TWI380721B - An apparatus and method for fast access in a wireless communication system - Google Patents

An apparatus and method for fast access in a wireless communication system Download PDF

Info

Publication number
TWI380721B
TWI380721B TW96109820A TW96109820A TWI380721B TW I380721 B TWI380721 B TW I380721B TW 96109820 A TW96109820 A TW 96109820A TW 96109820 A TW96109820 A TW 96109820A TW I380721 B TWI380721 B TW I380721B
Authority
TW
Taiwan
Prior art keywords
access
identification
terminal
receiving
transmitting
Prior art date
Application number
TW96109820A
Other languages
Chinese (zh)
Other versions
TW200840391A (en
Inventor
Aleksandar Damnjanovic
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Priority to TW96109820A priority Critical patent/TWI380721B/en
Publication of TW200840391A publication Critical patent/TW200840391A/en
Application granted granted Critical
Publication of TWI380721B publication Critical patent/TWI380721B/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Description

九、發明說明: 【發明所屬之技術領域】 以下描述大體係關於I線 , …、線通化,且更特定而言係關於用 於舅源之快速存取的方案。 【先前技術】 廣泛佈署無線通信车絲 Μ統以^供各種類型之通信内容,諸 如聲音、資料等。此等系 ^ f 系統可為能夠藉由共用可用系統資 源(例如,頻寬及傳輸功率 执刀旱)而支援與多個使用者之通信之 多向存取系統。該等多向在 存取系統之實例包括劃碼多向存 取(CDMA)系統、劃時多自在 多内存取(TDMA)系統、劃頻多向存 取(FDMA)系統及正交劃艏炙a七 廿 J頻多向存取(OFDMA)系統。 無線通k系統已成為世界卜士 界上大多數人進行通信的普遍方 法。無線通信設備已變得p #、且更強大續滿足消費者需 、 及便利性。行動設備(諸如蜂巢式電話)中 處理功率之增加已引起對無線網路傳輸系統之需求的辦 加。 9 一種典型無線通信網跤r/s, 1 周路(例如’利用劃頻、劃時、劃碼 技術的)包括提供一覆蓋區 " 復蛊&域之一或多個基地台及可在 蓋區域内傳輸並接收資粗 #枓之一或多個行動(例如’無線)線 端 典型基地台可同時傳輸用於廣播、多點播送及/ 或早點播杨務之多個資料流,丨中資㈣為可由 終端機所關注進行獨立桩必々次^ m 珣立接收之資料之流。該基地台之覆甚 區域内之一行動終端機可盘接此士兮访人士丑 ,啊』興接收由該複合流載運之一個、 一個以上或所有的資料流相 _ y . 相關。類似地,一行動終端機可 119652.doc 傳輸資料至該基地台或至另_行_端機β 在長期料(LTE)$m㈣機或使用者設備剛 要資源用於建立與基地台(例如節點B或存取網路)之連 接時’可使用隨機存取通道(RACH)。隨機存取通道參數 週期性地由節點B廣播於下行鏈路公用控制通道(ccch) UE僅在其達成下行鏈路同步且獲得最近RACH參數之 後才可經由RACH傳輸。RACHM於上行鏈路層ι同步且 請求上行鏈路空中縣資源指派。在上行鏈路空中介面之 正交性質中(例如0FDM或0FDMA系統),保存RACH資源 並將其僅用於存取可能是必要的。RACH2利用為突發性 的且可能遠低於經排程之訊務資料通道之利用。因此,存 在使最少資料在RACH上傳輸同時確保短的存取延遲之需 要。 【發明内容】 下文呈現一或多個態樣之簡化概要,以便提供對該等態 樣之基本理解。此概要並非所有預期態樣之全面概述,且 並不欲識別所有態樣之重要或關鍵元素且並不欲界定任何 或所有態樣之範疇。其目的僅在於以簡化形式呈現一或多 個態樣之某些概念作為隨後將呈現之更詳細描述的序言。 根據一態樣,一種在一無線通信系統中快速存取之方 法,該方法產生一包含一具有服務資訊品質之存取序文的 存取探測,並在一隨機存取通道上傳輸存取探測。 根據一態樣,一種在一無線通信系統中快速存取之方 法,該方法接收一存取探測,該存取探測包含服務資訊之 119652.doc 1380721 根據又一態樣,一種積體電路,其包含:用於傳輸一存 取探測之構件;用於接收一第一存取許可之構件,其中將 該第一存取許可之一部分設定為空;及用於在該使用者資 料係在接收到該第一存取許可之後被傳輸之情況下傳輸使 用者資料以及一第一 MAC ID的構件。 在另一態樣中,一種積體電路,其包含:用於接收一存 取探測之構件;用於回應於接收到該存取探測而產生一存 取許可之構件,其中該存取許可包含設定為空之存取許可 之一部分;及用於接收使用者資料及一第一 MAc id之構 件。 根據又一態樣,一種在一無線通信系統中可操作之電子 設備,其包含:一傳輸器,該傳輸器傳輸一存取探測;一 接收器,該接收器接收一第一存取許可,其中將該第一存 取許可之一部分設定為空;及該傳輸器.進一步在該使用者 資料係在接收到該第一存取許可之後被傳輸之情況下傳輸 使用者資料以及一第一 MAC ID。 又在另一態樣中,根據一態樣,一種在一無線通信系統 中快速存取之方法,該方法包含:傳輸一存取探測;接收 一第一許可訊息,其中該第一許可訊息包含一表示一第一 識別之部分;及傳輸一使用一第二識別之訊息,其中該第 二識別不等於該第一識別。 根據又一態樣,一種在一無線通信系統中快速存取之方 法,該方法包含:接收一存取探測;回應於接收到該存取 探測而產生一存取許可,其中該存取許可包含一表示一第 119652.doc —識別之部分;及接收__包含H別之訊息該第二 識別不等於該所傳輸之第一識別。 . I據另-態樣,-種在-無線通信系統中可操作之裝 j ’該裝置包含:用於傳輸—存取探測之構件;用於接收 -·: 第一許可訊息之構件,其中該第-許可訊息包含一表示 ―第—識別之部分;及用於傳輸-使用-第二識別之訊息 之構件,丨t該第二識別;I;等於該第一識別。 • 3 一態樣係關於-種在-無線通信系統中可操作之裝 置,其包含:用於接收一存取探測之構件;用於回應於接 收到該存取探測而產生一存取許可之構件,其中該存取許 可包含一表示-第-識別之部分;&用於#收一包含一第 二識別之訊息之構件,該第二識別不等於該所傳輸之第一 識別。 又-態樣係關於-種其上儲存有電腦可執行指令之電腦 可讀媒體,其用於執行以下指令:傳輸一存取探測;接收 • —第—許可訊息,其中該第-許可訊息包含-表示-第— 識別之部分,及傳輸一使用一第二識別之訊息,其中該第 二識別不等於該第—識別。 ·' 另―態樣提供—種其上儲存有電腦可執行指令之電腦可 * 媒體’其用於執行以下指令:接收-存取探測;回應於 接收到該存取探測而產生一存取許可,其中該存取許可包 含-表示-第-識別之部分;及接收一包含一第二識別之 訊息,該第二識別不等於該所傳輸之第一識別。 又-態樣係關於-種積體電路,其包含:用於傳輸一存IX. Description of the Invention: [Technical Field to Which the Invention Is Affected] The following describes a large system regarding I-line, ..., line communication, and more particularly, a scheme for fast access for a power source. [Prior Art] Widely deploy wireless communication wires to provide various types of communication contents, such as sound and data. These systems can be multi-directional access systems capable of supporting communication with multiple users by sharing available system resources (e.g., bandwidth and transmission power). Examples of such multi-directional access systems include coded multi-directional access (CDMA) systems, time-limited multiple free access (TDMA) systems, frequency-multiplexed multi-directional access (FDMA) systems, and orthogonal schemes. a seven-inch J-frequency multi-directional access (OFDMA) system. The wireless k-system has become a common method for most people in the world to communicate. Wireless communication devices have become p #, and more powerful to meet consumer needs, and convenience. The increase in processing power in mobile devices, such as cellular phones, has caused a demand for wireless network transmission systems. 9 A typical wireless communication network 跤r/s, 1 week (for example, 'utilizing frequency, time, and code technology') includes providing one coverage area "recovering & one or more base stations and Transmitting and receiving one or more actions in the coverage area (for example, the 'wireless' line terminal typical base station can simultaneously transmit multiple data streams for broadcast, multicast, and/or early broadcast of Yang's services. Capital (4) is the flow of information that can be received by the terminal and can be received by independent piles. One of the mobile terminals in the area can be connected to the smugglers of the interviewer, ah, and receive one, more than one or all of the data streams carried by the composite stream _ y . Similarly, an mobile terminal can transmit data to the base station or to another base station to transmit data to the base station or to the base station (for example, the long-term (LTE) $m (four) machine or the user equipment. A random access channel (RACH) can be used when connecting a Node B or an access network. The random access channel parameters are periodically broadcast by the Node B to the downlink common control channel (ccch). The UE can only transmit via the RACH after it has achieved downlink synchronization and obtained the most recent RACH parameters. The RACHM synchronizes at the uplink layer and requests an uplink air county resource assignment. In the orthogonal nature of the uplink null intermediaries (e.g., OFDM or OFDM systems), it may be necessary to save the RACH resources and use them only for access. RACH2 utilization is exploitative and may be much lower than the utilization of scheduled traffic data channels. Therefore, there is a need to minimize the amount of data being transmitted over the RACH while ensuring short access delays. BRIEF DESCRIPTION OF THE DRAWINGS [0007] The following presents a simplified summary of one or more aspects in order to provide a This summary is not a comprehensive overview of all the intended aspects, and is not intended to identify all the important or critical elements of the aspects and does not define the scope of any or all aspects. Its purpose is to present some of the concepts of the invention in the According to one aspect, a method of fast access in a wireless communication system produces an access probe containing an access context with service information quality and transmits access probes over a random access channel. According to one aspect, a method for fast access in a wireless communication system, the method receiving an access probe, the access probe including service information 119652.doc 1380721. According to yet another aspect, an integrated circuit is And comprising: means for transmitting an access probe; means for receiving a first access permission, wherein one of the first access permissions is set to be empty; and for receiving the user data in the user The user profile and the component of a first MAC ID are transmitted with the first access permission transmitted. In another aspect, an integrated circuit includes: means for receiving an access probe; means for generating an access permission in response to receiving the access probe, wherein the access permission comprises A portion of the access permission set to be empty; and a means for receiving the user profile and a first MAc id. According to still another aspect, an electronic device operable in a wireless communication system includes: a transmitter that transmits an access probe; and a receiver that receives a first access permission. Wherein the one of the first access permissions is set to be empty; and the transmitter further transmits the user profile and a first MAC if the user profile is transmitted after receiving the first access permission ID. In another aspect, a method for fast access in a wireless communication system according to an aspect, the method comprising: transmitting an access probe; receiving a first grant message, wherein the first grant message includes a portion indicating a first identification; and transmitting a message using a second identification, wherein the second identification is not equal to the first identification. According to still another aspect, a method of fast access in a wireless communication system, the method comprising: receiving an access probe; generating an access permission in response to receiving the access probe, wherein the access license includes One indicates a 119652.doc - the identified portion; and the received __ contains the H message that the second identification is not equal to the transmitted first identification. According to another aspect, an apparatus operable in a wireless communication system includes: means for transmitting-access detecting; means for receiving -:: a first permission message, wherein The first permission message includes a component indicating a "first" identification; and a component for transmitting-using-second identifying the message, the second identification; I; equal to the first identification. A mode of operation in a wireless communication system, comprising: means for receiving an access probe; for generating an access permission in response to receiving the access probe And a component, wherein the access permission includes a portion representing a ---identification; & means for receiving a message containing a second identification, the second identification being not equal to the transmitted first identification. A further aspect relates to a computer readable medium having stored thereon computer executable instructions for executing the following instructions: transmitting an access probe; receiving a - first permission message, wherein the first license information comprises - indicating - the first part of the identification, and transmitting a message using a second identification, wherein the second identification is not equal to the first identification. · 'Another aspect provides a computer capable of storing computer executable instructions* media for executing the following instructions: receive-access probe; generating an access permission in response to receiving the access probe And wherein the access permission includes a portion indicating a --identification; and receiving a message including a second identification that is not equal to the first identification of the transmission. And the state-like system is related to the -integrated circuit, which comprises: for transmitting a memory

