Title of Invention

CONNECTION INDEPENDENT SESSION HANDOFF FROM SOURCE SESSION REFERENCE NETWORK CONTROLLER TO TARGET SRNC

Abstract Systems and methods of decoupling session management from connection management of a wireless network by enabling transfer of a session between session controllers. A session transfer component transfers ownership of a session from a source session controller to a target session controller, wherein the session transfer does not necessarily require moving the associated connections therewith. Such transfer employs a Unicast Access Terminal Identifier (UATI) that is updated to inform the related base stations regarding transfer of the session.
Full Text METHOD AND APPARATUS FOR TRANSFER OF SESSION REFERENCE NETWORK CONTROLLER
Claim of Priority under 35 U.S.C. §119
[0001] The present Application for Patent claims priority to Provisional Application
No. 60/895,930 entitled "METHOD FOR TRANSFERRING SESSIONS REFERENCE CONTROLLER IN DISTRIBUTED RADIO ACCESS NETWORKS" filed on March 20, 2007, and Provisional Application No. 60/945,067 entitled "METHOD AND APPARATUS FOR IAS INTERFACE MESSAGE" filed on June 19, 2007, both applications assigned to the assignee hereof and hereby expressly incorporated by reference herein.
BACKGROUND
Field
[0002] The following description relates generally to wireless communications, and
more particularly to methods and apparatus for transfer of session ownership between network entities.
Background
[0003] Wireless networking systems have become a prevalent means to communicate
with others worldwide. Wireless communication devices, such as cellular telephones, personal digital assistants, and the like have become smaller and more powerful in order to meet consumer needs and to improve portability and convenience. Consumers have become dependent upon these devices, demanding reliable service, expanded areas of coverage, additional services (e.g., web browsing capabilities), and continued reduction in size and cost of such devices.
[0004] In particular, as the evolution of wireless technologies continues to advance, the
progression of mobile services will continue to evolve into ever-richer, more compelling mobile and converged services. With end users demanding more and higher-quality multimedia content in all environments, the evolution of device technologies will continue to enhance the increasing consumption of data usage. For example, over the last several years, wireless communications technologies have evolved from analog-driven systems to digital systems. Typically in conventional analog systems, the analog signals are relayed on a forward link and a reverse link and require a significant amount

of bandwidth to enable signals to be transmitted and received while being associated
with suitable quality. As the analog signals are continuous in time and space, no status
messages (e.g., messages indicating receipt or non-receipt of data) are generated. In
contrast, packet-switched systems allow analog signals to be converted to data packets
and transmitted by way of a physical channel between an access terminal and a base
station, router, and the like. In addition, digital data can be relayed in its natural form
(e.g., text, Internet data, and the like) via employing a packet switched network.
[0005] As such, digital wireless communication systems are widely deployed to provide
various communication services such as telephony, video, data, messaging, broadcasts, and the like. Such systems commonly employ an access network that connects multiple access terminals to a wide area network (WAN) by sharing the available network resources. The access network is typically implemented with multiple access points dispersed throughout a geographic coverage region. Moreover, the geographic coverage region can be divided into cells with an access point in each cell. Likewise, the cell can be further divided into sectors. However, in such system architecture supplying session information and paging management to a moving AT becomes a challenging task,
SUMMARY
[0006] The following presents a simplified summary in order to provide a basic
understanding of the described aspects. This summary is not an extensive overview and is intended to neither identify key or critical elements nor delineate the scope of such aspects. Its purpose is to present some concepts of the described aspects in a simplified form as a prelude to the more detailed description that is presented later.
[0007] The described aspects provide for transfer of a communication session from a
source session controller (e.g., a source Session Reference Network Controller -SRNC) to a target session controller (e.g., a target SRNC) - via a session transfer component, and enable decoupling of session management from connection management of wireless networks. Accordingly, session management becomes independent of connection management, wherein if a session is to be transferred, such does not necessarily require moving the associated connection therewith. Such is in contrast to conventional systems that require the connection to be moved if the session is moved, which can further induce interruptions. Hence, the described aspects provide for transfer of a session without interruption of the data stream between the AT and the wireless communication system.

[0008] In general, a connection represents an assignment of resources (e.g., dedicated
resources) that allow an Access Terminal (AT) to communicate with an Access Network (AN). Likewise, a session represents a collection of configurations, attributes or parameters negotiated between the AT and the AN (e.g., Quality of Service configurations), wherein the session controller retains the authority on such configurations. Communications between base station and the AT is based on the configurations maintained in the session controller, wherein a base station needs to obtain such configuration from the session controller, before communicating with the AT. The connection is maintained independently of the session state, wherein the base stations (and not the session controller) control the connection.
[0009] The session and the AT can be identified to base stations based on a Unicast
AccessTerminal Identifier (UATI), wherein session signatures can further designate the version of the session for the AT. Such identification by session signatures can be based on a sequence of numbers that can be incremented, when the session is updated, e.g., a session can be modified upon initiation of a new application that requires additional resources.
[0010] Based on such updates, base station that receives the UATI can clearly and
unambiguously locate the session controller (e.g., target SRNC), which now manages the session to retrieve session information. It is to be appreciated that a base station can re¬negotiate the session if session information is not desirable.
[0011] In a related aspect, the transfer of the SRNC occurs without interruption to
stream of data communicated between the AT and base stations, regardless of which SRNC is chosen. Moreover, the AT can recognize each base station and can communicate directly therewith, wherein the SRNC can act as the coordinator of negotiations that the AT has conducted with such base stations. The SRNC typically includes authentication functions and associated configurations - which are negotiated between base station(s) and access terminals(s), and functions as a reference for base stations to retrieve information (e.g., obtain session information to avoid conflicts during session change.) The source SRNC can also hold the reference copy of the session and perform paging controller function. SRNC can be located using the UATI of the AT. In a related aspect, the session transfer component can robustly transfer SRNC to another entity, while at the same time another AN is being added into the active set or session negotiation.

