CN108702781A - The method for sending key task small data using random access channel - Google Patents
The method for sending key task small data using random access channel Download PDFInfo
- Publication number
- CN108702781A CN108702781A CN201680083305.0A CN201680083305A CN108702781A CN 108702781 A CN108702781 A CN 108702781A CN 201680083305 A CN201680083305 A CN 201680083305A CN 108702781 A CN108702781 A CN 108702781A
- Authority
- CN
- China
- Prior art keywords
- base station
- code
- user equipment
- short message
- code book
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access, e.g. scheduled or random access
- H04W74/08—Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
- H04W74/0833—Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/0001—Arrangements for dividing the transmission path
- H04L5/0014—Three-dimensional division
- H04L5/0016—Time-frequency-code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0053—Allocation of signaling, i.e. of overhead other than pilot signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0058—Allocation criteria
- H04L5/0064—Rate requirement of the data, e.g. scalable bandwidth, data priority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W56/00—Synchronisation arrangements
- H04W56/004—Synchronisation arrangements compensating for timing error of reception due to propagation delay
- H04W56/0045—Synchronisation arrangements compensating for timing error of reception due to propagation delay compensating for timing error by altering transmission time
Abstract
A method of short message being sent to base station for user equipment, this method includes following operation:Generate short message;Code book corresponding with short message is selected in multiple code books;Code word corresponding with radio net temporary mark (RNTI) of user equipment is identified in the codebook;Code word is divided into one or more binary sequences;One or more binary sequences are mapped to one or more random access channel (RACH) lead code;And one or more RACH lead codes are sent to base station using random access channel.
Description
Technical field
The application is usually directed to aerogram, and is particularly sent in the wireless network using random access channel
The method of key task small data.
Background technology
In typical wireless communications environment (for example, long term evolution (LTE)), user equipment (UE) (is also referred to as via base station
For " evolved node-B (Node-B) " (eNB)) transmit voice and/or data-signal using one or more service networks.
In this wireless communication system, UE can execute many events with base station communication with initiating random access procedure.Depend on
The random access channel used in UE (RACH) resource is to be randomly choosed by UE itself or distributed by network, can be to be based on
Contention executes random access procedure based on contention-free mode.
Recently, emerging technology (for example, Internet of Things) has been obtained for much paying close attention to, this is because it is by making many devices
It can communicate with one another and assign the full mechanical automation to operating many devices.In these machine type communication (MTC) devices
This communication is referred to as Machine To Machine (M2M) communication.MTC communication has some different from current Human To Human (H2H) communication
Feature.For example, the MTC device of such as intelligence instrument can generate very small data transmission during its report interval,
And subsequently into the suspend mode of long interval of time.In another example, MTC device (for example, fire alarm) can only send small size
But the alert message of key task.
Currently, regardless of the size and importance of the data per secondary transmission, it is necessary to execute above-mentioned random access mistake
For journey to enable carrying out data transmission, this leads to significant expense.In addition, in current LTE specification in addition to scheduled PUSCH it
Outside, it is all difficult to send the data of key task but small size on any uplink channel.But the PUSCH of limited quantity is provided
Source block (RB) possibly can not support a large amount of MTC devices in specific region, this leads to unpredictable transmission delay.
Invention content
The purpose of the application is to provide a kind of for the use random access channel with reduced overhead and time delay
The method that key task small data is sent between UE and base station.
According to the application's in a first aspect, a kind of method sending short message to base station for user equipment includes following behaviour
Make:Generate short message;Code book corresponding with short message is selected in multiple code books;It identifies in the codebook wireless with user equipment
The corresponding code word of electric network temporary identifier (RNTI);Code word is divided into one or more binary sequences;By one or more two
System sequence is mapped to one or more random access channel (RACH) lead code (preamble);And believed using random access
One or more RACH lead codes are sent to base station by road.
