throbber
584
`
`L'IE— THE UMTS LONG TERM EVOLU'HON
`
`Neighbor Relation Table
`
`Neighbour Relation
`
`Figure 25.2: The ANR function and the ANR table. Reproduced by permission of © SGPP.
`
`. In connected state, the eNodeB instructs a UE to search for neighbour cells in the target
`RATS/frequencies (it may need to schedule appropriate idle periods for this).
`
`The UE reports the PC15 of the detected cells in the target RATS/frequencies (note that
`each RAT has its own specific format of PG).
`
`w
`
`. The eNodeB instructs the UE, using the newly discovered PC] as a parameter, to read
`the key RAT—specific cell identification parameters from the broadcast channel of the
`cell (e.g. the CGI and Routing Area Code (RAC) for GERAN; CGI. Local Area Code
`(LAC) and RAC for UTRAN; CGI for CDMA2000).
`
`The UE reports these key RAT.specific cell identification parameters to the eNodeB of
`the serving cell.
`
`.
`
`the eNodeB updates its inter-RAT/inter-frequency NRT. The eNodeB can then make
`use of the NR, for example when triggering subsequent handovers.
`
`25.3 Self-Configuration of eNodeB and MME
`
`Self-configuration of the eNodeB/MME is a SON function which is implemented in the basic
`8] and X2 interface procedures [1. 2].
`
`Samsung Ex. 1010
`1186 of 1365
`
`IPR2022-00648
`Apple EX1023 Page 650
`
`

`

`585
`
`SELF-OPTIMIZING NETWORKS
`25.3.1 Self-Configuration of eNodeB/MME over S1
`With the native support of the S1-flex function in LTE (see Section 2.5), an eNodeB must
`set up an S1 interface towards each MME of the pool area to which it belongs. The list of
`MME nodes of the pool area together with an initial corresponding remote Internet Protocol
`(IP) address can be directly configured in the eNodeB at deployment (although other means
`may also be used). Once the eNodeB has initiated a Stream Control Transmission Protocol
`(SCTP, see Section 2.5.1.1) association with each MME of the pool area using that IP address,
`they can exchange, via the ‘S1 Setup procedure’ (see Section 2.5), some application-level
`configuration data which is essential for the system operation. This automatic configuration
`process thus saves some manual configuration effort for the network operator, together with
`the associated risk of human error.
`Examples of such application-level configuration data exchanged between the eNodeB
`and the MMEs include Tracking Area (TA) identities,5 lists of PLMNs of different operators
`who may be sharing the network so that all the PLMN IDs can be broadcast over the air for
`their respective UEs, and Closed Subscriber Group (CSG) IDs to allow auto-configuration
`of the Home eNodeB (HeNB) gateway when it connects to thousands of HeNBs.6 Once all
`the data to be broadcast over the radio interface have been configured within each and every
`eNodeB, they are sent automatically to all the relevant MME nodes of the pool area via the
`S1 Setup procedure.7
`The eNodeB can later update the configuration data it had previously sent to the MME
`by sending an ‘eNB CONFIGURATION UPDATE’ message. In this case it only sends the
`updated configuration data, and the data that is not included is interpreted by the MME as
`being unchanged. Conversely, the MME can also send updates of its data to the eNodeBs
`by means of an ‘MME CONFIGURATION UPDATE’. The updated configuration data is
`assumed to be stored in both the eNodeB and the MME for the duration of the SCTP
`association or until any further update occurs.
`
`25.3.2 Self-Configuration of IP address and X2 interface
`Similarly to the S1 interface, self-configuration of IP addresses and of the X2 interface
`is implemented in the basic X2 and S1 interface procedures. The X2 interface may be
`established between one eNodeB and one of its neighbour eNodeBs when they need to
`exchange load, interference or handover related information (see Section 2.6). The automatic
`initialization of the X2 interface consists of three steps:
`
`1. The eNodeB identifies a suitable neighbour;
`
`2. The eNodeB retrieves a suitable IP address for this neighbour if not already available
`and sets up an SCTP association with it;
`
`3. The two eNodeBs exchange configuration data.
`
`5TAs correspond to the zones in which UEs are paged, and their mapping to eNodeBs must remain consistent
`between the E-UTRAN and the Evolved Packet Core (EPC).
`6This enables the paging optimization feature in the HeNB gateway. Further details can be found in Chapter 24.
`7Note that in case of CSG, the S1 Setup messages are exchanged via the Home eNodeB gateway to the MME
`(see Section 24.2).
`
`IPR2022-00648
`Apple EX1023 Page 651
`
`