[0012] According to a methodology, initially a source SRNC and a target SRNC are
positioned in a route set for exchange of messages (e.g., have been set up for communication). Subsequently, a message related to an SRNC transfer request can be sent to the source SRNC from the target SRNC. The source SRNC can then supply UATI sequence numbers {e.g., an increasing number associated with UATI) to signify for base stations the sequence numbers supplied for the target SRNC. Moreover, the target SRNC can supply the updated UATI to the AT. Upon receipt of such message by the AT, it subsequently responds with UATI complete message, to the target SRNC to indicate agreement with updated UATI and transfer to the assigned target SRNC. The target SRNC can then announce to members of route associated therewith (e.g., the source SRNC and the serving eBS) that the UATI has changed and the target SRNC has now taken ownership of the session. Likewise, base stations can change their associated UATI to that of the target SRNC.
[0013] To the accomplishment of the foregoing and related ends, certain illustrative
aspects are described herein in connection with the following description and the annexed drawings. These aspects are indicative, however, of but a few of the various ways in which the principles of the disclosed subject matter may be employed and the claimed matter is intended to include all such aspects and their equivalents. Other advantages and novel features may become apparent from the following detailed description when considered in conjunction with the drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
[0014] Fig. 1 illustrates an exemplary session transfer component that transfers a
session from a source Session Reference Controller (SRNC) to a target SRNC.
[0015] Fig. 2 illustrates an exemplary system for SRNC transfer, which includes Access
Networks in form of a functional entity that contains AN Route Instance (ANRI) for
logically communicating with the Access Terminal (AT).
[0016] Fig. 3 illustrates an exemplary Unicast Access Terminal Identifier (UATI) that is
updatable to designate a transfer to base stations.
[0017] Fig. 4 illustrates a related methodology of transferring a state to a target SRNC
according to an aspect.
[0018] Fig. 5 illustrates a further methodology of transferring ownership of a session
from a source SRNC to a target SRNC according to an aspect.

[0019] Fig. 6 illustrates an exemplary call flow of SRNC transfer according to a further
aspect, wherein it can be assumed that the source SRNC and the target SRNC are
already in the Route Set.
[0020] Fig. 7 illustrates a call flow when Route Set Add occurs during a session
reference transfer.
[0021] Fig. 8 illustrates a further flowchart for when session negotiation is attempted
during a session reference transfer, in accordance with a further aspect.
[0022] Fig. 9 illustrates a related flow chart that illustrates an exemplary session
reference transfer where the AT does not receive the UATIAssign message.
[0023] Fig. 10 illustrates a further exemplary aspect of a call flow, which describes a
failure scenario for a session reference transfer where the UATIComplete message is
lost.
[0024] Fig. 11 illustrates a particular system that facilitates transfer for ownership of a
session from a source SRNC to a target SRNC.
[0025] Fig. 12 illustrates a system that can be employed in connection with transmitting
a session to a target SRNC according to an aspect.
[0026] . Fig. 13 illustrates exemplary base station functions that control the connection
that allow the AT and the AN to communicate as part of a wireless system.
DETAILED DESCRIPTION
[0027] Various aspects are now described with reference to the drawings. In the
following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of one or more aspects. It may be evident, however, that such aspect(s) may be practiced without these specific details.
[0028] As used in this application, the terms "component," "module," "system" and the
like are intended to include a computer-related entity, such as but not limited to hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. In

addition, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets, such as data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems by way of the signal.
[0029] Furthermore, various aspects are described herein in connection with a terminal,
which can be a wired terminal or a wireless terminal. A terminal can also be called a system, device, subscriber unit, subscriber station, mobile station, mobile, mobile device, remote station, remote terminal, access terminal, user terminal, terminal, communication device, user agent, user device, or user equipment (UE). A wireless terminal may be a cellular telephone, a satellite phone, a cordless telephone, a Session Initiation Protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a handheld device having wireless connection capability, a computing device, or other processing devices connected to a wireless modem. Moreover, various aspects are described herein in connection with a base station. A base station may be utilized for communicating with wireless terminal(s) and may also be referred to as an access point, a Node B, enhanced Base Station (eBS), or some other terminology.
[0030] Moreover, the term "or" is intended to mean an inclusive "or" rather than an
exclusive "or." That is, unless specified otherwise, or clear from the context, the phrase "X employs A or B" is intended to mean any of the natural inclusive permutations. That is, the phrase "X employs A or B" is satisfied by any of the following instances: X employs A; X employs B; or X employs both A and B. In addition, the articles "a" and "an" as used in this application and the appended claims should generally be construed to mean "one or more" unless specified otherwise or clear from the context to be directed to a singular form.
[0031] The techniques described herein may be used for various wireless
communication systems such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA and other systems. The terms "system" and "network" are often used interchangeably. A CDMA system may implement a radio technology such as Universal Terrestrial Radio Access (UTRA), cdma2000, etc. UTRA includes Wideband-CDMA (W-CDMA) and other variants of CDMA. Further, cdma2000 covers IS-2000, IS-95 and IS-856 standards. A TDMA system may implement a radio technology such as Global System

