, returning tooperation 1505, the 2^(nd) access eNB 610 repeats the subsequentoperations. If the state of the 2^(nd) access module of the UE 620 isthe deactivation state and the state information of the 2^(nd) accessmodule managed by the 1^(st) access eNB 600 indicates the activationstate, the 2^(nd) access eNB 610 may not transmit downlink data to theUE 620 and may buffer the downlink data, until the state of the 2^(nd)access module is changed to the activation state.

On the other hand, if the state mismatch of the 2^(nd) access module isnot detected according to the 1^(st) timer and the 2^(nd) timer, inoperation 1511, the 2^(nd) access eNB 610 determines whether a lastdownlink packet is transmitted. For example, if additional downlink datais not received until the 1^(st) timer expires, the 2^(nd) access eNB610 determines that the last downlink data is received, and examineswhether the downlink data is transmitted to the UE 620. For anotherexample, if the additional downlink data is detected before the 1^(st)timer expires, the 2^(nd) access eNB 610 may determine that the lastdownlink traffic is not transmitted.

If it is determined that the last downlink traffic is not transmitted,in operation 1513, the 2^(nd) access eNB 610 determines whether the2^(nd) timer for determining a time at which the 2^(nd) access modulefor the UE 620 is deactivated is close to an expiry time. For example,the 2^(nd) access eNB 610 may determine whether the 2^(nd) timer expireswithin a threshold time. If it is determined that the 2^(nd) timerexpires within the threshold time, the 2^(nd) access eNB 610 determinesthat the 2^(nd) access module of the UE 620 is deactivated within thethreshold time, and proceeding to operation 1515, transmits a signal forprohibiting deactivation of the 2^(nd) access module to the UE 620.

For example, the 2^(nd) access eNB 610 may transmit the signal forprohibiting deactivation of the 2^(nd) access module to the UE 620 sothat the 2^(nd) access module of the UE 620 is kept in an activationstate. In this case, the signal for prohibiting deactivation of the2^(nd) access module may include information regarding a time ofprohibiting deactivation. According to the embodiment of the presentdisclosure, instead of transmitting the signal for prohibitingdeactivation of the 2^(nd) access module in operation 1515, the 2^(nd)access eNB 610 may increase a priority for downlink data transmission ofthe UE 620. For example, if there is downlink data for a plurality ofUEs, the 2^(nd) access eNB 610 may transmit downlink data for the UE 620expected to be deactivated within a specific time by preferentiallyscheduling it.

If it is determined that the 2^(nd) timer does not expire within thethreshold time, returning to operation 1505, the 2^(nd) access eNB 610repeats the subsequent operations, and otherwise if it is determinedthat last downlink traffic is transmitted, ends the procedure accordingto the embodiment of the present disclosure.

FIGS. 16A and 16B illustrate a procedure of operating a UE according toan embodiment of the present disclosure.

Referring to FIGS. 16A and 16B, in operation 1601, the UE 620 receives asignal for instructing activation of a 2^(nd) access module via a 1^(st)access module. For example, the UE 620 may receive the 2^(nd) accessmodule activation instruction signal transmitted via a 1^(st) accesslink from the 1^(st) access eNB 600 by using the 1^(st) access module.In this case, the 2^(nd) access module of the UE 620 may be in adeactivation state.

In operation 1603, the UE 620 may activate the 2^(nd) access module. Forexample, the UE 620 may control the 2^(nd) access module 1920 operatingin the deactivation state to operate in the activation state.

In operation 1605, the UE 620 examines whether a short beacon signal isreceived from the 2^(nd) access eNB 610. If the short beacon signal isreceived, the UE 620 may acquire information required to receivedownlink data from the short beacon signal in operation 1607, and mayproceed to operation 1613. According to various embodiments of thepresent disclosure, operations 1605 and 1607 may be skipped.

On the other hand, if the short beacon signal is not received, inoperation 1621, the UE 620 may transmit to the 1^(st) access eNB asignal for changing the 2^(nd) access eNB. For example, if the shortbeacon signal is not received within a short beacon reception time froma time of activating the 2^(nd) access module, the UE 620 may determinethat it is difficult to receive a signal of the 2^(nd) access eNB, andthus may transmit to the 1^(st) access eNB a signal for indicating thatthere is a need to change the 2^(nd) eNB.

Thereafter, in operation 1623, the UE 620 examines whether the shortbeacon signal is received from at least one 2^(nd) access eNB. If theshort beacon signal is not received from the at least one 2^(nd) accesseNB, the UE 620 proceeds to operation 1609.

Otherwise, upon receiving the short beacon signal from the at least one2^(nd) access eNB, proceeding to operation 1625, the UE 620 determines a2^(nd) access eNB as a handover target based on the received shortbeacon signal, and in operation 1627, transmits information regardingthe 2^(nd) access eNB as the handover target to the Pt access eNB 600.Thereafter, in operation 1629, the UE 620 performs a handover process onthe 2^(nd) access eNB, and proceeds to operation 1613.

Meanwhile, in operation 1609, the UE 620 detects whether a periodicallytransmitted beacon is received from the 2^(nd) access eNB. If the beaconis not received from the 2^(nd) access eNB 610, the UE 620 returns tooperation 1605.

Otherwise, if the beacon is received from the 2^(nd) access eNB 610, inoperation 1611, the UE 620 acquires information required to receivedownlink data included in the received beacon.

In operation 1613, the UE 620 receives downlink data from the 2^(nd)access eNB 610 via the 2^(nd) access module.

In operation 1615, the UE 620 detects that the 2^(nd) access moduleneeds to be changed to a deactivation state by using the 2^(nd) timer orthe 2^(nd) access module deactivation instruction signal received viathe 1^(st) access link. For example, the UE 620 may receive the signalfor instructing deactivation of the 2^(nd) access module via the Ptaccess link from the 1^(st) access eNB 600. The signal for instructingdeactivation of the 2^(nd) access module may be a probe request signal.Further, the signal for instructing deactivation of the 2^(nd) accessmodule may include a sequence number of a last downlink packet. Forexample, the UE 620 may deactivate the 2^(nd) access module immediatelyafter the 2^(nd) access module deactivation instruction signal isreceived. For another example, the UE 620 may acquire the sequencenumber of the last downlink packet from the 2^(nd) access moduledeactivation instruction signal, and may deactivate the 2^(nd) accessmodule after detecting that up to the last packet is received based onthe acquired sequence number for the last packet. For another example,the UE 620 may detect that the 2^(nd) access module needs to be changedto the deactivation state based on the 2^(nd) timer which measures apre-set time at a time when downlink data is received via the 2^(nd)access link from the 2^(nd) access eNB 610. For example, the UE 620 maydetermine that the 2^(nd) access module needs to be changed to thedeactivation state if the downlink data is not additionally receiveduntil the pre-set time measured by the 2^(nd) timer expires. Herein, the2^(nd) timer may be set to the same manner as the 2^(nd) timer of FIGS.10A and 10B.

Upon detecting that the 2^(nd) access module needs to be changed to thedeactivation state, in operation 1617, the UE 620 may deactivate the2^(nd) access module. For example, the UE 620 may perform at least oneof the aforementioned operations 1 to 3. According to the embodiment ofthe present disclosure, before changing the 2^(nd) access module to thedeactivation state, as shown in FIG. 13, the UE 620 may set values ofthe Power Mgmt 1300 and More Data 1301 in the frame control field in theWLAN 802.11 MAC header to 1 and 1 respectively, and may transmit thevalues to the 2^(nd) access eNB 610.

In operation 1619, the UE 620 may transmit a signal for indicating thatthe 2^(nd) access module is deactivated to the 1^(st) access eNB 600 viathe 1^(st) access link. According to the embodiment of the presentdisclosure, the UE 620 may indicate that the 2^(nd) access module isdeactivated to the 1^(st) access eNB 600 by using a probe responsesignal. According to another embodiment of the present disclosure, theUE 620 may indicate that the 2^(nd) access module is deactivated byusing a PDCP feedback signal for indicating a sequence number of areceived last packet. According to another embodiment of the presentdisclosure, the UE 620 may not transmit the signal for indicating thatthe 2^(nd) access module is deactivated.

Thereafter, the UE 620 ends the procedure according to the embodiment ofthe present disclosure.

FIG. 17 illustrates a block diagram of a 1^(st) access eNB according toan embodiment of the present disclosure.

Referring to FIG. 17, the 1^(st) access eNB 600 may include a controller1700, a communication module 1710, and a storage unit 1720.

The controller 1700 may control and process an overall operation of the1^(st) access eNB 600. For example, the controller 1700 controls andprocesses a function for providing a communication service for a 1^(st)access system to the UE 620, and controls and processes a function foreffectively managing communication for a 2^(nd) access system of the UE620. For example, the controller 1700 may include a UE state controller1730 for controlling a state of a 2^(nd) access module.

The controller 1700 detects traffic to be transmitted to the UE 620 viathe 2^(nd) access eNB. According to the embodiment of the presentdisclosure, the controller 1700 may detect traffic to be transmitted tothe UE 620 via the 2^(nd) access eNB from a higher network node.According to another embodiment of the present disclosure, thecontroller 1700 may receive a downlink traffic generation report signalfrom the 2^(nd) access eNB 610, and thus may detect a presence of thetraffic to be transmitted to the UE 620 via the 2^(nd) access eNB.According to another embodiment of the present disclosure, to distributea load for a 1^(st) access link, the controller 1700 may determine totransmit to the 2^(nd) access eNB 610 downlink data to be transmitted tothe UE 620, and may detect the generation of the traffic to betransmitted to the UE 620 via the 2^(nd) access eNB.

Further, the controller 1700 stores and manages state information of the2^(nd) access module of the UE 620. If the state information of the2^(nd) access module of the UE 620, which is stored in the storage unit1720, indicates an activation state, the controller 1700 may identifythat it is a state in which the UE 620 can receive downlink data via the2^(nd) access module, and may perform a function for transmitting thedownlink data to the 2^(nd) access eNB 610.

If the state information of the 2^(nd) access module of the UE 620,which is stored in the storage unit 1720, indicates the deactivationstate, the controller 1700 may perform a function for transmitting asignal for instructing activation of the 2^(nd) access module to the UE620 via the 1^(st) access link. The signal for instructing activation ofthe 2^(nd) access module may be transmitted by using any one of an RRCreconfiguration message, a MAC CE, and a PDCCH based on how quickly the2^(nd) access module of the UE 620 must be activated. The signal forinstructing activation of the 2^(nd) access module may includeinformation for indicating whether the 2^(nd) access eNB 610 transmits ashort beacon.

