WO2008100009A1 - Methods and procedures for high speed ue access - Google Patents

Methods and procedures for high speed ue access Download PDF

Info

Publication number
WO2008100009A1
WO2008100009A1 PCT/KR2007/006493 KR2007006493W WO2008100009A1 WO 2008100009 A1 WO2008100009 A1 WO 2008100009A1 KR 2007006493 W KR2007006493 W KR 2007006493W WO 2008100009 A1 WO2008100009 A1 WO 2008100009A1
Authority
WO
WIPO (PCT)
Prior art keywords
sequences
mobile terminal
network
random access
generated
Prior art date
Application number
PCT/KR2007/006493
Other languages
French (fr)
Inventor
Dragan Vujcic
Yeong-Hyeon Kwon
Original Assignee
Lg Electronics Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lg Electronics Inc. filed Critical Lg Electronics Inc.
Priority to CN2007800511999A priority Critical patent/CN101606334B/en
Priority to BRPI0721302-6A priority patent/BRPI0721302A2/en
Priority to EP07851464.3A priority patent/EP2119059B1/en
Priority to JP2009548983A priority patent/JP4934203B2/en
Priority to MX2009008273A priority patent/MX2009008273A/en
Priority to CA2675929A priority patent/CA2675929C/en
Publication of WO2008100009A1 publication Critical patent/WO2008100009A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J13/00Code division multiplex systems
    • H04J13/0007Code type
    • H04J13/0055ZCZ [zero correlation zone]
    • H04J13/0059CAZAC [constant-amplitude and zero auto-correlation]
    • H04J13/0062Zadoff-Chu
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/12Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/004Transmission of channel access control information in the uplink, i.e. towards network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0866Non-scheduled access, e.g. ALOHA using a dedicated channel for access

Definitions

  • the present invention is directed to a mobile terminal random access procedure for obtaining uplink time synchronization and access to a network and specifically to an apparatus and method that allows a mobile terminal to correctly map signature indexes onto cyclic shifted Zadoff-Chu (ZC) sequences when the deployed cells support a high-speed mobility by informing a mobile terminal whether a cell supports high-speed mobility.
  • ZC Zadoff-Chu
  • a universal mobile telecommunication system is a European-type, third generation IMT-2000 mobile communication system that has evolved from a European standard known as Global System for Mobile communications (GSM).
  • GSM Global System for Mobile communications
  • UMTS is intended to provide an improved mobile communication service based upon a GSM core network and wideband code division multiple access (W-CDMA) wireless connection technology.
  • W-CDMA wideband code division multiple access
  • 3GPP Third Generation Partnership Project
  • TSG technical specification groups
  • RAN radio access network
  • UTRAN UMTS terrestrial radio access network
  • FIG. 1 provides an overview of a UMTS network.
  • the UMTS network includes a mobile terminal or user equipment (UE) 1, a UTRAN 2 and a core network (CN) 3.
  • UE mobile terminal or user equipment
  • UTRAN 2 a UTRAN 2
  • CN core network
  • the UTRAN 2 includes several radio network controllers (RNCs) 4 and NodeBs 5 that are connected via the I ub interface. Each RNC 4 controls several NodeBs 5. Each NodeB 5 controls one or several cells, where a cell covers a given geographical area on a given frequency.
  • RNC 4 is connected via the Iu interface to the CN 3 or towards the mobile switching center (MSC) 6 entity of the CN and the general packet radio service (GPRS) support Node (SGSN) 7 entity.
  • MSC mobile switching center
  • GPRS general packet radio service
  • SGSN general packet radio service
  • RNCs 4 can be connected to other RNCs via the Iur interface.
  • the RNC 4 handles the assignment and management of radio resources and operates as an access point with respect to the CN 3.
  • the NodeBs 5 receive information sent by the physical layer of the UE 1 via an uplink and transmit data to the UE 1 via a downlink.
  • the Node-Bs 5 operate as access points of the UTRAN 2 for the UE 1.
  • the SGSN 7 is connected to the equipment identity register (EIR) 8 via the Gf interface, to the MSC 6 via the G s interface, to the gateway GPRS support node (GGSN) 9 via the G N interface, and to the home subscriber server (HSS) via the G R interface.
  • EIR equipment identity register
  • GGSN gateway GPRS support node
  • HSS home subscriber server
  • the EIR 8 hosts lists of UEs 1 that are allowed to be used on the network.
  • the EIR 8 also hosts lists of UEs 1 that are not allowed to be used on the network.
  • MGW media gateway
  • the MGW 11 is connected towards the HSS 10 via the C interface and also to the public switched telephone network (PSTN).
  • PSTN public switched telephone network
  • the MGW 11 also allows the codecs to adapt between the PSTN and the connected RAN.
  • the GGSN 9 is connected to the HSS 10 via the GC interface and to the Internet via the GI interface.
  • the GGSN 9 is responsible for routing, charging and separation of data flows into different radio access bearers (RABs).
  • RABs radio access bearers
  • the HSS 10 handles the subscription data of users.
  • the UTRAN 2 constructs and maintains an RAB for communication between a UE 1 and the CN 3.
  • the CN 3 requests end-to-end quality of service (QoS) requirements from the RAB and the RAB supports the QoS requirements set by the CN 3. Accordingly, the UTRAN 2 can satisfy the end-to-end QoS requirements by constructing and maintaining the RAB.
  • QoS quality of service
  • the services provided to a specific UE 1 are roughly divided into CS services and packet switched (PS) services.
  • CS services packet switched services
  • PS packet switched
  • the RNCs 4 are connected to the MSC 6 of the CN 3 and the MSC is connected to the gateway MSC (GMSC) that manages the connection with other networks in order to support CS services.
  • the RNCs 4 are connected to the SGSN 7 and the gateway GGSN 9 of the CN 3 to support PS services.
  • the SGSN 7 supports packet communications with the RNCs.
  • the GGSN 9 manages the connection with other packet switched networks, such as the Internet.
  • FIG. 2 illustrates a structure of a radio interface protocol between a UE 1 and the
  • the radio interface protocol has horizontal layers comprising a physical layer, a data link layer, and a network layer, and has vertical planes comprising a user plane (U-plane) for transmitting user data and a control plane (C-plane) for transmitting control information.
  • the U-plane is a region that handles traffic information with the user, such as voice or Internet protocol (IP) packets.
  • the C-plane is a region that handles control information for an interface with a network as well as maintenance and management of a call.
  • the protocol layers can be divided into a first layer (Ll), a second layer (L2), and a third layer (L3) based on the three lower layers of an open system interconnection (OSI) standard model.
  • OSI open system interconnection
  • the first layer (Ll), or physical layer provides an information transfer service to an upper layer by using various radio transmission techniques.
  • the physical layer is connected to an upper layer, or medium access control (MAC) layer, via a transport channel.
  • MAC medium access control
  • the MAC layer and the physical layer exchange data via the transport channel.
  • the second layer includes a MAC layer, a radio link control (RLC) layer, a broadcast/multicast control (BMC) layer, and a packet data convergence protocol (PDCP) layer.
  • the MAC layer handles mapping between logical channels and transport channels and provides allocation of the MAC parameters for allocation and re- allocation of radio resources.
  • the MAC layer is connected to an upper layer, or the radio link control (RLC) layer, via a logical channel.
  • a control channel is generally used to transmit information of the C-plane and a traffic channel is used to transmit information of the U-plane.
  • a logical channel may be a common channel or a dedicated channel depending on whether the logical channel is shared.
  • FIG. 3 illustrates the different logical channels that exist.
  • Logical channels include a dedicated traffic channel (DTCH), a dedicated control channel (DCCH), a common traffic channel (CTCH), a common control channel (CCCH), a broadcast control channel (BCCH), and a paging control channel (PCCH), or a Shared Control Channel (SCCH), as well as other channels.
  • the BCCH provides information including information utilized by a UE 1 to access a system.
  • the PCCH is used by the UTRAN 2 to access a UE 1.
  • the MBMS point- to-multipoint control channel (MCCH) is used for transmission of MBMS control in- formation.
  • the MBMS point-to-multipoint traffic channel (MTCH) is used for transmitting MBMS service data.
  • the MBMS scheduling channel (MSCH) is used to transmit scheduling information.
  • the MAC layer is connected to the physical layer by transport channels.
  • the MAC layer can be divided into a MAC-b sub-layer, a MAC-d sub-layer, a MAC-c/sh sublayer, a MAC-hs sub-layer and a MAC-m sublayer according to the type of transport channel being managed.
  • the MAC-b sub-layer manages a broadcast channel (BCH), which is a transport channel handling the broadcasting of system information.
  • BCH broadcast channel
  • the MAC-c/sh sub-layer manages a common transport channel, such as a forward access channel (FACH) or a downlink shared channel (DSCH), which is shared by a plurality of UEs 1, or in the uplink the radio access channel (RACH).
  • FACH forward access channel
  • DSCH downlink shared channel
  • the MAC-m sublayer may handle MBMS data.
  • FIG. 4 illustrates the possible mapping between the logical channels and the transport channels from a UE 1 perspective.
  • FIG. 5 illustrates the possible mapping between the logical channels and the transport channels from a UTRAN 2 perspective.
  • the MAC-d sub-layer manages a dedicated channel (DCH), which is a dedicated transport channel for a specific UE 1.
  • DCH dedicated channel
  • the MAC-d sublayer is located in a serving RNC 4 (SRNC) that manages a corresponding UE 1.
  • SRNC serving RNC 4
  • One MAC-d sublayer also exists in each UE 1.
  • the RLC layer supports reliable data transmissions and performs segmentation and concatenation on a plurality of RLC service data units (SDUs) delivered from an upper layer depending of the RLC mode of operation.
  • the RLC layer adjusts the size of each RLC SDU received from the upper layer in an appropriate manner based upon processing capacity and then creates data units by adding header information.
  • the data units, or protocol data units (PDUs) are transferred to the MAC layer via a logical channel.
  • the RLC layer includes a RLC buffer for storing the RLC SDUs and / or the RLC PDUs.
  • the BMC layer schedules a cell broadcast (CB) message transferred from the CN 3.
  • CB cell broadcast
  • the BMC layer broadcasts the CB message to UEs 1 positioned in a specific cell or cells.
  • the PDCP layer is located above the RLC layer.
  • the PDCP layer is used to transmit network protocol data, such as the IPv4 or IPv6, efficiently on a radio interface with a relatively small bandwidth.
  • the PDCP layer reduces unnecessary control information used in a wired network, a function called header compression, for this purpose.
  • the RRC layer controls the transport channels and the physical channels in relation to setup, reconfiguration, and the release or can- cellation of the radio bearers (RBs).
  • a RB signifies a service provided by the second layer (L2) for data transmission between a UE 1 and the UTRAN 2.
  • the set up of the RB generally refers to the process of stipulating the characteristics of a protocol layer and a channel required for providing a specific data service and setting the respective detailed parameters and operation methods.
  • the RRC also handles user mobility within the RAN and additional services, such as location services.
  • the different transport channels are mapped onto different physical channels.
  • the configuration of the physical channels is given by RRC signaling exchanged between the RNC 4 and the UE l.
  • Initial access is a procedure whereby a UE 1 sends a first message to the UTRAN 2 using a common uplink channel, specifically the Random Access Channel (RACH).
  • RACH Random Access Channel
  • the initial access procedure involves the UE 1 transmitting a connection request message that includes a reason for the request and receiving a response from the UTRAN 2 indicating the allocation of radio resources for the requested reason.
  • Table I indicates the establishment causes specified in UMTS, specifically in 3GPP TS 25.331.
  • the "originating call” establishment cause indicates that the UE 1 wants to setup a connection, for example, a speech connection.
  • the "terminating call” establishment cause indicates that that UE 1 answers to paging.
  • the “registration” establishment cause indicates that that the user wants to register only to the network.
  • a physical random access procedure is used to send information over the air.
