CN108702781A - The method for sending key task small data using random access channel - Google Patents

The method for sending key task small data using random access channel Download PDF

Info

Publication number
CN108702781A
CN108702781A CN201680083305.0A CN201680083305A CN108702781A CN 108702781 A CN108702781 A CN 108702781A CN 201680083305 A CN201680083305 A CN 201680083305A CN 108702781 A CN108702781 A CN 108702781A
Authority
CN
China
Prior art keywords
base station
code
user equipment
short message
code book
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201680083305.0A
Other languages
Chinese (zh)
Inventor
邬华明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Publication of CN108702781A publication Critical patent/CN108702781A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0001Arrangements for dividing the transmission path
    • H04L5/0014Three-dimensional division
    • H04L5/0016Time-frequency-code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0053Allocation of signaling, i.e. of overhead other than pilot signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0058Allocation criteria
    • H04L5/0064Rate requirement of the data, e.g. scalable bandwidth, data priority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W56/00Synchronisation arrangements
    • H04W56/004Synchronisation arrangements compensating for timing error of reception due to propagation delay
    • H04W56/0045Synchronisation arrangements compensating for timing error of reception due to propagation delay compensating for timing error by altering transmission time

Abstract

A method of short message being sent to base station for user equipment, this method includes following operation:Generate short message;Code book corresponding with short message is selected in multiple code books;Code word corresponding with radio net temporary mark (RNTI) of user equipment is identified in the codebook;Code word is divided into one or more binary sequences;One or more binary sequences are mapped to one or more random access channel (RACH) lead code;And one or more RACH lead codes are sent to base station using random access channel.