`

`586
`
`LTE – THE UMTS LONG TERM EVOLUTION
`
`The first step can be achieved either by configuration or by using the ANRF described in
`Section 25.2. If the ANRF is used, this step basically consists of the eNodeB being made
`aware of the ECGI and Tracking Area Identity (TAI) of the detected neighbour.
`For the second step, the eNodeB needs to know the IP address of the neighbour in order to
`set up an SCTP association. This IP address may again be either configured or retrieved
`via the network (the latter being used if the ANRF is used during the first step). Auto-
`configuration of the IP address is achieved by the requesting eNodeB sending over the S1
`interface a dedicated ‘eNB CONFIGURATION TRANSFER’ message that includes both
`routing information (such as the ECGI of the detected target cell) and the nature of the
`information that is requested – in this case an IP address for the purpose of X2 initiation.
`The requesting eNodeB also includes its own ECGI to be used for routing back the answer.
`If the receiving eNodeB agrees, it returns one or more IP addresses which can be used
`for the establishment of an X2 interface. When this procedure is complete, the requesting
`eNodeB can set up the SCTP association with its neighbour by sending an SCTP INIT
`message. In Release 10, in order to protect the eNodeBs from malicious SCTP INIT
`requests from unauthorized parties, this auto-configuration process has been enhanced to
`enable the use of an Access Control List (ACL)8 of authorized source IP addresses in the
`receiving eNodeB. For this purpose, the ‘eNB CONFIGURATION TRANSFER’ message
`has been enhanced with the possibility for the requesting eNodeB to include one or several
`IP addresses that the receiving eNodeB can store in its ACL. Thus, whenever a further
`SCTP INIT message is received to set up an X2 interface, the receiving eNodeB can first
`check that the source IP address corresponds to one notified earlier. The protocol also
`allows the requesting eNodeB to provide IP addresses for an IPSec9 transport endpoint for
`scenarios where IPSec is expected to be used (e.g. routing via a security gateway). Finally,
`the requesting eNodeB can also include the IP addresses that it intends to use for the data-
`forwarding GPRS Tunnelling Protocol (GTP) tunnels that it will later establish. This would
`also allow for checking of the user plane traffic at the receiving eNodeB. The reciprocal
`behaviour is also supported: the receiving eNodeB may similarly provide in the ‘eNB
`CONFIGURATION TRANSFER’ message to the requesting eNodeB all the IP addresses
`it intends to use for its control plane SCTP endpoint, user plane GTP endpoints and/or IPSec
`endpoint.
`Once an SCTP association exists between these two neighbour eNodeBs, the third step can
`be started, i.e. exchanging configuration data. This consists of application-level data similar
`to the data exchanged during the self-configuration of the S1 interface (see Section 25.3.1).
`In this case, the ‘X2 Setup’ procedure is used for the exchange. For example, an eNodeB can
`report, via the ‘X2 SETUP REQUEST’ message to a neighbour eNodeB, information about
`each cell it manages, such as the cell’s PCI, frequency band, TAI and/or associated PLMNs.
`More detailed radio parameters can also be included, such as the cyclic prefix length (see
`Section 5.4.1), the transmission bandwidth or the uplink-downlink subframe configuration
`(see Section 6.2) for Time Division Duplex (TDD) cells.
`An eNodeB can also exchange the list of pool areas to which it belongs with a neighbour
`eNodeB. The neighbour eNodeB can thus automatically learn if it shares a pool area in
`common and therefore whether it will need to use the S1 or the X2 handover procedure
`
`8A receiving network node where ACL functionality is applied may only accept connections from other peer
`network nodes once the source addresses of the sending network node are known in the receiving node.
`9IP Security – a collection of protocols and algorithms for IP security, including key management.
`
`IPR2022-00648
`Apple EX1023 Page 652
`
`

