MULTIPLE ACCESS CATEGORIZATION FOR
MOBILE STATION
BACKGROUND
1. FIELD OF THE INVENTION
The present invention pertains to telecommunications, and particularly to the provision of multiple types of services for cellular or mobile telecommunications.
2. RELATED ART AND OTHER CONSIDERATIONS In recent years cellular telephones have become increasingly popular. A cellular telephone is just one example of what is referred to in telephone parlance as a "mobile station" or "mobile terminal". Telecommunications services are provided between a cellular telecommunications network and a mobile station (e.g., cellular telephone) over an air interface, e.g., over radio frequencies. At any moment an active mobile station is communication over the air interface with one or more base stations. The base stations are, in turn, managed by base station controllers (BSCs). The base station controllers are connected via control nodes to a core telecommunications network. Examples of control nodes include a mobile switching center (MSC) node for connecting to connection-oriented, circuit switched networks such as PSTN and/or ISDN, and a general packet radio service (GPRS) node for connecting to packet-switched networks such as Internet, for example.
A mobile station can take on various forms other than a cellular telephone, including a computer (e.g., a laptop computer) with mobile termination capabilities. In some forms, mobile stations are capable of engaging in differing types of services, or multimedia services. In other words, the mobile station can execute several differing types of programs (i.e., "applications") which interact with the user. Examples of these
2
applications include Internet browsers and electronic mail programs. Several multimedia applications may reside in the same mobile station.
An owner of a mobile station typically enters into a contract or subscription agreement with a service provider (e.g., a company which operates the telecommunications network through which the mobile station engages in telecommunications connections). As part of the subscription agreement, the mobile station is categorized as belonging to one of several access classes available on the network. The particular access class to which a mobile station belongs determines the conditions under which the mobile station will be permitted to use resources of the cellular network. Examples of access classes are provided in GSM 04.08, TIA/EIA IS- 136, and IS-95, for example.
In general, when a mobile station needs to access a cellular telecommunications network, the mobile station sends an access request message to the network over the air interface (e.g., the mobile station requests the set up of a "connection"). In the network, either the base station or the base station controller decides whether the mobile station is to be permitted use of a radio resource (e.g., a radio traffic channel) for the requested connection. The permission decision is based primarily upon the access class to which the mobile station belongs. The network may either grant or deny the request, depending on the preference given the mobile station's access class relative to network factors such as network congestion and the like.
As mentioned above, a mobile station may be capable of engaging in several different telecommunications services, and these services may be transacted simultaneously. Different types of telecommunications services may have differing sensitivities for delay. For some types of service, delay in transmissions may not be critical and it may very well be acceptable to wait for several minutes or even hours before the service request is executed. Such is more commonly the case of asynchronous types of services such as electronic mail (E-mail), for example. On the other hand, other types of services are more delay sensitive.
Currently, when a access request for a mobile station is denied by the network, the access requests are repeated by applications executed at mobile station until the
network grants the request. Unfortunately, the repeated access requests undesirably increases radio interference and system load. In a busy cellular communications, a large portion of the radio interference and system load is due to the sending and handling (e.g., denying) of accesses requests.
One technique for curtailing repeated access requests is for the network to broadcast periodically an access status to all mobile stations. In fact, in accordance with this technique the network broadcasts an access status for each of several access classes. Typically the network broadcasts the access status for a number of access classes to the mobile stations. The access status for each access class may be either "granted" or "denied", as appropriate.
Thus, the network has the capability of granting access for some access classes while denying access to other access classes. The access classes thereby form part of a priority mechanism and can be used to regulate the load caused by mobile stations attempting to access the network.
Heretofore each mobile station, or each subscriber identification module (SIM) card in the mobile station, has belonged only to one access class. This can prove a problem when the mobile station is equipped to execute multimedia applications. The multimedia applications may have varying tolerance for congestion and delay, and the one access class to which the mobile station is associated may not be appropriate for all services which can be performed at the mobile station. The inappropriateness is due at least in part to the fact that, as indicated above, some applications have higher tolerance for access delay than other applications.
It is theoretically possible at a mobile station separately to provide one type of subscription (e.g., a SIM module) for each type of application. However, practically this possibility poses problems for the user, such as e.g., the higher costs for multiple subscriptions and increased physical size of the mobile station.
What is needed, therefore, and an object of the present invention, is a mobile station which can be assigned plural access classes, as well as a flexible technique for handling access requests from such a mobile station.
4
BRIEF SUMMARY OF THE INVENTION
A mobile station for radio communications with a telecommunications network has an access request controller which controls whether a mobile termination unit of the mobile station is to transmit access requests and/or data packets to the network from applications correlated with one of plural access classes available to the mobile station. The access request controller has an access request table which contains an access status for each of plural access classes utilizable by the mobile station. The access status for each of the plural access classes is received over the air interface from the network. Each of the plural applications provided at the mobile station is assigned a selectively changeable priority value by the user. The access request controller associates the priority value with one of the plural access classes in the access table. The access request controller consults the access request table to determine whether an access request or a data packet from an application is to be sent to the network.