for Mobile Communications (GSM). An OFDMA system may implement a radio technology such as Evolved UTRA (E-UTRA), Ultra Mobile Broadband (UMB), IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, Flash-OFDMLi, etc. UTRA and E-UTRA are part of Universal Mobile Telecommunication System (UMTS). 3GPP Long Term Evolution (LTE) is a release of UMTS that uses E-UTRA, which employs OFDMA on the downlink and SC-FDMA on the uplink. UTRA, E-UTRA, UMTS, LTE and GSM are described in documents from an organization named "3rd Generation Partnership Project" (3GPP). Additionally, cdma2000 and UMB are described in documents from an organization named "3rd Generation Partnership Project 2" (3GPP2).
[0032] Various aspects or features will be presented in terms of systems that may
include a number of devices, components, modules, and the like. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include ail of the devices, components, modules etc. discussed in connection with the figures. A combination of these approaches may also be used,
[0033] Fig. 1 illustrates a session transfer component 125 that transfers a session 142
from a source Session Reference Controller 111 (SRNC) to a target SRNC 113. Typically, the source and target SRNC 111, 113 are responsible for maintaining the session reference with the Access Terminal 120 (AT.) Moreover, such source SRNC 111 and target SRNC 113 can support idle state management of the AT 120, and provide paging control functions when the AT 120 is idle. In one aspect, the SRNC 113, 113 contains a Session Anchor route for each AT 120 it is supporting. Moreover, Access Gateway (AGW) selection can be performed by the SRNC 111, 113 for the AT 120. In addition, an SRNC can assume the Data Attachment Point SRNC function to establish a Signaling-Only binding with the AGW when the AT is idle. The SRNC can also function as the authenticator for access authentication.
[0034] As illustrated in Fig. 1, the session transfer component 125 transfers ownership
of a session 142 from the source SRNC 111 to the target SRNC 113, wherein associated Unicast Access Terminal Identifier (UATI) can then be updated to designate such transfer to the related base station(s). Accordingly, session management becomes independent of connection management, wherein if a session is to be moved, such does not necessarily require moving the associated connection therewith. Such is in contrast to conventional systems that require the connection to be moved if the session is moved,

which can further induce interruptions. Communications between base station (not shown) and the AT 120 is based on the configurations maintained in the session controller, wherein a base station needs to obtain such configuration from the session controller, before communicating with the AT. The session and the AT 120 can be identified to base stations based on a Unicast Access Terminal Identifier (UATI), wherein session signatures can further designate the version of the session for the AT. Such identification by session signatures can be based on a sequence of numbers that can be incremented, when the session is updated, e.g., a session can be modified upon initiation of a new application that requires additional resources.
[0035] Based on such updates, a base station that receives the UATI can clearly and
unambiguously locate the target SRNC 111, which now manages the session to retrieve session information. It is to be appreciated that a base station can re-negotiate the session if session information is not desirable. The UATI may include a subnet identifier segment (e.g., having a size of 8 bits) and an AT identifier portion having a predetermined size {e.g., 24 bits.). It may also include the IP address of the SRNC for the AT 120. Accordingly, when the AT system moves {e.g., from a source subnet to a target subnet) a target SRNC can be identified from UATI, and a session is referred or located thereafter by updated or a new UATI. It is to be appreciated that even though Fig. 1 illustrates the session transfer component as a single unit, such unit can be in a distributed from throughout the system. Moreover, the paging processes during session transfer can be performed by using both an old page ID {e.g., assigned by the source session controller to the AT) and a new Page ID (e.g., assigned to the AT by the target SRNC), and before the new UATI has been confirmed from the AT.
[0036] Fig. 2 illustrates an exemplary system SRNC transfer that includes Access
Networks in form of a functional entity that contains AN Route Instance (ANRI) 211, 213, 215 for logically communicating with the Access Terminal (AT) 220. Communication by an ANRI that is not currently serving the AT 220 on a forward or reverse radio link is accomplished logically by tunneling UMB Route Protocol Packets through the Forward Link Serving eBS (FLSE) and Reverse-Link Serving eBS (RLSE). The SRNC 230 can have a route with the AT 220, wherein the SRNC 230 can communicate transparently with other base stations. In one aspect transfer of a session occurs without interruption of the data stream between the AT and the wireless communication system. Moreover, the AT 220 can recognize each base station and can

communicate directly therewith, wherein the SRNC can act as the coordinator of negotiations that the AT has conducted with such base stations.
[0037] As illustrated in Fig. 2, the Access Gateway (AGW) 225 provides the "point of
IP attachment" to the Packet Data network for ATs. Accordingly, the AGW 225 is effectively the first-hop router for the AT 220, wherein the AGW 225 can consist of Control-plane (C-plane) to handle signaling messages between eBS/SRNC and the AGW, and User-plan (U-plane) to handle bearer traffic. C-plane and U-plane may have different IP endpoint. The transfer component moves the SRNC from one entity to another entity.
[0038] The source SRNC can also hold the reference copy of the session and perform
paging controller function. SRNC can be located using the UATI of the AT 220. For example, IP address of the SRNC may be embedded as part of the UATI. The transfer component robustly transfers SRNC to another entity that can happen at the same time that another AN is being added. Accordingly, the transfer component transfers ownership of a session from a source SRNC to a target SRNC, wherein associated Unicast Access Terminal Identifier (UATI) can then be updated to designate such transfer to base stations.
[0039] The session and the AT can be identified to base stations based on a Unicast
AccessTerminal Identifier (UATI), wherein session signatures can further designate the version of the session for the AT. Based on such updates, a bases station that receives the UATI can clearly and unambiguously locate the target SRNC, which now manages the session reference, to retrieve session information. It is to be appreciated that a base station can re-negotiate the session if session information is not desirable. As illustrated in Fig. 2, the Ul reference point carries control and bearer information between the eBS and the AGW. Likewise, the U2 reference point carries control information between the SRNC and eBS; and the U3 reference point carries control and bearer information between two eBSs. Moreover, The U4 reference point carries control information between SRNCs. Furthermore, the U6 reference point carries control information between the SRNC and AGW.
[0040] Fig. 3 illustrates an exemplary Unicast Access Terminal Identifier (UATI) 319
that is updatable to designate transfer of the AT from one base station to another base station, as part of a communication system 300. The UATI serves as a temporary identifier to identify the AT and the associated SRNC serving the AT. For example, the