Description

The method for sending key task small data using random access channel
Technical field
The application is usually directed to aerogram, and is particularly sent in the wireless network using random access channel The method of key task small data.
Background technology
In typical wireless communications environment (for example, long term evolution (LTE)), user equipment (UE) (is also referred to as via base station For " evolved node-B (Node-B) " (eNB)) transmit voice and/or data-signal using one or more service networks. In this wireless communication system, UE can execute many events with base station communication with initiating random access procedure.Depend on The random access channel used in UE (RACH) resource is to be randomly choosed by UE itself or distributed by network, can be to be based on Contention executes random access procedure based on contention-free mode.
Recently, emerging technology (for example, Internet of Things) has been obtained for much paying close attention to, this is because it is by making many devices It can communicate with one another and assign the full mechanical automation to operating many devices.In these machine type communication (MTC) devices This communication is referred to as Machine To Machine (M2M) communication.MTC communication has some different from current Human To Human (H2H) communication Feature.For example, the MTC device of such as intelligence instrument can generate very small data transmission during its report interval, And subsequently into the suspend mode of long interval of time.In another example, MTC device (for example, fire alarm) can only send small size But the alert message of key task.
Currently, regardless of the size and importance of the data per secondary transmission, it is necessary to execute above-mentioned random access mistake For journey to enable carrying out data transmission, this leads to significant expense.In addition, in current LTE specification in addition to scheduled PUSCH it Outside, it is all difficult to send the data of key task but small size on any uplink channel.But the PUSCH of limited quantity is provided Source block (RB) possibly can not support a large amount of MTC devices in specific region, this leads to unpredictable transmission delay.
Invention content
The purpose of the application is to provide a kind of for the use random access channel with reduced overhead and time delay The method that key task small data is sent between UE and base station.
According to the application's in a first aspect, a kind of method sending short message to base station for user equipment includes following behaviour Make:Generate short message;Code book corresponding with short message is selected in multiple code books;It identifies in the codebook wireless with user equipment The corresponding code word of electric network temporary identifier (RNTI);Code word is divided into one or more binary sequences;By one or more two System sequence is mapped to one or more random access channel (RACH) lead code (preamble);And believed using random access One or more RACH lead codes are sent to base station by road.
It is a kind of to be used for what base station sent the user equipment out of base station coverage area according to the second aspect of the application The method that short message is decoded includes following operation:The one or more from user equipment is received via random access channel Random access channel (RACH) lead code;One or more two is determined by being decoded to one or more RACH lead codes System sequence;One or more binary sequences are combined into code word;Short message is determined by being decoded to code word;More Code book corresponding with short message is selected in a code book;And the RNTI of user equipment is identified in selected code book, wherein RNTI corresponds to code word.
According to the third aspect of the application, base station includes one or more processors, memory and is stored in storage Multiple instruction in device is implemented multiple as described above when multiple instruction is executed by one or more processors in conjunction with base station Operation.
Description of the drawings
Attached drawing shows described embodiment, and is used to explain basic principle together with the description, the attached drawing by including Inside to provide a further understanding of embodiments, and it is incorporated into here and a part for constitution instruction.Identical attached drawing Label refers to corresponding component.
Figure 1A is the block diagram for the example wireless communications that can put into practice embodiments herein.
Figure 1B is the block diagram for showing the random access procedure based on contention including multiple steps.
Fig. 2A is shown according to some embodiments of the present application for sending short, key task message to base station The sides UE operation block diagram.
Fig. 2 B are shown according to some embodiments of the present application for receiving short, key task message from UE The block diagram of base station side operation.
Fig. 3 is shown according to some embodiments of the present application for sending short, key task from UE to base station The flow chart of one embodiment of the method for message.
Fig. 4 is shown according to some embodiments of the present application for receiving short, key task message from UE The flow chart of one embodiment of method.
Specific implementation mode
Now with detailed reference to embodiment, its example is shown in the drawings.In the following detailed description, it elaborates many non- Restricted detail is to help to understand the theme proposed here.But it to those skilled in the art will be aobvious and easy See, various replacements can be used without departing from the scope of the claims, and can there is no these specific Practical matter in the case of details.Referring now to the drawings, the exemplary block diagram of data processing circumstance is provided, it wherein can be real Existing illustrative embodiment.It should be understood that these attached drawings are merely exemplary, it is not intended that assert or suggest about can be real Any restrictions of the environment of existing different embodiments.Many modifications can be carried out to discribed environment.