`

`SELF-OPTIMIZING NETWORKS
`
`587
`
`to transfer UEs. Indeed, if the eNodeBs do not share a pool area in common, the MME
`associated with the UE must be relocated on handover and the S1 handover has to be used
`(see Sections 2.5.6 and 2.6.3 respectively).
`
`25.4 Automatic Configuration of Physical Cell Identity
`
`The application-level configuration data exchanged during the X2 setup procedure is also
`the core of another SON feature: automatic self-configuration and self-optimization of the
`Physical Cell Identities (PCIs). This helps the eNodeBs to select PCIs that avoid collisions
`and hence cell confusion. Cell confusion arises when two neighbouring cells broadcast
`the same PCI so that a UE cannot discriminate between the two cells when it reports
`measurements. As a consequence the serving eNodeB of that UE cannot determine which one
`of these two cells should be the handover target for the UE. Increased inter-cell interference
`may also arise. The possibility for cell confusion stems from the fact that only about five
`hundred PCI values are available. PCI collision can be avoided by careful configuration on
`the part of the network operator, i.e. by selecting the PCIs allocated to each cell so that
`they are unique within clusters of adjacent neighbouring cells; however, this is a laborious
`operation, and moreover there remains an ongoing risk of further PCI collisions due to the
`start up of new eNodeBs as the network is densified.
`The SON solution to this problem relies on the exchange of PCI values between neighbour
`eNodeBs during the X2 Setup procedure. In both the ‘X2 SETUP REQUEST’ and the ‘X2
`SETUP RESPONSE’ messages, an eNodeB can include the list of PCI values used not only
`by its own cells but also by the ‘direct neighbours’ of its own cells. A direct neighbour of a cell
`is defined as any cell controlled by an eNodeB that is a neighbour of the eNodeB controlling
`the first cell (even if that cell has not yet been reported by any UE). This exchange of direct
`neighbour PCI values over the X2 interface enables an eNodeB to become quickly aware
`of the set of PCI values that are being used in the cluster to which it belongs. In particular
`the eNodeB can easily identify any collision in this cluster and can decide to change the
`PCI of one of its cells if needed; if it does so, it can signal the change to its neighbours in
`an ‘eNB CONFIGURATION UPDATE’ message. However, the exact PCI change algorithm
`supported by eNodeBs is not standardized and remains up to vendor implementations. An
`example of self configuration of PCIs is illustrated in Figure 25.3.
`Via O&M, the network operator can use a variety of degrees of self-configuration at start
`up of the network: the operator could assign no PCI values and let each eNodeB select PCIs
`fully autonomously, or alternatively a range of possible PCI values can be assigned in order
`to assist the convergence of the self-configuration algorithms.
`
`25.5 Mobility Load Balancing Optimization
`
`Release 9 incorporates SON load balancing functionality, the objective of which is to coun-
`teract local traffic load imbalance between neighbouring cells with the aim of improving the
`overall system capacity and reducing congestion. The feature functions by first detecting any
`traffic imbalance and then applying solutions such as adjusting the cell reselection/handover
`parameters (such as handover thresholds). These parameters can be autonomously changed
`
`IPR2022-00648
`Apple EX1023 Page 653
`
`