  • the physical random access transmission is under control of a higher layer protocol, which performs important functions related to priority and load control. This procedure differs between GSM and UMTS radio systems.
  • the transport channels are channels supplied by the physical layer to the protocol layer of the MAC layer. There are several types of transport channels to transmit data with different properties and transmission formats over the physical layer.
  • Duplex (FDD) mode and are generally based on a layer configuration of radio frames and timeslots.
  • the form of radio frames and timeslots depends on the symbol rate of the physical channel.
  • a radio frame is the minimum unit in the decoding process, consisting of 15 time slots.
  • a time slot is the minimum unit in the Layer 1 bit sequence. Therefore, the number of bits that can be accommodated in one time slot depends on the physical channel.
  • the transport channel RACH is an uplink common channel used for transmitting control information and user data.
  • the transport channel RACH is utilized in random access and used for low-rate data transmissions from a higher layer.
  • the RACH is mapped to an uplink physical channel, specifically the PRACH.
  • the AICH is a downlink common channel, which exists as a pair with PRACH used for random access control.
  • the transmission of PRACH is based on a slotted ALOHA approach with fast acquisition indication.
  • the UE randomly selects an access resource and transmits a RACH preamble part of a random access procedure to the network.
  • a preamble is a short signal that is sent before the transmission of the RACH connection request message.
  • the UE 1 repeatedly transmits the preamble by increasing the transmission power each time the preamble is sent until it receives the Acquisition Indicator (AI) on AICH, which indicates the detection of the preamble by the UTRAN 2.
  • the UE 1 stops the transmission of the preamble once it receives the AI and sends the message part at the power level equal to the preamble transmission power at that point, adding an offset signaled by the UTRAN 2.
  • FIG. 6 illustrates a power ramping procedure.
  • This random access procedure avoids a power ramping procedure for the entire message.
  • a power ramping procedure would create more interference due to unsuccessfully sent messages and would be less efficient due to a larger delay since it would take much more time to decode the message before an acknowledgement could be transmitted to indicate successful receipt of the message.
  • the main characteristics of the RACH is that it is a contention based channel subject to collisions due to simultaneous access of several users, which may preclude decoding of the initial access message by the network.
  • the UE 1 can start the random access transmission of both preambles and message only at the beginning of an access slot. This access method is, therefore, a type of slotted ALOHA approach with fast acquisition indication
  • the time axis of both the RACH and the AICH is divided into time intervals or access slots. There are 15 access slots per two frames, with each frame having a length of 10 ms or 38400 chips, and the access slots are spaced 1.33 ms or 5120 chips apart.
  • FIG. 7 illustrates the number and spacing of access slots.
  • the UTRAN 2 signals information regarding which access slots are available for random access transmission and the timing offsets to use between RACH and AICH, between two successive preambles and between the last preamble and the message. For example, if the AICH transmission timing is 0 and 1, it is sent three and four access slots after the last preamble access slot transmitted, respectively.
  • FIG. 8 illustrates the timing of the preamble, AI and message part
  • a random access sub channel is a subset including the combination of all uplink access slots. There are 12 random access sub channels.
  • a random access sub channel consists of the access slots indicated in Table II.
  • the preamble is a short signal that is sent before the transmission of the RACH message.
  • a preamble consists of 4096 chips, which is a sequence of 256 repetitions of Hadamard codes of length 16 and scrambling codes assigned from the upper layer.
  • the Hadamard codes are referred to as the signature of the preamble. There are 16 different signatures and a signature is randomly selected from available signature sets on the basis of Access Service Classes (ASC) and repeated 256 times for each transmission of the preamble part. Table III lists the preamble signatures.
  • the message part is spread by Orthogonal Variable Spreading Factor (OVSF) codes that are uniquely defined by the preamble signature and the spreading codes for use as the preamble signature.
  • OVSF Orthogonal Variable Spreading Factor
  • the 10 ms long message part radio frame is divided into 15 slots, each slot consisting of 2560 chips.
  • Each slot includes a data part and a control part that transmits control information, such as pilot bits and TFCI.
  • the data part and the control part are transmitted in parallel.
  • the 20 ms long message part consists of two consecutive message part radio frames.
  • FIG. 9 illustrates the structure of the random access message part.
  • the AICH consists of a repeated sequence of 15 consecutive access slots, each slot having a length of 40 bit intervals or 5120 chips.
  • Each access slot includes two parts, an Acquisition Indicator (AI) part consisting of 32 real- valued signals, such as a0 ... a31, and a part having a length of 1024 chips during which transmission is switched off.
  • FIG. 10 illustrates the structure of the AICH.
  • the UTRAN 2 detects transmission of a RACH preamble having a certain signature in an RACH access slot, the UTRAN repeats this signature in the associated AICH access slot. Therefore, the Hadamard code used as the signature for the RACH preamble is modulated onto the AI part of the AICH.
  • the acquisition indicator corresponding to a signature can have a value of +1, -1 or 0 depending on whether a positive acknowledgement (ACK), a negative acknowledgement (NACK) or no acknowledgement is received in response to a specific signature.
  • ACK positive acknowledgement
  • NACK negative acknowledgement
  • the positive polarity of the signature indicates that the preamble has been acquired and the message can be sent.
  • the negative polarity indicates that the preamble has been acquired and the power ramping procedure shall be stopped, but the message shall not be sent. This negative acknowledgement is used when a received preamble cannot be processed at the present time due to congestion in the UTRAN 2 and the UE 1 must repeat the access attempt some time later.
  • All UEs 1 are members of one of ten randomly allocated mobile populations, defined as Access Classes (AC) 0 to 9. The population number is stored in the Subscriber Identity Module (SIM) / Universal Subscriber Identity Module (USIM). UEs 1 may also be members of one or more out of 5 special categories of Access Classes 11 to 15, which are allocated to specific high priority users and the information also stored in the SIM/USIM. Table IV lists the special AC and their allocation.
  • the UTRAN 2 performs the random access procedure at protocol layer L2 by determining whether to permit the UE 1 to use a radio access resource based primarily upon the AC to which the UE belongs.
  • Access attempts are allowed if the UE 1 is a member of at least one AC that corresponds to the permitted classes as signaled over the air interface and the AC is applicable in the serving UTRAN 2. Access attempts are otherwise not allowed. Any number of these AC may be barred at any one time. Access Classes are applicable as indicated in Table V.
  • An additional control bit for AC 10 is also signaled over the air interface to the UE 1. This control bit indicates whether access to the UTRAN 2 is allowed for Emergency Calls for UEs 1 with access classes 0 to 9 or without an International Mobile Subscriber Identity (IMSI). Emergency calls are not allowed if both AC 10 and the relevant AC, 11 to 15 are barred for UEs 1 with access classes 11 to 15. Emergency calls are otherwise allowed.
  • IMSI International Mobile Subscriber Identity
  • AC are mapped to ASC In the UMTS.
  • ASC Access Class
  • ASC Access Class
  • ASC Access Class
  • ASC Access Class
  • ASC Access Class
  • nth IE designates an ASC number i in the range 0 - 7 to AC.
  • the UE 1 behavior is unspecified if the ASC indicated by the "nth IE” is undefined.
  • the parameters implied by the respective ASC are utilized for random access. A UE 1 that is a member of several ACs selects the ASC for the highest AC number. The AC is not applied in connected mode.
  • An ASC consists of a subset of RACH preamble signatures and access slots that are allowed for the present access attempt and a persistence value corresponding to a probability, Pv ⁇ 1, to attempt a transmission.
  • Another important mechanism to control random access transmission is a load control mechanism that reduces the load of incoming traffic when the collision probability is high or when the radio resources are low.
  • a flow chart of the control access procedure is illustrated in FIG. 11.
  • Existing specifications provide many RACH transmission control parameters that are stored and updated by the UE 1 based on system information broadcast by the UTRAN 2. These parameters are received from RRC (SlO).
  • the RACH transmission control parameters include PRACH, ASC, maximum number of preamble ramping cycles (M max), range of backoff interval for timer (T B oi> specified as a number of 10 ms transmission time intervals (N B oimax) and (N B oimm) and applicable when NACK is received on AICH.
  • a count value M is then set to zero (S40).
  • the count value M is then incremented by one (S50).
  • the UE 1 determines if the count value M, which represents the maximum number of RACH transmission attempts, exceeds the maximum number of permitted RACH transmission attempts M max (S60).
  • the UE 1 treats the transmission as unsuccessful if M exceeds M 1112x .
  • the UE 1 then indicates the unsuccessful transmission to a higher layer (S70)
  • the UE 1 proceeds with the RACH access procedure if M is less than or equal to M 1112x .
  • the UE 1 updates the RACH transmission control parameters (S80).
  • a 10 ms timer T 2 is set (S90) and the UE 1 determines whether to attempt transmission based on the persistence value Pi associated with the ASC selected by the UE.
  • a random number between 0 and 1, R 1 is generated (SlOO) and the random number is compared to the persistence value (Sl 10).
  • the UE 1 does not attempt transmission if R 1 is less than or equal to the persistence value P 1 and waits until the 10 ms timer T 2 expires (S 120) before repeating the RACH access procedure by updating the RACH transmission control parameters (S80).
  • the UE 1 attempts to transmit using assigned RACH resources (S 130) if Ri is less than or equal to the persistence value P 1
  • the UE 1 determines whether the response from the network is an Acknowledgement (ACK), a Non- Acknowledgment (NACK) or no response (S 150) after the access attempt is transmitted.
  • the UE 1 begins message transmission (S 160) if an ACK is received, thereby indicating receipt of the UE transmission by the UTRAN 2.
  • the UE 1 does not transmit the message and repeats the RACH access procedure by incrementing the count value M (S50) if no response is received or a NACK is received, thereby indicating a failed receipt of the transmission by the network, for example, due to a collision.
  • the UE 1 only waits until the 10 ms timer T 2 expires (S 170) before repeating the
  • the UE 1 waits until the 10 ms timer T 2 expires (S 180) and also randomly generates a back off value N B oi associated with the PRACH assigned to the UE and between N E0I1112X and N B oimm and waits an additional back off interval T B oi that is equal to 10 ms multiplied by the back off value N B oi (S 190) before repeating the RACH access procedure if a NACK was received.
  • the physical layer receives information from a higher layer, specifically the RRC, before the physical random-access procedure is initiated and receives information from a higher layer, specifically the MAC, at each initiation of the physical random access procedure.
  • the information is indicated in Table VII.
  • the physical layer random-access procedure is illustrated in FIG. 12.
  • one access slot in the random access subchannel that can be used for the given ASC is randomly selected from access slots that can be used in the next full access slot sets (S200).
  • One access slot is randomly chosen from access slots that can be used in the next full access slot sets if there are no access slots available.
  • One signature is then randomly selected from the set of available signatures within the given ASC (S210).
  • the preamble retransmission counter is set at Preamble Retrans Max (S220), which is the maximum number of preamble retransmission attempts.
  • the preamble transmission power is set at Preamble Initial Power (S230), which is the initial transmission power of the preamble.
  • S230 Preamble Initial Power
  • the preamble is then transmitted according to the chosen uplink access slot, signature and set transmission power (S240).
  • the UE 1 determines whether the UTRAN 2 detected the preamble (S250). No random access message is transmitted if a NACK is detected in the downlink access slot corresponding to the selected uplink access slot. A random access message is transmitted if an ACK is detected in the downlink access slot corresponding to the selected uplink access slot.
  • the preamble is retransmitted if no response, specifically neither an ACK nor a NACK for the selected signature, is detected in the downlink access slot corresponding to the selected uplink access slot.
  • the next available access slot is selected from the random access subchannel within the given ASC (S260), a new signature is randomly selected from the available signatures within the given ASC (S270), the preamble transmission power is increased by the step width of the power ramping (Power Ramp Step) (S280) and the preamble retransmission counter is reduced by 1 (S290).