Figure 1A is the block diagram for the example wireless communications 100 that can put into practice embodiments herein.Base station 102 with it is more A user equipment 104 (it is referred to as user apparatus, movement station, subscriber unit, access terminal etc.) carries out wireless communication.Figure The first user equipment (UE) 104-A, second user equipment (UE) 104-B and the n-th user equipment 104-N are shown in 1A.Base Stand 102 in radio frequency (RF) communication channel 106 to 104 transmission datas of UE and from UE 104 receive data.
As used herein, term " transmitter " refers to any component or device for sending signal.Transmitter can be It is implemented in the base station 102 for sending signal to one or more user equipmenies 104.Alternatively, transmitter can be to one Or it is implemented in the user equipment 104 of the multiple transmission of base stations 102 signals.Term " receiver " refers to any component for receiving signal Or device.Receiver can be implemented from the user equipment 104 that one or more base stations 102 receive signal.Alternatively, Receiver can be implemented from the base station 102 that one or more user equipmenies 104 receive signal.Communication system 100 can be with Follow various wireless communication techniques, such as global system for mobile communications (GSM) technology, wideband code division multiple access (WCDMA) technology, when Point-S-CDMA-Synchronous Code Division Multiple Access (TD-SCDMA) technology, long term evolution (LTE) technology and other.
Figure 1B is the block diagram for showing the random access procedure based on contention including following four step:(1) physics with Machine accesses the random access lead code step on channel (PRACH);(2) on physical down link sharing channel (PDSCH) with Machine accesses response of step, wherein interim using the random access radio net on physical downlink control channel (PDCCH) It identifies (RA-RNTI) and carries out UE addressing;(3) the scheduled transmission step in physical uplink shared channel (PUSCH);And (4) the contention settlement steps to deal on physical down link sharing channel (PDSCH).
In random access lead code step, UE 104 selects one in 64 available RACH lead codes.In other words, 6 random access lead code id informations are only transmitted in random access lead code step.The random access replied from base station 102 is rung It includes following information to answer message:(i) 6 random access lead code ID, (ii) UE 104 change the timing alignment value of its timing, (iii) allow UE 104 that the initial uplink authorization resources of PUSCH, and (iv) is used to be used in a subsequent step The Cell Radio Network Temporary Identity (C_RNTI) further communicated.Effective random access response is being received from base station 102 After message, UE 104 distributes resource according to initial uplink authorization resources, and is sent with C_RNTI on PUSCH Scheduled transmission.It should be noted that in current LTE specification, the size of transmission block is at least 80.Finally, base station 102 uses The optional contention settlement steps to deal terminates random access procedure.
As described above, regardless of the size for the data to be sent, no matter when will be in current LTE wireless communication systems Execute data transmission, it is necessary to complete above-mentioned random access procedure can carry out data transmission between UE and base station.This is wanted It seeks a large amount of signaling overheads and unpredictable transmission delay may be caused.This method used by machine-to-machine communication is extremely There are problems that two less:(i) unpredictable transmission delay makes them unsuitable for those mission critical applications (for example, fire alarm);With (ii) since the message from MTC device is much smaller than distributed PUSCH resources, it is thus possible to can not efficiently utilize and be distributed PUSCH resources.
Present applicant proposes pass through the embedded small size in the initial random access lead code transmitting step from UE to base station But the data (for example, multidigit length and alert message for being generated by fire perceiving device) of key task are come the side that solves the above problems Case.Other than small size but the data of key task, the other information needed for base station is the promoter of data (originator), i.e. UE ID.In other words, take it is any it is further action (for example, to remote-control device (for example, service The mobile terminal of device or such as smart mobile phone) send report message) before, base station needs at least to know alert message itself and life At the fire perceiving device of alert message.
For illustrative purposes, assume to exist in the coverage area of base station in the following example and be less than or equal to 65536 A UE (for example, MTC device) and the key task message generated by one in UE are that there are four 2 of probable value for tool Long alert message.Therefore, 16 current RNTI are as UE ID long enoughs, to distinguish these in the coverage area of base station MTC device.It should be noted that when the quantity of the UE in base station range is more than 65536, length is more than 16 new UE ID is required to uniquely identify each UE in base station range.In order to make UE send key task message, 16 of UE RNTI is encoded as a code word in 24 in code book or longer multiple code words.Code book and key task message are uniquely It is associated so that each code word in code book corresponds to the identical key task message from particular UE.Then code word is divided into One or more 6 binary sequences, then one or more 6 binary sequences be mapped to one or more random access Lead code, and send it to base station in initial random access lead code transmitting step.