After transmitting the signal for instructing activation of the 2^(nd)access module to the UE 620 via the 1^(st) access link, the controller1700 may store the state information of the 2^(nd) access module of theUE 620 by changing from the deactivation state to the activation state.

According to the embodiment of the present disclosure, the controller1700 may instruct to transmit the short beacon to the 2^(nd) access eNB610. The short beacon may be configured by including only some pieces ofinformation among a plurality of pieces of information included in awell-known beacon signal.

Further, according to the embodiment of the present disclosure, thecontroller 1700 may receive from the UE 620 a signal for indicating thatthere is a need to change the 2^(nd) access eNB. In this case, thecontroller 1700 may select at least one 2^(nd) access eNB, and mayinstruct to transmit the short beacon to the selected 2^(nd) access eNB.The selected 2^(nd) access eNB may include a 2^(nd) access eNB to whichthe UE 620 previously has access, and may include a 2^(nd) access eNBneighboring to the 2^(nd) access eNB to which the UE 620 previously hasaccess. The controller 1700 may instruct to transmit the short beacon byselecting at least one 2^(nd) access eNB, based on a pre-stored 2^(nd)access eNB list. Further, the controller 1700 may receive informationregarding the 2^(nd) access eNB as a handover target from the UE 620,and may perform a handover process for the 2^(nd) access eNB of the UE620 based on the received information. For example, the controller 1700may transmit an additional request signal including information of theUE 620 to the target 2^(nd) access eNB, may receive an additionalrequest response signal from the target 2^(nd) access eNB, and mayconfigure a data path for the target 2^(nd) access eNB and the UE 620.Further, the controller 1700 may transmit a radio resource controlconnection reconfiguration signal to the UE 620, and may control andprocess a function for receiving a radio resource control connectionreconfiguration complete signal from the UE 620. Herein, the radioresource controller connection reconfiguration complete signal mayinclude information (e.g., PDCP SN) for last downlink data received fromthe 2^(nd) access eNB to which the UE previously has access. Uponreceiving the radio resource control connection reconfiguration completesignal, the controller 1700 transmits downlink data for the UE 620 tothe 2^(nd) access eNB to which the UE 620 is handed over. In this case,upon receiving the PDCP SN for the last downlink data from the UE 620,the controller 1700 may deliver downlink data subsequent to the PDCP SNto the 2^(nd) access eNB to which the UE 620 is handed over.

The controller 1700 transmits downlink data to the 2^(nd) access eNB610, and starts an operation of the 1^(st) timer at a time oftransmitting the downlink data. If downlink data of the UE 620 isadditionally detected via the 2^(nd) access eNB 610 during the 1^(st)timer is running, the controller 1700 may transmit the additionallydetected downlink traffic to the 2^(nd) access eNB 610, and may resetthe 1^(st) timer. The controller 1700 examines whether the 1^(st) timerexpires. For example, when the downlink data of the UE 620 is notadditionally detected via the 2^(nd) access eNB 610 during the 1^(st)timer is running, it is examined whether the 1^(st) timer expires bymeasuring a pre-set time. If the 1^(st) timer does not expire, thecontroller 1700 examines whether a signal for requesting to control astate of the 2^(nd) access module of the UE 620 is received from the2^(nd) access eNB 610.

If the signal for requesting to control the state of the 2^(nd) accessmodule is not received, the controller 1700 examines whether downlinktraffic to be transmitted to the UE 620 is additionally detected via the2^(nd) access eNB 610. If the downlink traffic to be transmitted to theUE 620 is additionally detected via the 2^(nd) access eNB 610, thecontroller 1700 transmits the additionally detected downlink data to the2^(nd) access eNB 610, and resets the 1^(st) timer. On the other hand,if the downlink traffic to be transmitted to the UE 620 is notadditionally detected via the 2^(nd) access eNB 610, the controller 1700re-examines whether the 1^(st) timer expires.

If the signal for requesting to control the 2^(nd) access module stateof the UE 620 is received from the 2^(nd) access eNB 610, the controller1700 transmits the signal for instructing activation of the 2^(nd)access module of the UE 620 to the UE 620 via the 1^(st) access link.For example, if the state information stored in the controller 1700 andregarding the 2^(nd) access module of the UE 620 is not matched to theactual state of the 2^(nd) access module of the UE 620, the controller1700 may receive the signal for requesting to control the state of the2^(nd) access module from the 2^(nd) access eNB 610.

If the 1^(st) timer expires, the controller 1700 may transmit a signalfor instructing deactivation of the 2^(nd) access module to the UE 620via the 1^(st) access link. The signal for instructing deactivation ofthe 2^(nd) access module may be a probe request signal. The signal forinstructing deactivation of the 2^(nd) access module may include asequence number of a last downlink packet transmitted by the 1^(st)access eNB 600 to the 2^(nd) access eNB 610.

According to various embodiments of the present disclosure, if the1^(st) access eNB 600 transmits timer information for deactivation tothe UE 620 during an initial setup process with respect to the UE 620 orif the UE 620 has timer information pre-stored therein for deactivation,the controller 1700 may skip the operation of transmitting the signalfor instructing deactivation of the 2^(nd) access module.

The controller 1700 may receive a signal for indicating that the 2^(nd)access module is deactivated from the UE 620 via the 1^(st) access link.The signal for indicating that the 2^(nd) access module is deactivatedmay be a probe response signal. According to the embodiment of thepresent disclosure, a process in which the controller 1700 receives thesignal for indicating that the 2^(nd) access link is deactivated may beskipped. In this case, the controller 1700 may determine whether the UE620 has received a last packet based on an ARQ response signal receivedfrom the UE 620.

The controller 1700 may store 2^(nd) access module state information ofthe UE 620 by changing to a deactivation state. For example, after asignal for indicating deactivation is transmitted, or after the 1^(st)timer expires, or after the signal for indicating the 2^(nd) accessmodule is deactivated is received from the UE 620, the controller 1700may store the 2^(nd) access module state information by changing to thedeactivation state.

The communication module 1710 may transmit/receive a signal to/from theUE 620 via a link of the 1^(st) access system under the control of thecontroller 1700. Further, the communication module 1710 maytransmit/receive a signal to/from the 2^(nd) access eNB 610 via abackhaul under the control of the controller 1700.

The storage unit 1720 stores a variety of data and programs required foran operation of the 1^(st) access eNB 600 under the control of thecontroller 1700. The storage unit 1720 stores state information of the2^(nd) access module of the UE currently having access to the 1^(st)access eNB 600 under the control of the controller 1700. The storageunit 1720 may store a rule (e.g., deactivation timer information, 2^(nd)timer information) for deactivating the 2^(nd) access module of the UE620 under the control of the controller 1700.

FIG. 18 illustrates a block diagram of a 2^(nd) access eNB according toan embodiment of the present disclosure.

Referring to FIG. 18, the 2^(nd) access eNB 610 may include a controller1800, a communication module 1810, and a storage unit 1820.

The controller 1800 may control and process an overall operation of the2^(nd) access eNB 610. For example, the controller 1800 controls andprocesses a function for providing a communication service for a 2^(nd)access system to the UE 620, and controls and processes a function foreffectively managing communication for the 2^(nd) access system of theUE 620. For example, the controller 1800 may include a state mismatchsensor 1802 for providing control such that a state of the 2^(nd) accessmodule of the UE 620 is matched to state information of the 2^(nd)access module of the UE 620, which is managed by the 1^(st) access eNB600.

Upon receiving a short beacon delivery instruction from the 1^(st)access eNB 600, the controller 1800 may transmit a short beacon to theUE 620. The short beacon may be configured by including only some piecesof information among a plurality of pieces of information included in awell-known beacon signal. As shown in FIG. 8B, a short beacon 852 is nottransmitted at a time of transmitting a periodically repeated beacon 850but is transmitted at a time point between beacon transmission periods.This is for allowing the UE 620 to activate the 2^(nd) access module,thereafter to receive the short beacon 852 instead of waiting until anext beacon reception duration, and thereafter to immediately receivedownlink data. According to the embodiment of the present disclosure,the controller 1800 may not transmit the short beacon.

The controller 1800 transmits downlink data, received from the 1^(st)access eNB, to the UE 620 via the 2^(nd) access link, and determineswhether a state mismatch of the 2^(nd) access module is detected basedon a 1^(st) timer and a 2^(nd) timer. Herein, the 1^(st) timer starts anoperation at a time when the 2^(nd) access eNB 610 receives downlinkdata from the 1^(st) access eNB 600. Further, the 2^(nd) timer starts anoperation at a time when the 2^(nd) access eNB 610 transmits downlinkdata to the UE 620. For example, the Pt timer and the 2^(nd) timer maybe respectively the aforementioned network timer or UE timer of FIGS.12A, 12B, 12C, and 12D. If the 1^(st) timer is in a running state (e.g.,an ON state) and the 2^(nd) timer is in an expiry state (e.g., an OFFstate), the controller 1800 may determine that a state mismatch of the2^(nd) access module is detected. In this case, the controller 1800 isin a state in which the 2^(nd) access module of the UE 620 is in adeactivation state and state information of the 2^(nd) access modulemanaged by the 1^(st) access eNB 600 indicates an activation state.

Upon detecting the state mismatch of the 2^(nd) access module based onthe 1^(st) timer and the 2^(nd) timer, the controller 1800 transmits tothe 1^(st) access eNB 600 a signal for requesting to control the stateof the 2^(nd) access module. For example, if the state of the 2^(nd)access module of the UE 620 is the deactivation state and the stateinformation of the 2^(nd) access module managed by the 1^(st) access eNB600 indicates the activation state, the controller 1800 may transmit asignal for requesting to change the state of the 2^(nd) access module ofthe UE 620 from the deactivation state to the activation state. If thestate of the 2^(nd) access module of the UE 620 is the deactivationstate and the state information of the 2^(nd) access module managed bythe 1^(st) access eNB 600 indicates the activation state, the controller1800 may not transmit downlink data to the UE 620 and may buffer thedownlink data, until the state of the 2^(nd) access module is changed tothe activation state.

The controller 1800 may detect whether a last downlink packet istransmitted in a state where the state mismatch of the 2^(nd) accessmodule is not detected based on the 1^(st) timer and the 2^(nd) timer.For example, if additional downlink data is not received until the1^(st) timer expires, the controller 1800 determines that the lastdownlink data is received, and examines whether the downlink data istransmitted to the UE 620. For another example, if the additionaldownlink data is detected before the 1^(st) timer expires, thecontroller 1800 may determine that the last downlink traffic is nottransmitted.