`

`588
`
`LTE – THE UMTS LONG TERM EVOLUTION
`
`eNB B
`
`Cell_B1
`Ph_ID1
`
`Cell_B2
`Ph_ID 2
`
`Cell_C1
`t_Ph ID a
`
`UE_b
`
`UE_a
`
`Cell_A2
`Ph_ID 4
`
`Cell_C2
`t_Ph ID b
`
`eNB C
`(new)
`
`Cell_A1
`Ph_ID 3
`
`eNB A
`
`Figure 25.3: Illustration of PCI allocation. Reproduced by permission of © 3GPP.
`
`and directly communicated between neighbouring cells by means of the X2 Parameter
`Negotiation procedure as explained in Section 25.5.2.
`
`25.5.1 Intra-LTE Load Exchange
`In order to detect an imbalance, it is first necessary to exchange load information between
`neighbouring eNodeBs over X2 for comparison. A client-server mechanism is used for this
`purpose: a requesting eNodeB (client) sends a ‘RESOURCE STATUS REQUEST’ message
`to request a load report from some of its neighbours. The ‘RESOURCE STATUS REQUEST’
`message can simultaneously request multiple types of load report and may also be directed
`at multiple cells of the receiving eNodeB (server). The neighbours that receive the request
`report the requested load information over the X2 interface via the ‘RESOURCE STATUS
`RESPONSE/UPDATE’ message. The reporting of the load is periodic with period indicated
`in the ‘RESOURCE STATUS REQUEST’ message.
`The reported information can indicate any of four different types of cell load information:
`
`• Current usage of Physical Resource Blocks (PRBs), possibly partitioned into real-time
`and non-real-time traffic;
`• Current hardware load;
`• Current S1 transport load;
`• Available composite load.
`
`The first three measurements represent a global view of the current load situation in
`the node that reports them. The ‘available composite load’ indicator represents the amount
`of overall resources that the reporting node is ready to accept. ‘Composite’ means that
`the reporting node takes into account multiple internal resource criteria via a proprietary
`evaluation to build up its report. The ‘available’ characteristic is interesting as an estimate
`
`IPR2022-00648
`Apple EX1023 Page 654
`
`

`

`SELF-OPTIMIZING NETWORKS
`
`589
`
`of the amount of non-GBR10 traffic that can be handed over into the cells controlled by the
`eNodeB. For example, in a case when one UE was using all PRBs, the ‘current usage of
`PRBs’ would typically indicate that all PRBs were fully utilized whereas those PRBs would
`in fact still be available to be shared by the traffic of a second UE. Two formats may be used
`by the operator for the ‘available composite load’ indicator:
`
`• A simple percentage of the total E-UTRAN resources available (i.e. of the total cell
`uplink or downlink bandwidth known from the X2 Setup procedure);
`
`• A percentage weighted according to a cell capacity class value.11
`
`25.5.2 Intra-LTE Handover Parameter Optimization
`
`As a result of the exchange of load information and detection of local load imbalance,
`eNodeBs may take immediate action such as deciding to handover some UEs to cells which
`are less loaded. However, longer-term actions can also be taken to combat the imbalance more
`efficiently. For example when an imbalance is detected between two specific cells it may be
`desirable to shift the handover trigger threshold by, for example, 0.5 dB. By so doing, UEs
`served by an overloaded cell may find that a less-loaded neighbour cell becomes a relatively
`attractive handover target, thus allowing some UEs from the overloaded cell to be served
`reliably by the less-loaded cell. In order to avoid a ping-pong effect, it is often desirable that
`the lightly loaded cell shift its corresponding threshold by a similar amount as the overloaded
`cell but in the opposite direction. For this to happen, the lightly loaded cell must be made
`aware of the change applied by the overloaded cell, or alternatively the overloaded cell could
`first request the less-loaded cell to change its handover threshold and wait for a positive
`response before initiating the change.
`This is the object of the ‘Handover Parameter Negotiation’ procedure. If the two cells
`in question belong to the same eNodeB, this negotiation happens within the eNodeB node
`itself via a proprietary algorithm; otherwise, the negotiation procedure is conducted over X2
`interface via the ‘Mobility Settings Change’ procedure. This procedure enables one eNodeB
`to send a ‘MOBILITY CHANGE REQUEST’ message to another, to indicate the handover
`trigger parameter shift that the first eNodeB sees as necessary for one of the cells controlled
`by the receiving eNodeB. The same message can optionally indicate if the first eNodeB has
`already performed any configuration change of this parameter for one of its own cells. If the
`second eNodeB accepts the proposed handover trigger parameter modification and is able
`to complete it, then it replies with a ‘MOBILITY CHANGE ACKNOWLEDGE’ message;
`otherwise it responds with a ‘MOBILITY CHANGE FAILURE’ message which can include
`an ‘allowed parameter modification range’ if the reason for the failure was that the change
`proposed by the first eNodeB was outside the possible range.
`
`10Guaranteed Bit-Rate – see Section 2.4.
`11The cell capacity class value is a parameter between 0 and 100 configured by the operator to classify one
`particular cell capacity with respect to the other cells available in its network. The use of this parameter is mandatory
`when the ‘available composite load’ indicator is exchanged inter-RAT, e.g. towards UMTS.
`
`IPR2022-00648
`Apple EX1023 Page 655
`
`