  • the UE 1 determines if the maximum number of retransmissions have been attempted (S300). This preamble re-transmission procedure is repeated for as long as the preamble retransmission counter exceeds 0 and no response is received.
  • the MAC is informed that no ACK was received on AICH (S310) and the physical layer random access procedure is terminated once the retransmission counter reaches 0.
  • the transmission power of the control channel of the random access message is set at a level higher than the transmission power of the last preamble transmitted according to a power offset (S320) and the random access message is transmitted 3 or 4 uplink access slots after the uplink access slot of the last transmitted preamble depending on the AICH transmission timing parameter (S330).
  • the higher layer is then informed of the receipt of the ACK and transmission of the random access message (S340) and the physical layer random access procedure is terminated.
  • FIG. 13 illustrates a signaling establishment procedure between a UE 1 and UTRAN
  • the RRC Connection Request message is transmitted once the PRACH power control preambles have been acknowledged (S400).
  • the RRC Connection Request message includes a reason for requesting the connection.
  • the UTRAN 2 determines which resources to reserve and performs synchronization and signaling establishment among radio network nodes, such as a NodeB 5 and serving RNC 4, depending on the request reason (S410). The UTRAN 2 then transmits the Connection Setup message to the UE 1, thereby conveying information about radio resource to use (S420).
  • the UE 1 confirms connection establishment by sending the Connection Setup
  • the UE 1 transmits the Initial Direct Transfer message to the UTRAN 2 once the connection has been established (S440).
  • the Initial Direct Transfer message includes information such as the UE identity, UE current location and the kind of transaction requested.
  • Authentication is then performed between the UE 1 and UTRAN 2 and security mode communication is established (S450).
  • the actual set up information is delivered to the UTRAN 2 from the UE 1 via the Call Control Setup message (S460).
  • the Call Control Setup message identifies the transaction and indicates the QoS requirements.
  • the UTRAN 2 initiates activities for radio bearer allocation by determining if there are sufficient resources available to satisfy the requested QoS and transmits the Call Control Complete message to the UE 1 (S470).
  • the radio bearer is allocated according to the request if there are sufficient resources available.
  • the UTRAN 2 may select either to continue allocation with a lowered QoS value, queue the request until sufficient radio resources become available or reject the call request if sufficient resources are not presently available.
  • LTE long-term evolution
  • 3GPP 3rd generation partnership project
  • 3GPP LTE is a technology for enabling high-speed packet communications.
  • Many schemes have been proposed for the LTE objective including those that aim to reduce user and provider costs, improve service quality, and expand and improve coverage and system capacity.
  • the 3G LTE requires reduced cost per bit, increased service availability, flexible use of a frequency band, a simple structure, an open interface, and adequate power consumption of a terminal as an upper-level requirement.
  • the UTRAN 2 corresponds to E-UTRAN (Evolved-UTRAN).
  • the NodeB 5 and / or RNC 4 correspond to e-NodeB in the LTE system. The following is the overview of the current LTE study assumption for RACH.
  • the random access procedure is classified into two categories; non- synchronized random access and synchronized random access. Only the non- synchronized random access procedure is considered herein.
  • Non- synchronized access is used when the uplink from a UE 1 has not been time synchronized or when the UE uplink loses synchronization.
  • Non- synchronized access allows the UTRAN 2 to estimate and adjust the UE 1 transmission timing if necessary. Therefore the non- synchronized random access preamble is used for at least time alignment and signature detection.
  • FIG. 14 illustrates a random access burst.
  • the message payload may include any additional associated signaling information, such as a random ID, Pathloss/Channel Quality indicator (CQI), or access purpose.
  • CQI Pathloss/Channel Quality indicator
  • a message payload up to 6 bits is transmitted in the random access burst along with the preamble as illustrated in FIG. 14.
  • a UE 1 randomly selects a signature from a group of signatures to distinguish between different UEs that attempt an access simultaneously.
  • the preamble must have good auto-correlation properties in order for the UTRAN 2 to obtain an accurate timing estimate.
  • preambles should have good cross-correlation properties in order for the UTRAN 2 to distinguish between simultaneous access attempts for different UEs 1 using different signatures.
  • a constant amplitude zero auto-correlation (CAZAC) sequence is used as a preamble signature sequence to achieve good detection probability.
  • Layer 1 shall receive the information listed in Table VIII from the higher layers prior to initiation of the non- synchronized physical random access procedure. The information is transmitted as part of the System Information from higher layers.
  • Random access channel parameters (number, frequency position, time period, and timing offset)
  • FIG. 15 illustrates a call flow diagram for a non-synchronized physical random access procedure.
  • the physical layer (Ll) random access procedure encompasses successful transmission of the random access preamble (message 1) and the random access response (message T). The remaining messages are scheduled for transmission by the higher layer on the shared data channel and thus are not considered part of the Ll random access procedure.
  • a random access channel is a 1.08 MHz portion of a subframe or set of consecutive subframes reserved for random access preamble transmissions.
  • a random access channel is randomly selected from the available non-synchronized random access channels and a preamble sequence is then randomly selected from the available preamble set based on the message to be transmitted.
  • the random access procedure ensures that each of the allowed selections is chosen with equal probability.
  • the initial preamble transmission power level which is set by the MAC, is determined using an open loop power control procedure.
  • the transmission counter is set to the maximum number of preamble retransmissions.
  • a Random Access Preamble (message 1) is then transmitted using the selected random access channel, preamble sequence, and preamble transmission power.
  • the Ll status "ACK on non- synchronized random access received" is reported to the higher layers, such as the MAC, and the physical random access procedure is terminated if a Random Access Response (message T) corresponding to the transmitted preamble sequence (message 1) is detected.
  • Another random access channel and preamble are randomly selected if no Random Access Response (message T) corresponding to the transmitted preamble sequence (message 1) is detected.
  • Preamble retransmission occurs as long as the maximum transmission power and the maximum number of retransmissions have not been reached.
  • the Ll status "no ac- knowledgment on non- synchronized random access" is reported to the higher layers, such as the MAC, and the physical random access procedure is terminated if the maximum transmission power or the maximum number of retransmissions has been reached.
  • the main purpose of the LTE (Long Term Evolution) random access procedure is to obtain uplink time synchronization and to obtain access to the network.
  • a random access mechanism can be described where a preamble is sent from a UEl to a NodeB 5 in order to determine the timing misalignment.
  • the preamble structure is based on Zadoff-Chu sequences with Zero Correlation Zone (ZC-ZCZ) and different root sequence indices when the required number of zones cannot be generated.
  • ZC-ZCZ Zero Correlation Zone
  • the zero-correlation zone for the ZC-ZCZ sequence is generated using a cyclic shift version of the Zadoff-Chu (ZC) carrier sequence. Cyclic shifts within the same root sequence then form an ideal set of signatures for LTE RACH preambles since their cross-correlation is zero.
  • the preamble cyclic shift length design differs for cells supporting high-speed mobility UEs 1.
  • the cyclic shift depends not only on cell size but is also proportional to sequence index when there is high Doppler.
  • the LTE RACH preamble sequence design is different for low and high mobility UEs 1. Furthermore, the conventional procedure does not use Zadoff-Chu sequences with Zero Correlation Zone (ZC-ZCZ) sequences for the RACH preamble.
  • ZC-ZCZ Zero Correlation Zone
  • the WCDMA RACH preamble consists of 4096 chips, which is a sequence of 256 repetitions of Hadamard codes of length 16 and scrambling codes. This facilitates simple and accurate frequency error estimation then the same sequence design is used for both low and high speed UEs 1.
  • a method of establishing a communication link between a mobile terminal and a network includes receiving an indication of whether a communication cell supports high speed mobility, generating sequences corresponding to signatures available for random access and requesting access to the network using a selected one of the generated sequences, wherein either the sequences are generated according to whether high speed mobility is supported or the generated sequence is selected according to whether high speed mobility is supported.
  • the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and further comprising mapping allowable signatures onto the cyclic shifted ZC sequences. It is further contemplated that each available random access signature is mapped onto a cyclic shifted ZC sequence using all possible cyclic shifted ZC sequences if high mobility is not supported. Preferably, each available random access signature is mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to a sequence index.
  • ZC Zadoff-Chu
  • a method of establishing a communication link between a mobile terminal and a network includes generating sequences corresponding to signatures available for random access, the sequences generated according to a process that either supports high mobility or does not support high speed mobility, transmitting an indication of whether high speed mobility is supported, receiving an access request from a mobile terminal, the access request using a selected one of the generated sequences and correlating the received request to each of the generated sequences in order to determine which of the generated sequences was used by the mobile terminal.
  • the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and further comprising mapping allowable signatures onto the cyclic shifted ZC sequences. It is further contemplated that each available random access signature is mapped onto a cyclic shifted ZC sequence using all possible cyclic shifted ZC sequences if high-speed mobility is not supported. Preferably, each available random access signature is mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to a sequence index.
  • ZC Zadoff-Chu
  • a method of establishing a communication link between a mobile terminal and a network includes receiving an indication of whether a cell supports high-speed mobility and requesting access to the network using the indication, wherein the indication indicates information on restricted use of cyclic shifts.
  • the indication comprises one bit. It is further contemplated that requesting access to the network includes generating sequences corresponding to signatures available for random access and requesting access to the network using a selected one of the generated sequences, wherein either the sequences are generated according whether high speed mobility is supported or the generated sequence is selected according to whether high speed mobility is supported.
  • the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and further comprising mapping allowable signatures onto the cyclic shifted ZC sequences, each available random access signature mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to the indication.
  • ZC Zadoff-Chu
  • a method of establishing a communication link between a mobile terminal and a network includes transmitting an indication of whether a cell supports high speed mobility and receiving a request to access the network from the mobile terminal, wherein the indication indicates information on restricted use of cyclic shifts and the request is based on the indication.
  • the indication comprises one bit. It is further contemplated that the method further includes generating sequences corresponding to signatures available for random access, the sequences generated according to a process that either supports high mobility or does not support high speed mobility, receiving the access request from the mobile terminal, the access request using a selected one of the generated sequences and correlating the received request to each of the generated sequences in order to determine which of the generated sequences was used by the mobile terminal.
  • the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and further comprising mapping allowable signatures onto the cyclic shifted ZC sequences, each available random access signature mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to the indication.
  • ZC Zadoff-Chu
  • a mobile terminal for of establishing a communication link with a network.
  • the mobile terminal includes a transmitting/receiving unit transmitting and receiving messages between the mobile terminal and the network, a display unit displaying user interface information, an input unit receiving inputs from a user and a processing unit processing a received indication of whether a communication cell supports high speed mobility, generating sequences corresponding to signatures available for random access and controlling the transmitting/receiving unit to request access to the network using a selected one of the generated sequences, wherein the processing unit either generates the sequences according to whether high speed mobility is supported or the selects the generated sequence according to whether high speed mobility is supported.
  • the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and the processing unit further maps allowable signatures onto the cyclic shifted ZC sequences. It is further contemplated that the processing unit maps each available random access signature onto a cyclic shifted ZC sequence using all possible cyclic shifted ZC sequences if high mobility is not supported. Preferably, the processing unit maps each available random access signature onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to a sequence index.
  • ZC Zadoff-Chu
  • a mobile terminal for of establishing a communication link with a network.
  • the mobile terminal includes a transmitting/receiving unit transmitting and receiving messages between the mobile terminal and the network, a display unit displaying user interface information, an input unit receiving inputs from a user and a processing unit processing a received indication of whether a cell supports high speed mobility and controlling the transmitting/ receiving unit to request access to the network using the indication, wherein the indication indicates information on restricted use of cyclic shifts.
  • the indication comprises one bit. It is further contemplated that processing unit controls the transmitting/receiving unit to request access to the network by generating sequences corresponding to signatures available for random access and requests access to the network using a selected one of the generated sequences, wherein the processing unit either generates the sequences according to whether high speed mobility is supported or the selects the generated sequence according to whether high speed mobility is supported.