119652.doc C S 1380721 取探測之構件;用於接收一第一許可訊息之構件其中該 第一許可訊息包含-表示—第—識別之部分;&用於傳輸 -使用-第二識別之訊息之構件,其中該第二識別不等於 該第一識別。 根據又一態樣,一種積體電 取探測之構件;用於回應於接 取許可之構件,其中該存取許119652.doc CS 1380721 A component for detecting; a component for receiving a first permission message, wherein the first permission message includes a portion indicating - a first identification; and a message for transmitting - using - a second identification message A member, wherein the second identification is not equal to the first identification. According to still another aspect, a component for detecting electrical pickup is provided; responsive to a component for accessing a license, wherein the access

部分;及用於接收一包含一第二識別之訊息之構件,該第 二識別不等於該所傳輸之第一識別。 根據另-態樣,一種在一無線通信系统中可操作之電子 設備’該電子設備包含:一傳輸器,該傳輸器傳輸一存取 探測;一接收器,該接收器接收一第一許可訊息,其中該 第許可訊息包含一表示一第一識別之部分;及該傳輸器 傳輸-使用一第二識別之訊息’其中該第二識別不等於該 第一識別。And a means for receiving a message including a second identification, the second identification being not equal to the transmitted first identification. According to another aspect, an electronic device operable in a wireless communication system includes: a transmitter that transmits an access probe; and a receiver that receives a first grant message And wherein the first permission message comprises a portion indicating a first identification; and the transmitter transmits - using a second identified message 'where the second identification is not equal to the first identification.

路,其包含:用於接收一存 收到該存取探測而產生一存 可包含一表示一第一識別之 又一態樣係關於一種在一無線通信系統中可操作之電子 °又備,該電子設備包含:一接收器,該接收器接收一存取 探測;一處理器,該處理器回應於接收到該存取探測而產 生一存取許可,其中該存取許可包含表示一第一識別之設 疋為二之存取許可之一部分;及該接收器進一步接收使用 者資料一包含一第二識別之第一 MAC ID訊息,該第二識 別不等於該所傳輸之第一識別。 為實現前述及相關目的,該或該等態樣包含將於下文充 分描述並在申請專利範圍中特別指出之特徵。實施方式及 119652.doc 1380721 隨附圖式陳述於該或該等態樣之註 ^ # Λ 碎細特定說明性態樣中。 α而此等態樣僅指不其中可採 — 用各態樣原理之各種方式中 之右干方式,且所描述之態樣意欲大中 等效物„ 匕括所有該等態樣及其 【實施方式】 現參看圖式描述各種實施例,其中相同 :指代相同元件。在以下描述中,為達成解釋之I:终:The method includes: receiving, receiving, and storing the access probe to generate a memory that includes a first identification, and is further related to an electronic device operable in a wireless communication system. The electronic device includes: a receiver that receives an access probe; a processor that generates an access permission in response to receiving the access probe, wherein the access permission includes a first representation The identification device is configured as part of the access permission; and the receiver further receives the user profile, and includes a second identified first MAC ID message, the second identification being not equal to the transmitted first identification. To the accomplishment of the foregoing and <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; The embodiment and 119652.doc 1380721 are set forth in the accompanying drawings in the specific description of the or the like. α and these are only those that are not available - the right-handed method in each of the various ways of using the principles of the various aspects, and the described aspects are intended to be equivalent to all of the equivalents and all of them. Modes Various embodiments are described with reference to the drawings, wherein the same: refers to the same elements. In the following description, I have reached an explanation:

述許多特定細節讀提供對—❹個實施例的透徹理解。 可㈣可實踐該m實施例而無需此等特定 在其他實财,眾所熟知結構及設備以方塊圖的形式展干 以便利於描述一或多個實施例。 /、 如該申請案中所使用’術語,,組件&quot;、&quot;模組&quot;、&quot;系統,及 其類似者意欲指代與電腦有關之實體,或硬體、知體 體與軟體之組合、軟體或者執行中之軟體。舉例而t,— 組件可為(但不限於)在處理器上執行之過程、處理;:二 件、可執行碼、執行線緒、程式及/或電腦。以實例說明 之’在計算設備上執行之應用程式及計算設備可為一組 件。一或多個組件可駐於一過程及/或執行線緒内,且— 組件可位於一電腦上及/或分佈於兩個或兩個以上電腦之 間。此外’此等組件可由儲存有各種資料結構之各種電腦 可讀媒體來執行。該等組件可(諸如)根據一 π 或多個 資料封包(例如,纟自與一局部系統、分佈式系統中之另 一組件相互作用之組件的資料,及/或借助信號在諸如網 際網路之網路上與其他系統相互作用之組件的資料)之俨 119652.doc -11- 號,借助局部及/或遠端過程而通信β 此外,本文結合一行動設備描述各種實施例。一行動設 備亦可稱為一系統、用戶單元、用戶台、行動台、行動器 件' 遠端台、遠端終端機、存取終端機、使用者終端機、 終端機、無線通信設備、使用者代理、使用者設備或使用 者裝置(UE)。一行動設備可為一蜂巢式電話、—無繩電 話、一會話起始協定(sip)電話、一無線區域迴路(WLL) 台、一個人數位助理(PDA)、一具有無線連接能力之手持 设備、計算設備或連接至一無線數據機之其他處理設備。 此外,本文結合基地台描述各種實施例。一基地台可用於 與行動设備通信且亦可稱作存取點、節點B或某一其他術 語。 此外,本文描述之各種態樣及特徵可實施為使用標準程 式化及/或工程技術之方法、裝置或製品。本文使用之術 語”製品&quot;意欲涵蓋可自任何電腦可讀言免備、㈣或媒體存 取之電腦程式。舉例而言,電腦可讀媒體可包括(但不限 於)磁性儲存設備(例如,硬碟、軟碟、磁條等)、光碟(例 如,緊密光碟(CD)、數位化通用光碟(DVD)等)、智慧卡及 快閃記憶體設備(例如,EPR〇M、卡、棒、保密磁碟等 此外,本文所述之各種儲存媒體可表示用於儲存資訊之一 或多個設備及/或其他機器可讀媒體。術語,,機器可讀媒體&quot; 可包括(但不限於)能夠儲存、含有及/或承載指令及/或資 料之各種其他媒體。 現參看圖1,根據本文之各種實施例說明實現無線通信 119652.doc *12· 1380721 環境中之最佳下行鏈路傳輸之系統i 〇〇。基地台1 〇2經組態 以與一或多個行動設備1〇4通信。基地台1〇2包含一允許對 局部及分佈式傳輸多工之最佳化組件106,及一(例如)接收 • 有關基地台能力之資訊的接收組件108。最佳化組件106允 -*·- 許進行下行鏈路傳輸使得達成頻率分集及使得與傳輸相關 ... 之附加項成本經由各種方案而減輕,如下文所述。可瞭 解,對局部及分佈式傳輸之多工允許適應各種訊務服務、 φ 使用者能力且進一步允許該或該等行動設備104之使用者 利用通道特性。此外,(例如)該或該等行動設備1〇4可為基 地台102處之最佳化組件1〇6提供與行動設備能力有關之資 訊、對下行鏈路通道情況之估計及用戶資料。亦將瞭解基 地台102可確定高速與低速使用者之百分比並儲存用戶資 料及與行動設備能力有關之資訊。基地台1〇2之該等能力 可進一步允許最佳化組件1 〇6根據環境情況選擇最佳多工 方案。 • 參看圖2至圖3,其說明與快速存取通信系統有關之方 法。然而,為解釋簡潔之㈣’該等方法展示及描述為一 系列動作,但應理解並瞭解該等方法不受該等動作之次序 .· @限制’因為某些動作可根據所主張之標的而以不同次序 : 發生及/或與本文所展示及所描述之其他動作同時發生。 舉例而言,熟習此項技術者將理解並瞭解一方法可替代地 表示為-系列相關狀態或事件,諸如以狀態圖表示。此 外’並不需要所有被說明之動作來實施根據所主張之 之方法。 τ •13· 119652.doc 特定參看圖2,纟說明便利於無線通信系統(例如, 或OFDMA系統)中之快速存取程序的方法細。該方 n 機失去與存取網路之同步或不與存取網路同步 或在交遞時用於起始存取、同步。該方法在開始一 存取探測傳輸至存取網路(節點B)。在一態樣中,該存取 探測在隨機存取通道(RACH)上傳輸。為最小化對上行鏈 路資源之使用,僅傳輸一序文。該序文可包括下行鏈路 C/Ι資訊(回應於存取探測而致能在下行鏈路上發送之存取 許可訊息的功率控制,如下文論述)、通道品質指示反 饋、QoS相關資訊(致能排程器選擇及/或優先化起始資源 指派)、隨機ID(減少相同存取探測自不同UE同時到達節點 B之機率)及小區ID(用於擾亂存取探測使得探測僅在目標 節點B處成功解碼)。一存取探測序文包含一存取序列。該 存取序列自UE下行鏈路C/I、qos資訊及/或用於避免可能 衝突之隨機數字而導出。在一態樣中,所有存取序列為正 交的。該存取序列在傳輸前被特定小區擾亂序列擾亂。在 另一態樣中’擾亂序列並不僅是小區ID之函數且亦為除小 區ID外MAC ID(任何類型之UE ID即足夠)之函數。 在一態樣中’在傳輸該存取探測之後,方法行進至 204’確定是否回應於該存取探測接收到存取許可。若接 收到存取許可’則在使用來自存取探測之資訊解碼存取許 可之後方法行進至206。在206 ’傳輸打開連接請求訊息 (例:,ConnectionOpenRequest),該方法等待回應。在 208,回應於打開連接請求訊息而接收打開連接回應訊息 119652.doc • 14· 1380721 (L〇imeCt1〇n〇penResponse)。在另一態樣中,若終端機已 被指派一 MAC ID(例如當終端機為活動狀態時),則取消在 206及208描述之方法且终端機可開始與存取網路交換資 • 料。 再參看204,若在預定時間後未接收到存取許可,則方 法行進至210。在210,確定是否達到預定最大數目之再傳 輸。若已發生最大數目之存取探測再傳輸,則方法行進至 # 212。在212,將傳輸功率重設為原始位準且再傳輸存取探 測。方法行進至204以檢查是否已接收到存取許可。若未 達到最大數目之存取探測再傳輸,則方法行進至214。在 214,以更高功率再傳輸存取探測。方法行進至2〇4以檢查 是否接收到存取許可。 現參看圖3,其說明一無線通信系統中便利於接收一存 取探測之實例方法300 ^該方法在3〇2開始,接收包含一存 取序列之存取探測。若成功地偵測到存取探測,則方法行 • 進至3〇4。在304,存取網路產生一存取許可。該存取許可 與存取探測相關且使用來自所接收之存取探測之資訊。該 存取網路確定將提供給終端機之參數以便與存取網路交換 ·· 資料,其中該終端機與針對該終端機之存取探測相關。其 : 中存取許可包含終端機MAC ID、上行鏈路資源指派及上 行鏈路調整。存取許可可使用誤差校正方案加以擾亂及被 保濩。若存取許可在廣播通道上傳輸至若干終端機,則其 可使用來自存取探測之資訊加以擾亂,使得僅請求者能夠 解碼該存取許可。舉例而言,節點B以其已接收之存取序 119652.doc -15- c s ) 1380721 文序列擾亂存取許可。僅選擇相應存取序文序列之UE可 解碼存取許可。在產生存取許可之後,在3〇6,該方法傳 輸該存取許可並等待打開連接請求。在3〇8,接收打開連 接請求訊息。在驗證終端機之後,在31〇,傳輸打開連接 回應訊息。 在另一態樣中,圖2至圖3中說明之方法可應用於交遞方 案。UE與源節點B協商交遞。並行地,源節點B與目標節 點B協商交遞。在UE可開始交換在目標節點b上之資料 前,UE朝向目標節點B傳輸同步訊息。同步訊息由存取序 文組成且其在RACH上傳輸。擾亂序列為目標小區m以及 其MAC ID之函數。當達成上行鏈路同步時,目標節點8發 送存取許可至UE。 在另一態樣中,圖4至圖5中說明之方法可應用於同步。 特定參看圖4,其說明便利於一無線通信系統(例如, OFDM或OFDMA系統)中之快速存取程序的方法4〇〇。當終 端機丟失同步或不與存取網路同步或在交遞時,該方法可 用於同步。方法400在終端機確定其不與存取網路同步時 執行。若終端機自活動模式轉變至睡眠模式、深度衰退或 在交遞程序期間,則終端機可能丟失與存取網路之同步。 在一態樣中,方法在404開始,存取終端機傳輸存取簽名 (可稱作存取探測)至存取網路(節點B)。在一態樣中,存取 探測在隨機存取通道(RACH)上傳輸。存取探測可包括下 行鍵路c/i資訊、通道品質指示反饋、Q〇s相關資訊、隨機 ID、小區id或]V[AC ID旗標。由於該方法用於再同步故 119652.doc 16 1380721 終端機可已具有MAC ID且並不需要來自存取網路的新 MAC ID。在一態樣中,存取探測之MAC ID旗標可經設定 以指示不需要新的MAC ID或不使用MAC ID旗標。 在傳輸存取探測之後,方法行進至406,終端機回應於 存取探測接收來自存取網路(節點B)之UL存取許可。在一 態樣中,回應於存取探測而接收之第一 UL許可訊息可含 有關於UL資源之資訊、調節時序之時序資訊及MAC ID部 分。在一態樣中,可對於回應於存取探測而接收之第一 UL許可訊息而將MAC ID部分設定為NULL(例如一串零或 用於指示不可用資料之任何樣式)。該終端機可忽略對許 可訊息之MAC ID部分之處理。在MAC ID部分不為 NULL(存取網路已被指派一新的MAC ID)時,該終端機可 接著忽略該新的MAC ID且使用儲存在記憶體中之任何先 前指派之MAC ID。若終端機不具有指派的MAC ID,則終 端機可使用來自存取許可訊息中之MAC ID。在另一態樣 中,存取網路可提供基於來自存取探測之資訊之擷取自記 憶體之MAC ID。在此態樣中,UL許可訊息可包含不同組 參數,且該終端機將處理不同UL許可訊息之MAC ID部 分。 參看408,使用來自存取許可之所接收之參數、建立與 存取網路之通信,其中該終端機開始傳達使用者資料。在 一態樣中,當在上行鏈路共用通道上進行傳輸時該終端機 提供其MAC ID。該存取網路可將此MAC ID儲存在記憶體 中。在410,該終端機自存取網路接收一第二或隨後UL存 119652.doc 17 1380721 取許可訊息。該終端機處理在接收到第一 UL存取許可訊 息(在406論述)之後接收到的所有1)[許可訊息之MAC出部 分。此後,在412,該終端機在上行鏈路共用通道上傳輪 使用者資料,但不提供MAC ID作為隨後使用者資料傳輸 之部分。 現參看圖5,其說明便利於在一無線通信系統中接收一 存取探測之實例方法500。該方法在5〇2開始,接收一存取 探測。若成功地偵測到該存取探測,則方法行進至5〇4。 在504,存取網路產生一存取許可。該存取許可與該存取 探測及來自所接收之該存取探測之使用者資訊相關。該存 取網路確定將提供給終端機之參數以便與存取網路交換資 料,其中該終端機與針對該終端機之存取探測相關。其中 存取許可包含上行鏈路資源指派及上行鏈路調整。在一熊 樣中,存取探測可包括一 MAC ID旗標。若MAC m旗標: 存取探測之部分且被設定(因此該終端機正在請求存^網 路以指派MAC ID),則可包括MAC ID作為存取許可訊息 之部分。在另一態樣中,存取探測不包括請求MAC 10之 任何指示。在此態樣中.,回應於指示不需要河八(:m之存 取探測所傳輸的UL存取許可訊息iMAC m部分,而提供 MAC ID為NULL。在另-態樣中,該存取探測包含第一指 示符。若設定了第-指示符,則該存取網路確定該存取^ 測為零速率清求且該存取網路可僅提供時序調整或功率調 整。在506,存取網路在存取許可後接收—第一訊息。該 第-訊息可含有MAC ID或使用者資料。在5〇8,存二 119652.doc • 18 - 1380721 更新記憶體以指示所有未來訊息(例如一第二UL存取許可 訊息)將使用所接收之MAC ID » 現參看圖6,根據本文呈現之各種實施例說明無線通信 系統600。系統600可包含在一或多個扇區中之一或多個基 地台602(例如’存取點),該或該等基地台6〇2相對於彼此 及/或相對於一或多個行動設備6〇4而接收、傳輸 '重複(等) 無線通信信號。每一基地台602可包含一傳輸器鏈及一接 收器鏈’如熟習此項技術者所瞭解的,該等鏈之每一者又 可包含與信號傳輸及接收相關之複數個組件(例如,處理 器、調變器、多工器、解調變器、解多工器、天線等)。 行動設備604可為(例如)用於經由無線通信系統6〇〇通信之 蜂巢式電話、智慧電話、膝上型電腦、手持通信設備、手 持計算裝置、衛星無線電、全球定位系統、pDA及/或任何 其他適合裝置》 基地台602可藉由利用0FDM或OFDMA技術將内容廣播 至行動設備604。基於劃頻之技術(諸如〇FDM)通常將頻譜 劃分成不同通道;例如’頻譜可被劃分為均一頻寬塊(頻 率範圍)。OFDM有效地將整個系統頻寬劃分為多個正交頻 率通道。該等頻率通道視系統需要而定可使用同步或不同 步HARQ指派。此外,0FDM系統可使用劃時及/或劃頻多 工以在對於多個基地台602之多個資料傳輸中達成正交 性。 現參看圖7A,其說明便利於無線通信中之快速存取之系 統700。系統700可包括一用於傳輸存取探測之模組7〇2, H9652.doc (S ) 1380721 一用於接收一第一存取許可之模組7〇4及用於傳輸使用者 資料之模组706。模組702、704及706可為一處理器或任何 電子設備,且可耦接至記憶體模組7〇8。 現參看圖7B,其說明便利於無線通信中之快速存取之系 統750。系統750可包括一用於接收一存取探測之模組 752、一用於回應於該所接收之存取探測而產生存取許可 之模組754及一用於接收使用者資料之模組756。模組752 至756可為一處理器或任何電子設備,且可耦接至記憶體 模組760。 圖8為一終端機或使用者設備800之說明,其根據本文陳 述之一或多個態樣提供一無線通信環境中之其他扇區通 信。終端機800包含接收器802,其接收一信號(例如一或 多個接收天線)並對所接收之信號執行典型動作(例如,過 /慮放大 '降頻轉換等)並數位化經調節之信號以獲得樣 本。解調變器804可解調變該等樣本並提供所接收之導引 符號至處理器806。 處理器806可為專用於分析由接收器組件8〇2接收之資訊 及/或關於傳輸器814所進行之傳輸而產生資訊之處理器。 處理器806可為控制终端機800之一或多個組件的處理器, 及/或可為分析由接收器8〇2接收之資訊、關於傳輸器814 進行之傳輸而產生資訊及控制終端機8〇〇之一或多個組件 的處理器。處理器806可利用本文描述之任何方法,包括 關於圖2至圖3描述之方法p 此外,終端機800可包括一分析所接收之輸入(包括成功 119652.doc •20- 1380721 傳輸之確認)的傳輸控制組件808。確認(ACK)可自祠服扇 區及/或相鄰扇區接收。確認可指示一先前傳輸已成功地 由該等存取點中之一者接收並解碼。若未接收到確認,或 若接收到否定確認(NAK),則可重發送該傳輸。傳輸控制 組件808可併入至處理器806中。應瞭解傳輸控制組件808 可包括執行與確定接收確認相關之分析的傳輸控制碼。 終端機800可額外包含記憶體810 ’記憶體8 10可操作地 耦接至處理器806且可儲存有關於傳輸、一組活動扇區、 用於控制傳输之方法、包含與此相關之資訊的查找表之資 訊,及有關於如本文描述之傳輸及活動扇區組之任何其他 適當資訊。將瞭解本文描述之資料儲存組件(例如,記憶 體)可為揮發性記憶體或非揮發性記憶體,或可包括揮發 性記憶體及非揮發性記憶體兩者。以實例說明之(非限制 地),非揮發性記憶體可包括唯讀記憶體(ROM)、可程式化 ROM(PROM)、電可程式化ROM(EPROM)、電可擦除 ROM(EEPROM)或快閃記憶體。揮發性記憶體可包括隨機 存取記憶體(RAM),其充當外部快取記憶體。以實例說明 之(非限制地),RAM可為許多形式,諸如同步RAM (SRAM)、動態 RAM(DRAM)、同步 DRAM(SDRAM)、雙資 料速率 SDRAM(DDR SDRAM)、增強 SDRAM(ESDRAM)、 同步鏈接DRAM(SLDRAM)及直接總線式RAM(DRRAM) » 所主張之系統及方法之記憶體810意欲包含(但不限於)此等 或任何其他適合類型之記憶體。處理器806連接至符號調 變器812及傳輸經調變之信號之傳輸器814。 119652.doc -21- 1380721 圖9為根據各種態樣便利於一通信環境中之其他扇區通 信之系統900的說明。系統900包含具有接收器9丨〇之存取 點902 ’該接收器91〇經由一或多個接收天線906自一或多 個終端機904接收信號,且經由複數個傳輸天線9〇8將信號 傳輸至該或該等終端機904 »終端機904可包括受存取點 902支援之終端機,以及受相鄰扇區支援之終端機9〇4。在 一或多個態樣中’接收天線906及傳輸天線908可使用單組 天線建構。捿收器910可接收來自接收天線906之資訊且可 操作地與一解調變接收到之資訊的解調變器912相關。如 熟習此項技術者將瞭解,接收器910可為(例如)耙式接收器 (例如’使用複數個基頻相關器個別地處理多路徑信號組 件之技術…)、基於MMSE之接收器或用於分出被指派之終 端機的某一其他適合接收器。根據各種態樣,可利用多個 接收器(例如’每接收天線一個接收器),且該等接收器可 彼此通信以提供改良的使用者資料估計。經解調變之符號 由與上文關於圖10描述之處理器類似的處理器914進行分 析,且該處理器914耦接至儲存有關於終端機、與終端機 相關之指派資源及類似者之資訊的記憶體916。每一天線 之接收器輸出可由接收器910及/或處理器914共同處理。 調變器918可多工由傳輸器920經由傳輸天線908傳輸至終 端機904之信號。 存取點902進一步包含終端機通信組件922,其可為與處 理器914不同或與處理器914為整體之處理器。終端機通信 組件922可獲得受相鄰扇區支援之終端機的資源指派資 &lt; -5 ) 119652.doc -22- 1380721 訊。此外,終端機通信組件922可提供指派資訊至受存取 點902支援之終端機的相鄰扇區。指派資訊可經由回程_ 令提供。 ° 基於關於指派資源之資訊,終端機通信組件922可指導 對受相鄰扇區支援之終端機的傳輸進行之偵測,以及對所 接收之傳輸進行之解碼。記憶體916可保持在接收解碼封 包必需之指派資訊之前自終端機接收之封包。終端機通信 組件922亦可控制用於指示傳輸之成功接收及解碼之確認 的傳輸及接收。應瞭解終端機通信組件922可包括執行與 指派資源、識別軟交遞終端機、解碼傳輸及類似者相關之 基於實體控制的傳輸分析碼。該終端機分析碼可利用基於 人工智慧之方法’該等方法與執行推論及/或機率確定及/ 或基於統計之確定相關,其中此等確定與最佳化終端機效 能相關。 圖10展示例示性無線通信系統1〇00。為簡短起見該無線 通信系統600僅描繪一個終端機及兩個存取點。然而,應 瞭解該系統可包括一或多個存取點及/或一個以上终端 機’其中額外存取點及/或終端機可大體上與下文描述之 例示性存取點及終端機類似或不同。此外,將瞭解該等存 取點及/或終端機可利用本文描述之系統(圖1、圖4至圖9) 及/或方法(圖2至圖3)。 圖10展示在多向存取多載波通信系統1000中之終端機 1004、支援終端機1004之伺服存取點ι〇〇2Χ及相鄰存取點 1002Y的方塊圖。在存取點ι〇〇2Χ,傳輸(TX)資料處理器 119652.doc •23· (S ) 1380721The many specific details are described to provide a thorough understanding of the embodiments. The invention may be practiced without departing from the scope of the invention. The structure and equipment are well-known in the form of a block diagram to facilitate the description of one or more embodiments. /, as used in this application, 'terms, components', &quot;modules&quot;, &quot; systems, and the like are intended to refer to computer-related entities, or hardware, body and software. Combination, software or software in execution. For example, t, the component can be, but is not limited to, a process or process performed on a processor; two components, an executable code, an execution thread, a program, and/or a computer. An application and computing device executing on a computing device by way of example may be a group of components. One or more components can reside within a process and/or thread of execution, and - the components can be located on a computer and/or distributed between two or more computers. Furthermore, such components can be executed by various computer readable media having various data structures stored therein. Such components may, for example, be based on a π or multiple data packets (eg, data from components interacting with a local system, another component in a distributed system, and/or by means of signals such as the Internet) The data of the components interacting with other systems on the network) 119652.doc -11-, communicating by means of local and/or remote processes. Further, various embodiments are described herein in connection with a mobile device. A mobile device can also be called a system, a subscriber unit, a subscriber station, a mobile station, a mobile device, a remote station, a remote terminal, an access terminal, a user terminal, a terminal, a wireless communication device, and a user. Agent, user device or user device (UE). A mobile device can be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless area loop (WLL) station, a number of person assistants (PDAs), a wireless connection capable handheld device, A computing device or other processing device connected to a wireless data machine. Moreover, various embodiments are described herein in connection with a base station. A base station can be used to communicate with mobile devices and can also be referred to as an access point, Node B, or some other term. In addition, the various aspects and features described herein can be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques. The term "article of manufacture" as used herein is intended to encompass a computer program that is readable from any computer, (4) or media access. For example, a computer readable medium may include, but is not limited to, a magnetic storage device (eg, Hard disk, floppy disk, magnetic strip, etc.), optical disc (for example, compact disc (CD), digital compact disc (DVD), etc.), smart card and flash memory device (for example, EPR〇M, card, stick, Confidential Diskette, etc. Further, various storage media described herein may represent one or more devices and/or other machine-readable media for storing information. The term, machine-readable medium&quot; may include, but is not limited to, Various other media capable of storing, containing, and/or carrying instructions and/or data. Referring now to Figure 1, an implementation of the best downlink transmission in a wireless communication 119652.doc *12· 1380721 environment is illustrated in accordance with various embodiments herein. System i. Base station 1 〇 2 is configured to communicate with one or more mobile devices 1 〇 4. Base station 〇 2 includes an optimization component 106 that allows for local and distributed transmission multiplexing, and One (for example Receiving a receiving component 108 for information about the capabilities of the base station. The optimization component 106 allows the downlink transmission to be achieved such that frequency diversity is achieved and the additional cost associated with the transmission is mitigated via various schemes. As described below, it can be appreciated that multiplexing of local and distributed transmissions allows for adaptation to various traffic services, user capabilities, and further allows the user of the mobile device 104 to utilize channel characteristics. The mobile device or device 4 can provide information about the capabilities of the mobile device, the estimation of the downlink channel condition, and the user profile for the optimization component 1 at the base station 102. The base station will also be known. 