`

`590
`25.5.3
`
`LTE – THE UMTS LONG TERM EVOLUTION
`Inter-RAT Load Exchange
`
`In order to perform load information exchange with neighbour cells of a RAT other than
`LTE, an eNodeB can trigger a ‘Cell Load Reporting Request/Response’ procedure towards
`a neighbouring Radio Network Controller (RNC) (for WCDMA), Base Station Controller
`(BSC) (for GSM) or evolved High Speed Packet Access (HSPA) NodeB (for HSPA).
`This new inter-RAT procedure was purposely designed to be independent of the handover
`procedure in order that it can be triggered at any time by a requesting eNodeB even in the
`absence of any mobility event. The procedure is implemented as a generic ‘SON Transfer’
`container carried on top of the RAN Information Management (RIM) protocol.12 The new
`inter-RAT cell load reporting procedure allows an eNodeB to evaluate the load situation
`of GSM or UMTS/HSPA neighbour cells before triggering any load-related action such as
`handing traffic over to those neighbours or switching off a carrier. The new procedure may be
`used in all directions, i.e. from any LTE/UMTS/GSM source node to any LTE/UMTS/GSM
`target node of another RAT.
`
`25.5.4 Enhanced Inter-RAT Load Exchange
`
`One limitation of the Release 9 inter-RAT load exchange procedure described in Section 25.5.3
`is that the RIM messaging which carries it passes through the core network nodes, which may
`become overloaded if load exchange occurs too frequently. On the other hand, variations
`in the radio conditions mean that it is important for the RAN nodes to have up-to-date
`load values from their peers in order to assess the load situation across different RATs. In
`order to solve these two opposing requirements, the inter-RAT load exchange procedure was
`enhanced in Release 10 by the introduction of two new types of reporting:
`
`Event-triggered reporting enables a source RAN node to request a target RAN node
`to report only when a pre-defined cell load-level threshold is crossed in the target node.
`The source node signals the granularity with which it wishes to receive indications of load
`variation: for example, if it requests a granularity of five levels, the target RAN node will
`divide the cell-load scale by five, evenly distributed on a linear scale below the overload
`threshold and will report the target cell load each time the load changes from one reporting
`level to another or enters or exits the overload state. Other parameters (such as hysteresis and
`averaging factors) can be configured by O&M at the target nodes.
`
`Multiple-cell reporting enables a source RAN node to request the a target RAN node to
`report the load of multiple cells within a single report. For example, in the case of UMTS, an
`eNodeB will only need to send one request to the RNC instead of individual requests for all
`the cells controlled by the RNC.
`
`12RIM is a well known protocol dedicated to information exchange between two RAN nodes of different RATs.
`An example is given in Section 25.6.7.
`
`IPR2022-00648
`Apple EX1023 Page 656
`
`