  • the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and the processing unit maps allowable signatures onto the cyclic shifted ZC sequences, each available random access signature mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to the indication.
  • ZC Zadoff-Chu
  • a network for establishing a communication link with a mobile terminal includes a transmitter transmitting messages to the mobile terminal, a receiver receiving messages from the mobile terminal and a controller generating sequences corresponding to signatures available for random access, controlling the transmitter to transmit an indication of whether high speed mobility is supported, processing a received access request from a mobile terminal that uses a selected one of the generated sequences, and correlating the received request to each of the generated sequences in order to determine which of the generated sequences was used by the mobile terminal, wherein the controller generates the sequences according to a process that either supports high mobility or does not support high speed mobility.
  • the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and the controller maps allowable signatures onto the cyclic shifted ZC sequences. It is further contemplated that the controller maps each available random access signature onto a cyclic shifted ZC sequence using all possible cyclic shifted ZC sequences if high-speed mobility is not supported. Preferably, the controller maps each available random access signature onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to a sequence index.
  • ZC Zadoff-Chu
  • a network for establishing a communication link with a mobile terminal includes a transmitter transmitting messages to the mobile terminal, a receiver receiving messages from the mobile terminal and a controller controlling the transmitter to transmit an indication of whether a cell supports high speed mobility and processing a received request to access the network from the mobile terminal, wherein the indication indicates information on restricted use of cyclic shifts and the access request is based on the indication.
  • the indication comprises one bit. It is further contemplated that the controller further generates sequences corresponding to signatures available for random access, the sequences generated according to a process that either supports high mobility or does not support high speed mobility and correlates the received access request to each of the generated sequences in order to determine which of the generated sequences the mobile terminal used when sending the access request.
  • the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and the controller maps allowable signatures onto the cyclic shifted ZC sequences, each available random access signature mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to the indication.
  • ZC Zadoff-Chu
  • FIG. 1 illustrates an overview of a UMTS network.
  • FIG. 2 illustrates a structure of a radio interface protocol between a UE and the UTRAN according to the 3GPP radio access network standards.
  • FIG. 3 illustrates the different logical channels.
  • FIG. 4 illustrates logical channels mapped onto transport channels as seen from the UE side.
  • FIG. 5 illustrates logical channels mapped onto transport channels as seen from the UTRAN side.
  • FIG. 6 illustrates a power ramping procedure
  • FIG. 7 illustrates the number and spacing of access slots.
  • FIG. 8 illustrates the timing of the preamble, Access Indicator and message part.
  • FIG. 9 illustrates the structure of the random access message part.
  • FIG. 10 illustrates the structure of the AICH.
  • FIG. 11 illustrates a control access procedure
  • FIG. 12 illustrates a physical layer random- access procedure.
  • FIG. 13 illustrates a signaling establishment procedure between a UE and network.
  • FIG. 14 illustrates a random access burst.
  • FIG. 15 illustrates a call flow diagram for a non-synchronized physical random access procedure.
  • FIG. 16 illustrates an example of possible channel response of indexes M and (M+ 1) in a high Doppler environment.
  • FIG. 17 illustrates the relationship between a sequence index M and various circular shift approaches when high-speed mobility is supported according to the present invention.
  • FIG. 18 illustrates channel response in high Doppler environments.
  • FIG. 19 illustrates a block diagram of a mobile station (MS) or access terminal (AT) according to the present invention.
  • MS mobile station
  • AT access terminal
  • the present invention allows a UE 1 to correctly map the signature indexes onto the cyclic shifted ZC sequences when the deployed cells support a high-speed mobility UE 1.
  • the present invention proposes to inform a UE 1 whether a cell supports high-speed mobility such that RACH signatures may be correctly mapped onto the cyclic shifted ZC sequences. This information may either be broadcast on the system information in a cell or fixed in the standard.
  • ZC sequences have ideal correlation properties in the absence of frequency error, such that the periodic autocorrelation shows no side-peaks and the cross-correlation between two sequences with different a root index M has a constant value when the index of the samples of a sequence N is a prime number. Therefore, cyclic shifts of a sequence form an ideal set of signatures for RACH preambles because their cross- correlation is zero and they can all be detected simultaneously using frequency domain processing.
  • the number of cyclic shifts available for a single root index M depends on the length of the sequence and the propagation delay uncertainty: The shift must be larger than the maximum propagation delay for given cell sizes.
  • Performance is improved if cyclic shifts in high Doppler environments are limited so that the cyclic shift pairs of each sequence period uncertainty are not in the sequence period uncertainty of any RACH preamble and the cyclic shift of t-1 of each sequence period uncertainty is different from the cyclic shifts of t +1 of all sequences period uncertainty. This results in using a restricted set of cyclic shifts for cells supporting highspeed mobility UEs 1.
  • the cyclic shift design may be done such that the alias channel response is not overlapped with the other circular shift positions since the frequency offset in a highspeed mobility UE 1 is proportional to sequence index M. Rules and methods of such design are known in the art.
  • the cyclic shift design is different depending upon whether a cell supports highspeed mobility UEs 1.
  • the basic random access procedure is for a UE 1 to send a random access preamble (message 1), which carries the signature access to Node B 5.
  • the access signature is only sent to meet coverage requirement for non- synchronized random access within the LTE framework.
  • the waveform of the LTE signature is based on Zadoff-Chu (ZC) with zero- correlation zones (ZCZ) and different mother sequence indexes when the required number of zones cannot be generated. This is because the number of ZCZ sequences is reduced inversely proportionally to cell radius. Therefore, additional ZCZ sequences from another index are added when the number of ZCZ sequences insufficient.
  • ZC Zadoff-Chu
  • ZCZ zero- correlation zones
  • the zero-correlation zones allow for ideal detection in the presence of interfering preambles.
  • the optimal auto-correlation property of the CAZAC sequence is destroyed when the Doppler spread of a high-speed mobility UE 1 induces the frequency offset, thereby resulting in degraded detection performance.
  • Doppler shift and frequency error on the uplink have properties depending on the channel condition, for example, line- of-site (LOS) condition or Non-line-of-site (NLOS) condition.
  • LOS line- of-site
  • NLOS Non-line-of-site
  • Frequency offset due to UE 1 mobility is spread over a range from the carrier frequency In NLOS. Therefore, a UE 1 tracks around the frequency offset.
  • the frequency offset of the received uplink signal is nearly zero and one way Doppler spread can be considered.
  • the maximum frequency offset of the receiver signal In LOS such as when a highspeed mobility vehicle moves towards or away from the Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) 2, is described as:
  • foffset, UL ⁇ fuE + 2f Dop pler_max, where f B s denotes the base station frequency drift,
  • ⁇ fu E denotes UE 1 frequency error
  • Dopp ie r m ax denotes the maximum Doppler frequency.
  • the worst-case frequency offset is around 1400Hz with mobility of 350 km/h at a 2 GHz carrier frequency.
  • a UE 1 tracks around 650Hz Doppler shift on the downlink in the LOS environment and then transmits uplink data compensated frequency offset in advance based on the estimated frequency offset on the downlink. Therefore, the frequency offset due to UE 1 mobility becomes twice of the Doppler shift of the channel at the NodeB 2, for example, 1300Hz.
  • the frequency offset spreads the channel response over a wide range depending on the sequence index M that is used.
  • the circular shift should be designed such that the alias channel response is not overlapped with the other circular shift positions. Therefore, the cyclic shift is depends not only on the cell size but also is proportional to the sequence index M, which results in the restricted set of cyclic shifts as compared to the low Doppler case and also in different RACH signature mapping.
  • N is a sequence length or ZC sequence length
  • M is one sequence index or a ZC root index
  • T 0 is the minimum cyclic shift for a given cell based on cell size.
  • the necessary information, such as N, can be fixed in a standard while other information, such as T 0 and M, should be broadcast on the system information.
  • the present invention proposes that the network broadcast one information bit to inform a UE 1 if high-speed mobility UEs is supported. This information bit would enable correct mapping of RACH signatures onto the cyclic shifted ZC sequences.
  • a UE 1 reads the information bit indicating support of high-speed mobility in a cell or indicating the use of a restricted set of cyclic shifts upon receiving a broadcast message relative to RACH information.
  • Information related to TO and M shall have already obtained by a UE 1 from information broadcast by the E-UTRAN 2 before processing the information bit.
  • the UE 1 shall have also already obtained information related to N and the maximum number of RACH signatures from the broadcast information if those values are not fixed by a standard. The UE 1 then determines whether the information bit indicates that highspeed mobility is supported.
  • mapping of RACH signatures onto the cyclic shifted ZC sequences can be easily performed for each cell when high-speed mobility is not supported, as indicated by the information bit having a value of "FALSE" or "0."
  • a UE 1 and E-UTRAN 2 can map RACH signatures onto the ZC sequences of index M, with RACH signatures incrementally mapped onto subsequent cyclic- shifted versions by T 0 of the same ZC sequence until all possible cyclic shifts have been mapped for a given index M. New consecutive indexes M are added until the total number of signatures equals a value specified in the standard or system information.
  • the E-UTRAN 2 may broadcast only one index M, with the UE 1 using consecutive indexes to generate the number of required preambles.
  • An alternative is for the E- UTRAN 2 to broadcast a set of several indexes M not necessarily consecutive to each other, with the UE 1 using the first index within the set and then using consecutive indexes within the set and mapping signatures in the same manner by starting from a higher or lower sequence index.
  • the UE 1 starts mapping RACH signatures onto the cyclic shifted ZC sequences by mapping onto the first ZC sequence of the received index M or on the first index M in a received list.
  • the UE 1 then incrementally maps the next subsequent signatures onto subsequent right-cyclic-shifted versions by the minimum cyclic shift length T 0 of the same ZC sequence index M until the maximum number of RACH signatures is reached or all possible cyclic shifts of index M have been obtained.
  • the UE 1 maps the next signature onto the next ZC sequence index M+l or the next index in the list if the maximum number of RACH signatures is not reached before all possible cyclic shifts of index M are used.
  • the UE 1 then maps the next subsequent signatures onto its subsequent right-cyclic-shifted versions by the minimum cyclic shift length T 0 . This signature mapping is repeated over all ZC sequence indexes and stops when the maximum number of RACH signatures is reached.
  • a UE 1 and the E-UTRAN 2 calculate the available cyclic shifts proportional to the index M and add new consecutive indexes M+l by adjusting the cyclic shifts proportionally until the total number of signatures equals a value specified in the standard or system information.
  • the relationship between the three cyclic shift approaches and the sequence index M is applied as illustrated In FIG. 18.
  • the E-UTRAN 2 may broadcast only one index M, with the UE 1 using consecutive indexes to generate the number of required preambles.
  • An alternative is for the E- UTRAN 2 to broadcast a set of several indexes M not necessarily consecutive to each other, with the UE 1 using the first index within the set and then using consecutive indexes within the set and mapping signatures in the same manner by starting from a higher or lower sequence index and mapping signatures in the same manner by applying the relationships illustrated in FIG. 18, starting from a higher or lower sequence index.
  • the UEl starts mapping RACH signatures onto the cyclic shifted ZC sequences by determining, for received index M or for the first index M in a received list, the cyclic shift that can be applied according to the restricted set of cyclic shifts that can be used.
  • the previously described rules are used as an example, but it should be noted that other possible rules for determining the restricted set of cyclic shifts could be applied.
  • the UE 1 determines the minimum cyclic shift T mn according to the first approach if
  • the UE 1 determines the minimum cyclic shift T mn according to the second approach if
  • the UE 1 determines the minimum cyclic shift T mn according to the third approach if LN/3_] ⁇ M ⁇
  • the determined Tmin value is then set with the minimum cyclic shift of index M.
  • the UE 1 maps the first signature onto the first ZC sequence of the received index M or on the first index M in a received list.
