Apparatus and methods for managing access and update requests in a wireless network
First Claim
1. A method for reducing network access congestion on a wireless network having a plurality of wireless devices associated therewith, the method comprising:
- monitoring a first channel to detect a plurality of requests issued by respective ones of said plurality of wireless devices;
determining when a triggering criterion has been met based at least in part on said monitoring; and
sending a plurality of responses on a second channel to said respective ones of said plurality of devices, said responses imposing a multiple access scheme on subsequent access request messages from said respective ones of said plurality of wireless devices, said multiple access scheme reducing congestion within at least a portion of said network.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus that enable a wireless network to detect and manage impending congestion events caused by a plurality of mobile devices attempting to access the network in a brief space of time. In one embodiment, the network comprises a 3g (UMTS) cellular network, and includes a congestion management and avoidance entity that preemptively triggers a collision mode upon detecting an impending congestion event. This mode advantageously reduces processing burden on the base station by causing the mobile devices (UEs) to halt current access attempts, and invoke a multiple access scheme (e.g., wait a random amount of time before attempting further access attempts). The comparatively early detection and avoidance of collisions reduces the mobile device'"'"'s power consumption, while addressing congestion events early in the wireless communication process so as to maintain optimal network conditions.
-
Citations
34 Claims
-
1. A method for reducing network access congestion on a wireless network having a plurality of wireless devices associated therewith, the method comprising:
-
monitoring a first channel to detect a plurality of requests issued by respective ones of said plurality of wireless devices; determining when a triggering criterion has been met based at least in part on said monitoring; and sending a plurality of responses on a second channel to said respective ones of said plurality of devices, said responses imposing a multiple access scheme on subsequent access request messages from said respective ones of said plurality of wireless devices, said multiple access scheme reducing congestion within at least a portion of said network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer readable apparatus comprising a storage medium storing at least one computer program, said program comprising a plurality of instructions which, when executed by a processing device:
-
monitor an access channel of a wireless network to determine a number of wireless devices that intend to issue an access request message; and send a plurality of negative response messages on a synchronization channel of said wireless network if said number of wireless devices that intend to issue an access request message exceeds a threshold value. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A congestion-avoidance system for use in a wireless network, the system comprising:
-
an access node; a relay station in wireless signal communication with said access node; and a plurality of wireless devices configured to at least communicate indirectly with said access station via said relay station; wherein said relay station comprises apparatus adapted to cause delay of a plurality of access request messages to said access station whenever the number of said plurality of wireless devices expected to issue said access request messages exceeds a prescribed criterion. - View Dependent Claims (16, 17)
-
-
18. Apparatus for reducing network access congestion, comprising:
-
a receiver; a transmitter; a processing device; and a memory; wherein said memory comprises a computer program having instructions which, when executed by said processing device; detects when the number of wireless devices that intend to issue an update request message or a random access will meet a given criterion; receives via said receiver a plurality of requests on an access channel; and transmits a plurality of negative response messages on a synchronization channel in response to at least a portion of said received requests. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
- 25. A method of operating a cellular communication system so as to avoid simultaneously receiving an excessive number of requests for a service on a first channel, comprising sending a message on a second channel, said message resulting in a staggering of said requests.
-
28. A method of reducing the power consumption of mobile devices used within a wireless network, said mobile devices each comprising a first protocol and a second related protocol, the method comprising:
-
receiving requests according to said first protocol from respective ones of said mobile devices; and issuing responses to said requests according to said first protocol, said issuing causing respective ones of said mobile devices to avoid invoking said second protocol for at least a period of time; wherein said second protocol would be invoked by said mobile devices but for said issued responses; and wherein said avoidance of said second protocol causes a reduction in power consumption within said mobile devices as compared to the power consumption associated with operating according to said second protocol. - View Dependent Claims (29, 30, 31, 32)
-
-
33. A method of reducing the power consumption of mobile devices used within a wireless network, said mobile devices each comprising a first protocol and a second protocol, said first protocol having a first power consumption associated therewith, and said second protocol having a second, greater power consumption associated therewith, the method comprising:
-
receiving a plurality of requests issued by respective ones of said mobile devices according to said first protocol; and spoofing collisions of said requests by sending responses to said issuing mobile devices that are indicative of a collision; wherein said spoofing causes said issuing mobile devices to enter an operational mode for at least a period of time that does not utilize said second protocol; and wherein without said spoofing, said second protocol would be utilized. - View Dependent Claims (34)
-
Specification