`

`591
`
`SELF-OPTIMIZING NETWORKS
`25.6 Mobility Robustness Optimization
`The Mobility Robustness Optimization (MRO) SON feature aims at detecting and preventing
`connection failures that occur as a result of mobility. These failures are of four types:
`• Too-late handover, leading to a connection failure in the serving cell;
`• Coverage hole, leading to a connection failure in the serving cell;
`• Too-early handover, leading to a connection failure in the target cell;
`• Handover to an inappropriate cell, leading to a connection failure in the wrong target
`cell.
`
`Connection failure cases generally correspond to Radio Link Failures (RLFs), including
`handover failure. These scenarios and their respective SON solutions are described in more
`detail below.
`
`25.6.1 Too-Late Handover
`When a handover is executed too late, a connection failure may occur in the source cell
`and the UE may try to re-establish the radio link in a different cell controlled by a different
`eNodeB, as illustrated in Figure 25.4. In order to enable eNodeB of the source cell to improve
`the situation, an ‘RLF INDICATION’ message can be used to report the event from the
`eNodeB under which the UE re-establishes the connection to the original source eNodeB.
`The message includes the PCI of the cell in which the connection failed, the CGI of the cell
`where the radio link was re-established and the identity (C-RNTI13) that the UE had in the cell
`where the connection failed. The message may also include the short MAC-I bits14 to allow
`verification of UE identity at the source eNodeB: the source eNodeB can recalculate these
`bits using the security configuration of the source cell. This mechanism makes it possible
`to eliminate false RLF detections that could happen due to PCI collision, for example. If
`a PCI collision occurs, an eNodeB would typically send the ‘RLF INDICATION’ message
`to multiple neighbour eNodeBs which all control cells with the same PCI, but the use of
`the short MAC-I bits enables only the source cell in which the RLF had really occurred to
`concern itself about the too-late handover.
`
`25.6.2 Coverage Hole Detection
`Receiving the ‘RLF INDICATION’ message at a source eNodeB might be caused either
`by a connection failure due to a too-late handover from the source to the target cell or
`by a coverage hole at the edge of the source cell. In order to improve the operation of
`the ‘too-late handover’ counter in the source eNodeB, it is useful to discriminate between
`these two scenarios. Hence, after completing the re-establishment procedure in the eNodeB
`where the connection is re-established, the UE may indicate to this eNodeB whether it can
`report the last cell measurements it has performed before the connection failed. If this is
`possible, this eNodeB may retrieve an ‘R9 UE RLF Report’ measurement and add it into the
`‘RLF INDICATION’ message sent to the source eNodeB. By evaluating the measurements
`
`13Cell-Radio Network Temporary Identifier.
`14The 16 least-significant bits of the Message Authentication Code for Integrity (MAC-I, see Section 4.2.3).
`
`IPR2022-00648
`Apple EX1023 Page 657
`
`