A list of access classes stored in the access table can be hardcoded or dynamically changeable either by the network or by the user. In one embodiment, the list of access classes is stored in a memory of a Subscriber Identity Module (SIM).
The access requests issued by the access request controller can include an access request on behalf of an application seeking a circuit-switched service, or an access request on behalf of an application seeking a packet-switched service. In the case of an access request on behalf of an application seeking a packet-switched service, a data packet is marked with its priority value. The access request controller matches the priority value with which the data packet is marked with an access class, and makes a determination based on the access class and the access status for that class whether the packet is to be forwarded to the network or queued.
When an access status for one of the plural access classes changes to an access permitted status, the access request controller waits a timeout period prior to forwarding the access request to the network.
Also provided is a method of operating a mobile telecommunications network wherein an inventive access status message is broadcast. The access status message includes access class status parameters for plural access classes, with each access class
being subdivided into plural subclasses. Differentiation of an access class into subclasses is an alternate way of providing multiple access categorization to a mobile station.
BRIEF DESCRIPTION OF THE DRAWINGS The foregoing and other objects, features, and advantages of the invention will be apparent from the following more particular description of preferred embodiments as illustrated in the accompanying drawings in which reference characters refer to the same parts throughout the various views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention.
Fig. 1 is a schematic view of an example telecommunications network in which the present invention operates.
Fig. 2 is a schematic view showing functional entities of a mobile station according to an embodiment of the invention.
Fig. 2Ais a schematic view showing functional entities of a mobile station according to another embodiment of the invention.
Fig. 3 is a schematic view showing a mapping of functional entities to hardware in a mobile station according to the embodiment of Fig. 2.
Fig. 3 A is a schematic view showing a mapping of functional entities to hardware in a mobile station according to the embodiment of Fig. 3.
Fig. 4 is a diagrammatic view of an access table maintained by a mobile station according to an embodiment of the invention.
Fig. 5 A is a diagrammatic view of the format of access class status parameters broadcast from a conventional network.
Fig. 5B is a diagrammatic view of the format of access class status parameters broadcast from a network in accordance with a mode of the present invention.
6
Fig. 6 is a diagrammatic view of the format of a communication priority window through which a user can set priority values relative to plural applications, as well as a priority table affected by such settings.
Fig. 7A is a diagrammatic view showing basic operations performed in a case in which access to a network is sought by an application which employs circuit data.
Fig. 7B is a diagrammatic view showing basic operations performed in a case in which access to a network is sought by an application which employs packet data.
Fig. 8 is diagrammatic view of a terminal adapter (TA) with a timer according to an embodiment of the invention.
Fig. 9 is diagrammatic view a charging function according to an embodiment of the invention.
Fig. 10 is a diagrammatic view of a request including an access class indication according to an embodiment of the invention.
Fig. 11A, Fig. 1 IB, and Fig. 11C are diagrammatic views of the mobile station of the embodiment of Fig. 2 A showing differing modes of changing the contents of an access table stored in a SIM card.
DETAILED DESCRIPTION OF THE DRAWINGS
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular architectures, interfaces, techniques, etc. in order to provide a thorough understanding of the present invention. However, it will be apparent to those skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well known devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
Fig. 1 shows a telecommunications network 18 in which a mobile station 20 communicates with one or more base stations 22 over air interface (e.g., radio interface) 23. Base stations 22 are connected by terrestrial lines to base station controller 24, also known as a radio network controller (RNC). Base station controller 24 is, in turn, connected through a control node known as the mobile switching center 26 to circuit- switched telephone networks represented by cloud 28; and through a GRPS control node 30 to packet-switched telephone networks represented by cloud 32.
As understood by those skilled in the art, when mobile station 20 is participating in a mobile telephonic connection, signaling information and frames of user information from mobile station 20 are transmitted over air interface 23 on designated radio channels to one or more of the base stations 22. The base stations have radio transceivers which transmit and receive radio signals involved in the connection. For information on the uplink from the mobile station 20 toward the other party involved in the connection, the base stations convert the radio-acquired information to digital signals which are forwarded to base station controller 24. Base station controller 24 orchestrates participation of the plural base stations 22 which may be involved in the connection, since mobile station 20 may be geographically moving and handover may be occurring relative to the base stations 22. On the uplink, base station controller 24 picks frames of user information from one or more base stations 22 to yield a coherent connection between mobile station 20 and the other party, whether that party be in PSTN/IDSN 28 or on the Internet 32.
It is the initiation of a connection by mobile station 20 to which the present invention primarily relates. One type of mobile station 20 with which the present invention is particularly useful is a computer with mobile termination, such as a laptop computer, for example. An illustrative embodiment of a suitable mobile station 20 for the present invention is provided in Fig. 2. As shown in Fig. 2, mobile station 20 has the following functional entities pertinent to the present invention: mobile termination entity (MT) 40; terminal adapter (TA) 42; terminal equipment 44; and a set 46 of applications. While each of these entities are described below, it should be understood that the invention is not confined to mobile stations having the same physical separation between functional entities, and that the present invention can be implemented in other than the described functional configuration.