  • the UE 1 then incrementally maps the next subsequent signatures onto subsequent right-cyclic-shifted versions by the minimum cyclic shift length T mn of the same ZC sequence index M until the maximum number of RACH signatures is reached or all possible cyclic shifts of index M have been obtained.
  • the UE 1 selects the next ZC sequence index M+l or the next index in the list and maps the next signature onto the ZC sequence of index M+l or the next index in the list if the maximum number of RACH signatures is not reached before all possible cyclic shifts of index M are used.
  • the UE 1 determines the minimum cyclic shift Tmin according to the first approach if 1 ⁇ (M + 1 ) ⁇ 2T 0 or N - 2T 0 ⁇ (M + 1 ) ⁇ N - 1.
  • the UE 1 determines the minimum cyclic shift T mn according to the second approach if
  • the UE 1 determines the minimum cyclic shift T mn according to the third approach if
  • the determined T mn value is then set with the minimum cyclic shift of index M + l.
  • the determined T mn value is then set with the minimum cyclic shift of index M + l.
  • the UE 1 then incrementally maps the next subsequent signatures onto subsequent right-cyclic- shifted versions by the minimum cyclic shift length T mn of the same ZC sequence index M + 1 until the maximum number of RACH signatures is reached or all possible cyclic shifts of index M + 1 have been obtained. This signature mapping is repeated over all ZC sequence indexes and stops when the maximum number of RACH signatures is reached.
  • FIG. 19 illustrates a block diagram of a mobile station (MS) or UE 1.
  • the AT 2 includes a processor (or digital signal processor) 510, RF module 535, power management module 505, antenna 540, battery 555, display 515, keypad 520, memory 530, SIM card 525 (which may be optional), speaker 545 and microphone 550.
  • processor or digital signal processor
  • a user enters instructional information, such as a telephone number, for example, by pushing the buttons of a keypad 520 or by voice activation using the microphone 550.
  • the microprocessor 510 receives and processes the instructional information to perform the appropriate function, such as to dial the telephone number. Operational data may be retrieved from the Subscriber Identity Module (SIM) card 525 or the memory module 530 to perform the function. Furthermore, the processor 510 may display the instructional and operational information on the display 515 for the user's reference and convenience.
  • SIM Subscriber Identity Module
  • the processor 510 issues instructional information to the RF module 535, to initiate communication, for example, transmits radio signals comprising voice communication data.
  • the RF module 535 comprises a receiver and a transmitter to receive and transmit radio signals.
  • An antenna 540 facilitates the transmission and reception of radio signals.
  • the RF module 535 may forward and convert the signals to baseband frequency for processing by the processor 510.
  • the processed signals would be transformed into audible or readable information outputted via the speaker 545, for example.
  • the processor 510 also includes the protocols and functions necessary to perform the various processes described herein.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A terminal random access procedure is improved by allowing a mobile terminal to correctly map signature indexes onto cyclic shifted Zadoff-Chu (ZC) sequences when the deployed cells support a high-speed mobility by informing a mobile terminal whether a cell supports high-speed mobility.

Description

Description
METHODS AND PROCEDURES FOR HIGH SPEED UE ACCESS
Disclosure of Invention Technical Solution
[1] This application claims the benefit of U.S. Provisional Application Serial No.
60/889,520 filed on February 12, 2007, the contents of which is hereby incorporated by reference herein in its entirety.
[2] The present invention is directed to a mobile terminal random access procedure for obtaining uplink time synchronization and access to a network and specifically to an apparatus and method that allows a mobile terminal to correctly map signature indexes onto cyclic shifted Zadoff-Chu (ZC) sequences when the deployed cells support a high-speed mobility by informing a mobile terminal whether a cell supports high-speed mobility.
[3] A universal mobile telecommunication system (UMTS) is a European-type, third generation IMT-2000 mobile communication system that has evolved from a European standard known as Global System for Mobile communications (GSM). UMTS is intended to provide an improved mobile communication service based upon a GSM core network and wideband code division multiple access (W-CDMA) wireless connection technology. In December 1998, a Third Generation Partnership Project (3GPP) was formed by the ETSI of Europe, the ARIB/TTC of Japan, the Tl of the United States, and the TTA of Korea. The 3GPP creates detailed specifications of UMTS technology.
[4] In order to achieve rapid and efficient technical development of the UMTS, five technical specification groups (TSG) have been created within the 3GPP for standardizing the UMTS by considering the independent nature of the network elements and their operations. Each TSG develops, approves, and manages the standard specification within a related region. The radio access network (RAN) group (TSG-RAN) develops the standards for the functions, requirements, and interface of the UMTS terrestrial radio access network (UTRAN), which is a new radio access network for supporting W-CDMA access technology in the UMTS.
[5] FIG. 1 provides an overview of a UMTS network. The UMTS network includes a mobile terminal or user equipment (UE) 1, a UTRAN 2 and a core network (CN) 3.
[6] The UTRAN 2 includes several radio network controllers (RNCs) 4 and NodeBs 5 that are connected via the Iub interface. Each RNC 4 controls several NodeBs 5. Each NodeB 5 controls one or several cells, where a cell covers a given geographical area on a given frequency. [7] Each RNC 4 is connected via the Iu interface to the CN 3 or towards the mobile switching center (MSC) 6 entity of the CN and the general packet radio service (GPRS) support Node (SGSN) 7 entity. RNCs 4 can be connected to other RNCs via the Iur interface. The RNC 4 handles the assignment and management of radio resources and operates as an access point with respect to the CN 3.
[8] The NodeBs 5 receive information sent by the physical layer of the UE 1 via an uplink and transmit data to the UE 1 via a downlink. The Node-Bs 5 operate as access points of the UTRAN 2 for the UE 1.
[9] The SGSN 7 is connected to the equipment identity register (EIR) 8 via the Gf interface, to the MSC 6 via the Gs interface, to the gateway GPRS support node (GGSN) 9 via the GN interface, and to the home subscriber server (HSS) via the GR interface.
[10] The EIR 8 hosts lists of UEs 1 that are allowed to be used on the network. The EIR 8 also hosts lists of UEs 1 that are not allowed to be used on the network.
[11] The MSC 6, which controls the connection for circuit switched (CS) services, is connected towards the media gateway (MGW) 11 via the NB interface, towards the EIR 8 via the F interface, and towards the HSS 10 via the D interface.
[12] The MGW 11 is connected towards the HSS 10 via the C interface and also to the public switched telephone network (PSTN). The MGW 11 also allows the codecs to adapt between the PSTN and the connected RAN.
[13] The GGSN 9 is connected to the HSS 10 via the GC interface and to the Internet via the GI interface. The GGSN 9 is responsible for routing, charging and separation of data flows into different radio access bearers (RABs). The HSS 10 handles the subscription data of users.
[14] The UTRAN 2 constructs and maintains an RAB for communication between a UE 1 and the CN 3. The CN 3 requests end-to-end quality of service (QoS) requirements from the RAB and the RAB supports the QoS requirements set by the CN 3. Accordingly, the UTRAN 2 can satisfy the end-to-end QoS requirements by constructing and maintaining the RAB.
[15] The services provided to a specific UE 1 are roughly divided into CS services and packet switched (PS) services. For example, a general voice conversation service is a CS service and a Web browsing service via an Internet connection is classified as a PS service.
[16] The RNCs 4 are connected to the MSC 6 of the CN 3 and the MSC is connected to the gateway MSC (GMSC) that manages the connection with other networks in order to support CS services. The RNCs 4 are connected to the SGSN 7 and the gateway GGSN 9 of the CN 3 to support PS services.
[17] The SGSN 7 supports packet communications with the RNCs. The GGSN 9 manages the connection with other packet switched networks, such as the Internet.
[18] FIG. 2 illustrates a structure of a radio interface protocol between a UE 1 and the
UTRAN 2 according to the 3GPP radio access network standards. As illustrated In FIG. 2, the radio interface protocol has horizontal layers comprising a physical layer, a data link layer, and a network layer, and has vertical planes comprising a user plane (U-plane) for transmitting user data and a control plane (C-plane) for transmitting control information. The U-plane is a region that handles traffic information with the user, such as voice or Internet protocol (IP) packets. The C-plane is a region that handles control information for an interface with a network as well as maintenance and management of a call. The protocol layers can be divided into a first layer (Ll), a second layer (L2), and a third layer (L3) based on the three lower layers of an open system interconnection (OSI) standard model.
[19] The first layer (Ll), or physical layer, provides an information transfer service to an upper layer by using various radio transmission techniques. The physical layer is connected to an upper layer, or medium access control (MAC) layer, via a transport channel. The MAC layer and the physical layer exchange data via the transport channel.
[20] The second layer (L2) includes a MAC layer, a radio link control (RLC) layer, a broadcast/multicast control (BMC) layer, and a packet data convergence protocol (PDCP) layer. The MAC layer handles mapping between logical channels and transport channels and provides allocation of the MAC parameters for allocation and re- allocation of radio resources. The MAC layer is connected to an upper layer, or the radio link control (RLC) layer, via a logical channel.
[21] Various logical channels are provided according to the type of information transmitted. A control channel is generally used to transmit information of the C-plane and a traffic channel is used to transmit information of the U-plane. A logical channel may be a common channel or a dedicated channel depending on whether the logical channel is shared.
[22] FIG. 3 illustrates the different logical channels that exist. Logical channels include a dedicated traffic channel (DTCH), a dedicated control channel (DCCH), a common traffic channel (CTCH), a common control channel (CCCH), a broadcast control channel (BCCH), and a paging control channel (PCCH), or a Shared Control Channel (SCCH), as well as other channels. The BCCH provides information including information utilized by a UE 1 to access a system. The PCCH is used by the UTRAN 2 to access a UE 1.
[23] Additional traffic and control channels are introduced in the Multimedia Broadcast
Multicast Service (MBMS) standard for the purposes of MBMS. The MBMS point- to-multipoint control channel (MCCH) is used for transmission of MBMS control in- formation. The MBMS point-to-multipoint traffic channel (MTCH) is used for transmitting MBMS service data. The MBMS scheduling channel (MSCH) is used to transmit scheduling information.
[24] The MAC layer is connected to the physical layer by transport channels. The MAC layer can be divided into a MAC-b sub-layer, a MAC-d sub-layer, a MAC-c/sh sublayer, a MAC-hs sub-layer and a MAC-m sublayer according to the type of transport channel being managed.
[25] The MAC-b sub-layer manages a broadcast channel (BCH), which is a transport channel handling the broadcasting of system information. The MAC-c/sh sub-layer manages a common transport channel, such as a forward access channel (FACH) or a downlink shared channel (DSCH), which is shared by a plurality of UEs 1, or in the uplink the radio access channel (RACH). The MAC-m sublayer may handle MBMS data.
[26] FIG. 4 illustrates the possible mapping between the logical channels and the transport channels from a UE 1 perspective. FIG. 5 illustrates the possible mapping between the logical channels and the transport channels from a UTRAN 2 perspective.
[27] The MAC-d sub-layer manages a dedicated channel (DCH), which is a dedicated transport channel for a specific UE 1. The MAC-d sublayer is located in a serving RNC 4 (SRNC) that manages a corresponding UE 1. One MAC-d sublayer also exists in each UE 1.
[28] The RLC layer supports reliable data transmissions and performs segmentation and concatenation on a plurality of RLC service data units (SDUs) delivered from an upper layer depending of the RLC mode of operation. The RLC layer adjusts the size of each RLC SDU received from the upper layer in an appropriate manner based upon processing capacity and then creates data units by adding header information. The data units, or protocol data units (PDUs), are transferred to the MAC layer via a logical channel. The RLC layer includes a RLC buffer for storing the RLC SDUs and / or the RLC PDUs.
[29] The BMC layer schedules a cell broadcast (CB) message transferred from the CN 3.
The BMC layer broadcasts the CB message to UEs 1 positioned in a specific cell or cells.