`

`592
`
`LTE – THE UMTS LONG TERM EVOLUTION
`
`Target Cell
`
`Source Cell
`
`Time
`
`Connection failure in target cell
`
`UE attempts to re-establish in original cell
`
`Sgna Strength
`
`Figure 25.4: Example of signal strength fluctuation in the source and target cells during
`handover.
`
`contained in this report, the source eNodeB should be able to determine if the connection
`failure was actually due to a coverage hole or not.
`
`25.6.3 Too-Early Handover
`When a handover is executed too early, the UE may experience a connection failure in the
`target cell due to fluctuations of the radio signal in cell B as illustrated in Figure 25.4, and
`will try to re-establish the radio link in the original source cell. Since the source eNodeB
`would have deleted all contexts related to that UE when the handover was completed, the
`re-establishment in the source cell would result in the source eNodeB sending an ‘RLF
`INDICATION’ message to the target eNodeB, exactly as if a too-late handover had taken
`place in the opposite direction. However, the target eNodeB can still discriminate the too-
`early handover from a too-late handover in the other direction if it had previously started a
`timer Tearly on the incoming handover of the UE and notices that the ‘RLF INDICATION’
`message is received from the same source cell and for the same UE before Tearly expires. The
`implementation of the SON remedy for too-early handover therefore requires both a new
`timer to be run in the target eNodeB and a new message, ‘HANDOVER REPORT’, to be
`sent from the target eNodeB B to the source eNodeB in response to the ‘RLF INDICATION’
`message, to signal to the source eNodeB that the source cell had a too-early handover problem
`towards the target cell rather than a ‘too-late’ handover problem.
`These examples also show that implementations of SON remedies for too-late and too-
`early handover are best implemented in conjunction with each other as a comprehensive
`solution in order to avoid wrong MRO verdicts.
`
`25.6.4 Handover to an Inappropriate Cell
`Handover to an inappropriate cell shares some similarities with the too-early handover
`described above. Consider an example where a UE moves from a cell A of eNodeB A to
`
`IPR2022-00648
`Apple EX1023 Page 658
`
`

`

`SELF-OPIIMIZING NETWORKS
`
`593
`
`a cell B of eNodeB B, but traverses a small overlap area in which a cell C of eNodeB C
`presents the strongest signal. This scenario is illustrated in Figure 25.5.
`
`
`
`Figure 25.5: Handover to an inappropriate cell.
`
`In this scenario, eNodeB A may be tempted to trigger the handover to cell C, but if the
`period for which cell C is the strongest is too short this could result in the UE experiencing
`a connection failure in cell C and re-cstablishing the radio link in the real suitable target cell
`B. However, the problem can again easily be reported to the originating eNodeB A: When
`the UE re-establishes the radio link in cell B, eNodeB B will send an ‘RLF INDICATION’
`
`message to eNodeB C for that UE before the timer Tm, expires in cell C, indicating
`the originating cell A. Then eNodeB C can send a ‘HANDOVER REPORT’ message to
`eNodeB A to inform it about the inappropriate handover to cell C. eNodeB A can then
`take appropriate conective action if it receives multiple similar reports. The ‘HANDOVER
`REPORT" message can also be sent from eNodeB C to eNodeB A over the X2 interface, even
`when both cells B and C belong to the same eNodeB and the ‘RLF INDICATION’ was thus
`internal to that eNodeB.
`
`It can be noticed that the same ‘HANDOVER REPORT" message is used to report the
`two MRO verdicts of too-early handover and handover to inappropriate cells, an information
`element ‘type of handover problem’ is used within the message to discriminate between these
`two cases.
`
`25.6.5 MRO Verdict Improvement
`
`As mentioned above, discrimination between a ‘too-late handover’ and a ‘coverage hole’
`MRO verdict requires that the eNodeB where the UE re—establishes the connection after
`
`Samsung Ex. 1010
`1195 of 1365
`
`IPR2022-00648
`Apple EX1023 Page 659
`
`

