ࡱ > R e bjbjVV 1` < < + K) K) o- o- o- - - - 8 - ?. - . p 3/ 3/ 3/ I/ 1 h =2 $ a2 $ H t / o- u2 1 1 " u2 u2 / K) K) 3/ I/ f D 6 6 6 u2 v K) 3/ - 8 3/ 6 u2 6 6 * i , W- K 3/ ` - 2 v 1 f Z 0 a3 0 , K K > L $ o- l u2 u2 6 u2 u2 u2 u2 u2 / / 4 , u2 u2 u2 u2 u2 u2 u2 , u2 u2 u2 u2 u2 u2 u2 u2 u2 ( : ProjectIEEE 802.16 Broadband Wireless Access Working Group < HYPERLINK "http://ieee802.org/16"http://ieee802.org/16>TitleOptimized schemes of network re-entry for M2M in 16mDate Submitted2011-5-8Source(s)Honggang Li, Shantidev Mohant, Rui Huang, Xiangying Yang IntelE-mail: HYPERLINK "mailto:Honggang.li@intel.com" Honggang.li@intel.com Re:802.16p amendment textsAbstractPurposeDiscuss and adopt proposed textsNoticeThis document does not represent the agreed views of the IEEE 802.16 Working Group or any of its subgroups. It represents only the views of the participants listed in the Source(s) field above. It is offered as a basis for discussion. It is not binding on the contributor(s), who reserve(s) the right to add, amend or withdraw material contained herein.ReleaseThe contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEEs name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEEs sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.16.Patent PolicyThe contributor is familiar with the IEEE-SA Patent Policy and Procedures: < HYPERLINK "http://standards.ieee.org/guides/bylaws/sect6-7.html" \l "6" http://standards.ieee.org/guides/bylaws/sect6-7.html#6> and < HYPERLINK "http://standards.ieee.org/guides/opman/sect6.html" \l "6.3" http://standards.ieee.org/guides/opman/sect6.html#6.3>. Further information is located at < HYPERLINK "http://standards.ieee.org/board/pat/pat-material.html" http://standards.ieee.org/board/pat/pat-material.html> and < HYPERLINK "http://standards.ieee.org/board/pat" http://standards.ieee.org/board/pat>.Optimized schemes of network re-entry for M2M in 16m Honggang Li, Shantidev Mohant, Rui Huang, Xiangying Yang Intel Introduction The traffic characteristics of M2M devices for different purposes are different, some are periodic traffic or in some known pattern, the others are burst in unknown pattern, for the devices with the traffic in the known pattern, the contention free mechanism can be used for network re-entry if the device in idle mode, for the device with the traffic in the unknown pattern, the contention based mechanism should be kept. Another factor to be considered is mobility characteristics of M2M devices, for fixed M2M device, the large scale channel condition can be much more stable, and the small scale channel condition in UL can be measured through DL synchronization and measurement esp. in TDD mode, so that the ranging process for UL synchronization can be saved. But for mobile M2M device, the ranging process should be kept for reliable measurement and transmission in UL. Based on this analysis, the optimization of network re-entry for M2M in 16m is proposed in this following section. Optimization of network re-entry for M2M For different category of M2Mmobility and traffic characteristics, the mechanism of network re-entry can be optimized and categorized as shown in the following table: Table 1, optimized schemes of network re-entry for M2M Known traffic patternUnknown traffic patternFixed Grouping paging/multicasting, cell wide/multi-cell wide Dedicated ranging channel allocation for contention free access Ranging process with or without ranging code sentCommon /Dedicated ranging channel allocation for contention based access Ranging process with or without ranging code sent, if w/o ranging code sent, dedicated ranging channel should be usedMobileGrouping paging/multicasting, multi-cell wide Dedicated ranging channel allocation for contention free access S-RCH/NS-RCH can be usedCommon/Dedicated ranging channel allocation for contention based access NS-RCH/S-RCH can be used Based on the mobility and traffic characteristics of the M2M device, the BS can select the proper network re-entry scheme for M2M device, the selection can be based on the table-1, and the BS shall indicate the M2M device which network re-entry scheme in some control message. The mobility and traffic characteristics of the M2M device can be known by: explicitly AAI-DSA-REQ(traffic characteristics) and/or AAI-REG-REQ(SS capability) and/or location update(mobility) Or the implicit statistics by the BS or some network entity Or pre-provision to the BS from M2M server or other network entity Proposed texts 3.1 Proposed Text #1 ---------------------------------------------- Text Start ----------------------------------------------- 16.2.18.5 Network reentry from idle mode Based on the mobility and traffic characteristics of the M2M device, the BS can select the proper network re-entry scheme for M2M device, the selection is based on the table-xxx, and the BS shall inform the M2M device which network re-entry scheme, the indication process and message are FFS. Table xxx, optimized schemes of network re-entry for M2M Known traffic patternUnknown traffic patternFixed Dedicated ranging channel allocation for contention free access Ranging process with or without ranging code sent, if w/o ranging code sent, dedicated ranging channel should be usedCommon /Dedicated ranging channel allocation for contention based access Ranging process with or without ranging code sent, if w/o ranging code sent, dedicated ranging channel should be usedMobileDedicated ranging channel allocation for contention free access Ranging channel uses S-RCHCommon/Dedicated ranging channel allocation for contention based access Ranging channel uses NS-RCH ---------------------------------------------- Text End ----------------------------------------------- IEEE C802.16p-11_00xx PAGE 3 > ? a b c x y { | oj]XK h t 5PJ nHo(tH hd 5h[L 5PJ nHo(tH hX 5hQM hX 5PJ nHo(tH hgk 5PJ nHo(tH hm 5PJ nHo(tH hQM 5PJ nHo(tH hR 5PJ nHo(tH h7 5PJ nHo(tH hR 5PJ nHtHhX hq 0J j hq Uj hq U hq 5hq hiV hq PJ nHo(tH { | P M kd $$If 0 F* F D% 4 4 l al ? $G$ If gdT M kd $$If 0 F* F D% 4 4 l al ? $G$ If : " # > K M N V c d e Ǵ~pf[fpL