According to the embodiment of the present disclosure, if it isdetermined that the last downlink traffic is not transmitted, thecontroller 1800 determines whether the 2^(nd) timer for determining atime at which the 2^(nd) access module for the UE 620 is deactivated isclose to an expiry time. For example, the controller 1800 may determinewhether the 2^(nd) timer (or a UE timer) expires within a thresholdtime. If it is determined that the 2^(nd) timer expires within thethreshold time, the controller 1800 may determine that the 2^(nd) accessmodule of the UE 620 is deactivated within the threshold time, and maytransmit a signal for prohibiting deactivation of the 2^(nd) accessmodule to the UE 620. For example, the controller 1800 may transmit thesignal for prohibiting deactivation of the 2^(nd) access module to theUE 620 so that the 2^(nd) access module of the UE 620 is kept in anactivation state. In this case, the signal for prohibiting deactivationof the 2^(nd) access module may include information regarding a time ofprohibiting deactivation. According to the embodiment of the presentdisclosure, instead of transmitting the signal for prohibitingdeactivation of the 2^(nd) access module, the controller 1800 mayincrease a priority for downlink data transmission of the UE 620. Forexample, if there is downlink data for a plurality of UEs, thecontroller 1800 may transmit downlink data for the UE 620 expected to bedeactivated within a specific time by preferentially scheduling it.

If it is determined that the last downlink data is not transmitted, thecontroller 1800 may continuously determine whether the state of the2^(nd) access module is mismatched, while transmitting downlink data tothe UE 620 until transmission of the last downlink data is detected.

In addition, the controller 1800 may analyze the Power Mgmt 1300 andMore Data 1301 included in the WLAN 802.11 MAC header received fromaccessed UEs, and thus may determine whether all of the accessed UEsindicate the change to the deactivation state of the 2^(nd) accessmodule. If all of the accessed UEs indicate the change to thedeactivation state of the 2^(nd) access module, the controller 1800 maynot perform an operation of periodically transmitting a beacon signal.In this case, the controller 1800 may perform the operation oftransmitting the beacon signal under the control of the 1^(st) accesseNB 600. For example, upon receiving downlink data to be transmitted tothe UE 620 from the 1^(st) access eNB 600, the controller 1800 maydetect that it is required to resume the operation of periodicallytransmitting the beacon signal, and may periodically transmit the beaconsignal.

The communication module 1810 may transmit/receive a signal to/from theUE 620 via a link of the 2^(nd) access system under the control of thecontroller 1800. Further, the communication module 1810 maytransmit/receive a signal to/from the 1^(st) access eNB 600 via abackhaul under the control of the controller 1800.

The storage unit 1820 stores a variety of data and programs required foran operation of the 2^(nd) access eNB 610 under the control of thecontroller 1800. The storage unit 1820 may store state information ofthe 2^(nd) access module of the UE 620, which is received from the1^(st) access eNB. The storage unit 1820 may store state information ofthe 2^(nd) access module of the UE 620, which is received from the UE620. Further, the storage unit 1820 may store a rule (e.g., deactivationtimer information, 2^(nd) timer information) for deactivating the 2^(nd)access module of the UE 620 under the control of the controller 1800.

FIG. 19 illustrates a block diagram of a UE according to an embodimentof the present disclosure.

Referring to FIG. 19, the UE 620 may include a controller 1900, a 1^(st)access module 1910, a 2^(nd) access module 1920, and a storage unit1930.

The controller 1900 controls and processes an overall operation of theUE 620. According to the embodiment of the present disclosure, thecontroller 1900 controls and processes a function for controlling andchanging an activation state of the 2^(nd) access module 1920 in a statewhere the 1^(st) access module 1910 is kept in an activation state.

The controller 1900 receives the signal for instructing activation ofthe 2^(nd) access module via the 1^(st) access module 1910. For example,the controller 1900 may process a function for receiving the 2^(nd)access module activation instruction signal transmitted via a 1^(st)access link from the 1^(st) access eNB 600 by using the 1^(st) accessmodule 1910. In this case, the 2^(nd) access module 1920 of the UE 620may be in an inactive state.

The controller 1900 may activate the 2^(nd) access module 1920 based onthe signal for instructing activation of the 2^(nd) access module. Forexample, the controller 1900 may control the 2^(nd) access module 1920operating in the deactivation state to operate in the activation state.

The controller 1900 examines whether a short beacon signal is receivedfrom the 2^(nd) access eNB 610 via the 2^(nd) access module 1920. If theshort beacon signal is received, the controller 1900 may acquireinformation required to receive downlink data from the short beaconsignal. Otherwise, if the short beacon signal is not received, thecontroller 1900 examines whether a beacon transmitted periodically fromthe 2^(nd) access eNB 610 is received via the 2^(nd) access module 1920.If the beacon is received from the 2^(nd) access eNB 610, the controller1900 may acquire information required to receive downlink data from aTIM included in the received beacon. Further, if the short beacon signalis not received, the controller 1900 may transmit to the 1^(st) accesseNB a signal for indicating that there is a need to change the 2^(nd)access eNB. For example, if the short beacon signal is not receivedwithin a short beacon reception time from a time of activating the2^(nd) access module, the controller 1900 may determine that it isdifficult to receive a signal of the 2^(nd) access eNB, and thus maytransmit to the 1^(st) access eNB a signal for indicating that there isa need to change the 2^(nd) eNB is. If the short beacon signal isreceived from at least one 2^(nd) access eNB, the controller 1900 maydetermine a handover target 2^(nd) access eNB based on the receivedshort beacon signal. The controller 1900 may transmit informationregarding the target 2^(nd) access eNB to the 1^(st) access eNB 600, andmay perform a handover to the target 2^(nd) access eNB. Further, thecontroller 1900 may receive downlink data via the 2^(nd) access module1920 from the 2^(nd) access eNB 610.

The controller 1900 detects that the 2^(nd) access module 1920 needs tobe changed to a deactivation state by using the 2^(nd) timer or the2^(nd) access module deactivation instruction signal received by the1^(st) access module 1910 via the 1^(st) access link. For example, thecontroller 1900 may receive the signal for instructing deactivation ofthe 2^(nd) access module via the 1^(st) access link from the 1^(st)access eNB 600 by using the 1^(st) access module 1910. The signal forinstructing deactivation of the 2^(nd) access module may be a proberequest signal. Further, the signal for instructing deactivation of the2^(nd) access module may include a sequence number of a last downlinkpacket. According to the embodiment of the present disclosure, thecontroller 1900 may deactivate the 2^(nd) access module 1920 immediatelyafter the 2^(nd) access module deactivation instruction signal isreceived. In another embodiment of the present disclosure, thecontroller 1900 may acquire the sequence number of the last downlinkpacket from the 2^(nd) access module deactivation instruction signal,and may deactivate the 2^(nd) access module 1920 after detecting that upto the last packet is received based on the acquired sequence number forthe last packet. According to another embodiment of the presentdisclosure, the controller 1900 may detect that the 2^(nd) access module1920 needs to be changed to the deactivation state based on the 2^(nd)timer which measures a pre-set time at a time when downlink data isreceived via the 2^(nd) access module 1920 from the 2^(nd) access eNB610. For example, the controller 1900 may determine that the 2^(nd)access module 1920 needs to be changed to the deactivation state if thedownlink data is not additionally received until the pre-set timemeasured by the 2^(nd) timer expires. Herein, the 2^(nd) timer may beset to the same manner as the 2^(nd) timer of FIGS. 10A and 10B.

Upon detecting that the 2^(nd) access module 1920 needs to be changed tothe deactivation state, the controller 1900 may deactivate the 2^(nd)access module 1920. For example, the controller 1900 may perform atleast one of the aforementioned operations 1 to 3. According to theembodiment of the present disclosure, before changing the 2^(nd) accessmodule 1920 to the deactivation state, as shown in FIG. 13, thecontroller 1900 may set values of the Power Mgmt 1300 and More Data 1301in the frame control field in the WLAN 802.11 MAC header to 1 and 1respectively, and may transmit the values to the 2^(nd) access eNB 610.

The controller 1900 may transmit a signal for indicating that the 2^(nd)access module is deactivated to the 1^(st) access eNB 600 via the 1^(st)access module 1910. According to the embodiment of the presentdisclosure, the controller 1900 may indicate that the 2^(nd) accessmodule is deactivated to the 1^(st) access eNB 600 by using a proberesponse signal. According to another embodiment of the presentdisclosure, the controller 1900 may indicate that the 2^(nd) accessmodule is deactivated by using a PDCP feedback signal for indicating asequence number of a received last packet. According to anotherembodiment of the present disclosure, the controller 1900 may nottransmit the signal for indicating that the 2^(nd) access module isdeactivated.

The 1^(st) access module 1910 may transmit/receive a signal to/from the1^(st) access eNB 600 via the 1^(st) access link under the control ofthe controller 1900. According to the embodiment of the presentdisclosure, the 1^(st) access module 1910 is kept in the activationstate.

The 2^(nd) access module 1920 may transmit/receive a signal to/from the2^(nd) access eNB 610 via the 2^(nd) access link under the control ofthe controller 1900. According to the embodiment of the presentdisclosure, the 2^(nd) access module 1920 may operate in an activestatue or a deactivation state under the control of the controller 1900.

The storage unit 1930 stores a variety of data and programs required foran operation of the UE 620 under the control of the controller 1900. Thestorage unit 1930 may store a rule (e.g., deactivation timerinformation, 2^(nd) timer information) for deactivating the 2^(nd)access module 1920 under the control of the controller 1900.

In the aforementioned embodiment of the present disclosure, if the2^(nd) access system is a WLAN, an operator AP may be managed togetherwith the 2^(nd) access eNB 610 described in the aforementionedembodiment. However, it may be difficult to manage a private AP togetherwith the aforementioned 2^(nd) access eNB 610. Therefore, hereinafter,it is described a case where the embodiment of the present disclosure isapplied to a situation in which the operator AP and the private APcoexist. Hereinafter, for convenience of explanation, according to theaforementioned embodiments of the present disclosure, an operation ofchanging and controlling an activation state of the 2^(nd) access module(e.g., a WLAN module) while keeping activation of the 1^(st) accessmodule (e.g., an LTE module) of the UE 620 is called an ‘LTE-WLANInterworking/Integration (I/I) operation’.

FIG. 20 illustrates an operation of a UE and each AP in an environmentin which an operator AP and a private AP coexist according to anembodiment of the present disclosure.

FIG. 21 illustrates an operation state of an AP according to anembodiment of the present disclosure.

