System and method for applying extended accessing barring in wireless communication system

ABSTRACT

A system and a method that employs Extended Access Barring (EAB) when a Machine Type Communication (MTC) device performs an attempt to access an evolved Node B (eNB) in a wireless communication system are provided. When User Equipment (UE) supporting MTC, an MTC device, performs an attempt to access a network, the system and method determines whether it can access the network and performs the access procedure. The system and method can control the operations of UE that performs an attempt to access a network, thereby preventing excessive access.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit under 35 U.S.C. §119(e) of U.S. Provisional patent applications filed on Aug. 10, 2011 in the United States Intellectual Property Office and assigned Ser. No. 61/521,910, on Sep. 6, 2011 and assigned Ser. No. 61/531,185, on Oct. 10, 2011 and assigned Ser. No. 61/545,363, on Nov. 14, 2011 and assigned Ser. No. 61/559,674, and on Nov. 23, 2011 and assigned Ser. No. 61/563,345, the entire disclosure of each of which is hereby incorporated by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to wireless communication systems. More particularly, the present invention relates to a system and a method that determine, when a Machine Type Communication (MTC) device makes an attempt to access a network in a Long Term Evolution (LTE) system, whether the MTC device can access the network and that allows the MTC device to access the network according to the determination.

2. Description of the Related Art

With the rapid development of wireless communication technologies, communication systems have evolved that employ the wireless communication technologies. An example of a 4th Generation mobile communication technology is a Long Term Evolution (LTE) system. The LTE system employs technologies for supporting various types of mobile devices (or User Equipment (UE)) and is related to Machine Type Communication (MTC). MTC devices refer to machines that can communicate with other machines/metering devices such as electric charge meters or water meters, without a user's involvement. MTC devices can attempt to access a network irrespective of the priority.

In order to process MTC devices, LTE release 10 (the term ‘release’ refers to version information and the larger the number the more recent the version) provides a procedure where a UE that makes an access attempt informs an evolved Node B (eNB) that ‘an access request is made by an MTC device’ via an access request message; and the eNB determines whether to permit the access request, or, if it rejects the access request, informs the UE of how much time should pass before the UE it can make an access request.

However, the procedure of LTE release 10 is disadvantageous in that the UE must transmit an access request message at the initial stage. In particular, if a number of UEs simultaneously transmit access requests to the eNB, an access overload may occur. Therefore, there is a need for a system that addresses these problems.

The above information is presented as background information only to assist with an understanding of the present disclosure. No determination has been made, and no assertion is made, as to whether any of the above might be applicable as prior art with regard to the present invention.

SUMMARY OF THE INVENTION

Aspects of the present invention are to address the above-mentioned problems and/or disadvantages and to provide at least the advantages described below. Accordingly, an aspect of the present invention is to provide a system and method that determines, when a Machine Type Communication (MTC) device makes an attempt to access a network in a wireless communication system, whether the MTC device can access the network before transmitting an access request message to the network, and that allows the UE to make an attempt to access the network according to the determination.

Another aspect of the present invention is to provide a system and method that can process a back off included in a random access reply message while an MTC device without barring the access to a network is performing a random access procedure.

Another aspect of the present invention is to provide a system and method that allows a User Equipment (UE) to identify information regarding Access Class Barring (ACB) and Extended Access Barring (EAB), transmitted from an evolved Node B (eNB), by employing an ACB mechanism and an EAB mechanism before transmitting an access request message to the eNB, and to determine whether the UE can access the eNB.

To this end, although the UE is an MTC device, the UE does not employ the EAB in any of the following cases:

-   -   If the UE makes an access attempt to receive a call (mobile         terminated call-Access (mt-Access));     -   If the UE makes an emergency call; and     -   If the UE makes an access attempt with a high priority (i.e., a         highPriorityAccess).

In addition, when EAB and ACB are activated, if an MTC device employs EAB first, and then concludes that it can perform an access attempt, the MTC device employs ACB and then determines whether the access succeeds.

In accordance with an aspect of the present invention, an access control method of a MTC device in a wireless communication system is provided. The method includes determining whether a Radio Resource Control (RRC) connection establishment corresponds to a Cause 1 or a Cause 2, establishing, if the RRC connection establishment corresponds to the Cause 1, the RRC connection so that the RRC connection is not subject to EAB procedure, and determining, if the RRC connection establishment corresponds to the Cause 2, whether to employ the EAB procedure according to an establishment of a System Information Block (SIB) transmitted from an evolved Node B (eNB), and employing the EAB procedure according to the determination.

In accordance with another aspect of the present invention, a MTC device for controlling access to an eNB in a wire communication system is provided. The MTC device includes a transceiver for transmitting and receiving signals to and from the eNB, and a controller. The controller determines whether an RRC connection establishment corresponds to a Cause 1 or a Cause 2, establishes, if the RRC connection establishment corresponds to the Cause 1, the RRC connection so that the RRC connection is not subject to EAB procedure, and determines, if the RRC connection establishment corresponds to the Cause 2, whether to employ the EAB procedure according to an establishment of a SIB transmitted from the eNB, and employing the EAB procedure according to the determination.

Other aspects, advantages, and salient features of the invention will become apparent to those skilled in the art from the following detailed description, which, taken in conjunction with the annexed drawings, discloses exemplary embodiments of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

The above and other aspects, features, and advantages of certain exemplary embodiments of the present invention will become more apparent from the following description taken in conjunction with the accompanying drawings, in which:

FIG. 1 illustrates a configuration of a Long Term Evolution (LTE) system according to an exemplary embodiment of the present invention;

FIG. 2 illustrates a view showing a wireless protocol stack of an LTE system according to an exemplary embodiment of the present invention;

FIG. 3A illustrates a view that describes communication between non-Machine Type Communication (MTC) User Equipments (UEs) according to an exemplary embodiment of the present invention;

FIG. 3B illustrates a view that describes communication between MTC devices according to an exemplary embodiment of the present invention;

FIG. 4 illustrates a flowchart that describes a method via the application of Extended Access Barring (EAB) and Access Class Barring (ACB), according to an exemplary embodiment of the present invention;

FIG. 5 illustrates a flowchart that describes a method for operating a UE, according to a first exemplary embodiment of the present invention;

FIG. 6 illustrates a flowchart that describes a method for operating a UE, according to a second exemplary embodiment of the present invention;

FIG. 7 illustrates an example of a format of a new Random Access Response (RAR) message, according to an exemplary embodiment of the present invention;

FIG. 8 illustrates a schematic block diagram of a UE according to an exemplary embodiment of the present invention; and

FIG. 9 illustrates a schematic block diagram of an evolved Node B (eNB) according to an exemplary embodiment of the present invention.