102 can determine the percentage of high speed and low speed users and store user data and information related to mobile device capabilities. These capabilities of base station 1 2 can further allow optimization of components 1 〇 6 to select the best multiplex according to environmental conditions Solution. • Referring to Figures 2 through 3, the method associated with the fast access communication system is illustrated. However, for the sake of simplicity (4) 'the methods are shown and described It is a series of actions, but it should be understood and understood that the methods are not in the order of such actions. @Restricted' because certain actions may be in a different order depending on the claimed subject matter: occur and/or as shown and described herein Other acts described are occurring at the same time. For example, those skilled in the art will understand and appreciate that a method can alternatively be represented as a series of related states or events, such as in a state diagram. In addition, 'all required actions are not required. To implement the method according to the claimed method. τ • 13· 119652.doc Referring specifically to FIG. 2, FIG. 2 illustrates a method for facilitating a fast access procedure in a wireless communication system (eg, or an OFDMA system). Used to synchronize access to the access network or not to access the network or to initiate access and synchronization during handover. The method begins with an access probe transmission to the access network (Node B). In one aspect, the access probe is transmitted on a random access channel (RACH). To minimize the use of uplink resources, only a preamble is transmitted. The preamble may include downlink C/Ι information (power control for access grant messages enabled on the downlink in response to access probes, as discussed below), channel quality indication feedback, QoS related information (enabled) Scheduler selection and/or prioritization of starting resource assignments), random ID (reducing the probability of the same access probe coming from different UEs simultaneously arriving at Node B) and cell ID (for scrambling access probes such that the probe is only at the target node B Successfully decoded). An access probe sequence contains an access sequence. The access sequence is derived from the UE downlink C/I, qos information and/or random numbers used to avoid possible collisions. In one aspect, all access sequences are orthogonal. The access sequence is disturbed by a particular cell scrambling sequence prior to transmission. In another aspect, the 'scrambling sequence is not only a function of the cell ID but is also a function of the MAC ID (any type of UE ID is sufficient) in addition to the cell ID. In an aspect, after transmitting the access probe, the method proceeds to 204' to determine whether an access grant is received in response to the access probe. If the access permission is received, then the method proceeds to 206 after decoding the access permission using the information from the access probe. The connection request message (eg, ConnectionOpenRequest) is transmitted at 206 ', and the method waits for a response. At 208, an open connection response message is received in response to opening the connection request message 119652.doc • 14· 1380721 (L〇imeCt1〇n〇penResponse). In another aspect, if the terminal has been assigned a MAC ID (e.g., when the terminal is active), the method described in 206 and 208 is cancelled and the terminal can begin to exchange resources with the access network. . Referring again to 204, if no access permission is received after a predetermined time, the method proceeds to 210. At 210, it is determined if a predetermined maximum number of retransmissions has been reached. If the maximum number of access probe retransmissions has occurred, the method proceeds to #212. At 212, the transmit power is reset to the original level and the access probe is retransmitted. The method proceeds to 204 to check if an access permission has been received. If the maximum number of access probe retransmissions has not been reached, then the method proceeds to 214. At 214, the access probe is retransmitted at a higher power. The method proceeds to 2〇4 to check if an access permission has been received. Referring now to Figure 3, there is illustrated an exemplary method 300 for facilitating receipt of an access probe in a wireless communication system. The method begins at 312 and receives an access probe containing an access sequence. If the access probe is successfully detected, the method proceeds to 3〇4. At 304, the access network generates an access permission. The access grant is associated with access probes and uses information from the received access probes. The access network determines parameters to be provided to the terminal to exchange data with the access network, wherein the terminal is associated with access probes for the terminal. Its: Medium access license includes terminal MAC ID, uplink resource assignment, and uplink adjustment. Access permissions can be disrupted and protected using error correction schemes. If the access permission is transmitted to a plurality of terminals on the broadcast channel, it can be scrambled using information from the access probe so that only the requester can decode the access permission. For example, Node B disturbs the access grant with its received access sequence 119652.doc -15- c s ) 1380721. Only UEs that select the corresponding access sequence can decode the access grant. After the access permission is generated, at 3, 6, the method transmits the access permission and waits for the connection request to be opened. At 3〇8, the open connection request message is received. After verifying the terminal, at 31〇, the transmission opens the connection response message. In another aspect, the method illustrated in Figures 2 through 3 can be applied to a handover scheme. The UE negotiates handover with the source node B. In parallel, source node B negotiates a handover with target node B. The UE transmits a synchronization message towards the target Node B before the UE can begin exchanging data on the target node b. The sync message consists of the access sequence and it is transmitted on the RACH. The scrambling sequence is a function of the target cell m and its MAC ID. When uplink synchronization is achieved, the target node 8 sends an access grant to the UE. In another aspect, the methods illustrated in Figures 4 through 5 are applicable to synchronization. Referring specifically to Figure 4, a method for facilitating a fast access procedure in a wireless communication system (e.g., an OFDM or OFDMA system) is illustrated. This method can be used for synchronization when the terminal loses synchronization or is not synchronized with the access network or is handed over. Method 400 is performed when the terminal determines that it is not synchronized with the access network. If the terminal transitions from active mode to sleep mode, deep fade, or during the handover procedure, the terminal may lose synchronization with the access network. In one aspect, the method begins at 404, and the access terminal transmits an access signature (which may be referred to as an access probe) to the access network (Node B). In one aspect, access probes are transmitted on a random access channel (RACH). Access probes may include downlink key c/i information, channel quality indication feedback, Q〇s related information, random ID, cell id, or]V[AC ID flag. Since this method is used for resynchronization, the terminal can already have a MAC ID and does not need a new MAC ID from the access network. In one aspect, the MAC ID flag of the access probe can be set to indicate that no new MAC ID is required or no MAC ID flag is used. After transmitting the access probe, the method proceeds to 406 where the terminal receives a UL access grant from the access network (Node B) in response to the access probe. In one aspect, the first UL grant message received in response to the access probe may contain information about the UL resource, timing information for adjusting the timing, and the MAC ID portion. In one aspect, the MAC ID portion can be set to NULL for a first UL grant message received in response to an access probe (e.g., a string of zeros or any pattern used to indicate unavailable material). The terminal can ignore the processing of the MAC ID portion of the grant message. When the MAC ID portion is not NULL (the access network has been assigned a new MAC ID), the terminal can then ignore the new MAC ID and use any previously assigned MAC ID stored in the memory. If the terminal does not have an assigned MAC ID, the terminal can use the MAC ID from the access grant message. In another aspect, the access network can provide a MAC ID based on the retrieved information from the access probe. In this aspect, the UL grant message can contain different sets of parameters and the terminal will process the MAC ID portion of the different UL grant messages. Referring to 408, communication with the access network is established using parameters received from the access permissions, wherein the terminal begins to communicate user data. In one aspect, the terminal provides its MAC ID when transmitting on the uplink shared channel. The access network can store this MAC ID in memory. At 410, the terminal receives a second or subsequent UL 119652.doc 17 1380721 permission message from the access network. The terminal processes all of the 1) [MAC out part of the grant message" received after receiving the first UL access grant message (discussed at 406). Thereafter, at 412, the terminal uploads the round user data on the uplink shared channel, but does not provide the MAC ID as part of the subsequent user data transmission. Referring now to Figure 5, illustrated is an example method 500 that facilitates receiving an access probe in a wireless communication system. The method begins at 5〇2 and receives an access probe. If the access