8
Mobile termination entity (MT) 40, which is sometimes called the Mobile Equipment (ME), contains the radio transmitter/receiver TX/RX 60 (with antenna 61) and communications control 62 toward the network 18, e.g., the setup and release of radio connections, handover, etc. Mobile termination entity (MT) 40 can be a standard mobile pocket telephone (e.g., a GSM phone) or a phone card within mobile station 20.
Terminal adapter (TA) 42 acts as an adaptation between mobile termination entity (MT) 40 and the applications in the set 46 of applications. The terminal adapter (TA) 42 is typically realized as a Modem implemented on a PCMCIA (Personal Computer Memory Card International Association) card, which is inserted in a slot of terminal equipment 44. The terminal adapted (TA) 42 has a CPU 63 as well as a RAM 64 and a MT interface (I/F) 65. CPU 63 serves as an access request controller when executing an access request program 66 stored in RAM 64. As explained hereinafter, access request controller 63 of terminal adapter (TA) 42 selectively forwards call requests or data packets in accordance with access class status parameters received from network 18.
Terminal equipment 44 is normally a small computer (or computer platform), and as such includes both hardware and software. Terminal equipment 44 thus has typical aspects of a computer platform, e.g., a processor an operating system and middleware (Internet protocol suits, for example), collectively illustrated by reference numeral 70 in Fig. 2. In addition, terminal equipment 44 has control logic 72 (executed by the processor) for controlling terminal adapter (TA) 42. Control logic 72 performs set-up and release of calls to and from the network 18.
As shown in Fig. 2, the set 46 of applications illustrated for the example embodiment includes an Internet browser 80; a file transfer program (FTP) 82; an E- mail program 84; and voice service 86. Each application is normally a program which is executed by the processor of terminal equipment 44 and which interacts with the user via, e.g., data input devices such as a keyboard and/or mouse and output or display devices. These applications typically can run on any personal computer (with or without radio access). The applications in set 46 use a number of application programming interfaces (APIs) towards the terminal equipment 44. One or several of these APIs is for communications with the network 18. Examples of APIs are Unix
BSD Socket, WinSock or more telcom-specific APIs such as the Microsoft Intel Telephony API, AT&T, and Novell TSAPI or OnTheMove Mobile API. Thus, although the set 46 of applications is represented in Fig. 2 as an entity separate from terminal equipment 44, it should be understood that the set 46 of applications executed on the terminal equipment 44 if the terminal equipment 44 is a general computer, with the applications that are executed using the APIs offered by terminal equipment 44.
Fig. 3 shows how the functional entities of mobile station as illustrated in Fig. 2 are mapped onto hardware components of mobile station 20. In essence, Fig. 3 shows terminal equipment 44 wherein mobile termination entity (MT) 40 and terminal adapter (TA) 42 are cards situated in card slots. Terminal adapter (TA) 42 is connected to central processing unit (CPU) 100 by bus 102. Mobile termination entity (MT) is connected to MT interface 65 of terminal adapter (TA) 42 by a cable.
Memories of terminal equipment 44, particularly read only memory (ROM) 104 and random access memory (RAM) 106 are also connected to central processing unit (CPU) 100 by bus 102. In RAM 106 are stored the TA control logic 72, the set 46 of applications, and TCP/IP stack 108.
Terminal equipment 44 interfaces with a user through input device(s) 110 and output device(s) 112, each connected through respective appropriate interfaces 120 and 122 to bus 102. Input device(s) 110 can be a keyboard and/or mouse, for example, while output device(s) 112 can take the form of a display device, such as a LCD display panel, for example.
As indicated above, a subscription agreement exists for each mobile station 20. One pertinent term of the subscription agreement pertinent is the access class in which the mobile station is categorized. As explained previously, heretofore the subscription agreement for a mobile station assigned the mobile station to one and only one of several possible access classes. In accordance with an embodiment of the present invention, on the other hand, the subscription agreement for mobile station 20 permits mobile station 20 to participate in plural access classes. Since mobile station 20 has multimedia services as evidenced by the set 46 of applications executable thereon (see Fig. 2), participation by mobile station 20 in plural access classes affords the user an
opportunity to have its separate services seek access to network 18 using differing access criteria.
The subscription agreement terms are stored in an access table 200. Access table 200 is in RAM 64 of terminal adapter (TA) 42. An example access table 200X for one mode of the invention is shown in Fig. 4, which includes (in the left column thereof) a listing of each access type to which mobile station 20 can participate according to the subscription agreement. In particular, in the mode of Fig. 4 the applications in set 46 which are executed by mobile station 20 can be afforded one of access class C04, access class C09, or access class C14. How each application in set 46 is associated with one of the plural access classes available in accordance with the subscription agreement is described below in connection with a priority table 202 maintained by TA control logic 72.