[30] The PDCP layer is located above the RLC layer. The PDCP layer is used to transmit network protocol data, such as the IPv4 or IPv6, efficiently on a radio interface with a relatively small bandwidth. The PDCP layer reduces unnecessary control information used in a wired network, a function called header compression, for this purpose.
[31] The radio resource control (RRC) layer located at the lowest portion of the third layer
(L3) is only defined in the C-plane. The RRC layer controls the transport channels and the physical channels in relation to setup, reconfiguration, and the release or can- cellation of the radio bearers (RBs).
[32] A RB signifies a service provided by the second layer (L2) for data transmission between a UE 1 and the UTRAN 2. The set up of the RB generally refers to the process of stipulating the characteristics of a protocol layer and a channel required for providing a specific data service and setting the respective detailed parameters and operation methods. The RRC also handles user mobility within the RAN and additional services, such as location services.
[33] Not all different possibilities for the mapping between the RBs and the transport channels for a given UE 1 are available all the time. The UE 1 / UTRAN 2 deduce the possible mapping depending on the UE state and the procedure presently executed by the UE / UTRAN.
[34] The different transport channels are mapped onto different physical channels. The configuration of the physical channels is given by RRC signaling exchanged between the RNC 4 and the UE l.
[35] Initial access is a procedure whereby a UE 1 sends a first message to the UTRAN 2 using a common uplink channel, specifically the Random Access Channel (RACH). For both GSM and UMTS systems, the initial access procedure involves the UE 1 transmitting a connection request message that includes a reason for the request and receiving a response from the UTRAN 2 indicating the allocation of radio resources for the requested reason.
[36] There are several reasons, or establishment causes, for sending a connection request message. Table I indicates the establishment causes specified in UMTS, specifically in 3GPP TS 25.331.
[37] The "originating call" establishment cause indicates that the UE 1 wants to setup a connection, for example, a speech connection. The "terminating call" establishment cause indicates that that UE 1 answers to paging. The "registration" establishment cause indicates that that the user wants to register only to the network.
[38] A physical random access procedure is used to send information over the air. The physical random access transmission is under control of a higher layer protocol, which performs important functions related to priority and load control. This procedure differs between GSM and UMTS radio systems.
[39] The description of GSM random access procedure can be found in "The GSM
System for Mobile Communications" published by M. Mouly and M. B. Pautet, 1992. As the present invention is related to UMTS enhancement and evolution, the W- CDMA random access procedure is detailed herein. Although the present invention is explained in the context of UMTS evolution, the present invention is not so limited.
[40] The transport channel RACH and two physical channels, Physical Random Access
Channel (PRACH) and Acquisition Indication Channel (AICH), are utilized in this procedure. The transport channels are channels supplied by the physical layer to the protocol layer of the MAC layer. There are several types of transport channels to transmit data with different properties and transmission formats over the physical layer.
[41] Physical channels are identified by code and frequency in Frequency Division
Duplex (FDD) mode and are generally based on a layer configuration of radio frames and timeslots. The form of radio frames and timeslots depends on the symbol rate of the physical channel.
[42] A radio frame is the minimum unit in the decoding process, consisting of 15 time slots. A time slot is the minimum unit in the Layer 1 bit sequence. Therefore, the number of bits that can be accommodated in one time slot depends on the physical channel.
[43] Table 1
[Table 1]
Establishment Causes
Originating Conversational Call
Originating Streaming Call
Originating Interactive Call
Originating Background Call
Originating Subscribed traffic Call
Terminating Conversational Call
Terminating Streaming Call
Terminating Interactive Call
Terminating Background Call
Emergency Call
Inter-RAT cell re-selection
Inter-RAT cell change order
Registration
Detach
Originating High Priority Signaling
Originating Low Priority Signaling
Call re-establishment
Terminating High Priority Signaling
Terminating Low Priority Signaling
[44] The transport channel RACH is an uplink common channel used for transmitting control information and user data. The transport channel RACH is utilized in random access and used for low-rate data transmissions from a higher layer. The RACH is mapped to an uplink physical channel, specifically the PRACH. The AICH is a downlink common channel, which exists as a pair with PRACH used for random access control.
[45] The transmission of PRACH is based on a slotted ALOHA approach with fast acquisition indication. The UE randomly selects an access resource and transmits a RACH preamble part of a random access procedure to the network.
[46] A preamble is a short signal that is sent before the transmission of the RACH connection request message. The UE 1 repeatedly transmits the preamble by increasing the transmission power each time the preamble is sent until it receives the Acquisition Indicator (AI) on AICH, which indicates the detection of the preamble by the UTRAN 2. The UE 1 stops the transmission of the preamble once it receives the AI and sends the message part at the power level equal to the preamble transmission power at that point, adding an offset signaled by the UTRAN 2. FIG. 6 illustrates a power ramping procedure.
[47] This random access procedure avoids a power ramping procedure for the entire message. A power ramping procedure would create more interference due to unsuccessfully sent messages and would be less efficient due to a larger delay since it would take much more time to decode the message before an acknowledgement could be transmitted to indicate successful receipt of the message.
[48] The main characteristics of the RACH is that it is a contention based channel subject to collisions due to simultaneous access of several users, which may preclude decoding of the initial access message by the network. The UE 1 can start the random access transmission of both preambles and message only at the beginning of an access slot. This access method is, therefore, a type of slotted ALOHA approach with fast acquisition indication
[49] The time axis of both the RACH and the AICH is divided into time intervals or access slots. There are 15 access slots per two frames, with each frame having a length of 10 ms or 38400 chips, and the access slots are spaced 1.33 ms or 5120 chips apart. FIG. 7 illustrates the number and spacing of access slots.
[50] The UTRAN 2 signals information regarding which access slots are available for random access transmission and the timing offsets to use between RACH and AICH, between two successive preambles and between the last preamble and the message. For example, if the AICH transmission timing is 0 and 1, it is sent three and four access slots after the last preamble access slot transmitted, respectively. FIG. 8 illustrates the timing of the preamble, AI and message part
[51] The timing at which the UE 1 can send the preamble is divided by random access sub channels. A random access sub channel is a subset including the combination of all uplink access slots. There are 12 random access sub channels. A random access sub channel consists of the access slots indicated in Table II.
[52] Table 2 [Table 2]
Figure imgf000010_0001
[53] The preamble is a short signal that is sent before the transmission of the RACH message. A preamble consists of 4096 chips, which is a sequence of 256 repetitions of Hadamard codes of length 16 and scrambling codes assigned from the upper layer.
[54] The Hadamard codes are referred to as the signature of the preamble. There are 16 different signatures and a signature is randomly selected from available signature sets on the basis of Access Service Classes (ASC) and repeated 256 times for each transmission of the preamble part. Table III lists the preamble signatures.
[55] The message part is spread by Orthogonal Variable Spreading Factor (OVSF) codes that are uniquely defined by the preamble signature and the spreading codes for use as the preamble signature. The 10 ms long message part radio frame is divided into 15 slots, each slot consisting of 2560 chips.
[56] Table 3
[Table 3]
Figure imgf000011_0001
[57] Each slot includes a data part and a control part that transmits control information, such as pilot bits and TFCI. The data part and the control part are transmitted in parallel. The 20 ms long message part consists of two consecutive message part radio frames. The data part consists of 10*2k bits, where k = 0, 1, 2, 3, which corresponds to a Spreading Factor (SF) of 256, 128, 64, 32. FIG. 9 illustrates the structure of the random access message part.
[58] The AICH consists of a repeated sequence of 15 consecutive access slots, each slot having a length of 40 bit intervals or 5120 chips. Each access slot includes two parts, an Acquisition Indicator (AI) part consisting of 32 real- valued signals, such as a0 ... a31, and a part having a length of 1024 chips during which transmission is switched off. FIG. 10 illustrates the structure of the AICH.
[59] When the UTRAN 2 detects transmission of a RACH preamble having a certain signature in an RACH access slot, the UTRAN repeats this signature in the associated AICH access slot. Therefore, the Hadamard code used as the signature for the RACH preamble is modulated onto the AI part of the AICH.
[60] The acquisition indicator corresponding to a signature can have a value of +1, -1 or 0 depending on whether a positive acknowledgement (ACK), a negative acknowledgement (NACK) or no acknowledgement is received in response to a specific signature. The positive polarity of the signature indicates that the preamble has been acquired and the message can be sent.
[61] The negative polarity indicates that the preamble has been acquired and the power ramping procedure shall be stopped, but the message shall not be sent. This negative acknowledgement is used when a received preamble cannot be processed at the present time due to congestion in the UTRAN 2 and the UE 1 must repeat the access attempt some time later.
[62] All UEs 1 are members of one of ten randomly allocated mobile populations, defined as Access Classes (AC) 0 to 9. The population number is stored in the Subscriber Identity Module (SIM) / Universal Subscriber Identity Module (USIM). UEs 1 may also be members of one or more out of 5 special categories of Access Classes 11 to 15, which are allocated to specific high priority users and the information also stored in the SIM/USIM. Table IV lists the special AC and their allocation.
[63] Table 4 [Table 4]
Figure imgf000012_0001
[64] The UTRAN 2 performs the random access procedure at protocol layer L2 by determining whether to permit the UE 1 to use a radio access resource based primarily upon the AC to which the UE belongs.
[65] It will be desirable to prevent UE 1 users from making access attempts, including emergency call attempts, or responding to pages in specified areas of a Public Land Mobile Network (PLMN) under certain circumstances. Such situations may arise during states of emergency or where 1 or more co-located PLMNs has failed. Broadcast messages should be available on a cell-by-cell basis to indicate the class(es) of subscribers barred from network access. The use of this facility allows the network operator to prevent overload of the access channel under critical conditions
[66] Access attempts are allowed if the UE 1 is a member of at least one AC that corresponds to the permitted classes as signaled over the air interface and the AC is applicable in the serving UTRAN 2. Access attempts are otherwise not allowed. Any number of these AC may be barred at any one time. Access Classes are applicable as indicated in Table V.
[67] Table 5 [Table 5]
Figure imgf000013_0001
[68] An additional control bit for AC 10 is also signaled over the air interface to the UE 1. This control bit indicates whether access to the UTRAN 2 is allowed for Emergency Calls for UEs 1 with access classes 0 to 9 or without an International Mobile Subscriber Identity (IMSI). Emergency calls are not allowed if both AC 10 and the relevant AC, 11 to 15 are barred for UEs 1 with access classes 11 to 15. Emergency calls are otherwise allowed.
[69] The AC are mapped to ASC In the UMTS. There are eight different priority levels defined, specifically ASC 0 to ASC 7, with level 0 representing the highest priority. [70] Access Classes shall only be applied at initial access, such as when sending an RRC Connection Request message. A mapping between AC and ASC shall be indicated by the information element "AC-to-ASC mapping" in System Information Block type 5. The correspondence between AC and ASC is indicated in Table VI.
[71] Table 6 [Table 6]
Figure imgf000013_0002
[72] In Table VI, "nth IE" designates an ASC number i in the range 0 - 7 to AC. The UE 1 behavior is unspecified if the ASC indicated by the "nth IE" is undefined. [73] The parameters implied by the respective ASC are utilized for random access. A UE 1 that is a member of several ACs selects the ASC for the highest AC number. The AC is not applied in connected mode.
[74] An ASC consists of a subset of RACH preamble signatures and access slots that are allowed for the present access attempt and a persistence value corresponding to a probability, Pv < 1, to attempt a transmission. Another important mechanism to control random access transmission is a load control mechanism that reduces the load of incoming traffic when the collision probability is high or when the radio resources are low. A flow chart of the control access procedure is illustrated in FIG. 11. [75] Existing specifications provide many RACH transmission control parameters that are stored and updated by the UE 1 based on system information broadcast by the UTRAN 2. These parameters are received from RRC (SlO). The RACH transmission control parameters include PRACH, ASC, maximum number of preamble ramping cycles (M max), range of backoff interval for timer (TBoi> specified as a number of 10 ms transmission time intervals (NBoimax) and (NBoimm) and applicable when NACK is received on AICH.