It is a kind of to be used for what base station sent the user equipment out of base station coverage area according to the second aspect of the application
The method that short message is decoded includes following operation:The one or more from user equipment is received via random access channel
Random access channel (RACH) lead code;One or more two is determined by being decoded to one or more RACH lead codes
System sequence;One or more binary sequences are combined into code word;Short message is determined by being decoded to code word;More
Code book corresponding with short message is selected in a code book;And the RNTI of user equipment is identified in selected code book, wherein
RNTI corresponds to code word.
According to the third aspect of the application, base station includes one or more processors, memory and is stored in storage
Multiple instruction in device is implemented multiple as described above when multiple instruction is executed by one or more processors in conjunction with base station
Operation.
Description of the drawings
Attached drawing shows described embodiment, and is used to explain basic principle together with the description, the attached drawing by including
Inside to provide a further understanding of embodiments, and it is incorporated into here and a part for constitution instruction.Identical attached drawing
Label refers to corresponding component.
Figure 1A is the block diagram for the example wireless communications that can put into practice embodiments herein.
Figure 1B is the block diagram for showing the random access procedure based on contention including multiple steps.
Fig. 2A is shown according to some embodiments of the present application for sending short, key task message to base station
The sides UE operation block diagram.
Fig. 2 B are shown according to some embodiments of the present application for receiving short, key task message from UE
The block diagram of base station side operation.
Fig. 3 is shown according to some embodiments of the present application for sending short, key task from UE to base station
The flow chart of one embodiment of the method for message.
Fig. 4 is shown according to some embodiments of the present application for receiving short, key task message from UE
The flow chart of one embodiment of method.
Specific implementation mode
Now with detailed reference to embodiment, its example is shown in the drawings.In the following detailed description, it elaborates many non-
Restricted detail is to help to understand the theme proposed here.But it to those skilled in the art will be aobvious and easy
See, various replacements can be used without departing from the scope of the claims, and can there is no these specific
Practical matter in the case of details.Referring now to the drawings, the exemplary block diagram of data processing circumstance is provided, it wherein can be real
Existing illustrative embodiment.It should be understood that these attached drawings are merely exemplary, it is not intended that assert or suggest about can be real
Any restrictions of the environment of existing different embodiments.Many modifications can be carried out to discribed environment.
Figure 1A is the block diagram for the example wireless communications 100 that can put into practice embodiments herein.Base station 102 with it is more
A user equipment 104 (it is referred to as user apparatus, movement station, subscriber unit, access terminal etc.) carries out wireless communication.Figure
The first user equipment (UE) 104-A, second user equipment (UE) 104-B and the n-th user equipment 104-N are shown in 1A.Base
Stand 102 in radio frequency (RF) communication channel 106 to 104 transmission datas of UE and from UE 104 receive data.
As used herein, term " transmitter " refers to any component or device for sending signal.Transmitter can be
It is implemented in the base station 102 for sending signal to one or more user equipmenies 104.Alternatively, transmitter can be to one
Or it is implemented in the user equipment 104 of the multiple transmission of base stations 102 signals.Term " receiver " refers to any component for receiving signal
Or device.Receiver can be implemented from the user equipment 104 that one or more base stations 102 receive signal.Alternatively,
Receiver can be implemented from the base station 102 that one or more user equipmenies 104 receive signal.Communication system 100 can be with
Follow various wireless communication techniques, such as global system for mobile communications (GSM) technology, wideband code division multiple access (WCDMA) technology, when
Point-S-CDMA-Synchronous Code Division Multiple Access (TD-SCDMA) technology, long term evolution (LTE) technology and other.
Figure 1B is the block diagram for showing the random access procedure based on contention including following four step:(1) physics with
Machine accesses the random access lead code step on channel (PRACH);(2) on physical down link sharing channel (PDSCH) with
Machine accesses response of step, wherein interim using the random access radio net on physical downlink control channel (PDCCH)
It identifies (RA-RNTI) and carries out UE addressing;(3) the scheduled transmission step in physical uplink shared channel (PUSCH);And
(4) the contention settlement steps to deal on physical down link sharing channel (PDSCH).