probe is successfully detected, the method proceeds to 5〇4. At 504, the access network generates an access permission. The access permission is associated with the access probe and user information from the received access probe. The access network determines parameters to be provided to the terminal to exchange data with the access network, wherein the terminal is associated with access probes for the terminal. The access grant includes an uplink resource assignment and an uplink adjustment. In a bear, the access probe can include a MAC ID flag. If the MAC m flag: accesses the portion of the probe and is set (so the terminal is requesting a network to assign a MAC ID), the MAC ID may be included as part of the access grant message. In another aspect, the access probe does not include any indication of the request MAC 10. In this aspect, in response to the indication that the UL access permission message iMAC m portion transmitted by the access probe is not required, the MAC ID is provided as NULL. In another mode, the access is performed. The probe includes a first indicator. If the first indicator is set, the access network determines that the access is zero rate clear and the access network can only provide timing adjustment or power adjustment. The access network receives the first message after the access permission. The first message may contain the MAC ID or the user profile. At 5〇8, save the second 119652.doc • 18 - 1380721 update the memory to indicate all future messages. (e.g., a second UL access grant message) will use the received MAC ID. Referring now to Figure 6, a wireless communication system 600 is illustrated in accordance with various embodiments presented herein. System 600 can include one or more sectors. One or more base stations 602 (eg, 'access points') that receive or transmit 'repeated (equal) relative to each other and/or relative to one or more mobile devices 6〇4 Wireless communication signal. Each base station 602 can include a transmitter chain and a receiver As will be appreciated by those skilled in the art, each of these chains can include a plurality of components associated with signal transmission and reception (eg, processors, modulators, multiplexers, demodulators, The multiplexer, antenna, etc.) The mobile device 604 can be, for example, a cellular telephone, smart phone, laptop, handheld communication device, handheld computing device, satellite radio for communicating via the wireless communication system 6 , Global Positioning System, pDA, and/or any other suitable device. Base station 602 can broadcast content to mobile device 604 by utilizing OFDM or OFDMA techniques. Frequency-based techniques, such as 〇FDM, typically divide the spectrum into different channels. For example, 'the spectrum can be divided into uniform bandwidth blocks (frequency range). OFDM effectively divides the entire system bandwidth into multiple orthogonal frequency channels. These frequency channels can use synchronous or asynchronous HARQ depending on system requirements. In addition, the OFDM system may use time and/or frequency multiplexing to achieve orthogonality in multiple data transmissions for multiple base stations 602. Referring now to Figure 7A, A system 700 that facilitates fast access in wireless communications. System 700 can include a module for transmitting access probes, 〇2, H9652.doc (S) 1380721, for receiving a first access permission. The module 702, the module 702, 704 and 706 can be a processor or any electronic device, and can be coupled to the memory module 7〇8. 7B, which illustrates a system 750 that facilitates fast access in wireless communications. System 750 can include a module 752 for receiving an access probe and an access for responding to the received access probe. The licensed module 754 and a module 756 for receiving user data. Modules 752 through 756 can be a processor or any electronic device and can be coupled to memory module 760. 8 is an illustration of a terminal or user device 800 that provides for communication with other sectors in a wireless communication environment in accordance with one or more aspects described herein. The terminal 800 includes a receiver 802 that receives a signal (eg, one or more receive antennas) and performs typical actions on the received signal (eg, over/under amplification 'down conversion, etc.) and digitizes the conditioned signal Get samples. Demodulation transformer 804 can demodulate the samples and provide the received pilot symbols to processor 806. Processor 806 can be a processor dedicated to analyzing information received by receiver component 820 and/or generating information regarding transmissions by transmitter 814. The processor 806 can be a processor that controls one or more components of the terminal 800, and/or can generate information and control the terminal 8 for analyzing the information received by the receiver 820, for transmission by the transmitter 814.处理器 One or more components of the processor. The processor 806 can utilize any of the methods described herein, including the method described with respect to Figures 2 through 3. Additionally, the terminal 800 can include an analysis of the received input (including confirmation of success 119652.doc • 20-1380721 transmission). Transmission control component 808. Acknowledgement (ACK) can be received from the serving sector and/or adjacent sectors. The acknowledgment may indicate that a previous transmission has been successfully received and decoded by one of the access points. If no acknowledgment is received, or if a negative acknowledgment (NAK) is received, the transmission can be resent. Transmission control component 808 can be incorporated into processor 806. It should be appreciated that the transmission control component 808 can include a transmission control code that performs an analysis related to determining a receipt confirmation. Terminal 800 can additionally include memory 810 'memory 8 10 operatively coupled to processor 806 and can store information about transmissions, a set of active sectors, methods for controlling transmissions, and information related thereto Information on the lookup table and any other appropriate information regarding the transmission and active sector groups as described herein. It will be appreciated that the data storage component (e. g., memory) described herein can be a volatile memory or a non-volatile memory, or can include both volatile and non-volatile memory. By way of example (non-limiting), non-volatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), and electrically erasable ROM (EEPROM). Or flash memory. Volatile memory can include random access memory (RAM), which acts as external cache memory. By way of example (and without limitation), RAM can be in many forms, such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Memory 810 of the claimed system and method is intended to include, but is not limited to, such or any other suitable type of memory. Processor 806 is coupled to symbol modulator 812 and to transmitter 814 that transmits the modulated signal. 119652.doc -21- 1380721 Figure 9 is an illustration of a system 900 that facilitates communication with other sectors in a communication environment in accordance with various aspects. System 900 includes an access point 902 having a receiver 9' that receives signals from one or more terminals 904 via one or more receive antennas 906 and signals via a plurality of transmit antennas 9A8 Transfer to the or the terminal 904 » The terminal 904 may include a terminal supported by the access point 902 and a terminal 9 〇 4 supported by the adjacent sector. The receive antenna 906 and transmit antenna 908 can be constructed using a single set of antennas in one or more aspects. Receiver 910 can receive information from receive antenna 906 and is operatively associated with a demodulation transformer 912 that demodulates the received information. As will be appreciated by those skilled in the art, receiver 910 can be, for example, a rake receiver (e.g., 'Technology for processing multipath signal components individually using a plurality of fundamental frequency correlators...), MMSE based receivers or Some other suitable receiver for the assigned terminal. Depending on the aspect, multiple receivers (e.g., &apos; one receiver per receive antenna) may be utilized, and the receivers may be in communication with one another to provide improved user data estimates. The demodulated symbols are analyzed by a processor 914 similar to the processor described above with respect to FIG. 10, and coupled to the storage of associated resources associated with the terminal, associated with the terminal, and the like. Information memory 916. The receiver output of each antenna can be processed jointly by receiver 910 and/or processor 914. The modulator 918 can multiplex the signals transmitted by the transmitter 920 to the terminal 904 via the transmit antenna 908. Access point 902 further includes a terminal communication component 922, which may be a processor that is different from processor 914 or integral with processor 914. The terminal communication component 922 can obtain the resource assignment of the terminal supported by the adjacent sector &lt; -5) 119652.doc -22- 1380721. In addition, the terminal communication component 922 can provide assignment information to adjacent sectors of the terminal supported by the access point 902. Assignment information can be provided via the Return_Order. Based on information about the assigned resources, the terminal communication component 922 can direct the detection of transmissions by terminals supported by adjacent sectors and the decoding of the received transmissions. Memory 916 can hold packets received from the terminal prior to receiving the assignment information necessary to decode the packet. The terminal communication component 922 can also control the transmission and reception of acknowledgments for successful reception and decoding of the transmission. It should be appreciated that the terminal communication component 922 can include an entity controlled transmission analysis code associated with assigning resources, identifying soft handover terminals, decoding transmissions, and the like. The terminal analysis code can be correlated with performing inference and/or probability determination and/or statistically based determination using methods based on artificial intelligence, wherein such determinations are related to optimizing terminal performance. FIG. 10 shows an exemplary wireless communication system 100. For the sake of brevity, the wireless communication system 600 depicts only one terminal and two access points. However, it should be appreciated that the system can include one or more access points and/or more than one terminal device 'where additional access points and/or terminals can be substantially similar to the exemplary access points and terminals described below or different. In addition, it will be appreciated that such access points and/or terminals can utilize the systems described herein (Figs. 1, 4-9) and/or methods (Figs. 2-3). Figure 10 is a block diagram showing a terminal 1004, a servo access point ι2 of the support terminal 1004, and an adjacent access point 1002Y in the multi-directional access multi-carrier communication system 1000. At the access point ι〇〇2Χ, the transmission (TX) data processor 119652.doc •23· (S ) 1380721