UATI 319 can be employed in messages transmitted over the air interface between the mobile station 326 327, the AN, target SRNC 340 or source SRNC 330. As illustrated in Fig. 3, the UATI 319 can include a predetermined number of bits (e.g., 24 bits that includes an 8-bit prefix for the AN, and a 16-bit SRNC identifier.) It is to be appreciated that such arrangement is exemplary in nature and other arrangements are well within the realm of the subject innovation.
[0041] Moreover, additional frame preambles can be employed followed by a series of
frames. Further acquisition information such as timing and other information sufficient for an access terminal to communicate on one of the carriers and basic power control or offset information may also be included in the superframe preamble. In other cases, only some of the above and/or other information can be included in the frame preamble and or subframes. Moreover, each frame can further identify a number of subcarriers that can simultaneously utilized for transmission over some defined period.
[0042] In a related aspect, such transfer of the SRNC via updatable UATIs can occur
without interruption of the data stream between the AT 326, 327 and the wireless communication system. Moreover, the AT 326, 327 can recognize each base station and can communicate directly therewith, wherein the SRNC can act as the coordinator of negotiations that the AT has conducted with such base stations.
[0043] Fig. 4 illustrates a related methodology 400 of transferring a session from a
source SRNC to a target SRNC according to an aspect. While the exemplary method is illustrated and described herein as a series of blocks representative of various events and/or acts, the various aspects is not limited by the illustrated ordering of such blocks. For instance, some acts or events may occur in different orders and/or concurrently with other acts or events, apart from the ordering illustrated herein, in accordance with the various aspects described herein. In addition, not all illustrated blocks, events or acts, may be required to implement a methodology in accordance with the subject innovation. Moreover, it will be appreciated that the exemplary method and other methods according to the innovation may be implemented in association with the method illustrated and described herein, as well as in association with other systems and apparatus not illustrated or described. Initially and at 410, changes in the base station serving the AT can be detected, which prompt a change between a source SRNC and a target SRNC. Next and at 420 UATI associated with the source SRNC can be updated to designate the target SRNC. At 430, a session can transfer ownership from the source SRNC to the

target SRNC. Such transfer of ownership from the source SRNC to the target SRNC supplies decoupling of management of the session from connection management of the session at 440. Accordingly, session management becomes independent of connection management, wherein if a session is to be moved, such does not necessarily require moving the associated connection therewith. Such is in contrast to conventional systems that require the connection to be moved if the session is moved, which can further induce interruptions.
[0044] Fig. 5 illustrates a further methodology 500 of transferring ownership of a
session from a source SRNC to a target SRNC according to an aspect. Initially and at 510, a source SRNC and a target SRNC are positioned in a route set for exchange of messages. Subsequently and at 520, a message related to an SRNC transfer request can be sent to the source SRNC from the target SRNC. At 530, the source SRNC can then supply UATI sequence numbers (e.g., an increasing number associated with UATI) and signify for base stations the sequence numbers supplied for the target SRNC. Moreover, the target SRNC can supply the updated UATI to the AT. Upon receipt of such message by the AT, it subsequently responds with UATI complete message to the target SRNC to indicate agreement with updated UATI and transfer to the assigned target SRNC. At 540, the target SRNC can then announce to members of route associated therewith (e.g., the source SRNC and the serving eBS) that the UATI has changed and the target SRNC has now taken ownership of the session. Likewise, base stations can change their associated UATI to that of the target SRNC.
[0045] Fig. 6 illustrates an exemplary call flow 600 of SRNC transfer according to a
further aspect, wherein it can be assumed that the source SRNC and the target SRNC are already in the Route Set (e.g., communicate with each other). As illustrated, initially and at 610, the target SRNC sends an Inter-Access Network Signaling (IAS)-SRNC Transfer Request message to the source SRNC to request a session reference transfer and starts timer Tstr_;as. Such timers are employed to increase reliability of the message exchange procedures.
[0046] Subsequently, and at 620, the source SRNC responds to the target SRNC with an
IAS-SRNC Transfer Response message. Such message includes a new UATI_SeqNo (for the new UATI). Once the source SRNC sends the IAS-SRNC Transfer Response message, a session associated therewith can be locked. Such session locking can include rejects of any further session modification - and yet still acceptance request for a copy of

the session and also request to page the AT. Upon receipt of the IAS-SRNC Transfer Response message, the target SRNC halts timer Tstr_jas. The target SRNC can aiso lock its session.
[0047] At 630, the target SRNC sends UATIAssign message containing the new UATI
to the AT. Subsequently and at 640, upon receipt of the UATIAssign message, the AT sends UATICompiete messages to the target SRNC. Upon receipt of the UATIComplete message or signaling message addressed to the new UATI, the target SRNC unlocks its session, e.g., it allows session configuration, and sends IAS-UATI Update message to ail ANRIs in the Route Set.
[0048] Next and at 640, upon receipt of the IAS-UATI Update message with a new
UATI_SeqNo, the source SRNC releases the old UATI and sends IAS-UATI Update Ack message back to the target SRNC. Upon receipt of the IAS-UATI Update Ack message, the target SRNC unlocks the session and stops timer Tuupd-ias-
[0049] Fig. 7 illustrates a call flow 700 when Route Set Add occurs during a session
reference transfer. Such calf flow 700 assumes that the source SRNC and the target SRNC are already in the Route Set while eBSl is not in the Route Set yet. Initially and at 710, the target SRNC sends an IAS-SRNC Transfer Request message to the source SRNC to request a session reference transfer and starts timer Tstr_jas.
[0050] Next and at 720 the source SRNC locks its session and responds to the target
SRNC with an IAS-SRNC Transfer Response message. Such message includes the new UATI__SeqNo (for the new UATI). Upon receipt of the IAS-SRNC Transfer Response message, the target SRNC stops timer Tslr.ias.
[0051] Subsequently and at 730 the target SRNC sends a UATIAssign message
containing the new UATI to the AT. However, before the message is received at the AT, the AT sends RouteOpenRequest message to the eBSl with old UATI to add the eBSI into the Route Set. At 740, eBSl sends an lAS-Session Information Request message addressing the old UATI, to the source SRNC with a flag indicating this is for Route Set Add and starts timer TSjr_jas.
[0052] At 750, the source SRNC accepts the request for session by sending an IAS-
Session Information Response message with the session information. Upon receipt of the IAS-Session Information Response message, the eBSl stops timer TSjr_jas.
[0053] Subsequently, at 760, the AT receives the UATIAssign message from the target
SRNC. Next, at 770, upon receipt of the UATIAssign message, the AT sends

UATICompIete message to the target SRNC. As such and upon receipt of the U ATI Complete message or a signaling message addressed to the new UATI, the target SRNC unlocks its session, wherein session configuration can be enabled, and sends IAS-UATI Update message to all ANRIs in the Route Set,
[0054] At 780, the target SRNC sends an IAS-UATI Update message with the new
UATI and the new UATI_SeqNo to the source SRNC and starts timer Tuupti.jas. Moreover, at 790, upon receipt of the IAS-UATI Update message, the source SRNC releases the old UATI and sends an IAS-UATI Update Ack message back to the target SRNC. Upon receipt of the IAS-UATI Update Ack message, the target SRNC stops timer Tuupd.jas. At 792, the AT receives a RouteOpenAccept message from eBSl in response to the RouteOpenRequest message in act 730. Subsequently, at 794, the AT sends RouteMapStatus message to all ANRIs in the Route Set, including the target SRNC.
[0055] Next, at 796, upon receipt of the RouteMapStatus message which contains the
new eBSl in the Route Set, the target SRNC sends IAS-UATI Update message containing the new UATI and the new UATI__SeqNo to eBSl and starts timer Tuupci-ias-Next, at 799, upon receipt of the IAS-UATI Update message, eBSl sends an IAS-UATI Update Ack message to the target SRNC. Upon receipt of the IAS-UATI Update Ack message, the target SRNC stops timer TUUpd-»as-
[0056] Fig. 8 illustrates a further flowchart in accordance with a further aspect. Such
flowchart describes the call flow when session negotiation is attempted during a session reference transfer. The call flow 800 assumes that eBSl 891, the source SRNC 892 and the target SRNC 893 are already in the Route Set. Initially, at 801, the target SRNC 893 sends an IAS-SRNC Transfer Request message to the source SRNC 892 to request a session reference transfer and starts timer Tstr.jas.
[0057] Subsequently, at 802, the source SRNC 892 locks its session and responds to the
target SRNC 893 with an IAS-SRNC Transfer Response message. This message includes the new UATI_SeqNo (for the new UATI). Upon receipt of the IAS-Session Information Request message, the target SRNC 893 stops timer Tstl..;as. The target SRNC sends UATIAssign message containing the new UATI to the AT. However, before the message is received at the AT, the AT and eBSl initiate session negotiation at 803.

[0058] Next, at 804, in order to complete session negotiation, eBSl 891 sends IAS-
Session Information Update Request message with the old UATI to the source SRNC 892 and starts timer Tsur.jas. At 805, the source SRNC rejects the request by sending an IAS-Session Information Update Response message to eBSl 891 with the error cause value indicating that the session is locked. Upon receipt of the lAS-Session Information Update Response message, eBSl stops timer Tsjr_jas and eBSl may retry updating the session at the SRNC after it receives an IAS-UATI Update message or may terminate session negotiation with the AT 895. Next, at 806, the AT receives UATIAssign message from the target SRNC.
[0059] Subsequently and upon receipt of the UATIAssign message, the AT sends
UATICompIete message to the target SRNC at 807. Upon receipt of the UATIComplete message or a signaling message addressed to the new UATI, the target SRNC unlocks its session, wherein, it can allow session configuration, and sends an IAS-UATI Update message to all ANRIs in the Route Set, including the source SRNC and eBSl.
[0060] Next, at 808, the target SRNC sends an IAS-UATI Update message with the
new UATI to the source SRNC and starts timer Tuupd_ias. At 809, and upon receipt of the IAS-UATI Update message, the source SRNC releases the old UATI and sends an IAS-UATI Update Ack message back to the target SRNC. Upon receipt of the IAS-UATI Update Ack message, the target SRNC stops timer Tuupd-jas-
[0061] Subsequently, at 810, the target SRNC sends an IAS-UATI Update message
with the new UATI to eBS 1 and starts timer Tuupd-ias- At 811, upon receipt of the IAS-UATI Update message, eBSl uses the new UATI and sends an IAS-UATI Update Ack message back to the target SRNC. Upon receipt of the IAS-UATI Update Ack message, the target SRNC stops timer Tuupd-ias- Next, at 812, upon receipt of the IAS-UATI Update message, eBSl sends IAS-Session Update Request message with the new UATI to the target SRNC and starts timer T^r.^.
[0062] Subsequently, at 813, the target SRNC accepts the request by sending an IAS-
Session Update Response message to eBSl with the new session signature. Upon receipt of the IAS-Session Update Response message, eBSl stops timer TSUr-ias-Accordingly, at 814, eBSl and the AT complete session negotiation using the new session signature.
[0063] Fig. 9 illustrates a related call flow 900 that illustrates an exemplary session
reference transfer where the AT 999 does not receive the UATIAssign message. Such