Fig. 2A is shown according to some embodiments of the present application for sending 2 key task alert messages to base station The sides UE operation block diagram.As shown in Figure 2 A, UE selects to correspond to 2 alert messages first in multiple RNTI code books 200 A specific RNTI code book 201.The RNTI of UE is given, then the certain code word X in selected code book 201 is identified as reflecting It is mapped to RNTI.For ease of description, every 2 of code word X are grouped together as the binary sequence with consecutive order.For example, Respectively ' D ' is labeled as labeled as ' C ' symbol and ' 10 ' labeled as ' A ' symbol, ' 01 ' by ' 00 ' labeled as ' B ' symbol, ' 11 ' Symbol.
For example, if alert message is " 00 ", the output codons X of corresponding RNTI is configured to contain than any other symbol Number more ' A ' symbols.In one embodiment, output codons X has 6 ' A ' symbols, 2 ' B ' symbols, 2 ' C ' symbols And 2 ' D ' symbols.Therefore, the possibility code word in code book corresponding with the particular alert message being distributed with predefined symbol Sum determined by the different sequences of A, B, C and D symbol.In this example, sum is C (12,6) * C (6,2) * C (4,2) * C (2,2)=83160 are more than 65536 (sums of i.e. all possible 16 RNTI information sequences).Therefore, we can be 65536 code words are randomly choosed in possible 83160 code words, to fill the RNTI code books for corresponding to alert message.Table 1 shows The exemplary RNTI code books when alert message is " 00 " are gone out.
Exemplary RNTI code book of the table 1. when alert message is " 00 "
Similarly, by having more ' B ', ' C ' or ' D ' symbols in code word X, when alert message be respectively " 01 ", RNTI code books can be generated when " 11 " or " 10 ".In other words, for different alert messages, the RNTI of identical UE is mapped to Different code words in different code books.But it is directed to specific code book, RNTI corresponds to one and only one code word (for example, Fig. 2A Shown in code word X).
Table 2 shows the exemplary symbols distribution for the code word X of different alert messages.
Exemplary symbols distribution of the table 2. for the code word X of different alert messages
If it should be noted that the appearance of ' A ', ' B ', ' C ' and ' D ' symbol is unequal in code word, and symbol distribution Quantity of the quantity of difference sequence more than be possible to RNTI is (assuming that RNTI is used as the UE of the MTC device in base station range ID), then other distributions of the symbol in code word X are also feasible.For example, it is another to have 5A, 2B, 3C and 2D in code word X The possible symbol distribution of kind, this is because total C (12,5) * C (7,2) * C (5,3) * C (2,2) of the possibility code word of RNTI code books =166320, it is more than 65536.Symbol distribution can be selected to meet the different error quality objectives of RNTI and alert message. It is also noted that the length of code word X can be selected to meet the different error quality objectives of RNTI and alert message.Example Such as, for alert message " 00 ", 30 bit words of X may be selected with 9 A symbols, 2 B symbols, 2 C symbols and 2 D Symbol, for the possible code word space of bigger of RNTI code books.In this example, C (15,9) * C (6,2) * C (4,2) * C (2, 2)=450450.
After identifying code word X, code word X is converted to one or more RACH lead codes by UE so that they can lead to PRACH processes are crossed to be sent.In this step, it is one or more groups of 6 bit sequences code word X to be divided, then by one or more groups of 6 Sequence is mapped to the one or more RACH lead codes to be sent by UE.As shown in Figure 2 A, xk is enabled to indicate the kth position of code word X, Wherein k comes from { 1 ..., 24 }, and the value of the binary sequence of { x1, x2, x3, x4, x5, x6 } defines the first RACH lead codes and matches Set index PI;The value of the binary sequence of { x7, x8, x9, x10, x11, x12 } defines the 2nd RACH lead code configuration indexes P2;The value of the binary sequence of { xl3, xl4, xl5, x16, x17, x18 } defines the 3rd RACH lead code configuration indexes P3; The value of the binary sequence of { x19, x20, x21, x22, x23, x24 } defines the 4th RACH lead code configuration indexes P4.
Next, UE sends above-mentioned identified RACH lead codes with the sequence of PI, P2, P3 and P4.In some embodiments In, the existence time interval between each RACH preamble transmissions.This time interval can be by system/network/eNB come pre- Definition or configuration, and broadcasted to UE using high-level signaling.
Fig. 2 B are shown according to some embodiments of the present application for restoring short, key task message from UE The block diagram of base station side operation.As shown in the figure, in base station after UE receives these random access lead code message, base station is first Code word X is first regenerated, and then by checking the distribution of received symbol in the code word X regenerated come to alert message It is decoded.Enable NA,NB,NCAnd NDIndicate A, B, C and D symbol of corresponding number in reconstruct code word X.Table 3 shows decoding alarm The exemplary predefined rule of message.
Table 3. decodes the exemplary rules of alert message
Condition Alert message determines
NAIt is NA,NB,NCAnd NDIt is maximum in the middle 00
NBIt is NA,NB,NCAnd NDIt is maximum in the middle 01
NCIt is NA,NB,NCAnd NDIt is maximum in the middle 11
NDIt is NA,NB,NCAnd NDIt is maximum in the middle 10
Using alert message, the base station selected identical RNTI code books 201 used as described above by UE.In other words, Both RNTI code books 200 having the same are gathered by base station and UE, so that short, key task message is sent to base by UE It stands.In RNTI code books 201, finds code word X and therefore corresponding RNTI is identified as UE ID.