1014接收來自資料源ι〇12之訊務資料(亦即,資訊位元)及 來自控制器1〇2〇及排程器1〇3〇之信令及其他資訊。舉例而 言’排程器1030可為終端機提供載波指派。此外,記憶體 1022可保持關於當前或先前指派之資訊β τχ資料處理器 ίο 14使用多載波調變(例如,0FDM)編碼並調變所接收之 資料以提供經調變之資料(例如’ OFDM符號)。傳輸器單 7G (TMTR) 10 16接著處理經調變之資料以產生接著自天線 101 8傳輸之下行鏈路調變信號。 在傳輸指派資訊至終端機1〇〇4之前,排程器可提供指派 資訊至存取點1002Y。該指派資訊可經由回程信令(例如, T1線)1010而提供。或者,指派資訊可在傳輸至終端機 1 004之後提供至存取點1002Y。 在終端機1004處,經傳輸及經調變之信號由天線1〇52接 收且提供至接收器單元(RCVR)1〇54。接收器單元1〇54處 理並數位化所接收之信號以提供樣本。接收(RX)資料處理 器1056接著解調變並解碼該等樣本以提供經解碼之資料, 經解碼之資料可包括經恢復之訊務資料、訊息 '信令等 等。該訊務資料可提供至資料槽i㈣,且用於終端機1〇〇4 之載波指派資訊提供至控制器】〇6〇。 控制器1060使用已指派至 指派中加以指示之特定載波 憶體1062可保持關於指派資 碼)之資訊及其他相關資訊。 終端機1004並在所接收之载波 而指引上行鏈路上之傳輸。記 源(例如,頻率、時間及/或代 對於終端機1004 TX資料處理器1〇74接收來自資料源 H9652.doc1014 receives the traffic information (ie, information bits) from the data source ι〇12 and the signaling and other information from the controller 1〇2排 and the scheduler 1〇3〇. For example, the scheduler 1030 can provide a carrier assignment for the terminal. In addition, the memory 1022 can maintain information about the current or previously assigned information τ χ data processor 使用 14 using multi-carrier modulation (eg, OFDM) to encode and modulate the received data to provide modulated data (eg, 'OFDM symbol). Transmitter Single 7G (TMTR) 10 16 then processes the modulated data to produce a downlink modulated signal that is then transmitted from antenna 101 8 . The scheduler can provide assignment information to the access point 1002Y before transmitting the assignment information to the terminal set 1〇〇4. This assignment information may be provided via backhaul signaling (eg, T1 line) 1010. Alternatively, the assignment information may be provided to access point 1002Y after transmission to terminal 1 004. At terminal 1004, the transmitted and modulated signals are received by antenna 1 〇 52 and provided to a receiver unit (RCVR) 1 〇 54. Receiver unit 〇 54 processes and digitizes the received signal to provide samples. Receive (RX) data processor 1056 then demodulates and decodes the samples to provide decoded data, which may include recovered traffic data, message 'signaling, etc. The traffic data can be provided to the data slot i (4), and the carrier assignment information for the terminal 1 to 4 is provided to the controller. The controller 1060 can maintain information about the assigned code and other related information using the particular carrier memory 1062 that has been assigned to indicate in the assignment. The terminal 1004 directs the transmission on the uplink on the received carrier. Source (eg, frequency, time, and/or generation for terminal 1004 TX data processor 1〇74 received from data source H9652.doc