Referring to FIGS. 20 and 21, in general, a beacon 2000 of a private AP(PA) has a longer period than a beacon of an operator AP 210. Therefore,in a situation in which the operator AP 210 and the private AP coexist,a UE 220 or 620 may perform an LTE-WLAN I/I operation in a duration 2010between periods in which the beacon 2000 is transmitted from the privateAP. For example, the UE 620 may deactivate a WLAN module while keepingactivation of an LTE module during the duration 2010 in which the beacon2000 is not transmitted from the private AP. For another example, whilekeeping activation of the LTE module for the duration 2010 in which thebeacon 2000 is not transmitted from the private AP, the UE 620 mayoperate the WLAN module in an activation state in a part of a durationin which downlink data via the operator AP 210 is present and mayoperate the WLAN module in a deactivation state in a part of theduration in which the downlink data via the operator AP 210 is notpresent.

In the environment in which the operator AP 210 and the private APcoexist, the LTE-WLAN I/I operation of the UE 620 may vary depending onan operation state for the private AP as shown in FIG. 21. It is assumedherein that the UE 620 has access to the operator AP 210.

For example, the UE 620 may perform scanning to have access to theprivate AP in a state of accessing the operator AP 210. If the UE 620 isin a state (S1) 2100 for periodically performing scanning to discoverthe private AP, the UE 620 may perform scanning on the private APaccording to a pre-set period, and may perform the LTE-WLAN I/Ioperation in a duration in which the scanning is not performed. Forexample, the UE 620 may deactivate the WLAN module while keepingactivation of the LTE module during scanning is not performed on theprivate AP. For another example, while keeping activation of the LTEmodule during scanning is not performed on the private AP, the UE 620may operate the WLAN module in an activation state in a part of aduration in which downlink data via the operator AP 210 is present, andmay operate the WLAN module in a deactivation state in a part of aduration in which the downlink data via the operator AP 210 is notpresent.

For another example, the UE 620 may have access to the private AP in astate of having access to the operator AP 210 by using a time divisionmultiple access (TDMA) scheme. In this case, if the UE 620 is in a state(D1) 2110 of transmitting/receiving data to/from the private AP, the UE620 activates the WLAN module to transmit/receive data to/from theprivate AP, and stops the LTE-WLAN I/I operation for the operator AP 210for a duration in which data is transmitted/received to/from the privateAP.

For another example, the UE 620 may operate with a PSM mode for theprivate AP in a state of having access simultaneously to the operator AP210 and the private AP by using the TDMA scheme. In case of a state (P1)2120 of operating with the PSM mode for the private AP, the UE 620 mayactivate the WLAN module to receive a beacon of the private AP in abeacon transmission period of the private AP, and may perform theLTE-WLAN I/I operation for the operator AP 210 for a duration (e.g.,2010) in which the beacon of the private AP is not transmitted. Forexample, the UE 620 may deactivate the WLAN module while keepingactivation of the LTE module for a duration in which the beacon of theprivate AP is not transmitted. For another example, while keepingactivation of the LTE module for the duration in which the beacon is nottransmitted from the private AP, the UE 620 may operate the WLAN modulein an activation state in a part of a duration in which downlink datavia the operator AP 210 is present and may operate the WLAN module in adeactivation state in a part of the duration in which the downlink datavia the operator AP 210 is not present.

In the environment in which the operator AP 210 and the private APcoexist, the UE 620 may provide a user interface as shown in FIGS. 22Ato 22D.

FIGS. 22A to 22D illustrate a user interface for an operation of a UE inan environment in which an operator AP and a private AP coexistaccording to an embodiment of the present disclosure.

Referring to FIG. 22A, the UE 620 may display a message for requestingto determine a preferred Wi-Fi type when a Wi-Fi function is on to haveaccess to an AP. For example, a message may be displayed to inquirewhether it is preferred to use the operator AP, or whether it ispreferred to use the private AP, or whether it is preferred tosimultaneously use the operator AP and the private AP. In this case,based on the preferred Wi-Fi type determined by a user, the UE 620 maydiscover the operator AP to have access thereto, may discover theprivate AP to have access thereto, and may simultaneously have access tothe operator AP and the private AP.

Referring to FIG. 22B, the UE 620 may display a list of discovered APs,and may indicate whether each AP is the private AP or the operator AP.Further, the UE 620 may provide a user interface to allow the user toselect one or two APs. For example, if the operator AP is selected fromthe AP list, it may be provided a user interface capable of additionallyselecting one of the private APs. For another example, if the private APis selected from the AP list, it may be provided a user interfacecapable of additionally selecting one of the operator APs.

Referring to FIG. 22C, the UE 620 may display a message for inquiringwhether to perform ultra power saving by using an LTE-WLAN I/I functionfor the operator AP in a state of having access to the operator AP or ina state of attempting the access to the operator AP. If it is determinedto use the LTE-WLAN I/I function by a user input, an operation describedabove with reference to FIG. 20 and FIG. 21 may be performed.

Referring to FIG. 22D, the UE 620 may display an icon for indicating acurrently accessed AP in a portion of a screen. For example, the UE 620may display any one icon among an icon 2201 for indicating that it hascurrently access to the private AP, an icon 2202 for indicating that ithas currently access to the operator AP, and an icon 2203 for indicatingthat it has access simultaneously to the private AP and the operator AP,so that the user can recognize a type of the currently accessed AP.

Further, as shown in FIG. 22D, the UE 620 may display icons 2211 and2212 in a portion of a screen according to the current usage of theLTE-WLAN I/I function. For example, if the WLAN module is in adeactivation state during the LTE-WLAN I/I function is used, the UE 620may display the icon 2211 for indicating that it is operating with anultra power saving mode of the UE. For another example, if the LTEmodule and the WLAN module are simultaneously activated during theLTE-WLAN I/I function is used, the UE 620 may display the icon 2212 forindicating that it is operating in a ‘Data Rate Boosting mode’.

In the aforementioned embodiment of the present disclosure, it isdescribed a case where a UE supporting a multi-radio access technologykeeps an activation state of some access modules among a plurality ofaccess modules included in the UE, and controls an activation state ofthe other access modules. For example, it has been described in theembodiment of the present disclosure that the UE keeps an activationstate of only one access module and deactivates the remaining otheraccess modules, and thereafter monitors downlink traffic for otherdifferent radio access technologies by using the activated one accessmodule so that the access module operates in the activation state onlyduring the downlink traffic is present. In the following description, anaccess technology includes the meaning of the radio access technology.

However, according to various embodiments of the present disclosure, oneUE may perform downlink monitoring on at least one different UE, and maycontrol an activation state of at least one access module for the atleast one different UE based on a result of the downlink monitoring. Forexample, a plurality of UEs may form a group, a representative UE in thegroup may perform downlink monitoring on different UEs in the group, andan activation state of an access module for the different UEs in thegroup may be controlled according to a result of the downlinkmonitoring.

FIG. 23 illustrates a system structure in which a UE controls anactivation state of an access module for at least one different UEaccording to an embodiment of the present disclosure.

Referring to FIG. 23, each of a plurality of UEs 2300 to 2304 maysupport a multi-radio access technology. The plurality of UEs 2300 to2304 may form a group by a user request. Each of the plurality of UEs2300 to 2304 may form the group through mutual detection based oninformation pre-registered to each UE by a user, association historyinformation with respect to a different UE, signaltransmission/reception information with respect to neighboring UEs, andthe like.

According to the embodiment of the present disclosure, each of theplurality of UEs 2300 to 2304 which have formed one group may determinea master UE (or a representative UE) based on information pre-registeredby a user and information acquired through signal transmission/receptionto/from a different UE in the group. For example, each of the pluralityof UEs 2300 to 2304 may determine the master UE based on at least one ofa multi-radio access technology supported by each UE, capacity of anaccess module of each UE, a remaining power level of each UE, receptionsignal quality for a 1^(st) access eNB and/or a 2^(nd) access eNB, and atopology. Herein, the topology may indicate a connection relationbetween the plurality of UEs, and may indicate a UE to/from whichsignals can be transmitted/received directly by each UE and a UE to/fromwhich signals cannot be transmitted directly. For example, the topologymay indicate the number of UEs to/from which signals can betransmitted/received by each UE via one-hop among UEs in the group. Anoperation of determining the master UE (or the representative UE) may beperformed by only one UE among the plurality of UEs in the group or maybe performed by each of the plurality of UEs. When the master UE isdetermined by each of the plurality of UEs, each of the plurality of UEsmay determine the master UE in the same manner, and may nottransmit/receive information regarding the master UE to/from differentUEs in the group. On the other hand, if the master UE is determined onlyby one UE among the plurality of UEs in the group, the UE needs totransmit information regarding the determined master UE to different UEsin the group. Further, if the master UE is determined only by one UEamong the plurality of UEs in the group, the UE may be determined by auser input or may be determined through signal transmission/receptionto/from UEs in the group. Hereinafter, for convenience of explanation, aUE which performs downlink monitoring of different UEs in a group iscalled a master UE, and a UE of which at least one access module iscontrolled under the control of the master UE is called a slave UE.

Further, according to the embodiment of the present disclosure, a masterUE 2300 in a group may determine a management access module formonitoring whether downlink traffic is generated for slave UEs 2301 to2304 among access modules included in the master UE 2300. Herein, themanagement access module may be determined based on informationpre-registered by a user or information acquired through signaltransmission/reception to/from a different UE in the group. For example,the master UE 2300 may determine the management access module based onat least one of a multi-radio access technology supported by the masterUE 2300, capacity of each access module supporting a differentmulti-access technology, reception signal quality with respect to eachaccess module for a 1^(st) access eNB and/or a 2^(nd) access eNB, achannel occupation probability for the 1^(st) access eNB and/or the2^(nd) access eNB, a type of currently accessed eNB (e.g., an operatorAP or a private AP), whether downlink traffic monitoring of differentdevices in a group for each access module is possible, a powerconsumption amount of each access module, and a topology. Herein, thetopology may indicate a connection relation between the plurality ofUEs, and may indicate a UE to/from which signals can betransmitted/received directly by each UE and a UE to/from which signalscannot be transmitted directly. For example, the topology may indicatethe number of UEs to/from which signals can be transmitted/received viaone-hop among UEs in the group when each UE transmits/receives thesignals by using a specific access module.

The master UE 2300 may select a control access module for controlling anactivation state of an access module of the slave UEs 2301 to 2304. Forexample, the control access module may be used to transmit/receive acontrol signal for activating or deactivating a 1^(st) access module ofthe slave UE 2301 by the master UE 2300. The control access module maybe identical to or different from the management access module. Forexample, the management access module may be a 1^(st) access modulewhich transmits/receives a signal to/from a 1^(st) access eNB, and thecontrol access module may be an access module (e.g., a Bluetooth lowenergy (BLE) module) capable of transmitting/receiving a signal with lowpower to/from a neighboring UE.

The master UE 2300 may transmit radio access technology informationcorresponding to the determined management access module and/or radioaccess technology information corresponding to the control access moduleto the slave UEs 2301 to 2304.