In random access lead code step, UE 104 selects one in 64 available RACH lead codes.In other words,
6 random access lead code id informations are only transmitted in random access lead code step.The random access replied from base station 102 is rung
It includes following information to answer message:(i) 6 random access lead code ID, (ii) UE 104 change the timing alignment value of its timing,
(iii) allow UE 104 that the initial uplink authorization resources of PUSCH, and (iv) is used to be used in a subsequent step
The Cell Radio Network Temporary Identity (C_RNTI) further communicated.Effective random access response is being received from base station 102
After message, UE 104 distributes resource according to initial uplink authorization resources, and is sent with C_RNTI on PUSCH
Scheduled transmission.It should be noted that in current LTE specification, the size of transmission block is at least 80.Finally, base station 102 uses
The optional contention settlement steps to deal terminates random access procedure.
As described above, regardless of the size for the data to be sent, no matter when will be in current LTE wireless communication systems
Execute data transmission, it is necessary to complete above-mentioned random access procedure can carry out data transmission between UE and base station.This is wanted
It seeks a large amount of signaling overheads and unpredictable transmission delay may be caused.This method used by machine-to-machine communication is extremely
There are problems that two less:(i) unpredictable transmission delay makes them unsuitable for those mission critical applications (for example, fire alarm);With
(ii) since the message from MTC device is much smaller than distributed PUSCH resources, it is thus possible to can not efficiently utilize and be distributed
PUSCH resources.
Present applicant proposes pass through the embedded small size in the initial random access lead code transmitting step from UE to base station
But the data (for example, multidigit length and alert message for being generated by fire perceiving device) of key task are come the side that solves the above problems
Case.Other than small size but the data of key task, the other information needed for base station is the promoter of data
(originator), i.e. UE ID.In other words, take it is any it is further action (for example, to remote-control device (for example, service
The mobile terminal of device or such as smart mobile phone) send report message) before, base station needs at least to know alert message itself and life
At the fire perceiving device of alert message.
For illustrative purposes, assume to exist in the coverage area of base station in the following example and be less than or equal to 65536
A UE (for example, MTC device) and the key task message generated by one in UE are that there are four 2 of probable value for tool
Long alert message.Therefore, 16 current RNTI are as UE ID long enoughs, to distinguish these in the coverage area of base station
MTC device.It should be noted that when the quantity of the UE in base station range is more than 65536, length is more than 16 new UE
ID is required to uniquely identify each UE in base station range.In order to make UE send key task message, 16 of UE
RNTI is encoded as a code word in 24 in code book or longer multiple code words.Code book and key task message are uniquely
It is associated so that each code word in code book corresponds to the identical key task message from particular UE.Then code word is divided into
One or more 6 binary sequences, then one or more 6 binary sequences be mapped to one or more random access
Lead code, and send it to base station in initial random access lead code transmitting step.
Fig. 2A is shown according to some embodiments of the present application for sending 2 key task alert messages to base station
The sides UE operation block diagram.As shown in Figure 2 A, UE selects to correspond to 2 alert messages first in multiple RNTI code books 200
A specific RNTI code book 201.The RNTI of UE is given, then the certain code word X in selected code book 201 is identified as reflecting
It is mapped to RNTI.For ease of description, every 2 of code word X are grouped together as the binary sequence with consecutive order.For example,
Respectively ' D ' is labeled as labeled as ' C ' symbol and ' 10 ' labeled as ' A ' symbol, ' 01 ' by ' 00 ' labeled as ' B ' symbol, ' 11 '
Symbol.
For example, if alert message is " 00 ", the output codons X of corresponding RNTI is configured to contain than any other symbol
Number more ' A ' symbols.In one embodiment, output codons X has 6 ' A ' symbols, 2 ' B ' symbols, 2 ' C ' symbols
And 2 ' D ' symbols.Therefore, the possibility code word in code book corresponding with the particular alert message being distributed with predefined symbol
Sum determined by the different sequences of A, B, C and D symbol.In this example, sum is C (12,6) * C (6,2) * C (4,2) * C
(2,2)=83160 are more than 65536 (sums of i.e. all possible 16 RNTI information sequences).Therefore, we can be
65536 code words are randomly choosed in possible 83160 code words, to fill the RNTI code books for corresponding to alert message.Table 1 shows
The exemplary RNTI code books when alert message is " 00 " are gone out.