Fig. 4 also shows, in the right hand column of access table 200, the status of each of the plural access classes as determined from network 18. At the moment in time shown in Fig. 4, the network precludes access classes C09 and C14 from requesting access to the network, while access class C04 is permitted access.
The base station controllers 24 of network 18 periodically broadcast access class status parameters over air interface 23. One example of the broadcasting of such access class status parameters occurs in the European GSM system wherein the access class status parameters take the form of RACH control parameters which are transmitted on the RACH channel. Fig. 5A shows a format of an information element containing the RACH control parameters, wherein octets 3 and 4 carry the access status bits for each of sixteen access classes (AC) COO through C15.
Mobile termination entity (MT) 40 detects the access class status parameters (RACH control parameters) as these parameters are periodically or otherwise repetitively broadcast over air interface 23. The detected access class status parameters are sent to terminal adapter (TA) 42. As the access status for one or more of the access classes changes over time, terminal adapter (TA) 42 updates the status of the access classes which are pertinent for the subscription agreement of mobile station 20. For example, with reference to the mode shown in Fig. 4, for example, if the access status of
access class C09 were to change from "denied" to "permitted", terminal adapter (TA) 42 would note such change and accordingly update the "access status" column of access table 200X.
The fact that mobile station 20 has plural access classes available in accordance with its subscription agreement allows the user of mobile station 20 to differentiate on an access priority basis between the applications included in the set 46 of applications. In this regard, the user can execute a priority assignment program 210 (stored in RAM 106 [see Fig. 2]) for the purpose of assigning a priority to each of the applications in the set 46 of applications.
Fig. 6 is a diagrammatic view of a particular window, known as the priority assignment window 220, which is displayed on output device 112 during execution of priority assignment tool or program 210. The priority assignment tool 210 is preferably stored in RAM 64 of terminal adapter (TA) 42, but is executed by the terminal equipment 44. Alternatively, priority assignment tool 210 can be stored in the memory of terminal equipment 44 and executed by terminal equipment 44. The priority assignment tool 210 is aware of the fact that support for the priorities exists in terminal adapter (TA) 42 and in mobile station 20.
As is apparent from the priority assignment window 220, the user has already entered the network-related applications from the set 46 of applications into window 220. In particular, window 220 as seen in Fig. 2 already has the applications listed for "Web Browsing" (corresponding to browser application 80); an "E-mail" (corresponding to E-mail application 84); "File Transfer" (corresponding to FTP application 82); and "Voice" (corresponding to voice series 86). Moreover, in the "Priority" dialogue boxes which correspond to each application, the user has entered a default priority value. As is apparent by the priority values displayed in window 220, a lower numerical value indicates a higher priority. In this regard, "Web Browsing" (corresponding to browser application 80) and "File Transfer" (corresponding to FTP application 82) have both been assigned a relatively low priority("4") by the user, whereas the "E-mail" application has been assigned a medium priority ("3") and "speech" (corresponding to voice application 86) as been assigned a high priority ("2"). The default priority can be overridden by the user e.g., by selecting an icon or button
indicative of an "urgent mode" while in the application itself. This temporary change of priority must be supported by the application in some way, e.g., by having an "urgent" button in a graphical interface of an E-mail program, for example.
As the user makes or changes priority assignments via priority assignment window 220 during execution of priority assignment program 210, the priority table 202 is likewise updated as also reflected in Fig. 6. When priority table 202 is initialized or updated, TA control logic 72 sends the contents of priority table 202 to terminal adapter (TA) 42. Access request controller 63 of terminal adapter (TA) 42 makes an association between each of the priorities assigned by the user (e.g., in priority assignment window 220) with one of the access classes permitted by the subscription agreement (e.g., in the example of Fig. 4, one of access classes C04, C09, or C14). Access request controller 63 is also involved, as hereinafter explained, in determining when an access request from one of the applications in the set 46 of applications can make an access request to the network 18.
At this point it should be kept in mind that some of the applications in the set 46 of applications may involve packet data, while others of the applications may involve circuit data. Although generally the same in principle regarding the present invention, the cases of packet data and circuit data are separately discussed and illustrated.
The case of seeking access by an application which employs circuit data is shown in Fig. 7A. Operation 7A-1 reflects the repeated broadcast of access class status parameters (RACH control parameters) by the network 18. Upon reception of the access class status parameters by mobile termination entity (MT) 40, the access class status parameters are forwarded to terminal adapter (TA) 42 as indicated by operation 7A-2. As shown by operation 7A-3, access request controller 63 of terminal adapter (TA) 42 updates its access table 200 (see Fig. 4 for an example) using the access class status parameters.
