TW200935811A - Method of gaining access to a network - Google Patents

Method of gaining access to a network Download PDF

Info

Publication number
TW200935811A
TW200935811A TW097137527A TW97137527A TW200935811A TW 200935811 A TW200935811 A TW 200935811A TW 097137527 A TW097137527 A TW 097137527A TW 97137527 A TW97137527 A TW 97137527A TW 200935811 A TW200935811 A TW 200935811A
Authority
TW
Taiwan
Prior art keywords
station
secondary station
message
network
access
Prior art date
Application number
TW097137527A
Other languages
Chinese (zh)
Inventor
Matthew P J Baker
Timothy J Moulsley
Olivier J-M Hus
Paul Bucknell
Original Assignee
Koninkl Philips Electronics Nv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninkl Philips Electronics Nv filed Critical Koninkl Philips Electronics Nv
Publication of TW200935811A publication Critical patent/TW200935811A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/002Transmission of channel access control information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • H04L1/1867Arrangements specially adapted for the transmitter end
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure

Abstract

The present invention relates to a method for gaining access to a network by a secondary station, said network comprising at least one primary station, said method comprising transmitting at a secondary station a message to the primary station using a retransmission protocol, wherein the number of allowed retransmissions of the message from the secondary station has a dependency on a current parameter of the secondary station.

Description

200935811 九、發明說明: 【發明所屬之技術領域】 本發明係關於取得一網路傳輸資源之存取之方法,及關 於根據此方法操作之一廣播站。 例如,此發明係關於行動通訊系統如UMTs(通用行動電 k系統)或關於另一通訊系統例如一隨機存取频道。 【先前技術】 ❹ ❹ 在一傳統電信系統網路中,一隨機存取頻道(rach)用 於取得網路之存取。在一隨機存取程序中,一基地台或一 要站刀配實體資源給行動站或次要站。此資源可是一 時槽,及/或一頻率副載波,及/或一編碼。按照慣例,此 隨機存取程序,如圖】圖解,首先一次要站刪之請求被 發送至主要站。在圖!中,藉由次要站而傳輸之資料是 2由時間表1說明,及藉由該主要站傳輸之資料是藉由時 、B表3說明。藉由次要站UE1發送之請求在-UMTS系統中 被指定為-隨機存取前置項1〇,及包含一隨機選擇之簽 名。此請求可被發送在RACH之特別方塊,亦_,在一特 ㈣=頻率方塊中’從—組時間頻率方塊中隨機選擇。 接著主要站可響應一隨機存取回應2〇中之此前置項, 由承認傳輸資源用於下一訊息之傳輸及為次要站 H時識別符,在贿8中稱為暫時特定小區無 ’八網路暫時識別符(標示為C-RNTI)。接著,次要站UE1 在刀配之實體資源中傳輸包含DATA 1之訊息3〇。 二而在此一隨機存取程序中,當複數個次要站在具有 135009.doc -6 - 200935811 同-前置項簽名之同-時間頻率方塊中各自發送其等隨機 存取前置項時’衝突發生。例如,在先前實例中,一第二 次要站UE2,其傳輸被圖解在時間表2,在同—時間頻率 方塊中傳輸一隨機存取前置項1〇及具有與次要站相同 之刖置項簽名。在此情形中,主要站無法決定複數個次要 站UE1及UE2正在請求資源,及參見藉由唯一次要站發起 之前置項請求。接著,主要站將借助於回應2〇回覆,此係 藉由在此實例中藉由提供其等一暫時c_RNTI,及一資源 承認。當複數個次要站UE1及UE2發送其等訊息30及4〇 時’該等訊息分別包含DATA 1及DATA2,在分配之資源 方塊中,有可能該主要站將無法解碼接收之層級訊息,因 為每一訊息是不同的’其中該訊息對應複數個站之每一次 要站。 因此’主要站將指示借助於一否定應答訊息(標示為 NACK)50,該訊息沒有被正確接收。此可使用(例如)一 ARQ協定(自動重複請求協定)完成,諸如一混合自動重複 請求(ARQ)協定。當接收NACK 50時,次要站UE1及UE2將 同時重傳。DATA 1及DATA2分別對應訊息60及70。然 而,由於每次訊息將是層加的,有可能沒有重傳成功。因 此,次要站UE1及UE2必須再次開始隨機存取程序,其導 致延遲’無線電通訊資源之低效率使用及耗散電力。 【發明内容】 接著,本發明之一目的是減輕上述識別之問題。 本發明之另一目的是提議一取得網路存取之方法,其准 135009.doc 200935811 許限制衝突之結果。 於t::另:目的是提議一取得存取之方法,其縮短由 一植類之衝突而產生的延遲。 為:’本發明提議—藉由一次要站取得網路存取之方 ’重=路包含至少—主要站,該方法包含該次要站使用 -重傳協定傳輸一訊息給主要站,其中來自該次·200935811 IX. INSTRUCTIONS: TECHNICAL FIELD OF THE INVENTION The present invention relates to a method of obtaining access to a network transmission resource, and to a broadcasting station operating in accordance with the method. For example, the invention relates to mobile communication systems such as UMTs (Universal Mobile K Systems) or to another communication system such as a random access channel. [Prior Art] ❹ ❹ In a conventional telecommunication system network, a random access channel (rach) is used to obtain access to the network. In a random access procedure, a base station or a station knife is assigned a physical resource to a mobile station or a secondary station. This resource may be a time slot, and/or a frequency subcarrier, and/or a code. Conventionally, this random access procedure, as illustrated in the figure, first sends a request to the primary station. In the picture! The information transmitted by the secondary station is 2 as described in Schedule 1, and the information transmitted by the primary station is indicated by time, Table B3. The request sent by the secondary station UE1 is designated as a - random access preamble in the - UMTS system, and includes a randomly selected signature. This request can be sent in the special block of the RACH, also _, randomly selected in a special (four) = frequency block 'from the set of time frequency blocks. Then the primary station can respond to the preamble of a random access response 2, by acknowledging the transmission resource for the transmission of the next message and the identifier for the secondary station H, which is referred to as a temporary specific cell in the bribe 8 'Eight network temporary identifier (labeled C-RNTI). Next, the secondary station UE1 transmits a message containing DATA 1 in the physical resource of the knives. 2. In this random access procedure, when a plurality of secondary stations respectively transmit their random access preambles in the same-time frequency block with the 135009.doc -6 - 200935811 same-preamble signature 'The conflict has occurred. For example, in the previous example, a second secondary station, UE2, whose transmission is illustrated in schedule 2, transmits a random access preamble in the same-time frequency block and has the same threshold as the secondary station. Set the signature. In this case, the primary station cannot determine that a plurality of secondary stations UE1 and UE2 are requesting resources, and see the preamble request initiated by the unique secondary station. The primary station will then respond by means of a response, which is acknowledged by providing a temporary c_RNTI, and a resource in this example. When a plurality of secondary stations UE1 and UE2 transmit their messages 30 and 4, respectively, the messages contain DATA 1 and DATA 2, respectively, and in the allocated resource block, it is possible that the primary station will not be able to decode the received hierarchical message because Each message is different 'where the message corresponds to each station of the plurality of stations. Thus the 'primary station' will indicate by means of a negative acknowledgement message (labeled NACK) 50 that the message was not received correctly. This can be done, for example, using an ARQ protocol (Automatic Repeat Request Protocol), such as a hybrid automatic repeat request (ARQ) protocol. When the NACK 50 is received, the secondary stations UE1 and UE2 will retransmit at the same time. DATA 1 and DATA 2 correspond to messages 60 and 70, respectively. However, since each message will be layered, there may be no retransmissions. Therefore, the secondary stations UE1 and UE2 must start the random access procedure again, which results in delaying the inefficient use of radio communication resources and dissipating power. SUMMARY OF THE INVENTION Next, an object of the present invention is to alleviate the above problem of identification. Another object of the present invention is to propose a method of obtaining network access, which is 135009.doc 200935811 to limit the outcome of the conflict. At t:: another: The purpose is to propose a method of obtaining access that shortens the delay caused by a conflict of plants. To: 'The present invention proposes that the party that obtains the network access by the station at one time contains the at least one primary station, and the method includes the secondary station using the -retransmission protocol to transmit a message to the primary station, where This time·

e 之允許重傳次數具有對該次要站之當前參數之相依性。〜 因此’如果二次要站之間發生衝突,具有最高允許重傳 次數之次要站將有機會單獨重傳其資料,因為另—次要站 將較早地達到其等各自允許重傳次數。因&,次要站之至 少一者將具有網路存取,因此限制一衝突之結果。 而且,在本發明之一些變體中,有可能為一預定種類之 次要站提供較高允許重傳次數’如具有—特別簽名層級或 例如具有傳輸資料之高優先權(例如安全臨界資料或緊急 呼叫)〇 本發明亦關於一次要站,該次要站包含用於執行根據本 發明之方法之構件。 本發明之另一態樣,提議一主要站,其包含用於執行根 據本發明之方法之構件。 本發明之此等及另一態樣將是顯而易見,及參閱此後說 明之實施例將被闡明。 【實施方式】 本發明是關於如圖2說明之通訊300之系統,包含—主要 站100,如一基地台或一進展節點B(eNodeB),及至少一次 135009.doc 200935811 要站200如一行動站或一使用者設備(亦標示為UE)。 無線電系統300包含複數個主要站1 〇〇及/或複數個次要 站200 ^主要站100包含一傳輸構件11〇及一接收構件12〇。 傳輸構件110之輸出及接收構件12〇之輸入是藉由一耦合構 件140耦合至天線130,該耦合構件例如可以是一循環器或 一轉換開關《耦合至傳輸構件u〇及接收構件12〇是一控制 構件150,例如其可以是一處理器。次要站2〇〇包含一傳輸 構件210及一接收構件22〇。傳輸構件21〇之輸出及接收構 件220之輸入是藉由一耦合構件240耦合至一天線230,該 耦合構件例如可以是一循環器或一轉換開關。耦合至傳輸 構件2 1 〇及接收構件220是一控制構件250,例如其可以是 處理器。從主要無線電站1〇〇至次要站200之傳輸發生在 第一頻道160及從次要無線電站2〇〇至第一無線電站1〇〇之 傳輸發生在一第二頻道260。 如前述說明之,當一次要站2〇〇希望取得網路存取時’ 其必須請求隨機存取頻道上(RACH)的主要站1〇〇,例如。 接著,主要站100回覆及指示一分配之資源用於資料之傳 輸。次要站使用該分配之資源傳輸其資料。 然而,在一傳統電信系統中,當在複數個站之間發生衝 大時,其可導致沒有一個衝突站取得網路存取,其引起延 遲,無線電通訊資源之低效率使用及耗散電力。 根據本發明之第一實施例,一系統准許次要站200更容 易存取且縮短延遲。借助於圖3及圖4將圖解此實施例。圖 3包含:對應第一次要站UE1i傳輸之時間表4〇1 ;對應第 135009.doc 200935811 二次要站UE2之傳輸之時間表402 ;及對應主要站ι〇〇之傳 輸之時間表403。根據此實施例,在圖4之步驟s4〇〇中,如 果兩個次要站UE1及UE2請求在同一資源方塊中各自存取 隨機存取前置項410,且具有相同簽名,主要站1〇〇具有藉 由僅一次要站聯繫之印象。在步驟S4〇1,主要站傳輸一回 覆420,其是被兩個次要站uei及UE2接收。在此回覆42〇 中,主要站指示一分配資源’該資源將由次要站使用而傳 輸其等資料。而且,主要站100可傳輸一暫時識別符,例 如上文說明之C-RNTI *此暫時識別符用於次要站之連 接,及在產生之後一段時間屆期。已經具有網路存取之一 些次要站可能已經擁有仍然有效暫時識別符。此適用於" 非初始存取"UE情形。 在步驟S402,該兩個次要站UE1及UE2將在對應訊息43〇 及440中傳輸其等各自資料DATA1及data2。此等訊息可 進一步包含對應次要站之非存取階層UE m(標示nas ue ID),例如,國際行動用戶識別(標示IMSI)。因為DATA1 及DATA2是不同的,在步驟S4〇3,很可能訊息43〇及彻皆 未被主要站予以正確地接收。如果主要站1〇〇可解碼所接 收的訊息(其情形係:例如,如果沒有衝突存在,或如果 非常弱地接收兩個衝突訊息之-者),則在步驟S404, 將根據一預定重傳協定(諸如ARQ、或HARQ或類似)發^ 號ACK給次要站。可例如藉由回覆不存在而運送指示訊自 被正確接收之織信號。在此-情形中,在步驟S404,: 要站將不向次要站傳輪。 135009.doc 200935811 在步驟S405,如果主要台無法解碼訊息,則其將發信號 NACK 450。當次要站UE1及UE2接收此否定應答訊息 450時,其等將檢查其等被允許重傳訊息(s4〇6)多少次。 根據本發明,允許重傳次數,意指每一次要站被允許再次 嘗試傳輸其等資料多少次,一次要站可不同於另一者。在 第一實施例中’此次數取決於每一次要站在請求存取之前 疋否已經擁有一暫時識別符,諸如C_RNTI。此意指其取 決於一次要站是否正實施非初始存取,及暫時識別符是否 仍然有效。如果是此情形,則允許重傳次數將是最大值或 至少大於對應初始存取次要站之允許重傳次數。 在此實例中’次要站UE1正在實施一非初始存取,及次 要站UE2正實施一初始存取《接著,UE2之允許重傳次數 (例如為1)小於UE1之允許重傳次數(例如為3)。因此,從圖 3可清晰可見’次要站UE1及UE2在各自訊息460及470中重 傳其等資料一次。接著,次要站UE2之重傳次數達到允許 重傳次數’及在步驟S407,次要站UE2中止其存取嘗試。 因此,對於第二嘗試490,次要站UE1是僅一傳輸站,接 著其將藉由主要站100完全接收,及在步驟S404藉由— ACK 500應答。 此使得其有可能供給已經擁有網路存取之次要站一有利 條件。此是有利的,因為此等次要站可已經完全適應考慮 之網路。 本發明防止衝突引起對所有衝突次要站之拒絕,但是最 終產生一成功存取。因此,經歷延遲之次要站之數量被減 135009.doc 200935811 少 ο 此亦是有用的,由於具有一 C-RNTI之次要站很可能規 律地存取網路,及使用者不期望經歷重複延遲, 延遲可僅發生在初始存取。 較長 在此實施例之變體中,次要站還沒有對網路之存取(亦 即,次要站不擁有一暫時存取識別符)可被供給一有利條 件,其係藉由使對應此情形之允許重傳次數大於對應"非 初始存取"站之允許重傳次數大。此可使得其有可能為該 等站提供容易存取,該等站已沒有機會具有資源存取。因 此’所有站可具有網路存取之可能性。 在第一實施例中,對應每一種類(非初始存取/初始存取) 之允許重傳次數被發信號給廣播頻道(BCH)上的次要站。 然而,在此實施例之一變體中,如果存在二種類例如(非 初始存取/初始存取),例如,僅對應初始存取種類之允許 重傳次數被發信號給次要站。因此,當次要站進入重傳協 定時,在達到允許信號重傳次數之後,,,初始存取次要站" 將停止重傳其等資料。"非初始次要站"將繼續重傳其等資 料直至主要站正確接收訊息或直至主要站停止發送 NACK 〇 因此,此避免發信號此種類之數量,減少附加項 (overhead),及在允許重傳次數之選擇上允許極大彈性。 此亦允許系統具有對重傳次數之非界定限制操作亦即最大 重傳次數可以是無窮大。 在第一實施例之另一變體中,種類可被不同選擇,或另 I35009.doc 200935811 一種類可被附加。因此,有可能在一組預定值中選擇允許 重傳次數,例如在次要站之優先權之基礎上。其音、指具有 安全訊息或緊急訊息之次要站之發送被給予特殊權限,因 此其資源存取被促進。在待傳輸之資料基礎上,或在次要 站之特性基礎上估計優先權,例如簽名之屬性。例如,由 於其等簽名,一些使用者可被限制對服務之存取。在此一 情形’允許重傳次數可低於此種類。 另-可祕可以是使用取得_存取之失敗嘗試次數估 計考慮次要站之優先權。因此’次要站失敗取得網路存取 越多,允許重傳次數越高,及下-嘗試越有可能成功。 在此發明之第二實施例中’可藉由—特定演算法為每一 選允許重傳次數。例如’允許重傳次數可呈現三 =,例;i1、3及5。每-次要站使用-演算法選擇此 等值之…例如,每—次要站可❹—特性,諸如The number of allowed retransmissions of e has a dependency on the current parameters of the secondary station. ~ So 'if there is a conflict between the secondary stations, the secondary station with the highest number of allowed retransmissions will have the opportunity to retransmit its data separately, because the other secondary stations will reach their respective allowed retransmissions earlier. . Because &, at least one of the secondary stations will have network access, thus limiting the outcome of a conflict. Moreover, in some variations of the invention, it is possible to provide a higher number of allowed retransmissions for a predetermined type of secondary station, such as having a special signature level or, for example, having a high priority for transmitting data (eg, security critical data or Emergency call) The present invention also relates to a primary station that includes components for performing the method according to the present invention. In another aspect of the invention, a primary station is proposed that includes means for performing the method in accordance with the present invention. This and other aspects of the invention will be apparent, and the embodiments described hereinafter are set forth. [Embodiment] The present invention relates to a system of communication 300 as illustrated in FIG. 2, including a primary station 100, such as a base station or a progress node B (eNodeB), and at least one 135009.doc 200935811 station 200 as a mobile station or A user device (also labeled as a UE). The radio system 300 includes a plurality of primary stations 1 and/or a plurality of secondary stations 200. The primary station 100 includes a transmission member 11A and a receiving member 12A. The output of the transmission member 110 and the input of the receiving member 12A are coupled to the antenna 130 by a coupling member 140, which may be, for example, a circulator or a changeover switch "coupled to the transmission member u" and the receiving member 12 A control component 150, for example, can be a processor. The secondary station 2 includes a transport member 210 and a receiving member 22A. The input of the transmission member 21A and the input of the receiving member 220 are coupled to an antenna 230 by a coupling member 240, which may be, for example, a circulator or a changeover switch. Coupled to the transfer member 2 1 and the receiving member 220 is a control member 250, which may be, for example, a processor. The transmission from the primary radio station 1 to the secondary station 200 occurs on the first channel 160 and the transmission from the secondary radio station 2 to the first radio station 1 发生 occurs on a second channel 260. As explained above, when a station 2 wants to obtain network access, it must request a primary station on the random access channel (RACH), for example. Next, the primary station 100 replies and indicates an allocated resource for the transmission of the data. The secondary station uses the allocated resources to transfer its data. However, in a conventional telecommunications system, when a large number of stations occur, it can result in no collision station gaining network access, which causes delays, inefficient use of radio communication resources, and dissipation of power. In accordance with a first embodiment of the present invention, a system permits secondary stations 200 to be more easily accessed and to reduce delays. This embodiment will be illustrated with the aid of Figures 3 and 4. Figure 3 includes: a schedule 4〇 corresponding to the first secondary station UE1i transmission; a schedule 402 corresponding to the transmission of the secondary station UE2 of the 135009.doc 200935811; and a schedule 403 corresponding to the transmission of the primary station ι〇〇 . According to this embodiment, in step s4 of FIG. 4, if two secondary stations UE1 and UE2 request to access the random access preamble 410 in the same resource block and have the same signature, the primary station 1〇 〇 has the impression of being connected only once. At step S4, the primary station transmits a reply 420 which is received by the two secondary stations uei and UE2. In this reply 42〇, the primary station instructs a resource to be allocated, which will be used by the secondary station to transmit its data. Moreover, the primary station 100 can transmit a temporary identifier, such as the C-RNTI * as described above. This temporary identifier is used for the connection of the secondary station and for a period of time after the generation. Some secondary stations that already have network access may already have a valid temporary identifier. This applies to the "non-initial access"UE scenario. In step S402, the two secondary stations UE1 and UE2 will transmit their respective data DATA1 and data2 in the corresponding messages 43A and 440. Such messages may further include a non-access stratum UE m (labeled nas ue ID) corresponding to the secondary station, for example, an International Mobile Subscriber Identity (Identified IMSI). Since DATA1 and DATA2 are different, it is very likely that the message 43 is not correctly received by the primary station in step S4〇3. If the primary station can decode the received message (the situation is: for example, if no conflict exists, or if the two conflict messages are received very weakly), then in step S404, a predetermined retransmission will be performed according to a predetermined A protocol (such as ARQ, or HARQ or similar) sends an ACK to the secondary station. The woven signal from the correct reception can be carried, for example, by the absence of a reply. In this case, in step S404, the station is to be not transferred to the secondary station. 135009.doc 200935811 In step S405, if the primary station is unable to decode the message, it will signal NACK 450. When the secondary stations UE1 and UE2 receive the negative acknowledgement message 450, they will check how many times they are allowed to retransmit the message (s4〇6). According to the present invention, the number of retransmissions is allowed, meaning that each time the station is allowed to attempt to transmit its data again and again, the primary station may be different from the other. In the first embodiment, this number depends on whether each station has a temporary identifier, such as C_RNTI, before it requests access. This means that it depends on whether the station is performing non-initial access and whether the temporary identifier is still valid. If this is the case, the number of allowed retransmissions will be the maximum or at least greater than the number of allowed retransmissions for the corresponding initial access secondary station. In this example, 'the secondary station UE1 is implementing a non-initial access, and the secondary station UE2 is implementing an initial access. Then, the number of allowed retransmissions of UE2 (for example, 1) is less than the number of allowed retransmissions of UE1 ( For example, 3). Therefore, it can be clearly seen from Fig. 3 that the secondary stations UE1 and UE2 retransmit their data once in the respective messages 460 and 470. Next, the number of retransmissions of the secondary station UE2 reaches the number of allowed retransmissions' and in step S407, the secondary station UE2 suspends its access attempt. Thus, for the second attempt 490, the secondary station UE1 is only one transmission station, which will then be fully received by the primary station 100, and acknowledgment by the ACK 500 in step S404. This makes it possible to supply a secondary station that already has network access. This is advantageous because these secondary stations can already be fully adapted to the network of consideration. The present invention prevents collisions from causing rejection of all conflicting secondary stations, but ultimately results in a successful access. Therefore, the number of secondary stations experiencing delays is reduced by 135009.doc 200935811 is less useful. This is also useful because secondary stations with a C-RNTI are likely to access the network regularly, and users do not expect to experience repetition. Delay, delay can only occur during initial access. Longer in a variation of this embodiment, the secondary station has not yet accessed the network (i.e., the secondary station does not have a temporary access identifier) can be supplied with an advantageous condition by The number of allowed retransmissions corresponding to this situation is greater than the number of allowed retransmissions of the corresponding "non-initial access" station. This may make it possible to provide easy access to the stations, which have no chance of having resource access. Therefore, all stations can have the possibility of network access. In the first embodiment, the number of allowed retransmissions for each category (non-initial access/initial access) is signaled to the secondary station on the broadcast channel (BCH). However, in one variation of this embodiment, if there are two types such as (non-initial access/initial access), for example, only the number of allowed retransmissions corresponding to the initial access category is signaled to the secondary station. Therefore, when the secondary station enters the retransmission coordination, after the number of allowed signal retransmissions is reached, the initial access secondary station " will stop retransmitting its data. "non-initial secondary station" will continue to retransmit its data until the primary station receives the message correctly or until the primary station stops sending NACKs. Therefore, this avoids signaling the number of this category, reducing the overhead, and The choice of the number of retransmissions allowed allows for great flexibility. This also allows the system to have an undefined limit operation on the number of retransmissions, i.e., the maximum number of retransmissions can be infinite. In another variation of the first embodiment, the categories may be selected differently, or another class may be attached. Therefore, it is possible to select the number of allowed retransmissions among a set of predetermined values, for example, based on the priority of the secondary station. Its tone, the transmission of a secondary station with a security message or an urgent message, is given special privileges, so its resource access is promoted. Prioritize, such as the nature of the signature, based on the data to be transmitted or based on the characteristics of the secondary station. For example, some users may be restricted from accessing services due to their signatures. In this case, the number of allowed retransmissions can be lower than this category. Another - secret can be estimated using the number of failed attempts to get _ access to consider the priority of the secondary station. Therefore, the more the secondary station fails to obtain network access, the higher the number of retransmissions is allowed, and the lower-try is more likely to succeed. In the second embodiment of the invention, the number of retransmissions allowed for each selection can be made by a specific algorithm. For example, the number of allowed retransmissions can be three =, for example; i1, 3, and 5. Each-minor station uses the - algorithm to select this value... for example, every-second station can be ❹-characteristics, such as

識別符,如其處理器之序列號,或IMS!,及將装廡7 一 預定功能以選擇三可能值之一者(例如,具有 NASID之^柯㈣㈣之—最大數、》 值NA請之次要站可選擇重傳之^ ^具有一偶數 性是隨機選擇允許重傳次數(或 數)°另一可能 產生數量之預定功能),例如在 作為-隨機 上,充分隨機數量之產生可 取吻未之前。實際 在此說明中,,隨機,,亦指"偽隨機,,。:隨:處理實現’因此 功能可是識別功能,其中輸出 些實施例中’預定 此第二實施例可解決上述說明之本^入數量相同。 之本發明之第-實施例不 135009.doc • 13 - 200935811 能幫助複數個次要站間衝突之情況,該等次要站擁有—c. RNTI ’或不能幫助複數個次要站間衝突之情況,該等次 要站不擁有一 C-RNTI。 從第二實施例應瞭解,對於一給定次要站允許重傳次數 可從一存取嘗試變化至另一者。An identifier, such as its processor serial number, or IMS!, and a predetermined function to select one of the three possible values (for example, the number of the NASID (4) (four) with the NASID - the maximum number, the value of NA, please To have a station to choose to retransmit ^ ^ has an even number of random selections to allow the number of retransmissions (or number) ° another possible number of predetermined functions), for example, as a random, a sufficient number of random generations can be kissed prior to. Actually, in this description, random, also refers to "pseudo-random,,. : With: Processing Implementation 'Therefore, the function may be an identification function, wherein the output is in some embodiments' predetermined. This second embodiment can solve the same number of instructions as described above. The first embodiment of the present invention does not 135009.doc • 13 - 200935811 can help a plurality of secondary station conflict situations, such secondary stations have -c. RNTI 'or can not help a plurality of secondary station conflicts In this case, the secondary stations do not own a C-RNTI. It will be appreciated from the second embodiment that the number of retransmissions allowed for a given secondary station can vary from one access attempt to the other.

最大重傳次數可以從主要站已知之一組次數中選擇。在 達到組中重傳之每―最大數量之後,主要站將清除其緩衝 區及再次開始接收處理;在每次此場合,次要站將停止重 傳亥等_人要站已選擇較低最大重傳次數,留下數量減少 之最初衝突次要站繼續重傳及改良用於主要站解碼一資料 訊息之機會。 靖注意第-及第:實施例可被組合。例如,對於"初始 存取次要站",允許重傳次數可被從可能值之第—子 隨機選擇,例如,似地,,,非初始存取次要站"之 允許重傳次數可從可能值之第二子組中隨 3及.4二此,如果—衝突發生,例如具有三次要站,I含 初始存取:欠要站”,及二”非初始存 =存取次要站之各自允許重傳次數是不同的,有導:: 次要站在二傳協定之末端。在另-實例中,當衝突 站取得網路存取結束。 有了-重傳協定以次要 在本發明之另一實施例中,最大重傳 包,或較高層傳訊(例如在—廣播頻道)。組態可 ”發月不僅應用於行動通訊系統,該行動通訊系 135009.doc 200935811 統使用ARQ或HARQ作為隨機存取程序之部分,諸^^河以 之LTE,亦有可能應用於另一標準諸如wiMAXi進展或 cdma2000 ° 實際上,本發明不限於此處作為實例說明之umts或行 動電信系統,而是可延伸至分配資源給終端請求存取之任 一其他通信系統,例如包含對等式網路,其中對等實體可 為傳輸資源之存取競爭。The maximum number of retransmissions can be selected from one of the group times known to the primary station. After reaching the maximum number of retransmissions in the group, the primary station will clear its buffer and start receiving processing again; in each case, the secondary station will stop retransmission, etc. The number of retransmissions, leaving the initial collision of the number of secondary stations to continue to retransmit and improve the opportunity for the primary station to decode a data message. Note that the first and third embodiments can be combined. For example, for "initial access secondary station", the number of allowed retransmissions can be randomly selected from the first to the possible values, for example, similarly, non-initial access secondary stations" The number of times may be from the second subgroup of possible values with 3 and .4, if - conflict occurs, for example, there are three stations to be visited, I includes initial access: owed to station, and two "non-initial storage = access" The number of retransmissions allowed for each of the secondary stations is different. Guided:: The secondary station is at the end of the second pass agreement. In another example, when the conflicting station obtains network access ends. With a -retransmission agreement to secondary in another embodiment of the invention, the maximum retransmission packet, or higher layer messaging (e.g., in - broadcast channel). The configuration can be used not only in mobile communication systems, but also in the mobile communication system 135009.doc 200935811. Using ARQ or HARQ as part of the random access procedure, the LTE is also applicable to another standard. Such as wiMAXi progression or cdma2000 ° In fact, the invention is not limited to the umts or mobile telecommunications systems described herein as examples, but may extend to any other communication system that allocates resources to the terminal for requesting access, for example including a peer-to-peer network. Road, where peer entities can compete for access to transmission resources.

在本發明之說明書及專财請範財,陳述元件之詞" 一(a)”或”一(an)"不排除複數個此等元 詞"包含.·不排除此等列出之其他元件或步驟之在存在進 通過閱讀本揭示,其他修改將對熟悉此項技術者是顯而 易見的。此等修改可包含另一特徵,其為無線電通訊之技 術及傳輸功率控制之技術已知及其可被使用替代或除此處 已經說明之特徵之外。 【圖式簡單說明】 圖U已經說明之)是一組時間表,該時間表代表複數個 次要站β與—主要站之間之—傳統隨機存取程序; 圖2是一代表一網路之方媸 揭圖根據本發明該網路包含 一主要站及一次要站; =3是一組時間表,其代表根據本發明實 機存取 程序;及 圖4是一代表本發明之方法之流程圖。 【主要元件符號說明】 10 隨機存取前置項 135009.doc -15· 200935811In the specification and special account of the present invention, please refer to the word "quote" (a) or "an" and "do not exclude plural of these terms". Including. Other elements or steps will be apparent from the reading of this disclosure. Other modifications will be apparent to those skilled in the art. Such modifications may include another feature that is known to the art of radio communication technology and transmission power control and that may be used in place of or in addition to the features already described herein. [Simple diagram of the diagram] Figure U has been described as a set of schedules representing a plurality of secondary stations β and - between the main stations - the traditional random access procedure; Figure 2 is a representation of a network According to the invention, the network comprises a primary station and a primary station; =3 is a set of schedules representing a real machine access procedure in accordance with the present invention; and Figure 4 is a representation of the method of the present invention. flow chart. [Main component symbol description] 10 Random access preamble 135009.doc -15· 200935811

20 回應 30 訊息 40 訊息 50 否定應答訊息(NACK) 60 訊息 70 訊息 100 主要站 110 傳輸構件 120 接收構件 130 天線 140 耦合構件 150 控制構件 160 第一频道 200 次要站 210 傳輸構件 220 接收構件 230 天線 240 輛合構件 401 對應一第一次要站UE1之傳輸之時間表 402 403 對應第二次要MUE2之傳輸之時間表 對應主要站之傳輸之時間表 410 隨機存取前置項 420 回覆 430 訊息 135009.doc -16- 20093581120 Response 30 Message 40 Message 50 Negative Response Message (NACK) 60 Message 70 Message 100 Primary Station 110 Transmission Component 120 Receiving Member 130 Antenna 140 Coupling Member 150 Control Member 160 First Channel 200 Secondary Station 210 Transmission Member 220 Receiving Member 230 Antenna A schedule of 402 vehicles 401 corresponding to a transmission of the first secondary station UE1 402 403 a schedule corresponding to the transmission of the second secondary MUE2 corresponds to a schedule of transmission of the primary station 410 Random access preamble 420 Reply 430 message 135009.doc -16- 200935811

440 訊息 450 否定應答訊息(NACK) 460 訊息 470 訊息 500 應答訊息(ACK) DATA1 資料 DATA2 資料 17- 135009.doc440 Message 450 Negative Answer Message (NACK) 460 Message 470 Message 500 Answer Message (ACK) DATA1 Data DATA2 Data 17- 135009.doc

Claims (1)

200935811 、申請專利範圍 1. 種藉由一次要站取得一網路存取之方法,該網路包含 至J —主要站’該方法包含該次要站使用一重傳協定傳 輸訊息至該主要站,其中來自該次要站之該訊息之允 許重傳次數具有對該次要站之一當前參數之 一相依性。 2 » 1 -Jr 之方法’其中該當前參數包含使用一預定選 擇廣算法選擇之-數量’及其中該相依性包含依據使用 。亥預疋選擇演算法選擇之該數量來設定該允許重傳次 數。 3 · 如5月求"項2之太v4l. 丄 $之方法,其中該預定選擇演算法從一組預定 數量中進行一隨機選擇。 4. 如請求項2之方法,宜中缽 ,、〒該預疋選擇凟算法包含導出該 二人要站之一特性之一函數。 5. 如請求項4之t,土 # i ,、中該次要站之該特性是該次要站 或其7^件部分之—者之一永久識別符。 6·如請求項2至5中任一項 數。 項之方法,其中該函數是恆等函 7 . 如清求項2之Htr Λψ, jj- I 已經擁Γ / ^該當前參數包含該次要站是否 i擁有—存取識別符,及其中 次要站已經擁有^ 包3如果該 作為-第_侑,芬线別符,則選擇該允許重傳次數 符,則選擇兮☆社逻沒有擁有一存取識別 擇以允許重傳次數作 — 8·如請求項7之方 弟-值。 別符給該次要站。 包含該網路提供該存取識 135009,doc 200935811 9.如 D月求項7或8之方 10.如請求項7 ' 、中s亥第一值係大於該第二值。 η·如前述請二:方法’其中該第-值係小於該第二值。 乂 %來項中任一 擁有-識別符,則“ 其中如果該次要站已經 號,則A 果該次要站停止接收否定應答信 …人要站將停Α該訊 12.如則述請求項中任 傳 有擁有-識㈣ $之方法’其中如果該次要站還沒 號 ° ,則如果該次要站停止接收否定應答信 二則该次要站將停止該訊息之重傳。 I3·如凊求項5至U中任一 ^ θ 項之方法,其中該第一數量及該 第一數量之一者是預定的。 14·如前述請求項中任一 唄之方法其中該允許重傳次數是 糟由該網路發信號。 15.如前述請求項中任一項 在其中至少部分在該次要 站之一優先權層級之基礎上選擇該允許重傳次數。 ❹ 如《月求項15之方法’其中該次要站之該優先權層級取決 於待傳輸之資料之一屬性。 17·如請$項15或16之^法’其中該次要站之該優先權層級 取決於先前存取網路之失敗嘗試次數。 18. —種主要站,其包含用於執行前述請求項之方法之構件。 19, 一種次要站,其包含用於取得對—網路之存取之構件, 該網路包含至少一主要站,其中該次要站包含使用一重 傳協定傳輸一訊息至該主要站之構件,其中來自該次要 站之該訊息之允許重傳次數取決於該次要站之一當前參 數。 I35009.doc200935811, Patent Application Area 1. A method for obtaining a network access by a station, the network includes a J-main station, the method includes the secondary station transmitting a message to the primary station by using a retransmission agreement, The number of allowed retransmissions of the message from the secondary station has one of the current parameters of one of the secondary stations. 2 » 1 - Jr's method 'where the current parameter contains a quantity - selected using a predetermined selection algorithm and the dependencies thereof are used according to the use. The number of choices allowed by the algorithm selection algorithm is used to set the number of allowed retransmissions. 3 · As in May, the method of seeking " item 2 is too v4l. 丄 $, wherein the predetermined selection algorithm performs a random selection from a predetermined set of numbers. 4. As in the method of claim 2, the pre-selection algorithm includes a function for deriving one of the characteristics of the two-person station. 5. If t of claim 4, soil # i , , the characteristic of the secondary station is one of the minor identifiers of the secondary station or its 7^ part. 6. A number as in any of claims 2 to 5. The method of the item, wherein the function is an identity function 7. If Htr Λψ, jj-I of the second item 2 is already supported / ^ the current parameter contains whether the secondary station has i-access identifier, and its secondary If the station already has ^ packet 3, if it is the - _ 侑, fen line character, then select the allowed retransmission number, then select 兮 ☆ 逻 没有 没有 does not have an access identification to allow the number of retransmissions - 8 · As requested in item 7 - the value of the brother. Do not assign to the secondary station. The network is provided to provide the access identification 135009, doc 200935811 9. If the D month is 7 or 8 of the formula 10. If the request item 7 ', the first value of the middle s is greater than the second value. η·, as described above, the second method: wherein the first value is less than the second value.乂% of any item has an -identifier, then "if the secondary station has already been numbered, then A the secondary station stops receiving the negative response message... the person wants the station to stop the message. 12. If the request is In the item, there is a method of possessing - knowing (four) $. If the secondary station has no number °, then if the secondary station stops receiving the negative response letter 2, the secondary station will stop the retransmission of the message. I3· A method of claiming any one of items 5 to U, wherein the first quantity and one of the first quantities are predetermined. 14. The method of any of the preceding claims, wherein the retransmission is allowed The number of times is badly signaled by the network. 15. Any one of the preceding claims wherein the number of allowed retransmissions is selected based at least in part on a priority level of the secondary station. The method of 15 'where the priority level of the secondary station depends on one of the attributes of the data to be transmitted. 17·If the item 15 or 16 is the method', the priority level of the secondary station depends on the previous The number of failed attempts to access the network. 18. A primary station, Means comprising means for performing the method of the foregoing claim. 19, a secondary station comprising means for obtaining access to a network, the network comprising at least one primary station, wherein the secondary station comprises A retransmission protocol transmits a message to the component of the primary station, wherein the number of allowed retransmissions of the message from the secondary station depends on the current parameter of one of the secondary stations.
TW097137527A 2007-10-01 2008-09-30 Method of gaining access to a network TW200935811A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP07301420 2007-10-01

Publications (1)

Publication Number Publication Date
TW200935811A true TW200935811A (en) 2009-08-16

Family

ID=40351389

Family Applications (1)

Application Number Title Priority Date Filing Date
TW097137527A TW200935811A (en) 2007-10-01 2008-09-30 Method of gaining access to a network

Country Status (2)

Country Link
TW (1) TW200935811A (en)
WO (1) WO2009044327A1 (en)

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2356325B (en) * 1999-11-11 2003-01-08 Motorola Israel Ltd Optimized random access scheme for a shared resource
US7924871B2 (en) * 2004-11-24 2011-04-12 Nextel Communications Inc. Control channel priority access systems and methods

Also Published As

Publication number Publication date
WO2009044327A1 (en) 2009-04-09

Similar Documents

Publication Publication Date Title
CN111684752B (en) Method for managing HARQ buffer of NR
US9148269B2 (en) Method and arrangement in a wireless communication system
TWI415502B (en) Method and apparatus for improving uplink transmission of transmission time interval bundling in a wireless communication system
TWI316807B (en) Method and protocol for handling access attempts for communications systems
TWI259674B (en) Method and apparatus for reducing transmission errors in a third generation cellular system
US20120163322A1 (en) Method and arrangement in a wireless communication system
JP2022031881A (en) Method for random access, terminal device, and network device
US20070174885A1 (en) Multicast transmission method, system and communication station
TW201018291A (en) Method and apparatus for handling UL-SCH transmission
TW201025916A (en) Method of distinguishing hybrid automatic repeat request processes and related communication device
CN104579602A (en) LTE (long term evolution) broadcast multicast repeat method
CN101686490A (en) Method and related device of scheduling request behavior in a wireless communication system
KR20140027531A (en) One method of delegate-based group channel access
CN108322936B (en) Data retransmission method and device
TW200939660A (en) Improved power ramping for RACH
TW200533132A (en) Methods and apparatus to optimize delivery of multicast content using probabilistic feedback
WO2020216332A1 (en) Data retransmission method, receiving method, terminal, and network device
TW200814681A (en) Procedure for initial access
TW200939812A (en) Indicating E-DCH resources for E-RACH
JP2018511276A (en) Random access signaling retransmission method and apparatus
CN111147202A (en) Data transmission method, sending terminal and network side equipment of Internet of vehicles
WO2020194924A1 (en) Terminal and transmission method
WO2014019441A1 (en) Method, apparatus, system, and related device for data transmission
CN104812083B (en) Method and apparatus for random access procedure
JP2021508207A (en) How to manage timers, how to transmit information, terminal equipment, and network equipment