Exemplary RNTI code book of the table 1. when alert message is " 00 "
Similarly, by having more ' B ', ' C ' or ' D ' symbols in code word X, when alert message be respectively " 01 ",
RNTI code books can be generated when " 11 " or " 10 ".In other words, for different alert messages, the RNTI of identical UE is mapped to
Different code words in different code books.But it is directed to specific code book, RNTI corresponds to one and only one code word (for example, Fig. 2A
Shown in code word X).
Table 2 shows the exemplary symbols distribution for the code word X of different alert messages.
Exemplary symbols distribution of the table 2. for the code word X of different alert messages
If it should be noted that the appearance of ' A ', ' B ', ' C ' and ' D ' symbol is unequal in code word, and symbol distribution
Quantity of the quantity of difference sequence more than be possible to RNTI is (assuming that RNTI is used as the UE of the MTC device in base station range
ID), then other distributions of the symbol in code word X are also feasible.For example, it is another to have 5A, 2B, 3C and 2D in code word X
The possible symbol distribution of kind, this is because total C (12,5) * C (7,2) * C (5,3) * C (2,2) of the possibility code word of RNTI code books
=166320, it is more than 65536.Symbol distribution can be selected to meet the different error quality objectives of RNTI and alert message.
It is also noted that the length of code word X can be selected to meet the different error quality objectives of RNTI and alert message.Example
Such as, for alert message " 00 ", 30 bit words of X may be selected with 9 A symbols, 2 B symbols, 2 C symbols and 2 D
Symbol, for the possible code word space of bigger of RNTI code books.In this example, C (15,9) * C (6,2) * C (4,2) * C (2,
2)=450450.
After identifying code word X, code word X is converted to one or more RACH lead codes by UE so that they can lead to
PRACH processes are crossed to be sent.In this step, it is one or more groups of 6 bit sequences code word X to be divided, then by one or more groups of 6
Sequence is mapped to the one or more RACH lead codes to be sent by UE.As shown in Figure 2 A, xk is enabled to indicate the kth position of code word X,
Wherein k comes from { 1 ..., 24 }, and the value of the binary sequence of { x1, x2, x3, x4, x5, x6 } defines the first RACH lead codes and matches
Set index PI;The value of the binary sequence of { x7, x8, x9, x10, x11, x12 } defines the 2nd RACH lead code configuration indexes
P2;The value of the binary sequence of { xl3, xl4, xl5, x16, x17, x18 } defines the 3rd RACH lead code configuration indexes P3;
The value of the binary sequence of { x19, x20, x21, x22, x23, x24 } defines the 4th RACH lead code configuration indexes P4.
Next, UE sends above-mentioned identified RACH lead codes with the sequence of PI, P2, P3 and P4.In some embodiments
In, the existence time interval between each RACH preamble transmissions.This time interval can be by system/network/eNB come pre-
Definition or configuration, and broadcasted to UE using high-level signaling.
Fig. 2 B are shown according to some embodiments of the present application for restoring short, key task message from UE
The block diagram of base station side operation.As shown in the figure, in base station after UE receives these random access lead code message, base station is first
Code word X is first regenerated, and then by checking the distribution of received symbol in the code word X regenerated come to alert message
It is decoded.Enable NA,NB,NCAnd NDIndicate A, B, C and D symbol of corresponding number in reconstruct code word X.Table 3 shows decoding alarm
The exemplary predefined rule of message.
Table 3. decodes the exemplary rules of alert message
Condition | Alert message determines |
NAIt is NA,NB,NCAnd NDIt is maximum in the middle | 00 |
NBIt is NA,NB,NCAnd NDIt is maximum in the middle | 01 |
NCIt is NA,NB,NCAnd NDIt is maximum in the middle | 11 |
NDIt is NA,NB,NCAnd NDIt is maximum in the middle | 10 |
Using alert message, the base station selected identical RNTI code books 201 used as described above by UE.In other words,
Both RNTI code books 200 having the same are gathered by base station and UE, so that short, key task message is sent to base by UE
It stands.In RNTI code books 201, finds code word X and therefore corresponding RNTI is identified as UE ID.