Fig. 3 is shown according to some embodiments of the present application for sending short, key task from UE to base station The flow chart of one embodiment of the method for message.First, UE generates (310) short alert message.In some embodiments, UE Be communicatively coupled to the third party device neighbouring with user equipment (for example, fire perceiving device or intelligence instrument), and UE in response to Short alert message is generated from the alarm signal of fire perceiving device.In some other embodiments, other devices are intelligence Instrument, and UE receives the parameter (for example, electricity usage) periodically provided by intelligence instrument, and it includes parameter value then to generate One or more short messages.Next, UE selections (320) code book corresponding with alert message.As described above, code book is configured as So that it corresponds to the unique short message generated by user equipment.Then, UE identify (330) and UE identifier (for example, RNTI) the code word in corresponding code book.In other words, each entry in code book defines in code word and base station range Unique mapping relations between the RNTI of user equipment.By doing so, base station can restore RNTI when it receives code word. Next, code word is divided into (340) one or more binary sequences by UE, and one or more binary sequences are mapped (350) one or more RACH lead codes are arrived.For example, as described in above in association with Fig. 2A, each binary sequence is mapped to one A RACH lead codes.Finally, UE uses the corresponding random access channel between UE and base station by one or more RACH lead codes It sends (360) and arrives base station.
Fig. 4 is shown according to some embodiments of the present application for receiving short, key task message from UE The flow chart of one embodiment of method.First, base station receives (410) one via random access channel (for example, PRACH) from UE A or multiple random access lead codes.As described above, base station to random access lead code be decoded (420) with determine one or Multiple binary sequences.Next, as described in above in association with Fig. 2 B, base station combination (430) binary sequence is to regenerate code Word is then used to the short message for determining that (440) correspond to code word.Next, base station selects (450) right in multiple code books It should be in the code book of short message.Finally, base station is closed in selected code book based on the mapping between such as RNTI and corresponding code word It is to identify the RNTI of (460) user equipment.
In some embodiments, multiple code books are generated by server, and are then supplied to base station, base station and then and base The multiple user equipmenies stood in coverage area share multiple code books.No matter when any update is carried out to code book, base station all will more Code book after new is sent to multiple user equipmenies in base station range.
The description of the present application is suggested to for purposes of illustration and description, and it is not intended to exhaustive Or limit the present invention to disclosed form.Many modifications and variations will be to those skilled in the art it is aobvious and It is clear to.Selection and description embodiment be in order to best explain the principle of the present invention, practical application, and make this field other Those of ordinary skill is it will be appreciated that the present invention is used for the various implementations with the various modifications for being suitable for contemplated special-purpose Example.
The term used in the description to embodiment is used only for the purpose of describing specific embodiments herein, it is no intended to Limit the scope of the claims.As used in the description of embodiment and appended claims, singulative " one ", " one It is a " and " described " be also intended to including plural form, unless the context clearly indicates otherwise.It will be further understood that used herein of Term "and/or" refer to and include one or more associated listed items any and all possible combinations.It will be into one Step understand, when used in this manual, term " include " and or " include " specify the feature, integer, step, Operation, the presence of element and/or component, but do not preclude the presence or addition of one or more of the other feature, integer, step, behaviour Work, element, component and/or its group.
It will be further understood that although term first, second etc. may be used herein to describe various elements, these yuan Part should not be limited by these terms.These terms are only used to distinguish an element and another element.For example, implementing not departing from In the case of the range of example, first port can be referred to as second port, and similarly, and second port can be referred to as first Port.First port and second port are all ports, but they are not same ports.
Benefit from the introduction presented in foregoing description and associated drawings those skilled in the art will envision that retouching here The many modifications for the embodiment stated and alternative embodiment.It will consequently be understood that the scope of the claims be not limited to it is disclosed Embodiment specific example, and change and other embodiments be intended to be included in scope of the appended claims.Although Specific term is employed herein, but they are only used for generic and descriptive sense, rather than for purposes of limitation.
Selection and description embodiment be in order to best explain basic principle and its practical application so that this field its His technical staff can be best using basic principle and the various realities of the various modifications with the special-purpose for being suitable for imagining Apply example.