Fig. 7A next shows, as operation 7A-4, a circuit data-based application (e.g. voice application 86) seeking access to network 18 by way of a call request. The call request of operation 7A-4 is handled by TA control logic 72, which (as indicated by operation 7A-5) notes from priority table 202 the particular priority presently assigned
to the requesting application. For example, in the case of the circuit data-based application being speech, TA control logic 72 would associate a priority value of "2" with the call request. TA control logic 72 then forwards the call request plus the priority value to access request controller 63 of terminal adapter (TA) 42 as indicated by operation 7A-6.
At operation 7A-7 the access request controller 63 of terminal adapter (TA) 42 maps the priority value received from the call request to one of the plural access classes permitted to mobile station 20 under the subscription agreement. Access request controller 63 has a mapping function that relates the priority values of priority table 202 to the access classes of access table 200. Using the illustration of Fig. 4 and the priority assignments shown in Fig. 6, an example mapping performed by access request controller 63 could be as follows: high priority (e.g., "2") is mapped to access class C04; medium priority (e.g., "3") is mapped to access class C09; and low priority (e.g., "4") is mapped to access class C14.
The priority /access class mapping of operation 7A-7, which results in association of an access class with the call request, at operation 7A-8 the access request controller 63 determines from access table 200 whether network access is presently permitted for the access class now associated with the application making the request. For example, if the access class associated with the requesting application were access class C02, at the time shown in Fig. 4 it would be realized by terminal adapter (TA) 42 that the network 18 is presently permitting access. In such case, access request controller 63 would forward a connection request (operation 7A-9) to mobile termination entity (MT) 40, which thereafter would communicate with the network 18 in conventional fashion (indicated by operation 7A-10) for setting up the connection with the requesting applications program.
On the other hand, if the access status associated with the requesting applications program has a "denied" status as discerned by access request controller 63 from access table 200, the access request controller 63 via terminal equipment 44 would so advise the requesting applications program. In the access denial scenario, the requesting application can be advised to reattempt the access at a later date. Alternatively, the requesting applications program may be put on hold for a predetermined period of time
14
while access request controller 63 waits to ascertain whether the access status for the associated access class happens to change during the predetermined wait or hold period.
In the example of Fig. 7A, it should be understood that the access class status parameters are repetitively transmitted from the network 18 to mobile station 20, and that the operations 7A-1 through 7A-3 can be performed at differing times. In fact, an instance of operations 7A-1 through 7A-3 could be performed at the time of or just before the call request with priority value is sent to access request controller 63, e.g., the time of operation 7A-6, for example.
The case of seeking access by an application which employs packet data but which does not use a call setup phase is shown in Fig. 7B. A packet data call may include a call setup phase, which is similar to the setup of a circuit data connection as above described. The difference is the data transfer phase which is described below, where a second level of access load control is accomplished.
In the case of an application which employs packet data but which does not use a call setup phase, the mobile termination entity (MT) 40 of mobile station 20 routinely receives the access class status parameters broadcast from the network 18, in the manner aforedescribed. Operations 7B-1 through 7B-3 correspond to operations 7A-1 through 7A-3 previously described for the respective reception of the access class status parameters, transmission thereof to access request controller 63 [operation 7B-2], and updating of the priority table 202 (operation 7B-3).
Operation 7B-4 occurs as one of the applications in the set 46 of applications seeks, via TCP/IP 106, to send a data packet (e.g., an Internet packet) to the network 18. Initially the data packet is sent to a "Prioritizer", e.g., to TA control logic 72. As shown by operation 7B-5, the "Prioritizer" checks the priority table 202 and associates a priority value with the particular application which desires to send the data packet, and thus associates the priority value with the data packet itself. The association of priority value with the data packet (based on the application program seeking to send the data packet) is understood with reference to Fig. 6 as discussed above. Thus, the "Prioritizer" essentially "marks" the data packet with a priority value.
As shown by operation 7B-6, the data packet with its associated priority is forwarded by TA control logic 72 to access request controller 63. Operation 7B-7 shows terminal adapter (TA) 42 queuing the data packet in a packet queue 250 for transfer to the network 18. Packet queue 250 can reside in RAM 64 of terminal adapter (TA) 42. When the marked data packet comes to the head of queue 250, as indicated by operation 7B-8 the access request controller 63 maps the priority value with which the data packet is marked to one of the access classes designated in the subscription agreement for base stations 22. The mapping of operation 7B-8 is essentially the same as that of operation 7A-7, with the exception that the mapping is for a data packet rather than a call request. At operation 7B-9 the access request controller 63 determines from access table 200 whether network access is presently permitted for the access class now associated with the data packet at the top of queue 250.
If the access table 200 indicates that the access status for the access class associated with data packet is a "denied" status, access request controller 63 maintains the data packet in queue 250 for a predetermined period of time. If, within that predetermined period of time, the access status for the access class of the data packet changes to a "permitted" status, the data packet is taken from the head of queue 250 and passed to mobile termination entity (MT) 40 for transmission to the network 18.
Should it ever occur that queue 250 gets overloaded with data packets, lower- prioritized packets in queue 250 are discarded. The TCP/IP protocol 106 has a control mechanism which handles any extra delay caused by overload of queue 250. It should be understood that queue 250 can represent plural buffers. Moreover, some or all of the buffering provided by queue 250 can be distributed to RAM 106 of terminal equipment 44 if desired.