Fig. 3 is shown according to some embodiments of the present application for sending short, key task from UE to base station
The flow chart of one embodiment of the method for message.First, UE generates (310) short alert message.In some embodiments, UE
Be communicatively coupled to the third party device neighbouring with user equipment (for example, fire perceiving device or intelligence instrument), and UE in response to
Short alert message is generated from the alarm signal of fire perceiving device.In some other embodiments, other devices are intelligence
Instrument, and UE receives the parameter (for example, electricity usage) periodically provided by intelligence instrument, and it includes parameter value then to generate
One or more short messages.Next, UE selections (320) code book corresponding with alert message.As described above, code book is configured as
So that it corresponds to the unique short message generated by user equipment.Then, UE identify (330) and UE identifier (for example,
RNTI) the code word in corresponding code book.In other words, each entry in code book defines in code word and base station range
Unique mapping relations between the RNTI of user equipment.By doing so, base station can restore RNTI when it receives code word.
Next, code word is divided into (340) one or more binary sequences by UE, and one or more binary sequences are mapped
(350) one or more RACH lead codes are arrived.For example, as described in above in association with Fig. 2A, each binary sequence is mapped to one
A RACH lead codes.Finally, UE uses the corresponding random access channel between UE and base station by one or more RACH lead codes
It sends (360) and arrives base station.
Fig. 4 is shown according to some embodiments of the present application for receiving short, key task message from UE
The flow chart of one embodiment of method.First, base station receives (410) one via random access channel (for example, PRACH) from UE
A or multiple random access lead codes.As described above, base station to random access lead code be decoded (420) with determine one or
Multiple binary sequences.Next, as described in above in association with Fig. 2 B, base station combination (430) binary sequence is to regenerate code
Word is then used to the short message for determining that (440) correspond to code word.Next, base station selects (450) right in multiple code books
It should be in the code book of short message.Finally, base station is closed in selected code book based on the mapping between such as RNTI and corresponding code word
It is to identify the RNTI of (460) user equipment.
In some embodiments, multiple code books are generated by server, and are then supplied to base station, base station and then and base
The multiple user equipmenies stood in coverage area share multiple code books.No matter when any update is carried out to code book, base station all will more
Code book after new is sent to multiple user equipmenies in base station range.
The description of the present application is suggested to for purposes of illustration and description, and it is not intended to exhaustive
Or limit the present invention to disclosed form.Many modifications and variations will be to those skilled in the art it is aobvious and
It is clear to.Selection and description embodiment be in order to best explain the principle of the present invention, practical application, and make this field other
Those of ordinary skill is it will be appreciated that the present invention is used for the various implementations with the various modifications for being suitable for contemplated special-purpose
Example.
The term used in the description to embodiment is used only for the purpose of describing specific embodiments herein, it is no intended to
Limit the scope of the claims.As used in the description of embodiment and appended claims, singulative " one ", " one
It is a " and " described " be also intended to including plural form, unless the context clearly indicates otherwise.It will be further understood that used herein of
Term "and/or" refer to and include one or more associated listed items any and all possible combinations.It will be into one
Step understand, when used in this manual, term " include " and or " include " specify the feature, integer, step,
Operation, the presence of element and/or component, but do not preclude the presence or addition of one or more of the other feature, integer, step, behaviour
Work, element, component and/or its group.
It will be further understood that although term first, second etc. may be used herein to describe various elements, these yuan
Part should not be limited by these terms.These terms are only used to distinguish an element and another element.For example, implementing not departing from
In the case of the range of example, first port can be referred to as second port, and similarly, and second port can be referred to as first
Port.First port and second port are all ports, but they are not same ports.
Benefit from the introduction presented in foregoing description and associated drawings those skilled in the art will envision that retouching here
The many modifications for the embodiment stated and alternative embodiment.It will consequently be understood that the scope of the claims be not limited to it is disclosed
Embodiment specific example, and change and other embodiments be intended to be included in scope of the appended claims.Although
Specific term is employed herein, but they are only used for generic and descriptive sense, rather than for purposes of limitation.