[76] When it is determined that there is data to transmit (S20), the UE 1 maps the assigned
AC to an ASC (S30). A count value M is then set to zero (S40).
[77] The count value M is then incremented by one (S50). The UE 1 determines if the count value M, which represents the maximum number of RACH transmission attempts, exceeds the maximum number of permitted RACH transmission attempts M max (S60).
[78] The UE 1 treats the transmission as unsuccessful if M exceeds M1112x. The UE 1 then indicates the unsuccessful transmission to a higher layer (S70)
[79] However, the UE 1 proceeds with the RACH access procedure if M is less than or equal to M1112x. The UE 1 updates the RACH transmission control parameters (S80). A 10 ms timer T2 is set (S90) and the UE 1 determines whether to attempt transmission based on the persistence value Pi associated with the ASC selected by the UE.
[80] Specifically, a random number between 0 and 1, R1, is generated (SlOO) and the random number is compared to the persistence value (Sl 10). The UE 1 does not attempt transmission if R1 is less than or equal to the persistence value P1 and waits until the 10 ms timer T2 expires (S 120) before repeating the RACH access procedure by updating the RACH transmission control parameters (S80). However, the UE 1 attempts to transmit using assigned RACH resources (S 130) if Ri is less than or equal to the persistence value P1
[81] The UE 1 determines whether the response from the network is an Acknowledgement (ACK), a Non- Acknowledgment (NACK) or no response (S 150) after the access attempt is transmitted. The UE 1 begins message transmission (S 160) if an ACK is received, thereby indicating receipt of the UE transmission by the UTRAN 2. The UE 1 does not transmit the message and repeats the RACH access procedure by incrementing the count value M (S50) if no response is received or a NACK is received, thereby indicating a failed receipt of the transmission by the network, for example, due to a collision.
[82] The UE 1 only waits until the 10 ms timer T2 expires (S 170) before repeating the
RACH access procedure if no response was received. However, the UE 1 waits until the 10 ms timer T2 expires (S 180) and also randomly generates a back off value NBoi associated with the PRACH assigned to the UE and between NE0I1112X and NBoimm and waits an additional back off interval TBoi that is equal to 10 ms multiplied by the back off value NBoi (S 190) before repeating the RACH access procedure if a NACK was received.
[83] The physical layer (Ll) random access procedure is initiated upon request from the
MAC sub layer (L2). The physical layer receives information from a higher layer, specifically the RRC, before the physical random-access procedure is initiated and receives information from a higher layer, specifically the MAC, at each initiation of the physical random access procedure. The information is indicated in Table VII. The physical layer random-access procedure is illustrated in FIG. 12.
[84] As illustrated in FIG. 12, one access slot in the random access subchannel that can be used for the given ASC is randomly selected from access slots that can be used in the next full access slot sets (S200). One access slot is randomly chosen from access slots that can be used in the next full access slot sets if there are no access slots available. One signature is then randomly selected from the set of available signatures within the given ASC (S210).
[85] The preamble retransmission counter is set at Preamble Retrans Max (S220), which is the maximum number of preamble retransmission attempts. The preamble transmission power is set at Preamble Initial Power (S230), which is the initial transmission power of the preamble. The preamble is then transmitted according to the chosen uplink access slot, signature and set transmission power (S240).
[86] The UE 1 then determines whether the UTRAN 2 detected the preamble (S250). No random access message is transmitted if a NACK is detected in the downlink access slot corresponding to the selected uplink access slot. A random access message is transmitted if an ACK is detected in the downlink access slot corresponding to the selected uplink access slot. The preamble is retransmitted if no response, specifically neither an ACK nor a NACK for the selected signature, is detected in the downlink access slot corresponding to the selected uplink access slot.
[87] Table 7
[Table 7]
Figure imgf000016_0001
[88] When no response is received, the next available access slot is selected from the random access subchannel within the given ASC (S260), a new signature is randomly selected from the available signatures within the given ASC (S270), the preamble transmission power is increased by the step width of the power ramping (Power Ramp Step) (S280) and the preamble retransmission counter is reduced by 1 (S290). The UE 1 then determines if the maximum number of retransmissions have been attempted (S300). This preamble re-transmission procedure is repeated for as long as the preamble retransmission counter exceeds 0 and no response is received. The MAC is informed that no ACK was received on AICH (S310) and the physical layer random access procedure is terminated once the retransmission counter reaches 0.
[89] If an ACK is received, the transmission power of the control channel of the random access message is set at a level higher than the transmission power of the last preamble transmitted according to a power offset (S320) and the random access message is transmitted 3 or 4 uplink access slots after the uplink access slot of the last transmitted preamble depending on the AICH transmission timing parameter (S330). The higher layer is then informed of the receipt of the ACK and transmission of the random access message (S340) and the physical layer random access procedure is terminated.
[90] If a NACK is received, no random access message is transmitted and no retransmission of the preamble is performed. The MAC is informed that a NACK was received (S350) and the physical layer random access procedure is terminated.
[91] FIG. 13 illustrates a signaling establishment procedure between a UE 1 and UTRAN
2. As illustrated in FIG. 13, the RRC Connection Request message is transmitted once the PRACH power control preambles have been acknowledged (S400). The RRC Connection Request message includes a reason for requesting the connection.
[92] The UTRAN 2 determines which resources to reserve and performs synchronization and signaling establishment among radio network nodes, such as a NodeB 5 and serving RNC 4, depending on the request reason (S410). The UTRAN 2 then transmits the Connection Setup message to the UE 1, thereby conveying information about radio resource to use (S420).
[93] The UE 1 confirms connection establishment by sending the Connection Setup
Complete message to the UTRAN 2 (S430). The UE 1 transmits the Initial Direct Transfer message to the UTRAN 2 once the connection has been established (S440). The Initial Direct Transfer message includes information such as the UE identity, UE current location and the kind of transaction requested.
[94] Authentication is then performed between the UE 1 and UTRAN 2 and security mode communication is established (S450). The actual set up information is delivered to the UTRAN 2 from the UE 1 via the Call Control Setup message (S460). The Call Control Setup message identifies the transaction and indicates the QoS requirements.
[95] The UTRAN 2 initiates activities for radio bearer allocation by determining if there are sufficient resources available to satisfy the requested QoS and transmits the Call Control Complete message to the UE 1 (S470). The radio bearer is allocated according to the request if there are sufficient resources available. The UTRAN 2 may select either to continue allocation with a lowered QoS value, queue the request until sufficient radio resources become available or reject the call request if sufficient resources are not presently available.
[96] The long-term evolution (LTE) of UMTS is under discussion by the 3rd generation partnership project (3GPP) that standardized UMTS. The 3GPP LTE is a technology for enabling high-speed packet communications. Many schemes have been proposed for the LTE objective including those that aim to reduce user and provider costs, improve service quality, and expand and improve coverage and system capacity.
[97] The 3G LTE requires reduced cost per bit, increased service availability, flexible use of a frequency band, a simple structure, an open interface, and adequate power consumption of a terminal as an upper-level requirement. Generally, The UTRAN 2 corresponds to E-UTRAN (Evolved-UTRAN). The NodeB 5 and / or RNC 4 correspond to e-NodeB in the LTE system. The following is the overview of the current LTE study assumption for RACH.
[98] The random access procedure is classified into two categories; non- synchronized random access and synchronized random access. Only the non- synchronized random access procedure is considered herein.
[99] Non- synchronized access is used when the uplink from a UE 1 has not been time synchronized or when the UE uplink loses synchronization. Non- synchronized access allows the UTRAN 2 to estimate and adjust the UE 1 transmission timing if necessary. Therefore the non- synchronized random access preamble is used for at least time alignment and signature detection.
[100] FIG. 14 illustrates a random access burst. The message payload may include any additional associated signaling information, such as a random ID, Pathloss/Channel Quality indicator (CQI), or access purpose. A message payload up to 6 bits is transmitted in the random access burst along with the preamble as illustrated in FIG. 14.
[101] A UE 1 randomly selects a signature from a group of signatures to distinguish between different UEs that attempt an access simultaneously. The preamble must have good auto-correlation properties in order for the UTRAN 2 to obtain an accurate timing estimate.
[102] Additionally, different preambles should have good cross-correlation properties in order for the UTRAN 2 to distinguish between simultaneous access attempts for different UEs 1 using different signatures. A constant amplitude zero auto-correlation (CAZAC) sequence is used as a preamble signature sequence to achieve good detection probability.
[103] Layer 1 shall receive the information listed in Table VIII from the higher layers prior to initiation of the non- synchronized physical random access procedure. The information is transmitted as part of the System Information from higher layers.
[104] Table 8 [Table 8]
Information received from higher layers prior to initiation of the non- synchronized physical random access procedure
Random access channel parameters (number, frequency position, time period, and timing offset)
Preamble format for the cell
Number of root ZC sequences and sequence indices
Preamble mapping to implicit message (set of cause values, CQI quantization parameters, signature mapping)
Power ramping step size (note 0 dB step size is allowed)
Maximum number of preamble retransmissions
[105] FIG. 15 illustrates a call flow diagram for a non-synchronized physical random access procedure. As illustrated in FIG. 15, the physical layer (Ll) random access procedure encompasses successful transmission of the random access preamble (message 1) and the random access response (message T). The remaining messages are scheduled for transmission by the higher layer on the shared data channel and thus are not considered part of the Ll random access procedure. A random access channel is a 1.08 MHz portion of a subframe or set of consecutive subframes reserved for random access preamble transmissions.
[106] A random access channel is randomly selected from the available non-synchronized random access channels and a preamble sequence is then randomly selected from the available preamble set based on the message to be transmitted. The random access procedure ensures that each of the allowed selections is chosen with equal probability.
[107] The initial preamble transmission power level, which is set by the MAC, is determined using an open loop power control procedure. The transmission counter is set to the maximum number of preamble retransmissions.
[108] A Random Access Preamble (message 1) is then transmitted using the selected random access channel, preamble sequence, and preamble transmission power. The Ll status "ACK on non- synchronized random access received" is reported to the higher layers, such as the MAC, and the physical random access procedure is terminated if a Random Access Response (message T) corresponding to the transmitted preamble sequence (message 1) is detected. Another random access channel and preamble are randomly selected if no Random Access Response (message T) corresponding to the transmitted preamble sequence (message 1) is detected.
[109] Preamble retransmission occurs as long as the maximum transmission power and the maximum number of retransmissions have not been reached. The Ll status "no ac- knowledgment on non- synchronized random access" is reported to the higher layers, such as the MAC, and the physical random access procedure is terminated if the maximum transmission power or the maximum number of retransmissions has been reached.
[110] The main purpose of the LTE (Long Term Evolution) random access procedure is to obtain uplink time synchronization and to obtain access to the network. A random access mechanism can be described where a preamble is sent from a UEl to a NodeB 5 in order to determine the timing misalignment. The preamble structure is based on Zadoff-Chu sequences with Zero Correlation Zone (ZC-ZCZ) and different root sequence indices when the required number of zones cannot be generated.
[I l l] The zero-correlation zone for the ZC-ZCZ sequence is generated using a cyclic shift version of the Zadoff-Chu (ZC) carrier sequence. Cyclic shifts within the same root sequence then form an ideal set of signatures for LTE RACH preambles since their cross-correlation is zero.
[112] However, this is true only if the frequency error is small and for UEs 1 with low mobility. The excellent properties of ZC-ZCZ sequences disappear as the frequency error increase for high-speed mobility UEs 1, thereby inducing overlapping between shifted sequences and making the sequence detection poor and impossible in some cases. Therefore, the cyclic shift is designed to avoid overlapping with the next shifted position when high-speed mobility UEs 1 are supported within the cell, which results in the use of a restricted set of cyclic shifts.