When the access table 200 indicates that the access status for the access class associated with the data packet is "permitted", the data packet is sent from access request controller 63 of terminal adapter (TA) 42 to mobile termination entity (MT) 40 as indicated by operation 7B-10 in Fig. 7B. In usual fashion, mobile termination entity (MT) 40 then sends a request for a channel (operation 7B-11). In response, a channel assignment is received from network 18 . The mobile termination entity (MT) 40 is then able to send the data packet over the assigned channel. After transmission of the
16
data packet to network 18, the network 18 sends an acknowledgment which is forwarded to terminal adapter (TA) 42.
Now that access request has been described, both with reference to circuit data (Fig. 17 A) and packet data (Fig. 17B), an example is now provided wherein it is desirable to change the priority value assigned to one of the applications in the set 46 of applications. At the time shown in Fig. 6, the window 220 indicates that the file transfer program (FTP) 82 has a low priority (i.e., a priority value of "4"). File transfer typically may not be a very urgent matter, so that if the network 18 is congested it is of little consequence that transfer of the file may be postponed. On the other hand, if the user is about to board an aircraft (in which operation of the mobile station is not permitted) and there is a need to transfer a file to an eager recipient, the present invention permits the file transfer program (FTP) to use temporarily a higher priority value (e.g., a higher access class). To do so, with the input device 110 (e.g., a mouse) the user changes the priority value in the dialogue box for the file transfer program (FTP) to obtain a lower number (it being remembered that lower numbers correspond to higher priority values). Thus, using the higher priority value, the user would be able to send the necessary files despite network congestion which otherwise might have precluded file transfer at the original priority value assigned to the file transfer program (FTP).
As mentioned above, the contents of access table 200 is established in accordance with the subscription agreement between the operator of the network 18 and the user (e.g., owner) of mobile station 20. In one embodiment of the invention, the subscription-determined contents of access table 200 is hardcoded in the memory of terminal adapter (TA) 42. In this embodiment, the access classes in which mobile station 20 can participate will always be the same access classes as initially established and hardcoded into access table 200.
In other embodiments of the invention, the terms of the subscription agreement for mobile station 20 can change so that mobile station 20 can be usable with other access classes. For example, the user or subscriber can contact the network operator and request a change of terms regarding the subscription agreement, e.g., negotiate new terms for the subscription agreement. In such case, the contents of access table 200 can be changed to reflect the re-negotiated terms (e.g., new access classes). In particular,
the network operator can download through the network 18 a new access table 200 to replace the prior access table 200. In this manner, the subscriber can update or otherwise modify the access table 200 in accordance with changed terms of the subscription agreement. Alternatively, the user or subscriber can himself modify the contents of access table 200. The user-implemented modification of access table 200 can be accomplished, if desired, by a special function of priority assignment program 210. Of course, any change of subscription agreement terms such as a change of available access classes can trigger new or additional charges when new access classes are utilized. Moreover, the mere ability for the user to change access classes at the user's initiative incur a greater subscription fee or be a chargeable event.
Another illustrative embodiment of a suitable mobile station 20A for the present invention is provided in Fig. 2A and Fig. 3A.. As shown in Fig. 2A, mobile station 20A has the same basic type of functional entities as the mobile station 20A. However, the mobile station 20A of the embodiment of Fig. 2A and Fig. 3 A has a Subscriber Identity Module (SIM) 260 [also know as a SIM card] included in mobile termination entity (MT) 40. Subscriber Identity Module (SIM) 260 has its own CPU 262 and memory (RAM) 264. Through appropriate interface(s), Subscriber Identity Module (SIM) 260 is connected to the network communications control 62 of mobile termination entity (MT) 40, as well as to terminal equipment 44.
Rather than having an access table stored in terminal equipment 44 as in the embodiment of Fig. 2 and Fig. 3, the mobile station 20 A of the embodiment of Fig. 2 A and Fig. 3 A has access table 200SIM stored in memory 264 of Subscriber Identity Module (SIM) 260. Thus, for mobile station 20 A, the conditions or terms of the mobile subscription agreement (e.g., access classes) are stored in access table 200SIM of Subscriber Identity Module (SIM) 260.
Upon startup, terminal equipment 44 can read the list of access classes from access table 200SIM of Subscriber Identity Module (SIM) 260. As the access request controller 63 executes the access request program 66, the access class values stored in access table 200SIM are utilized in connection with the performance of operations such as those discussed with reference to the embodiment of Fig. 2 and Fig. 3.
18
Moreover, in the event that the Subscriber Identity Module (SIM) 260 has satisfactory capacity and processing, the CPU 262 of Subscriber Identity Module (SIM) 260 can serve, at least in part, as the access request controller 63. In this regard, some or all of access request program 66 can be stored in memory 264 of Subscriber Identity Module (SIM) 260.