`

`594
`
`LTE – THE UMTS LONG TERM EVOLUTION
`
`the connection failure wait for the completion of the re-establishment and retrieve some
`measurements from the UE (the ‘R9 UE RLF Report’) before it can send the ‘RLF
`INDICATION’ message. As a result, this message may arrive late and hence confuse the
`MRO verdict between too-late, too-early and wrong cell handover. In order to remove this
`dependency on the timing of the network delivery of the ‘RLF INDICATION’ message, the
`‘R9 UE RLF Report’ was extended in Release 10 to include the ‘Time elapsed since the last
`handover initialization until connection failure’. Since this timer runs in the UE, its value is
`independent of network delivery conditions and therefore more accurate. When receiving the
`‘RLF INDICATION’ message, the source eNodeB will compare this new timer (instead of
`the Release 9 timer Tearly described above) to an internal threshold and thus obtain a more
`accurate verdict between the three MRO types (too-late, too-early and wrong cell).
`
`25.6.6 Handover to an Unprepared Cell
`Release 10 further extends the scope of MRO to cover the case where, after a connection
`failure, the UE is in idle mode when it re-connects to the network, either because the RLF
`took too long or simply because the UE first tried to re-establish the connection on a target
`cell that was unprepared and hence the re-establishment failed. In such scenarios, a network
`context cannot be relied upon, and therefore the Release 9 MRO detection scheme cannot be
`used. Therefore Release 10 includes an equivalent context-less MRO solution:
`
`1. A Release 10 UE starts a log when connection failure occurs, containing the following
`items:
`
`• The information contained in the Release 9 UE RLF report;
`• The new timer defined for the MRO verdict improvement (see Section 25.6.5),
`which measures the time elapsed since the last handover initialization until the
`connection failure;
`• The identity of the last cell that served the UE;
`• The identity of the cell which received the first (unsuccessful) re-establishment
`attempt;
`• The identity of the cell that served the UE at the last handover initialization.
`
`2. The UE starts this log at connection failure detection and delivers it when it re-connects
`to the network from idle mode over the newly established Radio Resource Control
`(RRC) connection. By analysing the UE’s log, the network can obtain all the elements
`to make a verdict between too-late handover, too-early handover, wrong-cell handover
`or coverage hole, despite the fact that the UE had transitioned through idle mode.
`
`25.6.7 Unnecessary Inter-RAT Handovers
`MRO was also extended in Release 10 to cover inter-RAT scenarios. The unnecessary inter-
`RAT handover scenario addresses the case where a UE is handed over from LTE to another
`RAT (e.g. UMTS or GSM) despite the fact the quality of the LTE coverage was actually good
`enough and would have allowed the UE to remain on LTE. This can be seen as a too-early
`handover to another RAT with no connection failure; it may affect the user experience if the
`
`IPR2022-00648
`Apple EX1023 Page 660
`
`

`

`SELF-OPTIMIZING NETWORKS
`
`595
`
`other RAT offers lower performance and the UE cannot easily reconnect to LTE; it may also
`lead to a non-optimal use of network resources. It is typically due to the handover threshold
`for the LTE serving cell being set too high.
`Such unnecessary inter-RAT handovers are detected by the target RAN node when
`triggered by the source eNodeB. The source eNodeB first requests the target RAN node
`during the inter-RAT Handover Preparation procedure to instruct the UE to continue
`measuring the LTE cells. It also provides the duration for which these measurements should
`continue and a minimum reference quality above which the target RAN node is allowed to
`report. It may also provide a list of selected LTE frequencies, for example to minimize the
`impact of compressed mode while in UMTS. Then, whenever the target RAN node receives a
`UE measurement above this threshold for one LTE cell for a sufficient period of time, it marks
`this LTE cell as to be reported. The reporting phase is performed by the target RAN node:
`when the measurement duration ends, the target RAN node sends a report (using a generic
`SON transfer container on top of the RIM protocol) to the originating LTE cell containing
`the results of the measurements – i.e. the list of LTE cells whose quality the UE measured to
`be above the configured threshold. Upon reception of the report, the originating eNodeB can
`take further corrective action, such as deciding if and how its parameters (e.g. the threshold
`to trigger inter-RAT handover) should be adjusted.
`
`25.6.8 Potential Remedies for Identified Mobility Problems
`Whenever the mechanisms described above are used in a network to detect such connection
`failure scenarios between cells, the source eNodeB may take some appropriate actions to
`combat them. For instance, in the case of repeated too-late or too-early handovers, one
`possible action could be to change the threshold at which the handovers are triggered. The
`source eNodeB can then use the same ‘Mobility Settings Change’ procedure as for MBL
`scenarios to inform the neighbour eNodeB of the change of threshold it has performed.
`In this case the ‘MOBILITY CHANGE REQUEST’ message is sent with a cause value
`‘hando

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket