Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

A token seizure method for DECT MAC ID Assignment

IP.com Disclosure Number: IPCOM000017592D
Original Publication Date: 2001-Apr-01
Included in the Prior Art Database: 2003-Jul-23
Document File: 2 page(s) / 15K

Publishing Venue

Siemens

Related People

Dr. Xiaoyong He: AUTHOR [+2]

Abstract

In a time division multiple access (TDMA) system like digital european cordless telephone (DECT) each physic channel has to be uniquely identified through a portable media access control (MAC) identity (PMID) in order to support the hand over. DECT standard specifies that when initiating a MAC connection, a portable, knowing nothing about the available unique PMID, can use a random number as default PMID. But ist uniqueness can not be ensured and so the hand over can not be safely performed. If it is not unique the base station will not send bearer confirm to portable and it has select another random number to repeat the process. Even if this process is finished with a unique number within the base station area, it is not certainly unique on the system level to support connection hand over. The network layer of the fixed part will temporarily use this default PMID link to assign a unique MAC identity to the portable as soon as possible. The old link based on the default PMID is then to be released and the connection is newly established on the assigned unique PMID. To overcome the disadvantages of the default PMID a method is presented to enable the portable to acquire a unique number as PMID at the very first MAC establish attempt and directly use it as the assigned PMID. This link identity will be used during the whole life cycle of the link with that base station. This uniquness make link release and reestablishment no longer necessary. There is also no need for explicit location procedure since an implicit location registration can be performed at fixed part side when a portable makes a connection setup attempt.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

-� � 168� � -

Information / Kommunikation

A token seizure method for DECT MAC ID Assignment

Idee: Dr. Xiaoyong He, A-Wien; Kurt Stainer, A-Goblitz

In a time division multiple access (TDMA) system like digital european cordless telephone(DECT) each physic channel has to be uniquely identified through a portable media accesscontrol (MAC) identity (PMID) in order to support the hand over. DECT standard specifies thatwhen initiating a MAC connection, a portable, knowing nothing about the available unique PMID,can use a random number as default PMID. But ist uniqueness can not be ensured and so thehand over can not be safely performed. If it is not unique the base station will not send bearerconfirm to portable and it has select another random number to repeat the process. Even if thisprocess is finished with a unique number within the base station area, it is not certainly unique onthe system level to support connection hand over. The network layer of the fixed part willtemporarily use this default PMID link to assign a unique MAC identity to the portable as soon aspossible. The old link based on the default PMID is then to be released and the connection isnewly established on the assigned unique PMID.

To overcome the disadvantages of the default PMID a method is presented to enable theportable to acquire a unique number as PMID at the very first MAC establish attempt anddirectly use it as the assigned PMID. This link identity will be used during the whole life cycle ofthe link with that base station. This uniquness make link release and reestablishment no longernecessary. There is also no need for explicit location procedure since an implicit locationregistration can be performed at fixed part side when a portable makes a connection setupattempt.

Each base station of a system has a collection of unique numbers as the available assignedPMID’s. Each PMID has n binary bits such that 2 n� <= M, where M is the maximum number ofmobile units in the system. The collection can be realized for example in a ring buffer. When thesystem is ready to accept new link establishment, the base station displays first k >= 1 value fromthe head of the ring buffer in one of the available broadcast channels. The larger the k the heavierthe load of� the broadcast channel. But the greater the freedom of the portable to select one outof the set of k numbers the less collision probabilit...