Claims (22)

1. a kind of method sending short message to base station for user equipment, this method include:
Generate short message;
Code book corresponding with the short message is selected in multiple code books;
Code word corresponding with radio net temporary mark (RNTI) of the user equipment is identified in the code book;
The code word is divided into one or more binary sequences;
One or more of binary sequences are mapped to one or more random access channel (RACH) lead code;And
One or more of RACH lead codes are sent to the base station using random access channel.
2. according to the method described in claim 1, wherein, the user equipment is communicatively coupled to neighbouring of the user equipment Tripartite's device, and the short message is related to the third party device.
3. according to the method described in claim 2, wherein, the user equipment is configured as according to predefined scheduling come automatic The short message is generated, the short message includes the parameter provided by the third party device.
4. according to the method described in claim 2, wherein, the user equipment is configured to respond to by the third party device The alarm signal of offer and automatically generate the short message.
5. according to the method described in claim 1, wherein, each code book in the multiple code book corresponds to be set by the user The standby unique short message generated.
6. according to the method described in claim 1, wherein, each entry in code book defines code word and covering in the base station Unique mapping relations between the RNTI of user equipment within the scope of lid.
7. according to the method described in claim 1, wherein, the base station is configured as:
One or more of RACH lead codes are received from the user equipment;
One or more of binary sequences are determined by being decoded to one or more of RACH lead codes;
Binary sequence determined by one or more is combined into code word;
The short message is determined by being decoded to the code word;
Code book corresponding with identified short message is selected in multiple code books;
RNTI corresponding with the code word is identified in selected code book;And
It turns in a report message to remote server, the report message includes identified short message and the RNTI.
8. according to the method described in claim 1, wherein, the base station be configured as with it is more in the coverage area of the base station A user equipment shares the multiple code book.
9. according to the method described in claim 8, wherein, the base station is configured as being updated according to predefined scheduling described Multiple code books, and updated code book is sent to multiple user equipmenies in the coverage area of the base station.
10. according to the method described in claim 1, wherein, the sum of the code word in corresponding code book is not less than covering for the base station The sum of user equipment within the scope of lid.
11. a kind of side that the short message sent to the user equipment out of the base station coverage area for base station is decoded Method, this method include:
Via random access channel one or more random access channel (RACH) lead codes are received from the user equipment;
One or more binary sequences are determined by being decoded to one or more of RACH lead codes;
One or more of binary sequences are combined into code word;
Short message is determined by being decoded to the code word;
Code book corresponding with the short message is selected in multiple code books;And
The RNTI of the user equipment is identified in selected code book, wherein the RNTI corresponds to the code word.
12. according to the method for claim 11, wherein it is neighbouring that the user equipment is communicatively coupled to the user equipment Third party device.
13. according to the method for claim 11, wherein each code book in the multiple code book corresponds to by the user Unique short message that equipment generates.
14. according to the method for claim 11, wherein each entry in code book defines covering for code word and the base station Unique mapping relations between the RNTI of user equipment within the scope of lid.
15. according to the method for claim 11, wherein the user equipment is configured as:
Generate short message;
Code book corresponding with the short message generated is selected in multiple code books;
Code word corresponding with the RNTI of the user equipment is identified in selected code book;
The code word is divided into one or more binary sequences;
One or more of binary sequences are mapped in one or more of RACH lead codes;And
One or more of RACH lead codes are sent to the base station using the random access channel.
16. according to the method for claim 11, wherein the base station be configured as in the coverage area of the base station Multiple user equipmenies share the multiple code book.
17. according to the method for claim 16, wherein the base station is configured as according to predefined scheduling to update Multiple code books are stated, and updated code book is sent to multiple user equipmenies in the coverage area of the base station.
18. according to the method for claim 11, wherein sum the covering not less than the base station of the code word in corresponding code book The sum of user equipment within the scope of lid.
19. a kind of base station for being configured as being decoded the short message that the user equipment out of base station coverage area is sent, The base station includes:
One or more processors;
Memory carries out electronic communication with one or more of processors;And
Multiple instruction is stored in the memory and is executed by one or more of processors, and the multiple instruction is also Including:
Via random access channel one or more random access channel (RACH) lead codes are received from the user equipment;
One or more binary sequences are determined by correspondingly being decoded to one or more of RACH lead codes;
One or more of binary sequences are combined into code word;
Short message is determined by being decoded to the code word;
Code book corresponding with the short message is selected in multiple code books;
The RNTI of the user equipment is identified in selected code book, wherein the RNTI corresponds to the code word.
20. base station according to claim 19, wherein each code book in the multiple code book corresponds to by the user Unique short message that equipment generates.
21. base station according to claim 19, wherein each entry in code book defines covering for code word and the base station Unique mapping relations between the RNTI of user equipment within the scope of lid.
22. base station according to claim 19, wherein sum the covering not less than the base station of the code word in corresponding code book The sum of user equipment within the scope of lid.
CN201680083305.0A 2016-01-08 2016-12-29 The method for sending key task small data using random access channel Pending CN108702781A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201662276670P 2016-01-08 2016-01-08
US62/276,670 2016-01-08
PCT/US2016/069113 WO2017120091A2 (en) 2016-01-08 2016-12-29 Methods of transmitting mission critical small data using random access channel