•24· 1380721 1072之訊務資料及來自控制器1〇6〇之信令及其他資訊。各 種類型之資料由ΤΧ資料處理器丨〇74使用經指派載波進行 編碼及調變,且進一步由傳輸器單元1076處理以產生接著 ' 自天線1052傳輸之上行鏈路調變信號》 _ ·. 在存取點丨〇〇2乂及1002Υ處,來自終端機1004之傳輸及 一 調變信號由天線1018接收,由接收器單元1032處理且由 RX資料處理器1034解調變及解碼。所傳輸之信號可基於 ^ 由伺服存取點1002X產生之指派資訊加以解碼並提供至相 鄰存取點1002Y。此外,存取點1〇〇2义及ι〇〇2γ可產生可提 供至另一存取點(1002X或Y)及/或至终端機1〇〇4之殘 認(ACK)。經解碼之信號可提供至資料槽1〇36。接收器單 元1032可估計每一終端機所接收之信號品質(例如,所接 收之〇雜比(SNR))並提供此資訊至控制器1〇2〇。Rx資料 處理器1034提供每一終端機之恢復反饋資訊至控制器1〇2〇 及排程器1030。 • 排程器1030使用反饋資訊執行若干功能,諸如(”選擇 一組終端機用於在反向鏈路上之資料傳輸及(2)指派載波至 選定終端機。經排程之終端機的載波指派接著在前向鏈路 *' 上傳輸至此等终端機。 .. 本文描述之技術可由各種構件實施。舉例而言,此等技 術可以硬體、軟體或其組合實施。若為硬體實施,則用於 此等技術之處理單元(例如,控制器1〇2〇及1〇6〇、τχ及rx 處理器_及1〇34等)可建構於一或多個特殊應用積體電 路(ASIC)、數位信號處理器(DSp)、數位信號處理設備 119652.doc -25- &lt; S &gt; 1380721 (DSPD)、可程式化邏輯設備(PLD)、場可程式化閘陣列 (FPG A)、處理器、控制器、微控制器、微處理器、經設計 以執行本文描述之功能的其他電子單元或其組合内。 若為軟體實施’則本文描述之技術可由執行本文描述之 功能的模組(例如,程序、函式等)實施。軟體代碼可儲存 於§己憶體單元中並由處理器執行。記憶體單元可建構於處 理器内或處理器外’在後種情況下記憶體單元可經由此項 技術中已知之各種構件通信地耦接至處理器。 上文描述之内容包括一或多個態樣之實例。當然在描述 前述態樣中’不可能描述組件或方法之每一可能組合,但 一般熟習此項技術者可認識到各種態樣之許多進一步組合 及排列亦是可能的。因此,所描述之態樣意欲囊括隨附申 請專利範圍之精神及範疇内之所有此等替代、修改及改 變。此外,就術語&quot;包括&quot;用於實施方式或申請專利範圍的 程度而言,該術語意欲以類似於術語&quot;包含&quot;之方式(如,,包 含&quot;用作請求項中之過渡詞時所解釋)而為包括性的。 【圖式簡單說明】 圖1為在無線通信環境中實現最佳下行鏈路傳輸之實例 系統的說明β 圖2為便利於由無線通信系統中之存取點使用之一系統 類型的實例方法的說明。 圖3為便利於由無線通信系統中之存取點使用之—系統 類型的實例方法的說明。 、 圖4為根據本文陳述之各箱能样&gt; , 合禋態樣之便利於無線通信系統 119652.doc -26 - 1380721 中快速存取程序的方法。 圖5為便利於接收無線通信系統中之存取探測之實例方 法。 圖6說明根據本文呈現之各種實施例的無線通信系統。 圖7A及圖7B說明便利於無線通信中之快速存取的系 統。 圖8說明根據本文陳述之一或多個態樣提供無線通信環 境中之其他扇區通信之終端設備或使用者設備。 圖9為根據各種態樣之便利於通信環境中之其他扇區通 信的系統的說明。 圖10說明根據各種態樣之例示性無線通信系統。 【主要元件符號說明】 100 系統 102 基地台 104 行動設備 106 最佳化組件 108 接收組件 600 無線通信系統 602 基地台 604 行動設備 700 系統 702 用於傳輸存取探測之模組 704 用於接收一第一存取許可之模組 706 用於傳輸使用者資料之模組 119652.doc -27- 1380721 708 記憶體模組 750 系統 752 用於接收一存取探測之模組 754 用於產生一存取許可之模組 756 用於接收使用者資料之模組 760 記憶體模組 800 終端機/使用者設備 802 接收器 804 解調變器 806 處理器 808 傳輸控制組件 810 記憶體 812 調變器 814 傳輸器 900 系統 902 存取點 904 終端機 906 接收天線 908 傳輸天線 910 接收器 912 解調變器 914 處理器 916 記憶體 918 調變器 119652.doc .28. 1380721• 24· 1380721 1072 traffic information and signaling and other information from the controller. The various types of data are encoded and modulated by the data processor 74 using the assigned carrier and further processed by the transmitter unit 1076 to produce an uplink modulated signal that is then transmitted from the antenna 1052. At access points 1002乂 and 1002Υ, the transmission from terminal 1004 and a modulated signal are received by antenna 1018, processed by receiver unit 1032 and demodulated and decoded by RX data processor 1034. The transmitted signal can be decoded based on the assignment information generated by the servo access point 1002X and provided to the adjacent access point 1002Y. In addition, access points 1 〇〇 2 and ι 〇〇 2 γ can generate an acknowledgment (ACK) that can be provided to another access point (1002X or Y) and/or to terminal 1 〇〇4. The decoded signal can be provided to data slot 1〇36. Receiver unit 1032 can estimate the signal quality (e.g., received noisy ratio (SNR)) received by each terminal and provide this information to controller 1〇2〇. The Rx data processor 1034 provides recovery feedback information for each terminal to the controller 1 〇 2 〇 and the scheduler 1030. • Scheduler 1030 uses feedback information to perform several functions, such as ("selecting a group of terminals for data transmission on the reverse link and (2) assigning carriers to selected terminals. Carrier assignment of scheduled terminals) It is then transmitted to the terminals on the forward link*'.. The techniques described herein may be implemented by various components. For example, such techniques may be implemented in hardware, software, or a combination thereof. Processing units for such techniques (eg, controllers 1〇2〇 and 1〇6〇, τχ and rx processors_ and 1〇34, etc.) may be constructed in one or more special application integrated circuits (ASICs) , digital signal processor (DSp), digital signal processing equipment 119652.doc -25- &lt; S &gt; 1380721 (DSPD), programmable logic device (PLD), field programmable gate array (FPG A), processing , controllers, microcontrollers, microprocessors, other electronic units designed to perform the functions described herein, or a combination thereof. If implemented for software, the techniques described herein may be performed by modules that perform the functions described herein ( For example, programs, functions, etc. The software code can be stored in the § memory unit and executed by the processor. The memory unit can be built into or outside the processor. In the latter case, the memory unit can be known by the art. The various components are communicatively coupled to the processor. The above description includes examples of one or more aspects. Of course, in describing the foregoing aspects, it is not possible to describe every possible combination of components or methods, but is generally familiar with this item. A person skilled in the art will recognize that many further combinations and permutations of the various aspects are possible. It is therefore intended to cover all such alternatives, modifications and variations within the spirit and scope of the appended claims. To the extent that the term &quot;includes&quot; is used in the context of an embodiment or patent application, the term is intended to be in a manner similar to the term &quot;include&quot; (eg, contains &quot; when used as a transitional word in a request item Illustrated) is inclusive. [Simplified Schematic] FIG. 1 is an illustration of an example system for achieving optimal downlink transmission in a wireless communication environment. FIG. An illustration of an example method of a system type used by an access point in a wireless communication system. Figure 3 is an illustration of an example method that facilitates use of an access point in a wireless communication system. According to the various box energies described herein, the method of facilitating the fast access procedure in the wireless communication system 119652.doc -26 - 1380721. Figure 5 is an access probe for facilitating reception in a wireless communication system. Example Method. Figure 6 illustrates a wireless communication system in accordance with various embodiments presented herein.Figures 7A and 7B illustrate a system that facilitates fast access in wireless communication. Figure 8 illustrates one or more aspects as set forth herein. A terminal device or user device that provides communication with other sectors in a wireless communication environment. Figure 9 is an illustration of a system that facilitates communication with other sectors in a communication environment in accordance with various aspects. Figure 10 illustrates an exemplary wireless communication system in accordance with various aspects. [Main component symbol description] 100 system 102 base station 104 mobile device 106 optimization component 108 receiving component 600 wireless communication system 602 base station 604 mobile device 700 system 702 for transmission access detection module 704 for receiving a Module 706 for accessing user data 119652.doc -27- 1380721 708 Memory module 750 system 752 is configured to receive an access probe module 754 for generating an access permission Module 756 for receiving user data module 760 memory module 800 terminal/user device 802 receiver 804 demodulator 806 processor 808 transmission control component 810 memory 812 modulator 814 transmitter 900 System 902 Access Point 904 Terminal 906 Receive Antenna 908 Transmission Antenna 910 Receiver 912 Demodulation Transformer 914 Processor 916 Memory 918 Modulator 119652.doc .28. 1380721

920 傳輸器 922 終端機通信組件 1000 無線通信系統 1002X 伺服存取點 1002Y 存取點 1004 终端機 1010 回程信令 1012 資料源 1014 TX資料處理器 1016 傳輸器單元 1018 天線 1020 控制器 1022 記憶體 1030 排程器 1032 接收器單元 1034 RX資料處理器 1036 資料槽 1052 天線 1054 接收器單元 1056 接收(RX)資料處理器 1058 資料槽 1060 控制器 1062 記憶體 1072 資料源 119652.doc -29- 1380721 1074 TX資料處理器 1076 傳輸器單元920 transmitter 922 terminal communication component 1000 wireless communication system 1002X servo access point 1002Y access point 1004 terminal 1010 backhaul signaling 1012 data source 1014 TX data processor 1016 transmitter unit 1018 antenna 1020 controller 1022 memory 1030 row Receiver 1032 Receiver Unit 1034 RX Data Processor 1036 Data Slot 1052 Antenna 1054 Receiver Unit 1056 Receive (RX) Data Processor 1058 Data Slot 1060 Controller 1062 Memory 1072 Data Source 119652.doc -29- 1380721 1074 TX Data Processor 1076 transmitter unit

119652.doc 30-119652.doc 30-

Claims (1)

第096109820號專利申請案 十、申請專利範圍: 中文申請專利範圍替換本_年7月 種在一無線通信系统中快速存取之方法,該方法包 含: 傳輸一存取探測; 2. 3. 4. 6.Patent Application No. 096,109, 820, Patent Application Scope: Chinese Patent Application Scope Replaces the method of fast access in a wireless communication system in July, the method includes: transmitting an access probe; 2. 3. 4 6. 一第一存取許可,其中該第一存取許可包含表示 —隨機選定之第-終端機識別之一部分;及 使用第一終端機識別以傳輸一訊息,其中該第二終 :機識別不等於該隨機選定之第一終端機識別且其中 該第二終端機識別係、為儲存於—記憶體t之—先前指派 之終端機識別。 如請求項1之方法,其進一步包含接收包含一第一媒體 存取控制朗符(MAC: ID)H存取許可,其中該第 MAC ID等於該第二終端機識別》 如4求項2之方法’其進一步包含傳輸隨後使用者資料 而不傳輸該第一 MACIDe ^求項1之方法,其進一步包含在該傳輸該存取探測 之刖確定是否丟失與一存取網路之同步。 ^ 之方法,其進一步包含在該傳輸該存取探測 之前確定—終蠕機之一狀態是否為睡眠模式。 S項1之方法,其進一步包含若在一第一時間週期 ^未接收Si丨該第—存取許可則在傳輸該第二存取探測之 則增加傳輸一第二存取探測之傳輸功率。 種在一無線通信系統中快速存取之方法,該方 含: 119652-1010712.doc 1380721 接收—存取探測; 回應於接收到該存取探測而產生一存取許可’其中該 存取許可包含表示一隨機選定之第一終端機識別之一部 分;及 接收包含一第二終端機識別之一訊息,該第二終端機 識別並不包括於該存取許可中。 8. ^凊求項7之方法,其進一步包含傳輸一第二存取許 可該第一存取許可包含擷取自該訊息之該第二終端機 識別。 φ 9·如明求項8之方法,其進一步包含接收隨後使用者資料 而無需該隨機選定之第一終端機識別。 10如請求項7之方法,其進一步包含傳輸一第二存取許 可,该第二存取許可包含擷取自記憶體之該隨機選定之 第一終端機識別。 11. 一種在一無線通信系統中可操作之裝置,該裝置包含: 用於傳輸一存取探測之構件; 用於接收-第-存取許可之構件,其中該第一存取許 · 可包含表示用於該裝置之一隨機選定之第一識別之一部 分;及 用於使用用於該裝置之-第二識別以傳輸一訊息之構 件,其中該第二識別不等於該隨機選定之第一識別,且 其中該第二識別係為儲存於一記憶體中之一先前指派之 識別。 12.如請求仙之裝置,其進—步包含用於接收包含―第一 II9652-J0I0712.doc Sr • 2 - 1380721 媒體存取控制識別符(MAC ID)之一第二存取許可之構 件’其中該第一 MAC ID等於該第二識別。 13·如請求項12之裝置,其進一步包含用於傳輸隨後使用者 資料而不傳輸該第一 MAC ID之構件。 I4·如請求項11之裝置,其進一步包含用於在該傳輪該存取 探測之前確定是否丟失與一存取網路之同步之構件。 15·如請求項u之裝置,其進一步包含用於在該傳輸該存取 探測之前確定一終端機之一狀態是否為睡眠模式之構 件。 16·如請求項u之裝置,其進一步包含用於若在一第—時間 週期内未接收到該第一存取許可則在傳輸該第二存取探 測之前增加傳輸一第二存取探測之傳輸功率之構件。 17· —種在一無線通信系統中可操作之裝置,該裝置包含: 用於接收一存取探測之構件; 用於回應於接收到該存取探測而產生一存取許可之構 件’其中該存取許可包含表示一隨機選定之第一終端機 識別之一部分;及 用於接從包含一第二終端機識別之一訊息之構件,該 第二終端機識別並不包括於該存取許可中。 18. 如請求項丨7之裝置,其進一步包含用於傳輸—第二存取 許可之構件,該第二存取許可包含擷取自該訊息之該第 二終端機識別^ 19. 如請求項18之裝置,其進一步包含用於接收隨後使用者 資料而無需傳輸該隨機選定之第一終端機識別之構件。 119652-10I0712.doc 20. 如請求項17之裝置,其進一步包含用於傳輸一第二存取 許可之構件,該第二存取許可包含擷取自記憶體之該隨 機選定之第一終端機識別。 21. —種其上儲存有電腦可執行指令之電腦可讀媒體’其用 於執行以下指令: 傳輸一存取探測; 接收一第一許可訊息,其中該第一許可訊息包含表示 一隨機選定之第一終端機識別之一部分;及 使用一第二終端機識別以傳輸一訊息,其中該第二終 端機識別不等於該隨機選定之第一終端機識別,且其中 該第二終端機識別係為儲存於一記憶體中之一先前指派 之終端機識別。 22‘ 一種其上儲存有電腦可執行指令之電腦可讀媒體,其用 於執行以下指令: 接收一存取探測; 回應於接收到該存取探測而產生一存取許可,其中2 存取許可包含表示一隨機選定之第一終端機識別之—立 分;及 接收包含一第二終端機識別之一訊息,該第二識別 不包括於該存取許可中。 23. —種積體電路,其包含: 用於傳輸一存取探測之構件; 用於接收一第一許可訊息之構件,其中該第一 息包含表示一隨機選定之第一终端機識別之一 〃,及 119652-1010712.doc 用於使用-第二終端機識別以傳輸一訊息之構件,其 中該第二終端機識別不等於該隨機選定之第一终端機識 別’且其t該第二終端機識別係為儲存於一記憶體中^ 一先前指派之終端機識別。 24· —種積體電路,其包含: 用於接收一存取探測之構件; 用於回應於接收到該存取探測而產生一存取許可之構 件’其中該存取許可包含表示—隨機敎之第_終端機 識別之一部分;及 用於接收包含-第二終端機識別之一訊息之構件,該 第二識別並不包括於該存取許可中。 25.種在一無線通信系統中可操作之電子設備,該電子設 備包含: 一傳輸器,該傳輸器傳輸一存取探測; 一接收器,該接收器接收一第一許可訊息,其中該第 一許可訊息包含表示用於該電子設備之一隨機選定之第 —識別之一部分;及 該傳輸器使用用於該電子設備之一第二識別以傳輸一 訊息,其中該第二識別不等於該隨機選定之第一識別, 且其中該第二識別係為儲存於該電子設備之一記憶體中 之一先前指派之識別。 26. —種在一無線通信系統中可操作之電子設備,該電子設 備包含: 一接收器’該接收器接收一存取探測; U9652-10I07l2.doc 1380721 /處理器’該處理器回應於 &gt; *•社订甘a 设叹到該存取探測而產生 存取許叮’其中該存取許可包合矣- 寸 表不一隨機選定之第 一终端機識別之一部分;及 該接收器進一步接收包含一第二終端機識別之一訊 息,該第二終端機識別並不包括於該存取許可中。a first access permission, wherein the first access permission comprises a portion representing a randomly selected first-terminal identification; and using the first terminal identification to transmit a message, wherein the second final: machine identification is not equal The randomly selected first terminal identifies and wherein the second terminal identification is for the previously assigned terminal identification stored in the memory t. The method of claim 1, further comprising receiving a first media access control languator (MAC: ID) H access permission, wherein the first MAC ID is equal to the second terminal identification ” The method 'further includes the method of transmitting subsequent user data without transmitting the first MACIDe ^ claim 1, further comprising determining whether to lose synchronization with an access network after transmitting the access probe. The method of ^, further comprising determining whether the state of one of the end worms is a sleep mode prior to transmitting the access probe. The method of item 1, further comprising increasing the transmission power of transmitting a second access probe while transmitting the second access probe if the first access grant is not received in a first time period. A method for fast access in a wireless communication system, the party comprising: 119652-1010712.doc 1380721 receiving-access probe; generating an access permission in response to receiving the access probe, wherein the access license includes Representing a randomly selected first terminal identification portion; and receiving a message including a second terminal identification, the second terminal identification not included in the access permission. 8. The method of claim 7, further comprising transmitting a second access grant, the first access grant comprising the second terminal identification retrieved from the message. The method of claim 8, further comprising receiving subsequent user data without the randomly selected first terminal identification. 10. The method of claim 7, further comprising transmitting a second access grant comprising the randomly selected first terminal identification retrieved from the memory. 11. A device operable in a wireless communication system, the device comprising: means for transmitting an access probe; means for receiving a - access permission, wherein the first access may include Representing a portion of a first identification for random selection of one of the devices; and means for transmitting a message using a second identification for the device, wherein the second identification is not equal to the randomly selected first identification And wherein the second identification is an identification of one of the previously assigned ones stored in a memory. 12. If the device is requested, the step further comprises means for receiving a second access permission including one of the first II9652-J0I0712.doc Sr • 2 - 1380721 media access control identifier (MAC ID). The first MAC ID is equal to the second identifier. 13. The device of claim 12, further comprising means for transmitting subsequent user data without transmitting the first MAC ID. I4. The apparatus of claim 11, further comprising means for determining whether to lose synchronization with an access network prior to the forwarding of the access probe. 15. The apparatus of claim 9, further comprising means for determining whether a state of a terminal is a sleep mode prior to transmitting the access probe. 16. The apparatus of claim 9, further comprising: for transmitting a second access probe prior to transmitting the second access probe if the first access grant is not received within a first time period The component of transmission power. 17. A device operable in a wireless communication system, the device comprising: means for receiving an access probe; means for generating an access permission in response to receiving the access probe The access permission includes a portion indicating a randomly selected first terminal identification; and means for receiving a message including a second terminal identification, the second terminal identification is not included in the access permission . 18. The device of claim 7, further comprising means for transmitting - a second access grant, the second access grant comprising the second terminal identification retrieved from the message. The apparatus of 18, further comprising means for receiving subsequent user data without transmitting the randomly selected first terminal identification. 119652-10I0712.doc 20. The device of claim 17, further comprising means for transmitting a second access permission, the second access permission comprising the randomly selected first terminal device retrieved from the memory Identification. 21. A computer readable medium having stored thereon computer executable instructions for performing the following instructions: transmitting an access probe; receiving a first grant message, wherein the first grant message comprises indicating a randomly selected Identifying, by the second terminal, a message, wherein the second terminal identification is not equal to the randomly selected first terminal identification, and wherein the second terminal identification is A previously assigned terminal identification stored in a memory. 22' A computer readable medium having stored thereon computer executable instructions for executing the following instructions: receiving an access probe; generating an access permission in response to receiving the access probe, wherein 2 access permissions And including receiving a second terminal identification that is randomly selected; and receiving a message including a second terminal identification, the second identification is not included in the access permission. 23. An integrated circuit comprising: means for transmitting an access probe; means for receiving a first grant message, wherein the first message comprises one of a first terminal identification indicating a random selection 〃, and 119652-1010712.doc for using the second terminal to identify a component for transmitting a message, wherein the second terminal identification does not equal the randomly selected first terminal identification 'and its t the second terminal The machine identification is stored in a memory and is a previously assigned terminal identification. An integrated circuit comprising: means for receiving an access probe; means for generating an access permission in response to receiving the access probe, wherein the access grant includes a representation - a random And a part of the terminal identification; and means for receiving a message including the second terminal identification, the second identification is not included in the access permission. 25. An electronic device operable in a wireless communication system, the electronic device comprising: a transmitter that transmits an access probe; a receiver that receives a first grant message, wherein the A permission message includes a portion identifying a first-identification for one of the electronic devices; and the transmitter uses a second identification for the electronic device to transmit a message, wherein the second identification is not equal to the random The first identification selected, and wherein the second identification is an identification of a previously assigned one of the memories stored in one of the electronic devices. 26. An electronic device operable in a wireless communication system, the electronic device comprising: a receiver 'the receiver receives an access probe; U9652-10I07l2.doc 1380721 / processor' the processor responds to &gt *• The agency subscribes to the access probe and generates access to the license. Receiving a message including a second terminal identification, the second terminal identification is not included in the access permission. 119652-1010712.doc 6 S· 1380721 第096109820號專利申請案 中文圖式替換頁Π01主7月)119652-1010712.doc 6 S· 1380721 Patent application No. 096109820 Chinese pattern replacement page Π 01 main July) mWig-I010712.docmWig-I010712.doc
TW96109820A 2007-03-21 2007-03-21 An apparatus and method for fast access in a wireless communication system TWI380721B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW96109820A TWI380721B (en) 2007-03-21 2007-03-21 An apparatus and method for fast access in a wireless communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW96109820A TWI380721B (en) 2007-03-21 2007-03-21 An apparatus and method for fast access in a wireless communication system

Publications (2)

Publication Number Publication Date
TW200840391A TW200840391A (en) 2008-10-01
TWI380721B true TWI380721B (en) 2012-12-21

Family

ID=44821145

Family Applications (1)

Application Number Title Priority Date Filing Date
TW96109820A TWI380721B (en) 2007-03-21 2007-03-21 An apparatus and method for fast access in a wireless communication system

Country Status (1)

Country Link
TW (1) TWI380721B (en)

Also Published As

Publication number Publication date
TW200840391A (en) 2008-10-01

Similar Documents

Publication Publication Date Title
EP2047703B1 (en) An apparatus and method for fast access in a wireless communication system
US9232537B2 (en) Apparatus and method for fast access in a wireless communication system
CA2800819C (en) Mobile station apparatus, base station apparatus, radio communication system, radio communication method, and integrated circuit
WO2018016438A1 (en) Terminal device, base station device, communication method, and integrated circuit
TWI343730B (en) An apparatus and method for hybrid automatic repeat request
AU2017247235A1 (en) Reception device and transmission device
WO2020194924A1 (en) Terminal and transmission method
TWI380721B (en) An apparatus and method for fast access in a wireless communication system
RU2788520C1 (en) Terminal and method for transmission
Kim et al. Enhanced random access method with a coverage level and subcarrier spacing in NB-IoT systems
BRPI0708972A2 (en) device and method for quick access in a wireless communication system