As described above, after the plurality of UEs 2300 to 2304 form onegroup, the master UE 2300 is determined, and if the management accessmodule and the control access module are determined, the master UE 2300may activate only the management access module and may deactivate theother access modules. If the management access module and the controlaccess module are different in the master UE 2300, the master UE 2300may persistently keep the control access module in an ON state, or onlywhen there is a need to transmit/receive a signal for controlling anaccess module of a slave UE, may keep the control access module in theON state. Further, the slave UEs 2301 to 2304 may keep only the controlaccess module in an activation state, and may deactivate the otheraccess modules. Herein, if the management access module of the master UE2300 is a WLAN module supporting an unlicensed band, the managementaccess module may be repetitively in an awake status and a sleep statusaccording to a pre-set PSM mode, instead of continuously operating inthe activation state. On the other hand, if the management access moduleof the master UE 2300 is an LTE module supporting a licensed band, themanagement access module may be continuously kept in the activationstate.

According to the embodiment of the present disclosure, the master UE2300 may transmit identification information of the master UE 2300 andidentification information of the slave UEs 2301 to 2304 to the 1^(st)access eNB 600 and/or the 2^(nd) access eNB 610. In this case, based onthe identification information of the master UE 2300 and theidentification information of the slave UEs 2301 to 2304, the 1^(st)access eNB 600 and/or the 2^(nd) access eNB 610 may detect whetherdownlink traffic is generated for UEs in a corresponding group, and ifthe downlink traffic is generated for the UEs in the group, may reportthis to the master UE 2300. For example, the 1^(st) access eNB 600 maydetect that downlink traffic is generated for a 1^(st) access module forthe slave UE 2301 based on the identification information of the slaveUE 2301, and may transmit to the master UE 2300 a signal for indicatingthat the downlink traffic of the 1^(st) access module for the slave UE2301 is generated. For another example, based on the identificationinformation of the slave UE 2301, the 1^(st) access eNB 600 may detectthat downlink traffic is generated for the 2^(nd) access module for theslave UE 2301, and may transmit to the master UE 2300 a signal forindicating that the downlink traffic of the 2^(nd) access module for theslave UE 2301 is generated. For example, the 1^(st) access eNB 600 maydetect generation of downlink traffic which uses not only a 1^(st)access technology for UEs in the group but also other accesstechnologies.

FIG. 24 illustrates an operation of forming a group of a UE according toan embodiment of the present disclosure.

FIG. 27 illustrates a situation in which one group is formed of aplurality of UEs owned by a user according to an embodiment of thepresent disclosure.

Referring to FIGS. 24 and 27, in operation 2401, the UE forms a groupwith a plurality of UEs. For example, referring to FIG. 27, a UE 2300may form a group with different UEs 2301 to 2304 by a user request, andmay exchange information. For example, the UE 2300 and the different UEs2301 to 2304 may be UEs owned by a 1^(st) user. For example, the UE 2300and the different UEs 2301 to 2304 may be in-door UEs of the 1^(st)user. The UE 2300 may recognize the different UEs 2301 to 2304 owned bythe user based on association information for indicating recentassociation history, information of a device registered for payment, andthe like. The UE 2300 may scan neighboring UEs through a 1^(st) radioaccess technology which is decided as being supported commonly by aplurality of UEs, and may attempt the association with the scanned UEs.If there is a specific UE not supporting the 1^(st) radio accesstechnology among the plurality of UEs, the UE 2300 may attempt theassociation with the specific UE not supporting the 1^(st) radio accesstechnology through a different radio access technology. In this case,the UE 2300 may transmit information regarding the specific UE todifferent UEs through the 1^(st) radio access technology. The UE 2300may detect the different UEs 2301 to 2304 through at least one radioaccess technology, and may form a group with the detected different UEs2301 to 2304. Further, the UE 2300 may exchange information based onflooding with the plurality of UEs 2301 to 2304. For example, the UE2300 may broadcast a signal including capacity and remaining powerinformation for each radio access technology supported by the UE 2300.Further, the UE 2300 may acquire capacity and remaining powerinformation for an access module for each multi-access technologysupported by a corresponding UE by receiving a signal which is broadcastfrom the different UEs 2301 to 2304 in the group, and may acquireinformation, such as channel state information and information, such asa topology, and the like, from the broadcast signal.

In operation 2403, the UE determines a master UE among UEs in a group.For example, the UE 2403 may determine a master UE (or a representativeUE) based on information pre-registered by a user and informationacquired through signal transmission/reception to/from a different UE inthe group. For example, the UE 2300 may determine the master UE based onat least one of a multi-radio access technology supported by each UE,capacity of an access module of each UE, a remaining power level of eachUE, reception signal quality for a 1^(st) access eNB and/or a 2^(nd)access eNB, and a topology. Herein, the topology may indicate aconnection relation between the plurality of UEs, and may indicate a UEto/from which signals can be transmitted/received directly by each UEand a UE to/from which signals cannot be transmitted directly. Forexample, the topology may indicate the number of UEs to/from whichsignals can be transmitted/received by each UE via one-hop among UEs inthe group. More specifically, the UE 2300 may identify a radio accesstechnology supported by the maximum number of UEs among a plurality ofradio access technologies supported by the UEs 2300 to 2304 in thegroup, and may determine one UE among UEs having the identified radioaccess technology as a master UE. For another example, the UE 2300 mayidentify capacity of an access module of each of the UEs 2300 to 2304 ofthe group, and may determine a UE having an access module of whichcapacity is greatest as the master UE. For another example, the UE 2300may determine a UE of which a remaining power level is highest or a UEto which power is supplied in a wired manner as the master UE among theUEs 2300 to 2304 in the group. For another example, the UE 2300 maydetermine a UE of which reception signal quality for the 1^(st) accesseNB and/or the 2^(nd) access eNB is highest among the UEs 2300 to 2304in the group as the master UE. Herein, the reception signal quality mayinclude reception power of the received signal or reception quality ofthe received signal. For another example, the UE 2300 may determine a UEwhich can transmit a control signal to the maximum number of UEs via onehop among the UEs 2300 to 2304 in the group as the master UE.

In operation 2405, the UE examines whether a UE determined as the masterUE is the UE itself. If the UE determined as the master UE is not the UEitself, in operation 2413, the UE receives information regarding acontrol access technology from the master UE. It is assumed herein thatan operation of determining the master UE is performed in each of theUEs in the group, and thus the UE does not transmit to a different UE asignal for reporting that it is determined as the master UE. However,according to a design rule, the UE may transmit to the different UE thesignal for reporting that it is determined as the master UE.

On the other hand, if the UE determined as the master UE is the UEitself, in operation 2407, the UE determines a management accesstechnology for monitoring downlink traffic for the UEs in the groupamong access technologies supported by the master UE. For example, themaster UE 2300 may determine an access technology to be used formonitoring whether downlink traffic is generated for the slave UEs 2301to 2304 in the group among access technologies supported by the masterUE 2300. The master UE 2300 may determine a management access technologybased on information pre-registered by a user and information acquiredthrough signal transmission/reception to/from a different UE in thegroup. For example, the master UE 2300 may determine the master UE basedon at least one of access technologies supported by the master UE 2300,capacity of each access module supporting a different multi-accesstechnology, reception signal quality with respect to each access modulefor a 1^(st) access eNB and/or a 2^(nd) access eNB, a channel occupationprobability for the 1^(st) access eNB and/or the 2^(nd) access eNB, atype of currently accessed eNB (e.g., an operator AP or a private AP),whether downlink traffic monitoring of different devices in a group foreach access module is possible, a power consumption amount of eachaccess module, and a topology. For example, the master UE 2300 maydetermine an access technology supported by the maximum number of UEsamong a plurality of access technologies supported by the UEs 2300 to2304 in the group as the management access technology. For anotherexample, the master UE 2300 may determine an access technologycorresponding to an eNB for which downlink traffic monitoring of the UEs2300 to 2304 in the group is possible as the management accesstechnology. For example, as shown in FIGS. 2A and 2B, in case of asystem structure in which the eNB 200 receives a report on trafficgeneration from the AP 210 or the eNB 200 controls traffic offloading ofthe AP 210, an access technology corresponding to the eNB 200 may bedetermined as the management access technology. For another example, themaster UE 2300 may determine an access technology corresponding to anaccess module of which power consumption is lowest as the managementaccess technology. For another example, the master UE 2300 may determinethe management access technology by considering a channel occupationprobability with respect to an eNB which can perform downlink trafficmonitoring and/or an eNB which transmits downlink data. The master UE2300 may determine the management access technology by considering aninstantaneous traffic load, an average traffic load, and the like, ofthe eNB which can perform the downlink traffic monitoring and/or the eNBwhich transmits the downlink data. For another example, the master UE2300 may determine an access technology of a UE which can transmit acontrol signal to the maximum number of slave UEs via one hop as themanagement access technology. For another example, the master UE 2300may determine the management access technology based on a type of an eNBto which the UEs 2300 to 2304 in the group have access. For example, ifthe UEs 2300 to 2304 in the group have access to the operator AP, themaster UE 2300 may determine an access technology corresponding to aneNB which controls downlink offloading for the operator AP as themanagement access technology. Further, if the UEs 2300 to 2304 in thegroup have access to the private AP, the master UE 2300 may determine anaccess technology corresponding to the private AP as the managementaccess technology.

Thereafter, in operation 2409, the UE determines a control accesstechnology for controlling a state of an access module of the UEs in thegroup among the access technologies supported by the master UE. Forexample, the master UE 2300 may select a control access technology forcontrolling an activation state of an access module of the slave UEs2301 to 2304 based on a downlink monitoring result via the managementaccess module corresponding to the management access technology. Forexample, the master UE 2300 may determine a master UE based on at leastone of access technologies supported by the master UE 2300, capacity ofeach access module supporting a different multi-access technology,reception signal quality with respect to each access module for a 1^(st)access eNB and/or a 2^(nd) access eNB, a channel occupation probabilityfor the 1^(st) access eNB and/or the 2^(nd) access eNB, a type ofcurrently accessed eNB (e.g., an operator AP or a private AP), a powerconsumption amount of each access module, and a topology. For example,the master UE 2300 may determine an access technology supported by themaximum number of UEs as the control access technology among a pluralityof access technologies supported by the UEs 2300 to 2304 in the group.For another example, the master UE 2300 may determine an accesstechnology corresponding to an access module of which power consumptionis lowest as the management access technology. For another example, themaster UE 2300 may determine an access technology of a UE which cantransmit a control signal to the maximum number of slave UEs via one hopas the management access technology. The control access technology maybe identical to or different from the management access technology. Forexample, the management access module may be a 1^(st) access modulewhich can transmit/receive a signal to/from a 1^(st) access eNB, and thecontrol access module may be an access module (e.g., a BLE module)capable of transmitting/receiving a signal with low power to/from aneighboring UE. Further, according to a design rule, the control accesstechnology may be determined to be the same as the management accesstechnology, and in this case, operation 2409 for determining the controlaccess technology may be skipped.