Publications (1)

Publication Number Publication Date
CN108702781A true CN108702781A (en) 2018-10-23

Family

ID=59274169

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680083305.0A Pending CN108702781A (en) 2016-01-08 2016-12-29 The method for sending key task small data using random access channel

Country Status (3)

Country Link
EP (1) EP3400747A4 (en)
CN (1) CN108702781A (en)
WO (1) WO2017120091A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111586592A (en) * 2020-05-27 2020-08-25 蚌埠珠领智能科技有限公司 Vehicle running state short information transmission method and system based on Internet of vehicles
WO2020199939A1 (en) * 2019-03-29 2020-10-08 Qualcomm Incorporated Preamble to demodulation reference signal mapping for random access procedures
CN113439463A (en) * 2019-02-14 2021-09-24 松下电器(美国)知识产权公司 Terminal and communication method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021135941A1 (en) * 2019-12-31 2021-07-08 FG Innovation Company Limited Method and user equipment for small data transmission

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120163311A1 (en) * 2010-12-22 2012-06-28 Electronics And Telecommunications Research Institute Data transmission method for use in mobile communication systems
GB2489690A (en) * 2011-04-01 2012-10-10 Renesas Mobile Corp Transmitting machine-to-machine data on a random access channel resource
CN104170281A (en) * 2012-04-13 2014-11-26 英特尔公司 Small data communications in a wireless communication network
CN104335534A (en) * 2013-02-28 2015-02-04 华为技术有限公司 Data sending method and receiving method and device
CN104469953A (en) * 2014-11-17 2015-03-25 大唐移动通信设备有限公司 Method and device for transmitting user data through auxiliary carrier
CN104955162A (en) * 2015-06-23 2015-09-30 中国联合网络通信集团有限公司 Packet random access method and system for IoT (Internet of Things) equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7804428B2 (en) * 2008-11-10 2010-09-28 Apple Inc. System and method for compressing a stream of integer-valued data
KR20120044198A (en) * 2010-10-27 2012-05-07 한국전자통신연구원 Method for random access procedure
CN103841603B (en) * 2012-11-20 2019-05-31 北京三星通信技术研究有限公司 The method and apparatus of ascending grouping scheduling

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120163311A1 (en) * 2010-12-22 2012-06-28 Electronics And Telecommunications Research Institute Data transmission method for use in mobile communication systems
GB2489690A (en) * 2011-04-01 2012-10-10 Renesas Mobile Corp Transmitting machine-to-machine data on a random access channel resource
CN104170281A (en) * 2012-04-13 2014-11-26 英特尔公司 Small data communications in a wireless communication network
CN104335534A (en) * 2013-02-28 2015-02-04 华为技术有限公司 Data sending method and receiving method and device
CN104469953A (en) * 2014-11-17 2015-03-25 大唐移动通信设备有限公司 Method and device for transmitting user data through auxiliary carrier
CN104955162A (en) * 2015-06-23 2015-09-30 中国联合网络通信集团有限公司 Packet random access method and system for IoT (Internet of Things) equipment

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113439463A (en) * 2019-02-14 2021-09-24 松下电器(美国)知识产权公司 Terminal and communication method
WO2020199939A1 (en) * 2019-03-29 2020-10-08 Qualcomm Incorporated Preamble to demodulation reference signal mapping for random access procedures
CN113615299A (en) * 2019-03-29 2021-11-05 高通股份有限公司 Preamble to demodulation reference signal mapping for random access procedures
CN113615299B (en) * 2019-03-29 2024-04-05 高通股份有限公司 Preamble to demodulation reference signal mapping for random access procedure
CN111586592A (en) * 2020-05-27 2020-08-25 蚌埠珠领智能科技有限公司 Vehicle running state short information transmission method and system based on Internet of vehicles

Also Published As

Publication number Publication date
WO2017120091A3 (en) 2018-02-22
WO2017120091A2 (en) 2017-07-13
EP3400747A4 (en) 2019-01-16
EP3400747A2 (en) 2018-11-14

Similar Documents

Publication Publication Date Title
US11218272B2 (en) Information transmission method and apparatus
CN104640211B (en) A kind of method sending and receiving data, system and equipment
US10194330B2 (en) Communication techniques
CN108810857B (en) Resource determination method, base station and user equipment
CN108702781A (en) The method for sending key task small data using random access channel
KR102211217B1 (en) Enhanced node b, ue and method for selecting cell discovery signals in lte networks
US8903441B2 (en) Group resource allocation method and device in wireless access system
KR102117572B1 (en) Method and apparatus for transmitting physical downlink control channel
CN106304344B (en) Resource pool configuration method and D2D UE
CN104883743A (en) Method and apparatus for device to device service in a wireless communication system
CN104488294B (en) Downlink information sending method, method of reseptance, base station and user equipment
CN104853339A (en) Signal processing method and device
CN102355293A (en) Method and device for sending measurement reference signal
CN103891387A (en) Mobile communications system, infrastructure equipment, mobile communications terminal and method to communicate user data within an uplink random access channel
CN104038920A (en) Data transmission method, system and device
CN108809496B (en) Information processing method and equipment
US8824421B2 (en) Method and apparatus for transmitting/receiving resource allocation information in a wireless communication system
CN103166737B (en) Group service method for scrambling, de-scrambling method, base station and subscriber equipment
CN116508373A (en) Beam indication method and device for intelligent relay
KR20220075228A (en) Time-frequency block cancellation
CN113055940A (en) Communication method, terminal equipment and network equipment
CN109392146B (en) Method, terminal and network equipment for determining uplink transmission resources
CN107735962A (en) The IMO of continuous N by stage for multi-hop communication is decoded
CN108141850A (en) Aerogram
CN107210890A (en) Mapping between up-link and down-chain resource

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181023