call flow 900 assumes that the source SRNC 991 and the target SRNC 993 are already in the Route Set while eBSl 997 is not yet in the Route Set. Initially, at 910, the target SRNC 993 sends an IAS-SRNC Transfer Request message to the source SRNC 991 to request a session reference transfer and starts timer Tstr-ias-
[0064] Next, at 911, the source SRNC 991 responds to the target SRNC 993 with an
IAS-SRNC Transfer Response message. This message includes the new UATI_SeqNo (for the new UATI). Upon receipt of the IAS-SRNC Transfer Response message, the target-SRNC 993 stops timer Tstr.ias. Subsequently, at 912, the target SRNC 993 sends UATIAssign message containing the new UATI to the AT 999. However, the AT 999 does not receive the message, as it has lost its connection.
[0065] During this period, if the source SRNC 991 receives a Paging Request message,
then the source SRNC 991 shall initiate a paging procedure for the AT 999 using the old PagelD. Likewise, if the UATICompIete message is not received, then the source SRNC and the target SRNC 993 can release the new UATI once its session KeepAlive timer expires. At 913, the AT 999 accesses eBSl 997 by sending a RouteOpenRequest with the old UATI to eBSl 997. Subsequently, at 914, eBSNl sends an lAS-Session Information Request message to the source SRNC with a flag indicating this is an access and starts timer TSjr.;as.
[0066] Next, at 915, upon receipt of the IAS-Session Information Request message with
the old UATI and access flag, the source SRNC unlocks the session and responds to eBSl with an IAS-Session Information Response message. Such message contains the current session, the current Data Attachment Point (DAP), and the current session signature. Upon receipt of the IAS-Session Information Response message, the eBSl stops timer Tsjr_jas.
[0067] Subsequently, at 916, the eBSl sends a RouteOpenAccept message to the AT to
complete the route setup procedure with the AT. Likewise, at 917, the AT sends a RouteMapStatus to all ANRIs in the Route Set. Next, at 918, upon receipt of the IAS-Session Information Request with the old UATI and access flag, the source SRNC also sends an IAS-UATI Update message to the target SRNC to inform the target SRNC that it may release the new UATI. Then, the source SRNC starts timer Tuup{i.jas
[0068] Subsequently, at 919, upon receipt of the IAS-UATI Update message, the target
SRNC releases the new UATI and sends an IAS-UATI Update Ack message back to the source SRNC. Upon receipt of the IAS-UATI Update Ack message, the source SRNC

stops timer Tmipci_jas, Accordingly, the call flow 900 exemplifies a scenario that enables
the source controller to recall the session and retain ownership by the source controller,
if the UATIAssign message is lost,
[0069] Fig. 10 illustrates a further exemplary aspect of a call flow 1000, which
describes a failure scenario for a session reference transfer where the UATIComplete message is lost. Such call flow 1000 assumes that the source SRNC and the target SRNC are already in the Route Set while eBSl is not yet in the Route Set. Initially, at 1001, the target SRNC sends an IAS-SRNC Transfer Request message to the source SRNC to request a session reference transfer and starts timer Tslr_jas. Next, at 1002, the source SRNC responds to the target SRNC with an IAS-SRNC Transfer Response message. This message contains the new UATI_SeqNo (for the new UATI). Upon receipt of the IAS-SRNC Transfer Response message, the target SRNC stops timer Tstr.
ias-
[0070] Subsequently, at 1003, the target SRNC sends UATIAssign message containing
the new UATI to the AT. Next, at 1004, the AT sends a UATIComplete message to the target SRNC. However, as illustrated in Fig. 1000, the AT loses its connection before the message is delivered. During such period, if the source SRNC receives a Paging Request message, then the source SRNC shall initiate a paging procedure for the AT using the old PagelD. It is to be appreciated that the AT monitors both the old PagelD and the new PagelD if the UATIComplete message has not been sent successfully. Moreover, if the UATIComplete message is not received, then the source SRNC and the target SRNC may release the new UATI once its session KeepAHve timer expires. At 1005, the AT accesses eBSl by sending RouteOpenRequest message with the new UATI.
[0071] Next, at 1006, eBSl sends an IAS-Session Information Request message with a
flag indicating this is an access to the target SRNC and starts timer TSir.jas. At 1007, and upon receipt of the IAS-Session Information Request message with the new UATI, the target SRNC unlocks the session and sends IAS-Session Information Response message to eBSl. The message contains the session of the AT. Upon receipt of the IAS-Session Information Response message, the eBSl stops timer TSjr_ias.
[0072] Subsequently and at 1008, eBSl sends a RouteOpenAccept message to the AT
to complete route setup procedure. Next, at 1009, the AT sends a RouteMapStatus message to all ANRIs in the Route Set, including eBSl and the target SRNC. At 1010,

upon receipt of the IAS-Session Information Request message with the new UATI, the target SRNC sends an IAS-UATI Update message to the source SRNC and starts timer Tuupd-ias- Next, at 10)1, upon receipt of the IAS-UATI Update message, the source SRNC sends an IAS-UATI Update Ack message to the target SRNC and may release the old UATI. Upon receipt of the UATI Update Ack message, the target SRNC stops timer Tuupd-ias. As such, the telecommunication system can recover during a failure scenario for a session reference transfer where the UATIComplete message is lost.
[0073] Fig. 11 illustrates a particular system 1100 that facilitates transfer for ownership
of a session from a source SRNC to a target SRNC. The system 1100 can be associated with an access point and includes a grouping 1102 of components that can communicate with one another in connection with transfer of session ownership, and supplying updates to the UATI.
[0074] Grouping 1102 also includes a component 1106 for transferring a session from a
source SRNC to a target. Such grouping can further include components for tracking session signatures (notshown) and a component for supplying QoS configuration 1107, wherein if a session is to be moved, such does not necessarily require moving the associated connection therewith. Grouping 1102 additionally includes a component 1108 for receiving communication data and/or message exchange from a source SRNC, wherein the data is desirably transmitted to the AT and/or target SRNC. Moreover, the communication data received from the AT can be an IP-encapsulated data packet that is associated with a sequence number or stamp. Grouping 1102 can further include a component 1110 for transmitting communication data (e.g., message exchange) to the target SRNC 1110 in an appropriate sequence. System 1100 can also include a memory 1112, which can retain instructions relating to executing components 1104-1110. The system 1100 further includes a component 1104 for notifying base stations and other units in communication with the AT of the session transfer and/or the identity of the target SRNC.
[0075] Fig. 12 illustrates a system 1200 that can be employed in connection with
interaction with a session transmitted to a target SRNC according to an aspect. System 1200 comprises a receiver 1202 that receives a signal from, for instance, one or more receive antennas, and performs typical actions thereon (e.g., filters, amplifies, downconverts, ...) the received signal and digitizes the conditioned signal to obtain