In operation 2411, the UE may transmit information regarding thedetermined control access technology to the slave UEs 2301 to 2304. Inthis case, the UE may transmit a signal including the informationregarding the control access technology to the slave UEs by using acontrol access module corresponding to the control access technology.Further, the UE may transmit the signal including the informationregarding the control access technology to the slave UEs by using amanagement access module corresponding to a management accesstechnology. Further, the UE may transmit the signal including theinformation regarding the control access technology to the slave UEs byusing an access module corresponding to a different access technologyother than the control access technology and the management accesstechnology.

Thereafter, the UE ends the operation of forming the group according tothe embodiment of the present disclosure.

FIG. 25 illustrates an operation of a master UE according to anembodiment of the present disclosure.

Herein, the master UE keeps a management access module corresponding toa management access technology in an activation state. According to theembodiment of the present disclosure, if the management access moduleoperates based on a PSM, such as WLAN, the master UE may allow themanagement access module to operate based on the PSM. For example, in acase where the management access module is a module supporting the WLAN,if the management access module is kept in the activation state, it maymean to include a state in which an active status and a sleep status areperiodically switched based on the PSM.

Referring to FIG. 25, in operation 2501, the master UE 2300 monitors adownlink signal related to the UEs 2300 to 2304 in the group by usingthe activated management access module. In this case, the master UE 2300may deactivate a different access module other than the managementaccess module. In addition, in order to detect whether downlink trafficis generated for the UEs 2300 to 2304 in the group, the master UE 2300may transmit identification information for the UEs 2300 to 2304 in thegroup to an access eNB corresponding to the management access modulebefore performing downlink signal monitoring. The master UE 2300 mayreceive a downlink signal for reporting the generation of the downlinktraffic for a specific UE in the group from the access eNB via themanagement access module. Further, the master UE 2300 may detect adownlink traffic generation signal to be transmitted to the specific UEin the group from the access eNB via the management access module.

In operation 2503, the master UE 2300 detects whether a specific accessmodule activation instruction signal for the specific UE in the group isreceived from a corresponding eNB. For example, the master UE 2300detects whether a signal for indicating the generation of the downlinktraffic for the master UE 2300 and/or the slave UEs 2301 to 2304 isreceived as a result of monitoring a signal transmitted from the accesseNB corresponding to the management access technology via the managementaccess module. In this case, the signal for indicating the generation ofdownlink traffic may include information regarding an access technologyused in the generation of the downlink traffic, information regarding anaccess module to be activated, or information of a UE corresponding todownlink traffic. For example, the master UE 2300 may receive a signalfor indicating generation of downlink traffic corresponding to a 2^(nd)access technology for the slave UE1 2301 or a signal for instructingactivation of the 2^(nd) access module of the slave UE1 2301 from the1^(st) access eNB via the management access module. For another example,the master UE 2300 may receive a signal for indicating generation ofdownlink traffic corresponding to a 1^(st) access technology for theslave UE3 2303 or a signal for instructing activation of the 1^(st)access module of the slave UE3 2303 from the 1^(st) access eNB via themanagement access module. If the specific access module activationinstruction signal for the specific UE in the group is not received,returning to operation 2501, the UE 2300 repeats the subsequentoperations.

Otherwise, if the specific access module activation instruction signalfor the specific UE in the group is received, in operation 2505, themaster UE 2300 examines whether the specific UE is the master UE. If thespecific UE is the master UE, the master UE 2300 activates the specificaccess module in operation 2515, and thereafter receives downlink datavia the activated specific access module in operation 2517. In thiscase, the master UE 2300 may receive the downlink data via the specificaccess module according to various embodiments disclosed in FIGS. 1 to22D described above. Thereafter, the master UE 2300 proceeds tooperation 2509.

If the specific UE is not the master UE, in operation 2507, the masterUE 2300 transmits a signal for requesting activation of the specificaccess module to the specific UE via the control access module. If thecontrol access module is different from the management access module, inoperation 2509, the master UE 2300 may switch the control access modulefrom a deactivation state to an activation state. For example, themaster UE 2300 may transmit a signal for requesting activation of the2^(nd) access module to the slave UE1 2301 via the control accessmodule. The master UE 2300 may transmit the signal for requestingactivation of the specific access module to the specific UE via theactivated control access module, and thereafter may deactivate thecontrol access module.

In operation 2509, the master UE 2300 detects whether a specific accessmodule deactivation instruction signal for the specific UE in the groupis received from a corresponding eNB. For example, the master UE 2300detects whether a signal for indicating an absence of the downlinktraffic for the master UE 2300 and/or the slave UEs 2301 to 2304 isreceived as a result of monitoring a signal transmitted from the accesseNB corresponding to the management access technology via the managementaccess module. In this case, the signal for indicating the absence ofthe downlink traffic may include information regarding a related accesstechnology, information regarding an access module to be deactivated, orinformation of a related UE. For example, the master UE 2300 may receivea signal for indicating an absence of downlink traffic corresponding toa 2^(nd) access technology for the slave UE1 2301 or a signal forinstructing deactivation of the 2^(nd) access module of the slave UE12301 from the 1^(st) access eNB via the management access module. Foranother example, the master UE 2300 may receive a signal for indicatingan absence of downlink traffic corresponding to a 1^(st) accesstechnology for the slave UE3 2303 or a signal for instructingdeactivation of the 1^(st) access module of the slave UE3 2303 from the1^(st) access eNB via the management access module. If the specificaccess module deactivation instruction signal for the specific UE in thegroup is not received, returning to operation 2501, the UE 2300 repeatsthe subsequent operations.

If the specific access module deactivation instruction signal for thespecific UE in the group is received, in operation 2511, the master UE2300 examines whether the specific UE is the master UE. If the specificUE is the master UE, the master UE 2300 deactivates the specific accessmodule in operation 2519. According to the embodiment of the presentdisclosure, the master UE 2300 may deactivate the specific access modulewithout having to receive the specific access module deactivationinstruction signal. For example, the master UE 2300 may use a timer formeasuring a pre-set time to detect that downlink data is not receivedduring the pre-set time via the specific access module, and maydeactivate the specific access module.

If the specific UE is not the master UE, in operation 2513, the masterUE 2300 transmits a signal for requesting deactivation of the specificaccess module to the specific UE via the control access module. Forexample, the master UE 2300 may transmit a signal for requestingdeactivation of the 2^(nd) access module to the slave UE1 2301 via thecontrol access module. The master UE 2300 may transmit the signal forrequesting deactivation of the specific access module to the specific UEvia the activated control access module, and thereafter may deactivatethe control access module.

Thereafter, the master UE 2300 ends the procedure according to theembodiment of the present disclosure.

FIG. 26 illustrates an operation of a slave UE according to anembodiment of the present disclosure. Herein, the slave UE may be anyone UE among the slave UE1 2301 to the slave UE4 2304 shown in FIG. 23.

Referring to FIG. 26, in operation 2601, the slave UE activates acontrol access module. For example, when forming a group with differentUEs, the slave UE identifies that the slave UE is not the master UE butthe slave UE, and activates the control access module. The slave UE maydeactivate the remaining access modules other than the control accessmodule while the control access module is kept in an activation state.

In operation 2603, the slave UE examines whether an activationinstruction signal for a specific access module is received from themaster UE. For example, the slave UE examines whether a signal forinstructing activation of a 1^(st) access module or a 2^(nd) accessmodule is received from the master UE 2300 via the control accessmodule. If the activation instruction signal for the specific accessmodule is not received from the master UE, returning to operation 2601,the slave UE repeats the subsequent operations.

Otherwise, if the activation instruction signal for the specific accessmodule is received from the master UE, in operation 2605, the slave UEmay activate a corresponding access module for which activation isinstructed. For example, if the activation instruction signal for the1^(st) access module is received from the master UE 2300, the slave UEmay switch the 1^(st) access module from the deactivation state to theactivation state.

In operation 2607, the slave UE receives a downlink data signal via theactivated access module. For example, the slave UE may receive downlinkdata via the 1^(st) access module activated by the activationinstruction signal received from the maser UE 2300.

In operation 2609, the slave UE examines whether a deactivationinstruction signal for the specific access module is received from themaster UE via the control access module. For example, the slave UEexamines whether the deactivation instruction signal of the 1^(st)access module is received via the control access module in a state wherethe 1^(st) access module is activated. If the deactivation instructionsignal for the specific access module is not received from the masterUE, returning to operation 2607, the slave UE repeats the subsequentoperations. If the deactivation instruction signal for the specificaccess module is received from the master UE, in operation 2611, theslave UE deactivates a corresponding access module. For example, if thedeactivation instruction signal for the 1^(st) access module is receivedfrom the master UE 2300, the slave UE may switch the 1^(st) accessmodule from the activation state to the deactivation state. According toanother embodiment of the present disclosure, the slave UE maydeactivate the specific access module without having to receive aspecific access module deactivation instruction signal from the masterUE 2300. For example, the slave UE may use a timer for measuring apre-set time to detect that downlink data is not received during thepre-set time via the specific access module, and may deactivate thespecific access module.

Thereafter, the slave UE ends the procedure according to the embodimentof the present disclosure.

FIG. 28 illustrates a radio access technology supported by UEs in agroup according to an embodiment of the present disclosure.

Referring to FIG. 28, a master UE 2300 may support a cellular 2800, aWLAN 2820, a BLE 2810, and a near field communication (NFC) 2830. Aslave UE1 2301 may support the cellular 2800 and the BLE 2810. A slaveUE2 2302 may support the cellular 2800, the WLAN 2820, and the BLE 2810.A slave UE3 2303 may support the cellular 2800, the WLAN 2820, the BLE2810, and the NFC 2830. A slave UE4 2304 may support the cellular 2800and the NFC 2830. In this situation, a management access module may bedetermined as a cellular module supported simultaneously by all of theUEs 2300 to 2304 in the group. Further, a control access module may bedetermined as the cellular module supported simultaneously by all of theUEs 2300 to 2304 in the group, or may be determined as a BLE modulehaving low power consumption.

If the management access module is determined as the cellular module andthe control access module is determined as the BLE module, the UEs 2300to 2304 in the group may operate as follows.