Selection and description embodiment be in order to best explain basic principle and its practical application so that this field its
His technical staff can be best using basic principle and the various realities of the various modifications with the special-purpose for being suitable for imagining
Apply example.
Claims (22)
1. a kind of method sending short message to base station for user equipment, this method include:
Generate short message;
Code book corresponding with the short message is selected in multiple code books;
Code word corresponding with radio net temporary mark (RNTI) of the user equipment is identified in the code book;
The code word is divided into one or more binary sequences;
One or more of binary sequences are mapped to one or more random access channel (RACH) lead code;And
One or more of RACH lead codes are sent to the base station using random access channel.
2. according to the method described in claim 1, wherein, the user equipment is communicatively coupled to neighbouring of the user equipment
Tripartite's device, and the short message is related to the third party device.
3. according to the method described in claim 2, wherein, the user equipment is configured as according to predefined scheduling come automatic
The short message is generated, the short message includes the parameter provided by the third party device.
4. according to the method described in claim 2, wherein, the user equipment is configured to respond to by the third party device
The alarm signal of offer and automatically generate the short message.
5. according to the method described in claim 1, wherein, each code book in the multiple code book corresponds to be set by the user
The standby unique short message generated.
6. according to the method described in claim 1, wherein, each entry in code book defines code word and covering in the base station
Unique mapping relations between the RNTI of user equipment within the scope of lid.
7. according to the method described in claim 1, wherein, the base station is configured as:
One or more of RACH lead codes are received from the user equipment;
One or more of binary sequences are determined by being decoded to one or more of RACH lead codes;
Binary sequence determined by one or more is combined into code word;
The short message is determined by being decoded to the code word;
Code book corresponding with identified short message is selected in multiple code books;
RNTI corresponding with the code word is identified in selected code book;And
It turns in a report message to remote server, the report message includes identified short message and the RNTI.
8. according to the method described in claim 1, wherein, the base station be configured as with it is more in the coverage area of the base station
A user equipment shares the multiple code book.
9. according to the method described in claim 8, wherein, the base station is configured as being updated according to predefined scheduling described
Multiple code books, and updated code book is sent to multiple user equipmenies in the coverage area of the base station.
10. according to the method described in claim 1, wherein, the sum of the code word in corresponding code book is not less than covering for the base station
The sum of user equipment within the scope of lid.
11. a kind of side that the short message sent to the user equipment out of the base station coverage area for base station is decoded
Method, this method include:
Via random access channel one or more random access channel (RACH) lead codes are received from the user equipment;
One or more binary sequences are determined by being decoded to one or more of RACH lead codes;
One or more of binary sequences are combined into code word;
Short message is determined by being decoded to the code word;
Code book corresponding with the short message is selected in multiple code books;And
The RNTI of the user equipment is identified in selected code book, wherein the RNTI corresponds to the code word.
12. according to the method for claim 11, wherein it is neighbouring that the user equipment is communicatively coupled to the user equipment
Third party device.
13. according to the method for claim 11, wherein each code book in the multiple code book corresponds to by the user
Unique short message that equipment generates.
14. according to the method for claim 11, wherein each entry in code book defines covering for code word and the base station
Unique mapping relations between the RNTI of user equipment within the scope of lid.
15. according to the method for claim 11, wherein the user equipment is configured as:
Generate short message;
Code book corresponding with the short message generated is selected in multiple code books;
Code word corresponding with the RNTI of the user equipment is identified in selected code book;
The code word is divided into one or more binary sequences;
One or more of binary sequences are mapped in one or more of RACH lead codes;And
One or more of RACH lead codes are sent to the base station using the random access channel.
16. according to the method for claim 11, wherein the base station be configured as in the coverage area of the base station
Multiple user equipmenies share the multiple code book.
17. according to the method for claim 16, wherein the base station is configured as according to predefined scheduling to update
Multiple code books are stated, and updated code book is sent to multiple user equipmenies in the coverage area of the base station.
18. according to the method for claim 11, wherein sum the covering not less than the base station of the code word in corresponding code book
The sum of user equipment within the scope of lid.
19. a kind of base station for being configured as being decoded the short message that the user equipment out of base station coverage area is sent,
The base station includes:
One or more processors;
Memory carries out electronic communication with one or more of processors;And
Multiple instruction is stored in the memory and is executed by one or more of processors, and the multiple instruction is also
Including:
Via random access channel one or more random access channel (RACH) lead codes are received from the user equipment;
One or more binary sequences are determined by correspondingly being decoded to one or more of RACH lead codes;
One or more of binary sequences are combined into code word;
Short message is determined by being decoded to the code word;
Code book corresponding with the short message is selected in multiple code books;
The RNTI of the user equipment is identified in selected code book, wherein the RNTI corresponds to the code word.
20. base station according to claim 19, wherein each code book in the multiple code book corresponds to by the user
Unique short message that equipment generates.
21. base station according to claim 19, wherein each entry in code book defines covering for code word and the base station
Unique mapping relations between the RNTI of user equipment within the scope of lid.
22. base station according to claim 19, wherein sum the covering not less than the base station of the code word in corresponding code book
The sum of user equipment within the scope of lid.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662276670P | 2016-01-08 | 2016-01-08 | |
US62/276,670 | 2016-01-08 | ||
PCT/US2016/069113 WO2017120091A2 (en) | 2016-01-08 | 2016-12-29 | Methods of transmitting mission critical small data using random access channel |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108702781A true CN108702781A (en) | 2018-10-23 |
Family
ID=59274169
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201680083305.0A Pending CN108702781A (en) | 2016-01-08 | 2016-12-29 | The method for sending key task small data using random access channel |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3400747A4 (en) |
CN (1) | CN108702781A (en) |
WO (1) | WO2017120091A2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111586592A (en) * | 2020-05-27 | 2020-08-25 | 蚌埠珠领智能科技有限公司 | Vehicle running state short information transmission method and system based on Internet of vehicles |
WO2020199939A1 (en) * | 2019-03-29 | 2020-10-08 | Qualcomm Incorporated | Preamble to demodulation reference signal mapping for random access procedures |
CN113439463A (en) * | 2019-02-14 | 2021-09-24 | 松下电器(美国)知识产权公司 | Terminal and communication method |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021135941A1 (en) * | 2019-12-31 | 2021-07-08 | FG Innovation Company Limited | Method and user equipment for small data transmission |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120163311A1 (en) * | 2010-12-22 | 2012-06-28 | Electronics And Telecommunications Research Institute | Data transmission method for use in mobile communication systems |
GB2489690A (en) * | 2011-04-01 | 2012-10-10 | Renesas Mobile Corp | Transmitting machine-to-machine data on a random access channel resource |
CN104170281A (en) * | 2012-04-13 | 2014-11-26 | 英特尔公司 | Small data communications in a wireless communication network |
CN104335534A (en) * | 2013-02-28 | 2015-02-04 | 华为技术有限公司 | Data sending method and receiving method and device |
CN104469953A (en) * | 2014-11-17 | 2015-03-25 | 大唐移动通信设备有限公司 | Method and device for transmitting user data through auxiliary carrier |
CN104955162A (en) * | 2015-06-23 | 2015-09-30 | 中国联合网络通信集团有限公司 | Packet random access method and system for IoT (Internet of Things) equipment |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7804428B2 (en) * | 2008-11-10 | 2010-09-28 | Apple Inc. | System and method for compressing a stream of integer-valued data |
KR20120044198A (en) * | 2010-10-27 | 2012-05-07 | 한국전자통신연구원 | Method for random access procedure |
CN103841603B (en) * | 2012-11-20 | 2019-05-31 | 北京三星通信技术研究有限公司 | The method and apparatus of ascending grouping scheduling |
-
2016
- 2016-12-29 WO PCT/US2016/069113 patent/WO2017120091A2/en active Application Filing
- 2016-12-29 CN CN201680083305.0A patent/CN108702781A/en active Pending
- 2016-12-29 EP EP16884220.1A patent/EP3400747A4/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120163311A1 (en) * | 2010-12-22 | 2012-06-28 | Electronics And Telecommunications Research Institute | Data transmission method for use in mobile communication systems |
GB2489690A (en) * | 2011-04-01 | 2012-10-10 | Renesas Mobile Corp | Transmitting machine-to-machine data on a random access channel resource |
CN104170281A (en) * | 2012-04-13 | 2014-11-26 | 英特尔公司 | Small data communications in a wireless communication network |
CN104335534A (en) * | 2013-02-28 | 2015-02-04 | 华为技术有限公司 | Data sending method and receiving method and device |
CN104469953A (en) * | 2014-11-17 | 2015-03-25 | 大唐移动通信设备有限公司 | Method and device for transmitting user data through auxiliary carrier |
CN104955162A (en) * | 2015-06-23 | 2015-09-30 | 中国联合网络通信集团有限公司 | Packet random access method and system for IoT (Internet of Things) equipment |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113439463A (en) * | 2019-02-14 | 2021-09-24 | 松下电器(美国)知识产权公司 | Terminal and communication method |
WO2020199939A1 (en) * | 2019-03-29 | 2020-10-08 | Qualcomm Incorporated | Preamble to demodulation reference signal mapping for random access procedures |
CN113615299A (en) * | 2019-03-29 | 2021-11-05 | 高通股份有限公司 | Preamble to demodulation reference signal mapping for random access procedures |
CN113615299B (en) * | 2019-03-29 | 2024-04-05 | 高通股份有限公司 | Preamble to demodulation reference signal mapping for random access procedure |
CN111586592A (en) * | 2020-05-27 | 2020-08-25 | 蚌埠珠领智能科技有限公司 | Vehicle running state short information transmission method and system based on Internet of vehicles |
Also Published As
Publication number | Publication date |
---|---|
WO2017120091A3 (en) | 2018-02-22 |
WO2017120091A2 (en) | 2017-07-13 |
EP3400747A4 (en) | 2019-01-16 |
EP3400747A2 (en) | 2018-11-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11218272B2 (en) | Information transmission method and apparatus | |
CN104640211B (en) | A kind of method sending and receiving data, system and equipment | |
US10194330B2 (en) | Communication techniques | |
CN108810857B (en) | Resource determination method, base station and user equipment | |
CN108702781A (en) | The method for sending key task small data using random access channel | |
KR102211217B1 (en) | Enhanced node b, ue and method for selecting cell discovery signals in lte networks | |
US8903441B2 (en) | Group resource allocation method and device in wireless access system | |
KR102117572B1 (en) | Method and apparatus for transmitting physical downlink control channel | |
CN106304344B (en) | Resource pool configuration method and D2D UE | |
CN104883743A (en) | Method and apparatus for device to device service in a wireless communication system | |
CN104488294B (en) | Downlink information sending method, method of reseptance, base station and user equipment | |
CN104853339A (en) | Signal processing method and device | |
CN102355293A (en) | Method and device for sending measurement reference signal | |
CN103891387A (en) | Mobile communications system, infrastructure equipment, mobile communications terminal and method to communicate user data within an uplink random access channel | |
CN104038920A (en) | Data transmission method, system and device | |
CN108809496B (en) | Information processing method and equipment | |
US8824421B2 (en) | Method and apparatus for transmitting/receiving resource allocation information in a wireless communication system | |
CN103166737B (en) | Group service method for scrambling, de-scrambling method, base station and subscriber equipment | |
CN116508373A (en) | Beam indication method and device for intelligent relay | |
KR20220075228A (en) | Time-frequency block cancellation | |
CN113055940A (en) | Communication method, terminal equipment and network equipment | |
CN109392146B (en) | Method, terminal and network equipment for determining uplink transmission resources | |
CN107735962A (en) | The IMO of continuous N by stage for multi-hop communication is decoded | |
CN108141850A (en) | Aerogram | |
CN107210890A (en) | Mapping between up-link and down-chain resource |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181023 |