samples. A demodulator 1204 can demodulate and provide received pilot symbols to a processor 1206 for channel estimation.
[0076] Processor 1206 can be a processor dedicated to analyzing information received
by receiver component 1202 and/or generating information for transmission by a transmitter 1214. Processor 1206 can be a processor that controls one or more portions of system 1200, and/or a processor that analyzes information received by receiver 1202, generates information for transmission by a transmitter 1214, and controls one or more portions of system 1200. System 1200 can include an optimization component 1208 that can optimize performance of user equipment before, during, and/or after handoff. Optimization component 1208 may be incorporated into the processor 1206, It is to be appreciated that optimization component 1208 can include optimization code that performs utility based analysis in connection with determining whether to initiate session handoff from the source SRNC to the target SRNC system. The optimization code can utilize artificial intelligence based methods in connection with performing inference and/or probabilistic determinations and/or statistical-based determination in connection with performing handoffs.
[0077] System (user equipment) 1200 can additionally comprise memory 1210 that is
operatively coupled to processor 1206 and that stores information such as signal strength information with respect to a base station, scheduling information, and the like, wherein such information can be employed in connection with determining whether and when to initiate and/or request a session handoff. Memory 1210 can additionally store protocols associated with generating lookup tables, etc., such that system 1200 can employ stored protocols and/or algorithms to increase system capacity. It will be appreciated that the data store {e.g., memories) components described herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of illustration, and not limitation, nonvolatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory can include random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM). The memory 1210 is intended to

comprise, without being limited to, these and any other suitable types of memory. Processor 1206 is connected to a symbol modulator 1212 and transmitter 1214 that transmits the modulated signal.
[0078] Fig. 13 illustrates base station functions, wherein the base stations control the
connection, which represent an assignment of resources (e.g., dedicated resources) that allow "an Access Terminal (AT) to communicate with an Access Network (AN). As illustrated, the system 1300 comprises a base station 1302 with a receiver 1310 that receives signal(s) from one or more user devices 1304 by way of one or more receive antennas 1306, and transmits to the one or more user devices 1304 through a plurality of transmit antennas 1308. In one example, receive antennas 1306 and transmit antennas 1308 can be implemented using a single set of antennas. Receiver 1310 can receive information from receive antennas 1306 and is operatively associated with a demodulator 1312 that demodulates received information. Receiver 1310 can be, for example, a Rake receiver (e.g., a technique that individually processes multi-path signal components using a plurality of baseband correlators, ...), an MMSE-based receiver, or some other suitable receiver for separating out user devices assigned thereto, as will be appreciated by one skilled in the art. For instance, multiple receivers can be employed (e.g., one per receive antenna), and such receivers can communicate with each other to provide improved estimates of user data. Demodulated symbols are analyzed by a processor 1314 that is similar to the processor described above with regard to Fig. 11, and is coupled to a memory 1316 that stores information related to user device assignments, lookup tables related thereto and the like. Receiver output for each antenna can be jointly processed by receiver 1310 and/or processor 1314. A modulator 1318 can multiplex the signal for transmission by a transmitter 1320 through transmit antennas 1308 to user devices 1304.
[0079] The various illustrative logics, logical blocks, modules, and circuits described in
connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but, in the alternative, the processor may be any conventional processor, controller, microcontroller, or state

machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. Additionally, at least one processor may comprise one or more modules operable to perform one or more of the steps and/or actions described above.
[0080] Further, the steps and/or actions of a method or algorithm described in
connection with the aspects disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium may be coupled to the processor, such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. Further, in some aspects, the processor and the storage medium may reside in an ASIC. Additionally, the ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal. Additionally, in some aspects, the steps and/or actions of a method or algorithm may reside as one or any combination or set of codes and/or instructions on a machine readable medium and/or computer readable medium, which may be incorporated into a computer program product.
[0081] In one or more aspects, the functions described may be implemented in
hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored or transmitted as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage medium may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also, any connection may be termed a computer-readable medium. For example, if software is transmitted from a website, server, or other remote source using a coaxial cable, fiber

optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as
infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair,
DSL, or wireless technologies such as infrared, radio, and microwave are included in the
definition of medium. Disk and disc, as used herein, includes compact disc (CD), laser
disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc where disks
usually reproduce data magnetically, while discs usually reproduce data optically with
lasers. Combinations of the above should also be included within the scope of computer-
readable media.
[0082] While the foregoing disclosure discusses illustrative aspects and/or
embodiments, it should be noted that various changes and modifications could be made herein without departing from the scope of the described aspects and/or embodiments as defined by the appended claims. Furthermore, although elements of the described aspects and/or embodiments may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated. Additionally, all or a portion of any aspect and/or embodiment may be utilized with all or a portion of any other aspect and/or embodiment, unless stated otherwise.