There are several ways of changing the conditions or terms (e.g., access classes) for the SIM card-containing mobile station 20A. A first way of changing access classes, as shown in Fig. 11 A, is to replace a first Subscriber Identity Module (SIM) 260(1) [having a first set of access classes] with a second Subscriber Identity Module (SIM) 260(2) [having a second set of access classes]. A second way of changing access classes (shown in Fig. 1 IB) is to remove the original Subscriber Identity Module (SIM) 260 contained in the mobile station 20A and take the Subscriber Identity Module (SIM) 260 to a programming device 1100. In this second way, the access table 200SIM of the Subscriber Identity Module (SIM) 260 is reprogrammed with updated or revised access class information, so that the original but reprogrammed Subscriber Identity Module (SIM) 260' can be returned to mobile station 20A. A third way (shown in Fig. 11C) of changing access classes stored in access table 200 SIM of Subscriber Identity Module (SIM) 260 is for the network (at the behest of e.g., the service provider) to send a special access table message ("AT MESSAGE") to mobile station 20 A, the access table message serving to down load the contents of a replacement access table into access table 200SIM.
In its various embodiments the invention thus permits mobile station 20 to participate in plural access classes. In this regard, it should be realized that the invention extends to a situation in which a network provides access classes, with one or more access classes having access subclasses. In such a situation, it should be understood that in the present invention the mobile station 20 can participate in more than one access class, or can participate in plural access subclasses for one or more than one access class.
In the above regard, the network 18 can send out a message similar to that containing the RACH control parameters as pictured in Fig. 5A, but having subclass values for each of the access classes. An example of such a message is illustrated in
19
Fig. 5B. The network message of Fig. 5B has access status for sixteen access classes, and more particularly for four subclasses for each of the sixteen subclasses. The network message of Fig. 5B has eight octets. The first four bits al, a2, a3, and a4 of the first octet carry access status for each of the four corresponding subclasses of the first access class. The last four bits bl, b2, b3, and b4 of the second octet carry access status for each of the four corresponding subclasses of the second access class. In similar manner, each of the remaining seven octets carry access status bits for the subclasses of two access classes: the second octet for the third and fourth access classes, the third octet for the fifth and sixth access classes, and so forth.
The person skilled in the art knows how to format a network message such as the
RACH control parameter message of Fig. 5 A, and how to broadcast the same over the air interface 23. Now that it is realized by the present invention that an access subclass scheme is also possible, the person skilled in the art is able to implement the change in format of the network message of Fig. 5B and to transmit the same.
With the subclass-based network message of Fig. 5B, it is possible to assign an access class to a mobile station in its subscription agreement, but also to allow the mobile station to participate in plural subclasses of the assigned access class. In a more complex arrangement, the mobile station may participate in access subclasses of plural access classes, if desired.
Thus, in view of the foregoing, the term "access class" as used herein is understood to refer to any type of access categorization, including the access subclass scenario described above. Advantageously, the present invention enables mobile station 20 to participate in plural access categorizations, e.g., plural access classes or plural access subclasses.
It should be recognized that mobile stations are capable of handling more than one simultaneous call and more than one simultaneous connection. In other words, more than one applications program may simultaneously be involved with a connection to network 18. Moreover, several of these calls from the applications program may use the same connection (e.g., the same radio channels over the air interface 23, for example). When services are simultaneously used, the terminal adapter (TA) 42 may choose either (1) to
20
use a radio connection already in use by an existing call or (2) to setup a new radio connection. If an already existing radio connection was used by a call with lower priority, then a new connection may not be necessary.
In the embodiments described herein, the priority value assigned by the user to the applications in the set 46 of applications has a relationship to, but is not necessarily the same as, access class. It should be understood that for sake of simplification, for example, the priority value and access class may be the same. That is, in setting priority values in window 220 of Fig. 6, the numbers selected by the user may actually be access class numbers.
The moment that an access status changes from "denied" to "granted" for a particular access class, there yet may be a tendency for the network to overload with a burst of access requests. Another embodiment of the terminal adapter (TA), shown as terminal adapter (TA) 842 in Fig. 8A, has a timer 860 which attempts to ameliorate this problem. Timer 860 has a time value stored therein. When the access status changes for an access class involved in mobile station's subscription agreement, terminal adapter (TA) 842 waits for a timeout corresponding to the value in timer 860 before forwarding the call request or data packet to mobile termination entity (MT) 40.
The time value stored in timer 860 can be, for example, a random number computed by mobile station 20. In this way, numerous access requests from many mobiles waiting for access can be linearly distributed (e.g., between O and Y milliseconds), relieving the load on the network. The value of Y is set by the network operator, or is a fixed value.
Employment of the timeout value smoothes the burst of access requests from the mobile stations. Alternatively, the timer can be located in mobile termination entity (MT) 40, and started by terminal adapter (TA) 842 when the change of access status is detected. It should also be understood that the timer 860 and timeout prior to sending an access request is not confined to embodiments wherein the mobile station participates in plural access classes, but that the timeout principle also applies to the traditional mobile station having only one access class.
21
As mentioned above, the user or subscriber can be charged different rates for connections of differing priorities. When a user assigns to an application program a priority level that is more likely to have a denied access status (likely for an application that has higher tolerance for delay), the user is not billed as much for the connection as if the user had selected a more favorable priority for a less restricted access class.
Fig. 9 shows mobile station sending a "request" 900 (which can be either an access request or channel request according to whether the service is for circuit-switched or packet-switched data) to network. At least some of the contents of the request 900 is ultimately routed (e.g. by diversity handling at a base station controller 24) to a control node CN. Control node CN can be a MSC for circuit-switched data or a GPRS control node for packet-switched data. As shown in Fig. 9, control node includes a service switching part SSP, a service control part SCP, and a database CNDB.
As shown in Fig. 10, the request 900 includes an access class indicator ACL For the access class scheme of Fig. 5 A, the access class indicator ACI can be four bits in length, since the sixteen access courses of the Fig. 5 A scheme are representable by four bits. For the access class scheme of Fig. 5B (which has access subclasses), the access class indicator ACI can be six bits in length, with four bits utilized to express the access class and two bits utilized to express the particular subclass of the expressed access class.
The database (CNDB) of control node CN has a record 910 for each subscriber. The record indicates the access classes (and access subclasses where applicable) permitted for use by the subscriber in accordance with the terms of the subscriber's subscription agreement. For example, record 910 has fields PAC1...PACn reflecting permitted access classes 1-n for the subscriber.
When request 900 is received at control node CN, the request 900 is sent by the SSP to the service control part SCP, as indicated by event 9-1. Using the access class indicator ACI contained in request 900, as evidenced by event 9-2, the SCP checks the subscriber's record in database CNDB to ensure that the access class indicator ACI of the request 900 is in one of the permitted access class (PAC) fields of record 910. If not, the request is denied. If the check is positive, the request is granted and service control part SCP performs a charging function for the call. In this regard, service control part
22
determines the current rate for the particular access class indicated by the access class indicator ACI, and based on other factors such duration of call or number of packets, etc. determines a financial charge for the call. As indicated above, an access class which has a low probability for having access status denied can be charged at a higher rate.
One specific non-limiting example of a particular type of network 18 (see Fig. 1) with which the present invention can be employed is a code division multiple access (CDMA) mobile telecommunications system. In a CDMA system, the information transmitted between each base station 22j through 22n and the mobile station is modulated by a different mathematical code (such as a spreading code) to distinguish it from information for other mobile stations which are utilizing the same radio frequency. Thus, in CDMA, the individual radio links are discriminated on the basis of codes. In addition, in CDMA mobile communications, typically the same baseband signal with suitable spreading is sent from several base stations (e.g., base stations 22 j through 22n) with overlapping coverage. The mobile station can thus receive and use signals from several base stations simultaneously. Moreover, since the radio environment changes rapidly, a mobile station likely has radio channels to several base stations at the same moment, e.g., so that the mobile station can select the best channel and, if necessary, use signals directed to the mobile from various base stations in order to keep radio interference low and capacity high. This utilization of radio channels from multiple base stations by a mobile station in a CDMA scheme is termed "soft handover." Additional details of diversity and soft handover are provided e.g., by United States Patent Application Serial Number (attorney docket 2380-3) filed November 26, 1997, entitled "Multistage Diversity Handling for CDMA Mobile Telecommunications", and United States Patent Application Serial Number (attorney docket 2380-4) filed November 26, 1997, entitled "Diversity Handling Moveover for CDMA Mobile Telecommunications", both of which are incorporated herein by reference.
In the example illustrated embodiment, base stations 22, base station controller 24, mobile switching center (MSC) 26, and GPRS control node 30 are each ATM-based nodes. As such, each of these nodes has an ATM switch. It should be understood, however, that the present invention is not confined to ATM packets or to employment of ATM switches.
23
It should be understood that, unless specifically stated to the contrary, reference to any mobile station herein expressly includes mobile station 20 A of the embodiment of Fig. 2 A and Fig. 3 A. In fact, the teachings of the invention are applicable to all embodiments herein disclosed. For example, the teachings of Fig. 8 and Fig. 9 are equally applicable to the embodiment of Fig. 2A and Fig. 3 A as to the embodiment of Fig. 2 and Fig. 3.
The present invention allows a mobile station to have multiple access classes without increasing cost or size of the mobile station itself. Having the benefit of plural access classes, at a peak traffic hour the mobile station can move some of its traffic to a lower priority, and hence possibly to another time, thereby better utilizing resources of the network. Moreover, the present invention facilitates an orderly placement of access requests in accordance with a prioritized order after network congestion diminishes. Further, as explained in connection with Fig. 9, for example, the network operator can charge for different delay requirements while yet maintaining just one subscription per user.
While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not to be limited to the disclosed embodiment, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.