First, while the cellular module which is the management access moduleis always kept in the activation state, the master UE 2300 maydeactivate the remaining access modules, i.e., the WLAN module, the BLEmodule, and the NFC module. The master UE 2300 may detect whethercellular downlink traffic for the slave UEs 2301 to 2304 is generated byusing the cellular module in the activation state, and also may detectwhether WLAN downlink traffic for the slave UEs 2302 and 2303 isgenerated. The master UE 2300 may activate the BLE module which is thecontrol access module upon detecting generation of cellular or WLANdownlink traffic for at least one of the slave UEs 2301 to 2304. Themaster UE 2300 may transmit a signal for controlling an activation stateof the cellular or WLAN module for at least one of the slave UEs 2301 to2304 via the BLE module.

However, since the slave UE4 2304 does not support the BLE, the masterUE 2300 cannot transmit the signal for controlling the activation stateof the cellular module to the slave UE4 2304 via the BLE. Therefore, themaster UE 2300 may provide control such that the signal for controllingthe activation state of the cellular module of the slave UE4 2304 istransmitted to the slave UE4 2304 via the slave UE3 2303. For example,since the NFC supported by the slave UE4 2304 is supported by the slaveUE3 2303, upon detection of downlink traffic for the cellular module ofthe slave UE4 2304, the master UE 2300 may transmit a cellular moduleactivation instruction signal of the slave UE4 to the slave UE3 2303 viathe BLE module. The slave UE3 2303 may receive the cellular moduleactivation instruction signal of the slave UE4 2304 from the master UE2300 via the BLE module, and may transmit the cellular module activationinstruction signal of the slave UE4 2304 to the slave UE4 2304 byactivating the NFC module. The slave UE3 2303 may transmit the cellularmodule activation instruction signal to the slave UE4 2304 via the NFCmodule, and thereafter may deactivate the NFC module. Herein, the slaveUE4 2304 does not include the BLE module which is the control accessmodule. Therefore, the NFC module may be kept in the activation stateinstead of the BLE module, and the cellular module activationinstruction signal may be received via the activated NFC module.

Although a case where the management access module is determined as thecellular module is described above, if the WLAN module of the slave UE22302 and the slave UE3 2303 uses a private AP, the management accessmodule must be determined as the WLAN module. For example, a cellulareNB can control downlink traffic for an operator AP, but cannot controldownlink traffic for the private AP. Therefore, if the WLAN module ofthe slave UE2 2302 and the slave UE3 2303 uses the operator AP, themaster UE 2300 may determine any one of the cellular module and the APmodule as the management access module. On the other hand, if the WLANmodule of the slave UE2 2302 and the slave UE3 2303 uses the private AP,the master UE 2300 may determine the AP module as the management accessmodule in order to monitor downlink traffic of the WLAN for the slaveUE2 2302 and the slave UE3 2303. In addition, the master UE 2300 maydetermine both of the cellular module and the WLAN module as themanagement access module. In this case, the master UE 2300 may detectgeneration of cellular downlink traffic for the UEs 2300 to 2304 in thegroup via the cellular module, and may detect generation of WLANdownlink traffic for the UEs 2300, 2302, and 2303 supporting the WLAN inthe group.

FIG. 29 illustrates an activation state of a WLAN module for a casewhere UEs in a group has access to an operator AP according to anembodiment of the present disclosure. It is assumed in FIG. 29 that amanagement access module of a master UE is a cellular module, and acontrol access module is a BLE module having low power consumption.Further, although not shown, the cellular module of the master UE isalways kept in the activation state.

Referring to FIG. 29, each of a master UE (i.e., a device 1) and a slaveUE (i.e., a device 2) may include an AP, a WLAN module, and a BLEmodule. The master UE may monitor whether downlink traffic for the slaveUE is generated in the AP via the cellular module. If the downlinktraffic generation for the slave UE is not detected in the AP as aresult of monitoring, the master UE may transmit a signal forinstructing deactivation of the WLAN module to the slave UE via the BLEmodule. In this case, the slave UE may switch the WLAN module from theactivation state to a deactivation state, or may be kept in thedeactivation state.

Otherwise, if the downlink traffic generation for the slave UE isdetected in the AP as the result of monitoring, the master UE maytransmit a signal for instructing activation of the WLAN module to theslave UE via the BLE module. In this case, the slave UE may switch theWLAN module from the deactivation state to the activation state. Theslave UE may receive a beacon signal (or a short beacon signal) from theAP via the activated WLAN module, and thereafter may receive downlinkdata.

Thereafter, the master UE may detect that downlink traffic for the slaveUE is no longer present in the AP via the cellular module, and maytransmit a signal for instructing deactivation of the cellular module tothe slave UE via the BLE module. In this case, the slave UE may switchthe WLAN module from the activation state to the deactivation state.

FIG. 30 illustrates an activate state of a WLAN module for a case whereUEs in a group have access to a private AP according to an embodiment ofthe present disclosure. It is assumed in FIG. 30 that a managementaccess module of a master UE is a WLAN module, and a control accessmodule is a BLE module having low power consumption.

Referring to FIG. 30, each of a master UE (a device 1) and a slave UE (adevice 2) may include an AP, a WLAN module, and a BLE module. The masterUE may monitor whether downlink traffic for the slave UE is generated bythe AP via the WLAN module. In this case, instead of being keptpersistently in an active status, the WLAN module operates in the active(or awake) status at a beacon transmission time based on a PSM, and ifdownlink traffic for the master UE and the slave UE is not detectedthrough the beacon signal, may operate in a sleep status until a nextbeacon transmission time. The master UE may determine whetheridentification information of the master UE and/or the slave UE ispresent in the beacon signal transmitted from the AP, and may determinewhether downlink traffic is generated for the UEs in the group.

If the downlink traffic generation for the slave UE is not detected inthe AP as a result of monitoring, the master UE may transmit a signalfor instructing deactivation of the WLAN module to the slave UE via theBLE module. In this case, the slave UE may switch the WLAN module fromthe activation state to a deactivation state, or may be kept in thedeactivation state. Further, the master UE may allow the WLAN module tooperate in the sleep status until a next beacon transmission time, andwhen the next beacon transmission time arrives, may switch the WLANmodule to the awake status and thereafter may detect whether downlinktraffic for the slave UE is generated in the AP.

If the downlink traffic generation for the slave UE is detected in theAP as the result of monitoring, the master UE may transmit a signal forinstructing activation of the WLAN module to the slave UE via the BLEmodule. In this case, the slave UE may switch the WLAN module from thedeactivation state to the activation state. The slave UE may receive abeacon signal (or a short beacon signal) from the AP via the activatedWLAN module, and thereafter may receive downlink data.

Thereafter, the master UE may detect that downlink traffic for the slaveUE is no longer present in the AP via the cellular module, and maytransmit a signal for instructing deactivation of the WLAN module to theslave UE via the BLE module. In this case, the slave UE may switch theWLAN module from the activation state to the deactivation state.

FIG. 31 is a block diagram of a UE for controlling an access module byforming a group with different UEs according to an embodiment of thepresent disclosure.

Referring to FIG. 31, the UE may include a controller 3100, a 1^(st)access module 3110, a 2^(nd) access module 3120, and a storage unit3130. The controller 3100, 1^(st) access module 3110, 2^(nd) accessmodule 3120, and storage unit 3130 included in the UE may respectivelyperform functions of the controller 1900, 1^(st) access module 1910,2^(nd) access module 1920, and storage unit 1930 of FIG. 19, and may beconfigured to additionally perform functions described below.

The controller 3100 controls and processes an overall operation of theUE. According to the embodiment of the present disclosure, thecontroller 3100 controls and processes a function for forming a groupwith a plurality of different UEs and for determining a master UE in theformed group. Further, the controller 3100 may control and process afunction for determining a management access technology for monitoringdownlink traffic of the UEs in the group among RATs supported by amaster UE. Furthermore, the controller 3100 may control and process afunction for determining a control access module fortransmitting/receiving a state control signal for an access module ofthe UEs in the group among the RATs supported by the master UE.

For example, based on information input by a user, association historyinformation for different UEs and stored in the UE, information acquiredby transmitting/receiving a signal to/from the different UEs, and thelike, the controller 3100 may determine at least one different UE forforming a group, and may form a group with the determined at least oneUE. The controller 3100 may determine the master UE based on at leastone of a multi-radio access technology supported by each UE, capacity ofan access module of each UE, a remaining power level of each UE,reception signal quality for a 1^(st) access eNB and/or a 2^(nd) accesseNB, and a topology. Further, the controller 3100 may determine themanagement access module based on information pre-registered by a useror information acquired through signal transmission/reception to/from adifferent UE in the group. For example, the controller 3100 maydetermine the management access module based on at least one of amulti-radio access technology supported by the master UE 2300, capacityof each access module supporting a different multi-access technology,reception signal quality with respect to each access module for a 1^(st)access eNB and/or a 2^(nd) access eNB, a channel occupation probabilityfor the 1^(st) access eNB and/or the 2^(nd) access eNB, a type ofcurrently accessed eNB (e.g., an operator AP or a private AP), whetherdownlink traffic monitoring of different devices in a group for eachaccess module is possible, a power consumption amount of each accessmodule, and a topology. Further, the controller 3100 may select thecontrol access module for controlling the activation state of the accessmodule in the UEs in the group. The control access module may beidentical to or different from the management access module. Forexample, the management access module may be a 1^(st) access modulewhich transmits/receives a signal to/from a 1^(st) access eNB, and thecontrol access module may be an access module (e.g., a BLE module)capable of transmitting/receiving a signal with low power to/from aneighboring UE. Further, the controller 3100 may receive relatedinformation from different UEs in the group, instead of directlydetermining the management access module and the control access module.For example, if a corresponding UE is not the master UE, the controller3100 may receive information regarding the control access module fromthe master UE in the group.

If the corresponding UE is the master UE, the controller 3100 maycontrol and process a function for transmitting radio access technologyinformation corresponding to the determined management access moduleand/or radio access technology information corresponding to the controlaccess module to the different UEs in the group.

Further, if the corresponding UE is the master UE, the controller 3100may keep the management access module in the activation state, and maydetect whether downlink traffic for the UEs in the group is generatedvia the management access module. Upon detection of downlink trafficgeneration of a specific access technology for a specific UE in thegroup, the controller 3100 may control and process a function fortransmitting a signal for instructing activation of an access modulecorresponding to the specific access technology to the specific UE. Inthis case, the controller 3100 may transmit the signal for instructingactivation of the access module corresponding to the specific accesstechnology to the specific UE via the control access module. Inaddition, if the management access module is different from the controlaccess module, the controller 3100 may keep the control access module inthe activation state only during a time when a signal for controllingthe activation state of the access module is transmitted to thedifferent UEs in the group.

If the corresponding UE is not the master UE, the controller 3100 mayactivate only the determined control access module, and may deactivatethe remaining access modules. The controller 3100 may activate ordeactivate a specific access module according to a signal received fromthe master UE.

The 1^(st) access module 3110 may transmit/receive a signal to/from thePt access eNB via the 1^(st) access link under the control of thecontroller 3100. According to the embodiment of the present disclosure,if the 1^(st) access module 3110 is the management access module, the1^(st) access module 3110 is always kept in the activation state underthe control of the controller 3100. If the 1^(st) access module 3110 isthe control access module and a corresponding UE is the master UE, the1^(st) access module 3110 may be kept in the activation state only whenan access module state control signal is transmitted to a different UEunder the control of the controller 3100. If the 1^(st) access module3110 is the control access module and the corresponding UE is the slaveUE, the 1^(st) access module 3110 may always be kept in the activationstate under the control of the controller 3100. Further, if the 1^(st)access module 3110 is not the management access module or the controlaccess module, the 1^(st) access module 3110 may operate in theactivation state only when there is downlink data to be received fromthe 1^(st) access eNB under the control of the controller 3110.

The 2^(nd) access module 3120 may transmit/receive a signal to/from the2^(nd) access eNB via the 2^(nd) access link under the control of thecontroller 3100, or may transmit/receive a signal to/from different UEs.According to the embodiment of the present disclosure, if the 2^(nd)access module 3120 is the management access module, the 2^(nd) accessmodule 1320 may always be kept in the activation state under the controlof the controller 3100. If the 2^(nd) access module 1320 is the controlaccess module and the corresponding UE is the master UE, the 1^(st)access module 3110 may be kept in the activation state only when anaccess module state control signal is transmitted to the different UEunder the control of the controller 3100. Further, if the 2^(nd) accessmodule 1320 is the control access module and the corresponding UE is theslave UE, the 1^(st) access module 3110 may always be kept in theactivation state under the control of the controller 3100. If the 2^(nd)access module 3120 is not the management module or the control accessmodule, the 2^(nd) access module 3120 may operate in the activationstate only when there is downlink data to be received from the 2^(nd)access eNB under the control of the controller 3100.

The storage unit 3130 stores a variety of data and programs required foran operation of the UE under the control of the controller 3100. Thestorage unit 3130 may store identification information of different UEsin a group under the control of the controller 3100. The storage unit3130 may store information required to determine the master UE, themanagement access module, and the control access module. For example,the storage unit 3130 may store information which is input by a user,association history information stored in the UE with respect to adifferent UE, information acquired by transmitting/receiving a signalto/from the different UE. The storage unit 3130 may store at least oneof a multi-radio access technology supported by each UE in the group,capacity of an access module of each UE, a remaining power level of eachUE, reception signal quality for a 1^(st) access eNB and/or a 2^(nd)access eNB, a channel occupation probability for the 1^(st) access eNBand/or the 2^(nd) access eNB, a type of currently accessed eNB (e.g., anoperator AP or a private AP, a power consumption amount of each accessmodule, and topology information.

While the present disclosure has been particularly shown and describedwith reference to embodiments thereof, it will be understood by thoseskilled in the art that various modifications and changes in form anddetails may be made therein without departing from the spirit of thedisclosure.

Certain aspects of the present disclosure can also be embodied ascomputer readable code on a non-transitory computer readable recordingmedium. A non-transitory computer readable recording medium is any datastorage device that can store data which can be thereafter read by acomputer system. Examples of the non-transitory computer readablerecording medium include a Read-Only Memory (ROM), a Random-AccessMemory (RAM), Compact Disc-ROMs (CD-ROMs), magnetic tapes, floppy disks,and optical data storage devices. The non-transitory computer readablerecording medium can also be distributed over network coupled computersystems so that the computer readable code is stored and executed in adistributed fashion. In addition, functional programs, code, and codesegments for accomplishing the present disclosure can be easilyconstrued by programmers skilled in the art to which the presentdisclosure pertains.

At this point it should be noted that the various embodiments of thepresent disclosure as described above typically involve the processingof input data and the generation of output data to some extent. Thisinput data processing and output data generation may be implemented inhardware or software in combination with hardware. For example, specificelectronic components may be employed in a mobile device or similar orrelated circuitry for implementing the functions associated with thevarious embodiments of the present disclosure as described above.Alternatively, one or more processors operating in accordance withstored instructions may implement the functions associated with thevarious embodiments of the present disclosure as described above. Ifsuch is the case, it is within the scope of the present disclosure thatsuch instructions may be stored on one or more non-transitory processorreadable mediums. Examples of the processor readable mediums include aROM, a RAM, CD-ROMs, magnetic tapes, floppy disks, and optical datastorage devices. The processor readable mediums can also be distributedover network coupled computer systems so that the instructions arestored and executed in a distributed fashion. In addition, functionalcomputer programs, instructions, and instruction segments foraccomplishing the present disclosure can be easily construed byprogrammers skilled in the art to which the present disclosure pertains.

While the present disclosure has been shown and described with referenceto various embodiments thereof, it will be understood by those skilledin the art that various changes in form and details may be made thereinwithout departing from the spirit and scope of the present disclosure asdefined by the appended claims and their equivalents.

What is claimed is:
 1. A method for operating a terminal in a wirelesscommunication system, the method comprising: receiving, from a basestation of a first system, via a first communication module for thefirst system, a signal comprising information indicating whetherdownlink traffic is generated for another terminal; and transmitting, tothe another terminal, a signal for requesting to control an activationstate of a communication module corresponding to the downlink traffic.2. The method of claim 1, wherein the communication module correspondingto the downlink traffic is configured to support at least one of thefirst system and the second system, and wherein the signal forrequesting to control the activation state is transmitted from the firstcommunication module or a third communication module or a third moduledifferent from the first module.
 3. The method of claim 1, furthercomprising: forming a group with the another terminal based on at leastone of user input information, association history information stored inthe terminal, and information acquired through signaltransmission/reception to/from a neighboring terminal.
 4. The method ofclaim 3, further comprising: determining the terminal as arepresentative terminal between the terminal which has formed the groupand the another terminal, wherein the representative terminal isdetermined based on at least one of a plurality of communication schemessupported by terminals in the group, a capacity of a communicationmodule of each terminal in the group, a remaining power level of eachterminal in the group, reception signal quality of each terminal in thegroup, and a topology for terminals in the group.
 5. The method of claim4, wherein the first communication module is determined as a downlinkmonitor module among a plurality of communication modules included inthe representative terminal, and wherein the downlink monitor module isdetermined based on at least one of a communication scheme supported byeach terminal in the group, capacity of each of the plurality ofcommunication modules, reception signal quality of each of the pluralityof communication modules, a channel occupation probability of each ofthe plurality of communication modules, a power consumption amount ofeach of the plurality of communication modules, a type of an accessedbase station, and a topology for terminals in the group.
 6. The methodof claim 1, wherein the first communication module is in an activationstate when the signal is generated.
 7. A method for operating a terminalin a wireless communication system, the method comprising: receiving,from another terminal, via a first communication module corresponding toa first system, a signal for requesting to control an activation stateof a second communication module corresponding to a second system; andcontrolling the activation state of the second communication modulecorresponding to the second system based on the signal received from theanother terminal.
 8. The method of claim 7, wherein the controlling ofthe activation state of the second communication module corresponding tothe second system based on the received signal comprises activating thesecond communication module based on the received signal, and whereindownlink data is received from a base station of the second system byusing the activated second communication module.
 9. The method of claim7, wherein the activation state of the second communication module ischanged according to the signal received from the another terminal. 10.The method of claim 7, further comprising: forming a group with theanother terminal based on at least one of user input information,association history information stored in the terminal, and informationacquired through signal transmission/reception to/from a neighboringterminal.
 11. An apparatus of a terminal in a wireless communicationsystem, the apparatus comprising: at least one communication moduleincluding a first communication module; and at least one processor,operatively coupled to the at least one communication module, configuredto: receive, from a base station of a first system, via the firstcommunication module for the first system, a signal comprisinginformation indicating whether downlink traffic is generated for anotherterminal, and transmit, to the another terminal, a signal for requestingto control an activation state of a communication module correspondingto the downlink traffic.
 12. The apparatus of claim 11, wherein thecommunication module corresponding to the downlink traffic is configuredto support at least one of the first system and the second system, andwherein the signal for requesting to control the activation state istransmitted from the first communication module or a third communicationmodule or a third module different from the first module.
 13. Theapparatus of claim 11, wherein the at least one processor is furtherconfigured to form a group with the another terminal based on at leastone of user input information, association history information stored inthe terminal, and information acquired through signaltransmission/reception to/from a neighboring terminal.
 14. The apparatusof claim 13, wherein the at least one processor is further configured todetermine the terminal as a representative terminal between the terminalwhich has formed the group and the another terminal, and wherein therepresentative terminal is determined based on at least one of aplurality of communication schemes supported by terminals in the group,a capacity of a communication module of each terminal in the group, aremaining power level of each terminal in the group, reception signalquality of each terminal in the group, and a topology for terminals inthe group.
 15. The apparatus of claim 14, wherein the firstcommunication module is determined as a downlink monitor module among aplurality of communication modules included in the representativeterminal, and wherein the downlink monitor module is determined based onat least one of a communication scheme supported by each terminal in thegroup, capacity of each of the plurality of communication modules,reception signal quality of each of the plurality of communicationmodules, a channel occupation probability of each of the plurality ofcommunication modules, a power consumption amount of each of theplurality of communication modules, a type of an accessed base station,and a topology for terminals in the group.
 16. The apparatus of claim11, wherein the first communication module is in an activation statewhen the signal is generated.
 17. An apparatus of a terminal in awireless communication system, the apparatus comprising: at least onecommunication module including a first communication module; and atleast one processor, operatively coupled to the at least onecommunication module, configured to: receive, from another terminal, viathe first communication module corresponding to a first system, a signalfor requesting to control an activation state of a second communicationmodule corresponding to a second system, and control the activationstate of the second communication module corresponding to the secondsystem based on the signal received from the another terminal.
 18. Theapparatus of claim 17, wherein the at least one processor is furtherconfigured to activate the second communication module based on thereceived signal, and wherein downlink data is received from a basestation of the second system by using the activated second communicationmodule.
 19. The apparatus of claim 17, wherein the activation state ofthe second communication module is changed according to the signalreceived from the another terminal.
 20. The apparatus of claim 17,wherein the at least one processor is further configured to form a groupwith the another terminal based on at least one of user inputinformation, association history information stored in the terminal, andinformation acquired through signal transmission/reception to/from aneighboring terminal.