CLAIMS
1. A method of session handoff comprising:
identifying a session and an Access Terminal (AT) to a base station; and
transferring ownership of the session from a source session controller to a target session controller, the session transferable independent of a connection associated therewith.
2. The method of claim 1 further comprising employing a Unicast Access Terminal Identifier(s) (UATI) that notifies the base station regarding an identity of the session.
3. The method of claim 2 further comprising supplying a source Session Reference Network Controller (SRNC) as the source session controller, and a target SRNC as the target controller in 3GPP2 systems.
4. The method of claim 3 further comprising re-negotiating the session with the target SRNC, upon completion of session transfer.
5. The method of claim 3 further comprising receiving an SRNC transfer request by the source SRNC, to initiate session transfer.
6. The method of claim 3 further comprising supplying sequence numbers of the UATI to base stations, to facilitate identification of the session.
7. The method of claim 3 further comprising locking the session by the source SRNC, to reject a session modification during session transfer.
8. The method of claim 7 further comprising unlocking the session upon completion of assigning the UATI from the target SRNC to the AT.
9. The method of claim 3 further comprising announcing transfer of session ownership to all entities that are in communications with the AT.

10. At least one processor configured to supply session handoff comprising:
a first module for identifying a session and an Access Terminal (AT) to a base station, and
a second module for transferring ownership of the session from a source session controller to a target session controller, the session transferable independent of a connection associated therewith,
11. A computer program product comprising;
a computer-readable comprising:
a first set of codes for causing a computer to identify a session and an Access Terminal (AT) to a base station; and
a second set of codes for causing the computer to transfer the session from a source session controller to a target session controller, the session transferable independent of a connection associated therewith.
12. An apparatus comprising:
means for transferring a session from a source SRNC to a target SRNC; the session transferable independent of a connection thereof; and
means for notifying base stations regarding transfer of the session.
13. A method of session transfer comprising:
identifying a session and an AT to a base station; and
receiving ownership of the session by a target session controller as a result of a session transfer from a source session controller; the session transferable independent of a connection associated therewith.
14. The method of claim 13 further comprising employing a Unicast Access
Terminal Identifier (UATI) that notifies the base station regarding identity of the
session.

15. The method of claim 13 further comprising supplying a source Session Reference Network Controller (SRNC) as the source session controller, and a target SRNC as the target controller in 3GPP2 systems.
16. The method of claim 15 further comprising re-negotiating the session with the target SRNC, upon completion of session transfer.
17. The method of claim 15 further comprising sending an SRNC transfer request by the target SRNC to the source SRNC.
18. The method of claim 15 further comprising paging the AT via at least one of a page identifier assigned by the source SRNC and a page identifier assigned by the target SRNC.
19. The method of claim 15 further comprising locking the session by the source SRNC, to reject a session modification,
20. The method of claim 19 further comprising unlocking the session upon designation of the target SRNC.
21. The method of claim 13 further comprising announcing transfer of session ownership to all entities that are in communications with the AT.
22. A computer implemented system comprising:
a wireless access terminal operable to identify a session and an AT to a base station;
a session transfer component operable to transfer the session from a source SRNC to a target SRNC, the session transferable independent of a connection associated therewith.
23. ■ A system for wireless communication comprising:
a memory unit that supplies instructions for switching a session between a source SRNC and a target SRNC; and

a processor unit that executes instructions for switching the session between the source SRNC and the target SRNC, the session transferable independent of a connection associated therewith.
24. A communications system comprising:
means for transferring a session from a source SRNC to a target SRNC; the session transferable independent of a connection associated therewith; and
means for notifying base stations regarding session transfer to the target SRNC.
25. The communication system of claim 24 further comprising means for identifying
the target SRNC.
26. A method of wireless communication system, the method comprising:
receiving an IAS-SRNC transfer request message by a source SRNC for request
of a session reference transfer to a target SRNC; and
sending an IAS-SRNC transfer response message by the source SRNC that includes information for a new UATI; to facilitate session transfer.
27. The method of claim 26 further comprising locking a session to reject
modification thereof.
28. The method of claim 26 further comprising sending IAS-UATI Update Ack message by the source SRNC to the target SRNC, to facilitate session transfer.
29. The method of claim 26 further comprising stopping or starting timers during message exchange, to manage response times.
30. The method of claim 26 further comprising notifying a base station for transfer
of the session to the target SRNC.


Documents:

http://ipindiaonline.gov.in/patentsearch/GrantedSearch/viewdoc.aspx?id=4db8MATCJ5oT/KqaztCWUQ==&loc=egcICQiyoj82NGgGrC5ChA==


Patent Number 277216
Indian Patent Application Number 5016/CHENP/2009
PG Journal Number 48/2016
Publication Date 18-Nov-2016
Grant Date 15-Nov-2016
Date of Filing 28-Aug-2009
Name of Patentee Qualcomm Incorporated
Applicant Address Attn: International IP Administration 5775 Morehouse Drive San Diego California 92121-1714 USA.
Inventors:
# Inventor's Name Inventor's Address
1 TINNAKORNSRISUPHAP Peerapol 5775 Morehouse Drive San Diego CA 92121 USA.
2 MAZIK David R. 5775 Morehouse Drive San Diego CA 92121 USA.
3 ULUPINAR Fatih 5775 Morehouse Drive San Diego CA 92121 USA.
4 AGASHE Parag Arun 5775 Morehouse Drive San Diego CA 92121 USA.
5 PATWARDHAN Ravindra 5775 Morehouse Drive San Diego CA 92121 USA.
6 PRAKASH Rajat 5775 Morehouse Drive San Diego CA 92121 USA.
PCT International Classification Number H04W92/22, H04L29/08, H04W36/10
PCT International Application Number PCT/US2008/057651
PCT International Filing date 2008-03-20
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 60/895,930 2007-03-20 U.S.A.
2 60/945,067 2007-06-19 U.S.A.
3 12/051,710 2008-03-19 U.S.A.