Thoughout the drawings, it should be noted that like reference numbers are used to depict the same or similar elements, features, and structures.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

The following description with reference to the accompanying drawings is provided to assist in a comprehensive understanding of exemplary embodiments of the invention as defined by the claims and their equivalents. It includes various specific details to assist in that understanding but these are to be regarded as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. In addition, descriptions of well-known functions and constructions may be omitted for clarity and conciseness.

The terms and words used in the following description and claims are not limited to the bibliographical meanings, but, are merely used by the inventor to enable a clear and consistent understanding of the invention. Accordingly, it should be apparent to those skilled in the art that the following description of exemplary embodiments of the present invention is provided for illustration purpose only and not for the purpose of limiting the invention as defined by the appended claims and their equivalents.

It is to be understood that the singular forms “a,” “an,” and “the” include plural referents unless the context clearly dictates otherwise. Thus, for example, reference to “a component surface” includes reference to one or more of such surfaces.

Although the following exemplary embodiments will be described based on Long Term Evolution (LTE) systems or LTE-Advanced (LTE-A) systems, it should be understood that the invention is not limited to the described exemplary embodiments. That is, the invention can also be applied to various types of communication systems and their modifications if they have technology backgrounds or channels similar to those of LTE and LTE-A systems.

FIG. 1 illustrates a configuration of an LTE system according to an exemplary embodiment of the present invention.

Referring to FIG. 1, the LTE system configures the wireless access network, including evolved Node Bs (eNBs) 105, 110, 115, and 120, a Mobility Management Entity (MME) 125, and a Serving-Gateway (S-GW) 130. User Equipment (UE) 135 can access an external network via the eNBs 105, 110, 115, and 120 and the S-GW 130.

The eNBs 105, 110, 115 and 120 correspond to Node Bs of the Universal Mobile Telecommunications System (UMTS) system. The eNBs 105, 110, 115 or 120 are connected to the UE 135 via a wireless channel and perform more complicated functions than a Node B of the UMTS system. Since the LTE system provides real time services, such as Voice over Internet Protocol (IP) (VoIP), and all user traffic via a shared channel, the LTE system uses devices that can collect information regarding states, such as states of a buffer of a UE, states of available transmission power, states of channels, etc., and can make a schedule. The eNBs 105, 110, 115 and 120 are examples of such devices. One eNB controls a number of cells. For example, in order to implement a transmission rate of 100 Mbps, the LTE system employs Orthogonal Frequency Division Multiplexing (OFDM) at a bandwidth of 20 MHz, as a wireless access technology. The LTE system also employs Adaptive Modulation & Coding (AMC) to determine a modulation scheme and a channel coding rate, meeting the channel state of the UE. The S-GW 130 provides a data bearer. The S-GW 130 creates or removes data bearers according to the control of the MME 125. The MME 125 manages the mobility of the UE and controls a variety of functions. The MME 125 connects to a number of eNBs, such as eNBs 105, 110, 115 and 120.

FIG. 2 illustrates a view of the wireless protocol stack of an LTE system according to an exemplary embodiment of the present invention.

Referring to FIG. 2, a UE and an eNB communicate using a Packet Data Convergence Protocol (PDCP) layer 205 and 240, a Radio Link Control (RLC) layer 210 and 235, and a Medium Access Control (MAC) layer 215 and 230, respectively. The PDCP layer 205 and 240 compresses/decompresses an IP header. The RLC layer 210 and 235 reconfigures a PDCP Packet Data Unit (PDU) into a proper size. The MAC layer 215 and 230 connects to a number of RLC layer devices configured in one UE. The MAC layer 215 and 230 multiplexes RLC PUDs to a MAC PDU, and de-multiplex RLC PDUs from MAC PDU. The Physical (PHY) layer 220 and 225 channel-codes and modulates data from the upper layers, creates OFDM symbols, and transmits them via a wireless channel. In addition, the PHY layer 220 and 225 demodulates and channel-decodes OFDM symbols transmitted via a wireless channel, and transfers them to the upper layers. The PHY 220 and 225 also employs Hybrid Automatic Repeat-reQuest (ARQ) to perform additional error correction, where the receiving end determines whether a packet from a transmitting end has been received by transmitting 1 bit to the transmitting end, which is referred to as HARQ ACKnowledgement (ACK)/Negative ACKnowledgement NACK information. Downlink HARQ ACK/NACK information with respect to an uplink transmission is transmitted via a Physical Hybrid-ARQ Indicator Channel (PHICH). Likewise, uplink HARQ ACK/NACK information with respect to downlink transmission is transmitted via a Physical Uplink Control Channel (PUCCH) or Physical Uplink Shared Channel (PUS CH).

FIG. 3A illustrates a view that describes communication between non-MTC UEs according to an exemplary embodiment of the present invention. FIG. 3B illustrates a view that describes communication between MTC devices according to an exemplary embodiment of the present invention.

Referring to FIG. 3A, when communication, e.g., a voice call, is made between non-MTC UEs, one UE may serve as a caller and the other as a call receiver, while connecting to each other via an eNB and a core network.

On the contrary, referring to FIG. 3B, when communication is made between MTC devices, an MTC device is connected to an MTC server via an eNB and a core network. That is, MTC is performed between machines, and this differs from communication between the UEs shown in FIG. 3A.

In order to bar access from a UE to a network, an LTE system supports an Access Class Barring (ACB) mechanism since LTE release 8, and further Extended Access Barring (EAB) mechanism since LTE release 11. Both, either or neither of ACB and EAB may be used.

An ACB mechanism supported by the LTE system refers to a mechanism that bars access according to Access Classes (ACs) 0 to 15 of a UE stored in a Universal Subscriber Identity Module (USIM) card of a UE. The operation is described in detail as follows.

The UE determines whether a System Information Block No. 2 (SIB 2) transmitted from an eNB includes an ac-BarringInfo parameter. If the UE ascertains that SIB 2 includes the ac-BarringInfo parameter, the UE performs the identification procedure as follows.

-   -   If the UE has one or more ACs 11 to 15 that are available, and         bit information regarding the available ACs 11 to 15 of UE is         set to ‘1’ in ac-BarringForSpecialAC information transmitted         from an eNB, the UE can perform an access attempt.     -   ACs 11-15 being available means that ACs 12, 13 and 14 are         available only in a home country of the UE (i.e., a service         provider's country to which the UE is subscribed), and ACs 11         and 15 are available only in a Home Public Land Mobile Network         (HPLMN) that refers to a service provider to which the UE is         subscribed and in an Equivalent Home Public Land Mobile Network         (EHPLMN) that refers to a service provider equivalent to the         HPLMN.     -   Otherwise, the UE generates a number between ‘0’ and ‘1.’ If the         generated number is less than the ac-BarringFactor parameter         value, the UE can perform an access attempt. If the generated         number is greater than the ac-BarringFactor parameter value, the         UE cannot perform an access attempt.     -   If access is barred via the processes described above, the UE         re-generates a number between ‘0’ and ‘1.’ An access bar time,         Tbarring, can be calculated using Equation 1.         Tbarring=(0.7+0.6×rand)×ac-BarringTime   [Equation 1]

An EAB mechanism supported by the LTE system refers to a mechanism that bars access according to ACs 0 to 9 of a UE stored in a USIM card of the UE. The operation is described in detail as follows.

The UE determines whether an SIB transmitted from an eNB includes an EAB parameter. If the UE ascertains that the SIB includes an EAB parameter, the UE performs the identification procedure as follows.

-   -   If the UE is included in a category indicated by an eab-Category         parameter transmitted from an eNB, and a value between ACs 0 to         9 that the UE belongs to is set to ‘1’ in a bit map of an         eab-BarringBitmap parameter, the UE cannot perform an access         attempt.     -   The category of the UE to which the EAB indicated by the         eab-Category is applied are divided into three sub-categories as         follows:         -   UEs set for EAB;         -   UEs, from among the UEs set for EAB, which do not exist on             HPLMN or EHPLMN, i.e., UEs of the other service providers;             and         -   UEs from among the UEs set for EAB, which do not exist on             HPLMN or EHPLMN, or UEs from among the UEs in a roaming             process, which do not exist on one of the Public Land Mobile             Networks (PLMNs) in the list defined by a service provider             stored in the USIM, i.e., UEs from among the UEs set for             EAB, which exclude service providers' high priority UEs when             roaming.     -   Otherwise, the UE cannot perform an access attempt.     -   If access is barred via the processes described above, a notice         is made to the upper layer that access is barred via EAB.

FIG. 4 illustrates a flowchart that describes a method via the application of EAB and ACB, according to an exemplary embodiment of the present invention.

A UE 401 receives a request for Radio Resource Control (RRC) connection establishment with an eNB 403 from the upper layer. The upper layer of the UE 401 refers to a Non-Access Stratum (NAS) layer. The upper layer of the UE 401 informs the lower layer of the UE 401 as to whether the RRC connection establishment relates to EAB, i.e., whether EAB should be applied to the RRC connection establishment at step 411. The lower layer of the UE 401 refers to an Access Stratum (AS) layer.

If the upper layer of the UE 401 satisfies the following conditions, despite the UE 401 being an MTC device, it may inform the lower layer that the RRC connection establishment does not relate to EAB in order to employ EAB. The following cases are referred to as ‘Cause 1’:

-   -   If a UE makes an access attempt to receive a call (mobile         terminated call-Access (mt-Access));     -   If a UE makes an emergency call; and     -   If a UE makes an access attempt with a high priority         (highPriorityAccess).

If the upper layer of the UE 401 satisfies the following conditions, it may inform the lower layer that the RRC connection establishment relates to EAB so that the MTC device employs EAB. The following cases are referred to as ‘Cause 2’:

-   -   If a UE makes an access attempt to make a call to transmit data         (mobile originated call-Data (mo-Data));     -   If a UE makes an access attempt to make a call to transmit a         control message (mobile originated call-Signaling         (mo-Signaling)); and     -   If a UE makes an access attempt to make a call irrespective of a         transmission delay such as an MTC service (delayTolerantAccess).

In the present exemplary embodiment, the reasons for discerning between Cause 1 and Cause 2 are as follows.

Regarding Cause 1, mt-Access is used to transmit data for a corresponding UE via a network. The UE 401 cannot determine the importance of the data until it receives the data. Therefore, if an access delay occurs, the UE 401 may lose important data. If the UE 401 delays a call during an emergency situation, this may endanger the user. An access attempt with a high priority is required to be differentiated from a general access attempt or an access with a lower priority.

Regarding Cause 2, this includes a cause that does not cause problems although the UE 401 delays access. Therefore, the upper layer of UE 401 informs the lower layer that an EAB mechanism can be employed for Cause 2 only.

Additionally, when the UE 401 accesses the eNB 403, it receives an SIB 2 from the eNB 403 in order to determine whether to employ ACB, and determines whether SIB 2 includes an AC barring parameter at step 413. If SIB 2 includes an AC barring parameter, UE 401 makes an attempt to access the eNB 403, employing ACB, and determines whether it can access the eNB 403 at step 413.

If the UE 401 ascertains that EAB should be applied to the RRC connection establishment at step 411, the UE 401 receives an SIB from the eNB 403 in order to determine whether the eNB 403 bars EAB related access, and determines whether the SIB includes an EAB related parameter at step 415.

If the SIB includes an EAB related parameter at step 415, the UE 401 performs an attempt to access the eNB 403, employing EAB if it is related to the access, and determines whether it can access the eNB 403.

For the sake of convenience in description, in an exemplary embodiment of the present invention, it is assumed that the eNB 403 employs EAB and ACB. If the RRC connection establishment corresponds to Cause 1, the UE 401 does not apply EAB to the access but applies ACB thereto at step 419. On the contrary, if the RRC connection establishment corresponds to Cause 2, the UE 401 applies EAB and ACB to the access at steps 417 and 419, and determines whether to make an attempt to perform RRC connection establishment. Since the eNB 403 employs EAB and ACB, the UE 401 that has Cause 2 as a cause of RRC connection establishment applies EAB first, prior to ACB, to the access, and then determines whether the access is barred due to EAB. For only the case where the access is not barred due to EAB, the UE 401 applies ACB to the access. If the access is not barred by ACB, the UE 401 may make an attempt to perform RRC connection establishment.

Regarding EAB and ACB, the system is operated as follows.

An ACB mechanism refers to a mechanism that bars the access according to ACs 0 to 15 of the UE 401 stored in a USIM card of the UE 401. The operation is described in detail as follows.

The UE 401 determines whether SIB 2 transmitted from the eNB 403 includes an ac-BarringInfo parameter. If the UE 401 ascertains that SIB 2 includes an ac-BarringInfo parameter, the UE 401 performs the identification procedure as follows.

-   -   If the UE 401 has one or more ACs 11 to 15 that are available,         and bit information regarding the available ACs 11 to 15 of UE         401 is set to ‘1’ in ac-BarringForSpecialAC information         transmitted from an eNB 403, the UE 401 can perform an access         attempt.     -   ACs 11-15 being available means that ACs 12, 13 and 14 are         available only in a home country of UE 401 (i.e., a service         provider's country to which the UE 401 is subscribed), and ACs         11 and 15 are available only in a HPLMN that refers to a service         provider to which the UE 401 is subscribed and in an EHPLMN that         refers to a service provider equivalent to the HPLMN.     -   Otherwise, the UE 401 generates a number between ‘0’ and ‘1.’ If         the generated number is less than the ac-BarringFactor parameter         value, the UE 401 can perform an access attempt. If the         generated number is greater than the ac-BarringFactor parameter         value, the UE 401 cannot perform an access attempt.     -   If access is barred via the processes described above, the UE         401 re-generates a number between ‘0’ and ‘1.’ An access bar         time, Tbarring, can be calculated using Equation 2.         Tbarring=(0.7+0.6×rand)×ac-BarringTime   [Equation 2]

An EAB mechanism supported by the LTE system refers to a mechanism that bars the access according to ACs 0 to 9 of the UE 401 stored in a USIM card of UE 401. The operation is described in detail as follows.

The UE 401 determines whether a SIB transmitted from the eNB 403 includes an EAB parameter. If the UE 401 ascertains that SIB includes the EAB parameter, the UE 401 performs the identification procedure as follows.

-   -   If the UE 401 is included in a category indicated by an         eab-Category parameter transmitted from an eNB 403, and a value         between ACs 0 to 9 that the UE 401 belongs to is set to ‘1’ in a         bit map of an eab-BarringBitmap parameter, the UE 401 cannot         perform an access attempt.     -   The Category of the UE 401 to which EAB indicated by the         eab-Category is applied are divided into three sub-categories as         follows:         -   UEs set for EAB;         -   UEs, from among the UEs set for EAB, which do not exist on             HPLMN or EHPLMN, i.e., UEs of the other service providers;             and         -   UEs from among the UEs set for EAB, which do not exist on             HPLMN or EHPLMN, or UEs from among the UEs in a roaming             process, which do not exist on one of PLMN in the list             defined by a service provider stored in the USIM, i.e., UEs             from among the UEs set for EAB, which exclude service             providers' high priority UEs when roaming.     -   Otherwise, the UE 401 cannot perform an access attempt.     -   If access is barred via the processes described above, a notice         is made to the upper layer that access is barred via EAB.

After performing steps 417 and 419, if the UE 401 ascertains that the access to a cell is not barred, the UE 401 transmits a Random Access Preamble to the eNB 403 at step 421. The Random Access Preamble indicates one from among the sets noticed by the eNB 403, selected by the UE 401, and is transmitted to the eNB 403. Therefore, the eNB 403 does not detect which UE 401 makes an access attempt thereto.

If the eNB 403 receives the Preamble, the eNB 403 transmits a Random Access Response (RAR) message to the UE 401 at step 423. The RAR message may include the received Preamble index and the resource allocation, Type 1 backoff, and Type 2 backoff value.

Type 1 backoff is applied to a non-MTC UE and not a MTC device. Type 2 backoff is applied to UEs sharing a specific property (e.g., delay tolerant MTC device or EAB configured UE). That is, if the RAR message received at step 423 does not include the index of the Preamble transmitted from the UE 401 to the eNB 403 at step 421 but includes a Type 2 backoff value, the UE 401 waits a Type 2 backoff time period by employing the Type 2 backoff value at step 425. After the Type 2 backoff time period has elapsed at step 425, the UE 401 re-transmits a Random Access Preamble to the eNB 403 at step 427.

For example, if there is only a Type 1 backoff, an EAB configured UE applies the Type 1 backoff algorithm to the access. If there is only a Type 2 backoff, the EAB configured UE applies the Type 2 backoff algorithm to the access. If there are Type 1 backoff and Type 2 backoff, an EAB configured UE applies the Type 2 backoff algorithm first, prior to the Type 1 backoff algorithm, to the access. However, if there is a Type 1 backoff, a non-MTC UE applies the Type 1 backoff algorithm to the access. If there is not a backoff, the non-MTC UE 401 does not apply any backoff algorithm to the access.

A detailed format of the RAR message will be described further below with reference to FIG. 7.

After re-transmitting a Random Access Preamble to the eNB 403 at step 427, the UE 401 receives an RAR message thereto from the eNB 403 at step 429. If the received RAR message includes resource allocation information regarding the Preamble transmitted at step 427, the UE 401 transmits, to the eNB 403, an RRC connection request message, RRCConnectionRequest, including its identifier and the access attempt cause, according to the resource allocation information at step 431.

After receiving the RRC connection request message, the eNB 403 transmits the RRC connection setup message, RRCConnectionSetup, to the UE 401 and accepts the RRC connection setup at step 433. The UE 401 receives the RRC connection setup message from the eNB 403, and transmits an RRC connection setup complete message, RRCConnectionSetupComplete, to the eNB 403, thereby notifying the eNB 403 that RRC connection has been set up at step 435.

FIG. 5 illustrates a flowchart that describes a method for operating a UE, according to a first exemplary embodiment of the present invention.

A UE receives a request for a RRC connection establishment with an eNB from the upper layer (e.g., NAS) at step 503. The upper layer of UE informs the lower layer (e.g., AS) as to whether the RRC connection establishment is related to EAB or the RRC connection establishment employs EAB at step 505.

As described above with respect to FIG. 4, if an RRC connection establishment is requested due to Cause 1, the upper layer of UE informs the lower layer that RRC connection establishment is not related to EAB. If an RRC connection establishment is requested due to Cause 2, the upper layer of UE informs the lower layer that RRC connection establishment is related to EAB.

If RRC connection establishment is related to EAB at step 505, the UE receives SIB 2 and SIB at step 507. On the contrary, if RRC connection establishment is not related to EAB at step 505, UE receives only SIB 2 at step 509.

If RRC connection establishment is related to EAB at step 505 and SIB includes EAB related to information at step 511, the UE performs the EAB procedure at step 513. On the contrary, if RRC connection establishment is related to EAB at step 505, and SIB does not include EAB related to information at step 511 or SIB does not exist at step 509, the UE performs an ACB identification procedure at step 519. That is, UE performs the EAB procedure and then the ACB procedure.

An EAB procedure refers to a mechanism that bars the access according to ACs 0 to 9 of a UE stored in a USIM card of the UE. The operation is described in detail as follows.

The UE determines whether a SIB transmitted from an eNB includes an EAB parameter. If the UE ascertains that SIB includes an EAB parameter, the UE performs the identification procedure as follows.

-   -   If the UE is included in a category indicated by an eab-Category         parameter transmitted from an eNB, and a value between ACs 0 to         9 that the UE belongs to is set to ‘1’ in a bit map of an         eab-BarringBitmap parameter, the UE cannot perform an access         attempt.     -   The category of the UE to which EAB indicated by the         eab-Category is applied are divided into three sub-categories as         follows:         -   UEs set for EAB;         -   UEs, from among the UEs set for EAB, which do not exist on             HPLMN or EHPLMN, i.e., UEs of the other service providers;             and         -   UEs from among the UEs set for EAB, which do not exist on             HPLMN or EHPLMN, or UEs from among the UEs in a roaming             process, which do not exist on one of PLMN in the list             defined by a service provider stored in the USIM; i.e., UEs             from among the UEs set for EAB, which exclude service             providers' high priority UEs when roaming.     -   Otherwise, the UE cannot perform an access attempt.     -   If access is barred via the processes described above, a notice         is made to the upper layer that access is barred via EAB.

After performing the EAB procedure at step 513, the UE determines whether the access is barred by EAB at step 515. If the access is barred by EAB at step 515, UE informs the upper layer of the failure of the RRC connection establishment at step 517 and then terminates the operation.

On the contrary, if the access is not barred by EAB at step 515, the UE determines whether SIB 2 includes ACB information at step 519. If the UE ascertains that SIB 2 includes ACB information at step 519, the UE performs the ACB procedure at step 521. On the contrary, if SIB 2 does not include ACB information at step 519, the UE makes an attempt to perform RRC connection establishment via Random Access procedure at step 525.

The ACB procedure refers to a mechanism that bars access according to ACs 0 to 15 of a UE stored in a USIM card of the UE. The operation is described in detail as follows.

The UE determines whether the SIB 2 transmitted from an eNB includes an ac-BarringInfo parameter. If the UE ascertains that SIB 2 includes an ac-BarringInfo parameter, the UE performs the identification procedure as follows.

-   -   If the UE has one or more ACs 11 to 15 that are available, and         bit information regarding the available ACs 11 to 15 of UE is         set to ‘1’ in ac-BarringForSpecialAC information transmitted         from an eNB, the UE can perform an access attempt.     -   ACs 11-15 being available means that ACs 12, 13 and 14 are         available only in a home country of the UE (i.e., a service         provider's country to which the UE is subscribed), and ACs 11         and 15 are available only in a HPLMN that refers to a service         provider to which the UE is subscribed and in a EHPLMN that         refers to a service provider equivalent to the HPLMN.     -   Otherwise, the UE generates a number between ‘0’ and ‘1.’ If the         generated number is less than ac-BarringFactor parameter value,         the UE can perform an access attempt. If the generated number is         greater than ac-BarringFactor parameter value, the UE cannot         perform an access attempt.     -   If access is barred via the processes described above, the UE         re-generates a number between ‘0’ and ‘1.’ An access bar time,         Tbarring, can be calculated using Equation 3.         Tbarring=(0.7+0.6×rand)×ac-BarringTime   [Equation 3]

After performing the ACB procedure at step 521, the UE determines whether a cell access is barred by ACB at step 523. If a cell access has been barred by ACB at step 523, the UE re-applies the ACB procedure to the access after the access bar time, Tbarring, has elapsed at step 521. On the contrary, if a cell access is not barred via ACB at step 523, the UE makes an attempt to perform RRC connection establishment via Random Access procedure at step 525, which is described in detail below with reference to FIG. 6.

FIG. 6 illustrates a flowchart that describes a method for operating UE, according to a second exemplary embodiment of the present invention.

After performing EAB and ACB procedures as shown in FIG. 5, a UE makes an attempt to perform RRC connection establishment via a Random Access procedure at step 601. To this end, the UE transmits a Random Access Preamble to an eNB at step 602. The Random Access Preamble that will be transmitted may be selected randomly from among preambles by the UE or designated by the eNB.

After transmitting the Random Access Preamble to the eNB, the UE makes an attempt to receive an RAR message in a preset period of time at step 603. The UE checks the PDCCH to receive a RAR message, for a preset period of time, after a period of time has elapsed from a time point that it transmits the Preamble.

If the UE receives a MAC PDU addressed by a proper Radio Network Temporary Identity (RA-RNTI) in the preset period of time, the UE receives and decodes the RAR. The proper RA-RNTI is mapped, one-to-one, to a transmission resource (defined in time domain and frequency domain) to which the UE transmits the Preamble.

If the UE receives an RAR and ascertains that the RAR includes a backoff at step 603, the UE checks the type of UE and a cause of RRC connection establishment in order to determine the procedure to process the backoff at step 604.

If the UE ascertains that the UE is a non- MTC UE or, although the UE is an MTC device, the cause of RRC connection establishment is not a delayTolerantAccess at step 604, the UE proceeds with step 605. On the contrary, if the UE is an MTC device and the cause of RRC connection establishment is a delayTolerantAccess at step 604, the UE proceeds with step 608.

A non-MTC type of UE refers to general UE, not an MTC device. An MTC device refers to a machine type communication device that is provided with a Machine to Machine (M2M) service and performs communication between machines, not between humans or between humans and machines. An example of the MTC device is a metering device providing smart metering services. MTC devices are also referred to as UEs that are configured for EAB.

MTC devices generate data that is not urgent. MTC devices establish an RRC connection in order to transmit such data, in such a way that the EstablishmentCause field of an RRC connection request message, RRC CONNECTION REQUEST, is set as delayTolerantAccess.

MTC devices may transmit more important data (e.g., an alarm message, etc.). In that case, MTC devices may employ mo-Signaling, for example, for the EstablshmentCause field.

In an exemplary embodiment of the present invention, MTC devices are controlled via Type 2 backoff by default. However, if MTC devices are intended to transmit important data, it is preferable that they are subject to the same congestion control as non-MTC UEs.

When an MTC device establishes a RRC connection, the MTC device stores the establishment cause, EstablishmentCause, that it used. After that, the MTC device uses the EstablishmentCause to determine whether it is a delayTolerantAccess or the other value when performing a Random Access Procedure, thereby determining a backoff value according to the result.

If a UE in an idle mode performs a Random Access procedure to operate in a connection state, i.e., to perform a RRC connection establishment process, the UE checks whether EstablishmentCause of an RRC CONNECTION REQUEST message to be transmitted is delayTolerantAccess and then determines the operation according to the result.

After checking the type of UE and a cause of RRC connection establishment at step 604,

-   -   if the UE is not an MTC device, the UE performs a congestion         control process, employing Type 1 backoff at step 605;     -   if the UE is an MTC device that performs an Random Access         procedure for RRC connection establishment and the         EstablishmentCause of an RRC CONNECTION REQUEST message is not         delayTolerantAccess, the UE performs a congestion control         process, employing Type 1 backoff at step 605;     -   if the UE is an MTC device that performs an Random Access         procedure for RRC connection establishment and the         EstablishmentCause of an RRC CONNECTION REQUEST message is not         delayTolerantAccess, the UE performs a congestion control         process, employing Type 1 backoff at step 605;     -   if the UE is an MTC device that performs an Random Access         procedure for RRC connection establishment and the         EstablishmentCause of an RRC CONNECTION REQUEST message is         delayTolerantAccess, the UE performs a congestion control         process, employing Type 1 backoff and Type 2 backoff at step         608;     -   if the UE is an MTC device in an RRC connection state and the         EstablishmentCause has been set to a cause (e.g., emergency,         highPriorityAccess, mo-Signaling, or mo-Data) other than         delayTolerantAccess, when establishing the current RRC         connection, the UE performs a congestion control process,         employing Type 1 backoff at step 605; and     -   if the UE is an MTC device in an RRC connection state and the         EstablishmentCause has been set to delayTolerantAccess, when         establishing the current RRC connection, the UE performs a         congestion control process, employing Type 1 backoff and Type 2         backoff at step 608.

If the UE is a non-MTC UE or an MTC device with high priority access, the UE checks whether the received RAR includes Type 1 backoff at step 605.

If the UE ascertains that the received RAR does not include Type 1 backoff at step 605, it sets the backoff parameter to 0 ms at step 606. This means that backoff is not employed when re-transmitting a Preamble due to a variety of causes, such as a congestion resolution failure, etc.

On the contrary, if the UE ascertains that the received RAR includes Type 1 backoff at step 605, the UE sets the backoff parameter to a value indicated by Type 1 backoff at step 607. This means that a value is randomly selected between ‘0’ and a value stored in the backoff parameter when re-transmitting a Preamble due to a variety of causes, such as a congestion resolution failure, etc., and the backoff is performed by the selected value.

If the UE is an MTC device that performs access, delayTolerantAccess, the UE checks whether the received RAR includes Type 1 backoff and Type 2 backoff at step 608. The format of RAR will be described in detail further below with reference to FIG. 7.

If the received RAR does not include Type 1 backoff and Type 2 backoff at step 608, the UE stores ‘0’ ms as a backoff parameter at step 609.

If the received RAR includes Type 1 backoff at step 608, the UE stores Type 1 backoff value as a backoff parameter at step 610. The stored value is applied to the transmission of the Preamble.

If the received RAR includes Type 1 backoff and Type 2 backoff at step 608, the UE stores Type 2 backoff value as a backoff parameter at step 611. The stored value is applied to the transmission of the Preamble.

Meanwhile, if Type 2 backoff exists and is less than Type 1 backoff (or if Type 2 backoff is 0 ms but Type 1 backoff is not 0 ms), the UE stores Type 1 backoff as a backoff parameter. It is normal that the exceptional case does not occur; however, the exceptional case is prepared to process a case that occurs since Type 2 backoff always exists during the standard process, and that may be determined by indicating ‘0’ ms if there is no need to apply a Type 2 backoff.

After that, the UE performs a Random Access process, e.g., a message transmitting process, a contention resolution process, or the like, at step 612.

FIG. 7 illustrates an example of a format of a new RAR message, according to an exemplary embodiment of the present invention.

A RAR message includes two parts, first part 701 and second part 703.

The first part 701 is configured in the same format as a RAR of the related art, so that it can be detected by all UEs. That is, the first part 701 includes a number of MAC subheaders 711, 713, 715 and 717 and a number of RAR payloads 719, 721 and 723.

The MAC subheaders have one byte and includes Type 1 backoff information 711 or Random Access Preamble Identifiers (RAPIDs) 713, 715 and 717. The information MAC subheaders include is indicated by a value of a bit position (e.g., the second bit). The MAC subheaders may or may not include Type 1 backoff 711. If Type 1 backoff 711 is included in the MAC subheaders, it is indicated by the first MAC subheader.

The RAR payloads 719, 721 and 723 include information regarding reverse resource allocation and information regarding a transmission timing control command, Timing advance Command.

The second part 703 includes Type 2 backoff. The UE determines the presence of Type 2 backoff and the value, referring to the format of the second part 703.

Type 2 backoff is located at the first byte of the second part 703, for example. The second part 703 configures a number of components 731, 733, 735 and 737.

An E bit 731 indicates whether the next byte is a padding or another subheader.

A T bit 733 indicates whether a corresponding byte is related to Type 2 backoff.

A scaling factor 735 is a value that is combined with a backoff indicator and defines the final Type 2 backoff. Type 2 backoff=Scaling factor×Backoff Indicator

The Scaling factor has two bits and the definitions presented in the following table.

Scaling factor Definitions 0 x1 1 xn₁ 2 xn₂ 3 xn₃

Referring to the table, if the scaling factor is ‘0,’ Type 2 backoff can be calculated by multiplying Backoff Indicator by ‘1.’

As such, backoff Indicator used for Type 1 backoff is reused to calculate Type 2 backoff. Type 2 backoff should indicate a larger value than Type 1 backoff. However, the exemplary embodiment of the present invention is implemented in such a way that the scaling factor and backoff indicator used for Type 1 backoff are reused for the other type of backoff, thereby avoiding defining an additional backoff.

The UE calculates a start time point of the second part as follows.

First, UE identifies the size of the first part. An MAC subheader and each RAR payload are one byte and six bytes in size, respectively. The UE can calculate from which byte the second byte starts using Equation 4. n+m×7   [Equation 4] where n is the number of subheaders of Type 1 backoff and m is the number of RAPID subheaders. Here, n is ‘0’ or ‘1.

The second part 703 follows the last byte of the first part 701.

FIG. 8 illustrates a schematic block diagram of user equipment according to an exemplary embodiment of the present invention.

Referring to FIG. 8, the UE includes a transceiver 805, a controller 810, a multiplexer and demultiplexer 815, a control message processor 830, upper layer devices 820 and 825.

The transceiver 805 receives data and control signals via the forward channel of a serving cell and transmits data and control signals via the reverse channel. If the UE establishes channels with a number of serving cells, the transceiver 805 can transmit and receive data and control signals to and from the serving cells.

The multiplexer and demultiplexer 815 multiplexes data from the control message processor 830 or the upper layer devices 820 and 825 or de-multiplexes data from the transceiver 805, and transfers the processed data to the control message processor 830 or the upper layer devices 820 and 825.

The control message processor 830 processes control messages from an eNB and performs corresponding operations. For example, the control message processor 830 receives Discontinuous Reception (DRX)-related parameters and transfers them to the controller 810.

The upper layer devices 820 and 825 may be configured according to types of services. For example, the upper layer devices 820 and 825 process data, generated when user services such as File Transfer Protocol (FTP) or VoIP services are provided, and transfer them to the multiplexer and demultiplexer 815. The upper layer devices 820 and 825 may also process data, from the multiplexer and demultiplexer 815, and transfers them to the upper layer service application.

The controller 810 receives a scheduling command via the transceiver 805, identifies the reverse grants, and controls the transceiver 805 and the multiplexer and demultiplexer 815 to transmit them as a proper transmission resource, in the reverse direction, at a proper time point. The controller 810 also controls the transceiver 805 to perform DRX operation and Channel State Information (CSI)/Sounding Reference Signal (SRS) transmission.

The controller 810 determines whether RRC connection establishment corresponds to Cause 1 or 2. If RRC connection establishment corresponds to Cause 1, the controller 810 establishes an RRC connection so that it is not subject to EAB. On the contrary, if RRC connection establishment corresponds to Cause 2, the controller 810 determines whether an EAB procedure is employed according to an SIB transmitted from an eNB, and performs EAB according to the determination.

Cause 1 may be one or more cases where a UE makes an access attempt to receive a call, a UE makes an emergency call, and a UE makes an access attempt with a high priority. Cause 2 may be one or more cases where a UE makes an access attempt to make a call to transmit data a UE makes an access attempt to make a call to transmit control message, and a UE makes an access attempt to make a call irrespective of a transmission delay such as an MTC service.

The controller 810 determines whether to employ ACB according to the establishment of SIB transmitted from an eNB, and employs the ACB procedure according to the determination. That is, if the controller 810 ascertains cases where the access is not subject to EAB because it corresponds to Cause 1, and the access is not barred according to the result of employing EAB procedure, the controller 810 determines whether to employ ACB according to the establishment of SIB transmitted from an eNB, and employs the ACB procedure according to the determination.

If the access is not barred according to the result of employing the EAB and ACB, the controller 810 requests RRC connection establishment from the eNB.

Although the exemplary embodiment of the UE is implemented in such a way that the components are distinguished according to the functions, it should be understood that the present invention is not limited to the exemplary embodiment. For example, the exemplary embodiment may be modified in such a way that the controller 810 can perform the operations of the control message processor 830. This principle can also be applied to the eNB described as follows.

FIG. 9 illustrates a schematic block diagram of an eNB according to an exemplary embodiment of the present invention.

Referring to FIG. 9, the eNB includes a transceiver 905, a controller 910, a multiplexer and demultiplexer 920, a control message processor 935, upper layer devices 925 and 930, and a scheduler 915.

The transceiver 905 transmits data and control signals via the forward carriers and receives data and control signals via the reverse carriers. If a number of carriers are set, the transceiver 905 transmits and receives data and control signals via the carriers.

The multiplexer and demultiplexer 920 multiplexes data from the control message processor 935 or the upper layer devices 925 and 930 or de-multiplexes data from the transceiver 905, and transfers the processed data to the control message processor 935 or the upper layer devices 925 and 930 or the controller 910.

The control message processor 935 processes control messages from the UE and performs corresponding operations. The control message processor 935 also generates control messages to be transmitted to the UE and transmits them to the lower layer.

The upper layer devices 925 and 930 may be configured according to types of services. For example, the upper layer devices 925 and 930 process data, generated when user services such as FTP or VoIP services are provided, and transfer them to the multiplexer and demultiplexer 920. The upper layer devices 925 and 930 may also process data, from the multiplexer and demultiplexer 920, and transfers them to the upper layer service application.

The controller 910 detects a time point when UE will transmit CSI/SRS and controls the transceiver 905 to transmit CSI/SRS.

The scheduler 915 allocates transmission resources at a proper time point, considering the buffer state, the channel state and Active time of the UE. The scheduler 915 processes signals transmitted from or to the UE.

As described above, the system and method according to exemplary embodiments of the present invention can control the operations of UEs that make attempts to access a network, thereby preventing excessive access.

While the invention has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the of the invention as defined in the appended claims and their equivalents. 

What is claimed is:
 1. An access control method of a user equipment (UE) in a wireless communication system, the method comprising: requesting, by a first layer of the UE, a second layer of the UE to establish a radio resource control (RRC) connection; and indicating, if the UE is configured for extended access barring (EAB), to the second layer of the UE that EAB is applied for a request for the RRC connection except for a specific case for access control, wherein the specific case comprises the UE is accessing a network with one of an access class (AC) 11-15.
 2. The method of claim 1, wherein the specific case comprises a cause of an RRC establishment is for an emergency call.
 3. The method of claim 1, further comprising: checking, by the second layer of the UE, if the first layer of the UE indicates that EAB is applied for the request for the RRC connection, whether access to a cell is barred by the EAB; and informing, by the second layer of the UE, if the access to the cell is barred by the EAB, of a failure of the RRC connection to the first layer of the UE.
 4. The method of claim 3, wherein the checking of whether access to the cell is barred by the EAB comprises: if first system information block received from a base station includes an EAB parameter, if the UE belongs to a category of UEs as indicated in an EAB Category contained in the EAB parameter and if an AC of the UE belongs to a range excluding the AC 11 to 15, considering access to a cell as barred.
 5. The method of claim 1, further comprising: performing, if a second system information block received from a base station includes an AC barring parameter, an access barring check.
 6. The method of claim 5, wherein the performing of the Access barring check comprises: considering, if the UE has one or more ACs with a value in a first range, which is valid for the UE, access to a cell as not barred; generating, if the UE does not have the one or more ACs with the value in the first range, a random number uniformly distributed in the range of 0 to 1; and considering, if the random number is lower than a value indicated by the AC barring parameter, access to the cell as not barred, and considering, if the random number is not lower than the value indicated by the AC barring parameter, access to the cell as barred.
 7. A user equipment (UE) for controlling access to a base station in a wireless communication system, the UE comprising: a transceiver configured to transmit and receive signals; and a controller configured to: request, by a first layer of the UE, a second layer of the UE to establish a radio resource control (RRC) connection; and indicate, if the UE is configured for extended access barring (EAB), to the second layer of the UE that EAB is applied for a request for the RRC connection except for a specific case for access control, wherein the specific case comprises the UE is accessing a network with one of an access class (AC) 11 to
 15. 8. The UE of claim 7, wherein the specific case comprises a cause of an RRC establishment is for an emergency call.
 9. The UE of claim 8, wherein the controller controls to check, if the first layer of the UE indicates that EAB is applied for the request for the RRC connection, whether access to a cell is barred by the EAB and to inform, if the access to a cell is barred by the EAB, of a failure of the RRC connection to the first layer of the UE.
 10. The UE of claim 9, wherein the controller controls to consider, if first system information block received from a base station includes an EAB parameter, if the UE belongs to a category of UEs as indicated in an EAB Category contained in the EAB parameter and if an AC of the UE belongs to a range excluding the AC 11 to 15, access to a cell as barred.
 11. The UE of claim 7, wherein the controller controls to perform, if a second system information block received from a base station includes an AC barring parameter, an access barring check.
 12. The UE of claim 11, wherein the controller controls to: consider, if the UE has one or more ACs with a value in a first range, which is valid for the UE, access to a cell as not barred; and generate, if the UE does not have the one or more ACs with the value in the first range, a random number uniformly distributed in the range of 0 to 1, consider, if the random number is lower than a value indicated by the AC barring parameter, access to the cell as not barred, and consider, if the random number is not lower than the value indicated by the AC barring parameter, access to the cell as barred. 