[113] In other words the preamble cyclic shift length design differs for cells supporting high-speed mobility UEs 1. In fact, the cyclic shift depends not only on cell size but is also proportional to sequence index when there is high Doppler.
[114] Therefore, the LTE RACH preamble sequence design is different for low and high mobility UEs 1. Furthermore, the conventional procedure does not use Zadoff-Chu sequences with Zero Correlation Zone (ZC-ZCZ) sequences for the RACH preamble.
[115] For example, the WCDMA RACH preamble consists of 4096 chips, which is a sequence of 256 repetitions of Hadamard codes of length 16 and scrambling codes. This facilitates simple and accurate frequency error estimation then the same sequence design is used for both low and high speed UEs 1.
[116] In one aspect of the present invention, a method of establishing a communication link between a mobile terminal and a network is provided. The method includes receiving an indication of whether a communication cell supports high speed mobility, generating sequences corresponding to signatures available for random access and requesting access to the network using a selected one of the generated sequences, wherein either the sequences are generated according to whether high speed mobility is supported or the generated sequence is selected according to whether high speed mobility is supported.
[117] It is contemplated that the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and further comprising mapping allowable signatures onto the cyclic shifted ZC sequences. It is further contemplated that each available random access signature is mapped onto a cyclic shifted ZC sequence using all possible cyclic shifted ZC sequences if high mobility is not supported. Preferably, each available random access signature is mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to a sequence index.
[118] In another aspect of the present invention, a method of establishing a communication link between a mobile terminal and a network is provided. The method includes generating sequences corresponding to signatures available for random access, the sequences generated according to a process that either supports high mobility or does not support high speed mobility, transmitting an indication of whether high speed mobility is supported, receiving an access request from a mobile terminal, the access request using a selected one of the generated sequences and correlating the received request to each of the generated sequences in order to determine which of the generated sequences was used by the mobile terminal.
[119] It is contemplated that the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and further comprising mapping allowable signatures onto the cyclic shifted ZC sequences. It is further contemplated that each available random access signature is mapped onto a cyclic shifted ZC sequence using all possible cyclic shifted ZC sequences if high-speed mobility is not supported. Preferably, each available random access signature is mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to a sequence index.
[120] In another aspect of the present invention, a method of establishing a communication link between a mobile terminal and a network is provided. The method includes receiving an indication of whether a cell supports high-speed mobility and requesting access to the network using the indication, wherein the indication indicates information on restricted use of cyclic shifts.
[121] It is contemplated that the indication comprises one bit. It is further contemplated that requesting access to the network includes generating sequences corresponding to signatures available for random access and requesting access to the network using a selected one of the generated sequences, wherein either the sequences are generated according whether high speed mobility is supported or the generated sequence is selected according to whether high speed mobility is supported. Preferably, the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and further comprising mapping allowable signatures onto the cyclic shifted ZC sequences, each available random access signature mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to the indication.
[122] In another aspect of the present invention, a method of establishing a communication link between a mobile terminal and a network is provided. The method includes transmitting an indication of whether a cell supports high speed mobility and receiving a request to access the network from the mobile terminal, wherein the indication indicates information on restricted use of cyclic shifts and the request is based on the indication.
[123] It is contemplated that the indication comprises one bit. It is further contemplated that the method further includes generating sequences corresponding to signatures available for random access, the sequences generated according to a process that either supports high mobility or does not support high speed mobility, receiving the access request from the mobile terminal, the access request using a selected one of the generated sequences and correlating the received request to each of the generated sequences in order to determine which of the generated sequences was used by the mobile terminal. Preferably, the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and further comprising mapping allowable signatures onto the cyclic shifted ZC sequences, each available random access signature mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to the indication.
[124] In another aspect of the present invention, a mobile terminal for of establishing a communication link with a network is provided. The mobile terminal includes a transmitting/receiving unit transmitting and receiving messages between the mobile terminal and the network, a display unit displaying user interface information, an input unit receiving inputs from a user and a processing unit processing a received indication of whether a communication cell supports high speed mobility, generating sequences corresponding to signatures available for random access and controlling the transmitting/receiving unit to request access to the network using a selected one of the generated sequences, wherein the processing unit either generates the sequences according to whether high speed mobility is supported or the selects the generated sequence according to whether high speed mobility is supported.
[125] It is contemplated that the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and the processing unit further maps allowable signatures onto the cyclic shifted ZC sequences. It is further contemplated that the processing unit maps each available random access signature onto a cyclic shifted ZC sequence using all possible cyclic shifted ZC sequences if high mobility is not supported. Preferably, the processing unit maps each available random access signature onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to a sequence index.
[126] In another aspect of the present invention, a mobile terminal for of establishing a communication link with a network is provided. The mobile terminal includes a transmitting/receiving unit transmitting and receiving messages between the mobile terminal and the network, a display unit displaying user interface information, an input unit receiving inputs from a user and a processing unit processing a received indication of whether a cell supports high speed mobility and controlling the transmitting/ receiving unit to request access to the network using the indication, wherein the indication indicates information on restricted use of cyclic shifts.
[127] It is contemplated that the indication comprises one bit. It is further contemplated that processing unit controls the transmitting/receiving unit to request access to the network by generating sequences corresponding to signatures available for random access and requests access to the network using a selected one of the generated sequences, wherein the processing unit either generates the sequences according to whether high speed mobility is supported or the selects the generated sequence according to whether high speed mobility is supported. Preferably, the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and the processing unit maps allowable signatures onto the cyclic shifted ZC sequences, each available random access signature mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to the indication.
[128] In another aspect of the present invention, a network for establishing a communication link with a mobile terminal is provided. The network includes a transmitter transmitting messages to the mobile terminal, a receiver receiving messages from the mobile terminal and a controller generating sequences corresponding to signatures available for random access, controlling the transmitter to transmit an indication of whether high speed mobility is supported, processing a received access request from a mobile terminal that uses a selected one of the generated sequences, and correlating the received request to each of the generated sequences in order to determine which of the generated sequences was used by the mobile terminal, wherein the controller generates the sequences according to a process that either supports high mobility or does not support high speed mobility.
[129] It is contemplated that the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and the controller maps allowable signatures onto the cyclic shifted ZC sequences. It is further contemplated that the controller maps each available random access signature onto a cyclic shifted ZC sequence using all possible cyclic shifted ZC sequences if high-speed mobility is not supported. Preferably, the controller maps each available random access signature onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to a sequence index.
[130] In another aspect of the present invention, a network for establishing a communication link with a mobile terminal is provided. The network includes a transmitter transmitting messages to the mobile terminal, a receiver receiving messages from the mobile terminal and a controller controlling the transmitter to transmit an indication of whether a cell supports high speed mobility and processing a received request to access the network from the mobile terminal, wherein the indication indicates information on restricted use of cyclic shifts and the access request is based on the indication.
[131] It is contemplated that the indication comprises one bit. It is further contemplated that the controller further generates sequences corresponding to signatures available for random access, the sequences generated according to a process that either supports high mobility or does not support high speed mobility and correlates the received access request to each of the generated sequences in order to determine which of the generated sequences the mobile terminal used when sending the access request. Preferably, the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and the controller maps allowable signatures onto the cyclic shifted ZC sequences, each available random access signature mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to the indication.
[132] Additional features and advantages of the invention will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the invention. It is to be understood that both the foregoing general description and the following detailed description of the present invention are exemplary and explanatory and are intended to provide further explanation of the invention as claimed.
[133] These and other embodiments will also become readily apparent to those skilled in the art from the following detailed description of the embodiments having reference to the attached figures, the invention not being limited to any particular embodiments disclosed. Brief Description of the Drawings
[134] The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention. Features, elements, and aspects of the invention that are referenced by the same numerals in different figures represent the same, equivalent, or similar features, elements, or aspects in accordance with one or more embodiments. [135] FIG. 1 illustrates an overview of a UMTS network.
[136] FIG. 2 illustrates a structure of a radio interface protocol between a UE and the UTRAN according to the 3GPP radio access network standards.
[137] FIG. 3 illustrates the different logical channels.
[138] FIG. 4 illustrates logical channels mapped onto transport channels as seen from the UE side.
[139] FIG. 5 illustrates logical channels mapped onto transport channels as seen from the UTRAN side.
[140] FIG. 6 illustrates a power ramping procedure.
[141] FIG. 7 illustrates the number and spacing of access slots.
[142] FIG. 8 illustrates the timing of the preamble, Access Indicator and message part.
[143] FIG. 9 illustrates the structure of the random access message part.
[144] FIG. 10 illustrates the structure of the AICH.
[145] FIG. 11 illustrates a control access procedure.
[146] FIG. 12 illustrates a physical layer random- access procedure.
[147] FIG. 13 illustrates a signaling establishment procedure between a UE and network.
[148] FIG. 14 illustrates a random access burst.
[149] FIG. 15 illustrates a call flow diagram for a non-synchronized physical random access procedure.
[150] FIG. 16 illustrates an example of possible channel response of indexes M and (M+ 1) in a high Doppler environment.
[151] FIG. 17 illustrates the relationship between a sequence index M and various circular shift approaches when high-speed mobility is supported according to the present invention.
[152] FIG. 18 illustrates channel response in high Doppler environments.
[153] FIG. 19 illustrates a block diagram of a mobile station (MS) or access terminal (AT) according to the present invention. Mode for the Invention
[154] The present invention allows a UE 1 to correctly map the signature indexes onto the cyclic shifted ZC sequences when the deployed cells support a high-speed mobility UE 1. The present invention proposes to inform a UE 1 whether a cell supports high-speed mobility such that RACH signatures may be correctly mapped onto the cyclic shifted ZC sequences. This information may either be broadcast on the system information in a cell or fixed in the standard. Reference will now be made in detail to the preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings.
[155] The ZC sequences of odd length N are defined by the following equation: [156] au(k) = exp [-j2τr M (k(k+1)/2N)], where: N is a sequence length,
M = 1 ... N-1 is a root index of different sequences, and k= 0 ... N-1 are indexes of the samples of a sequence.
[157] ZC sequences have ideal correlation properties in the absence of frequency error, such that the periodic autocorrelation shows no side-peaks and the cross-correlation between two sequences with different a root index M has a constant value when the index of the samples of a sequence N is a prime number. Therefore, cyclic shifts of a sequence form an ideal set of signatures for RACH preambles because their cross- correlation is zero and they can all be detected simultaneously using frequency domain processing.
[158] The number of cyclic shifts available for a single root index M depends on the length of the sequence and the propagation delay uncertainty: The shift must be larger than the maximum propagation delay for given cell sizes.
[159] However, this is true only if the frequency error is small, such as for low-speed mobility UEs 1. The ZC sequences are quite sensitive to the frequency error. The frequency error does not severely affect the cross-correlation between two ZC sequences but affects the detection of contiguous sequences due to overlapped channel response that cannot be discriminated from each other, an example of which is illustrated in FIG. 16. The duration between the correct timing of the delay profile in FIG. 16, such as t for M and 2t for M+l, and the alias of the delay profile, such as t-M and t+M, caused by large frequency offset in a high-speed mobility UE 1 is proportional to sequence index M.
[160] Performance is improved if cyclic shifts in high Doppler environments are limited so that the cyclic shift pairs of each sequence period uncertainty are not in the sequence period uncertainty of any RACH preamble and the cyclic shift of t-1 of each sequence period uncertainty is different from the cyclic shifts of t +1 of all sequences period uncertainty. This results in using a restricted set of cyclic shifts for cells supporting highspeed mobility UEs 1.
[161] The cyclic shift design may be done such that the alias channel response is not overlapped with the other circular shift positions since the frequency offset in a highspeed mobility UE 1 is proportional to sequence index M. Rules and methods of such design are known in the art.
[162] The cyclic shift design is different depending upon whether a cell supports highspeed mobility UEs 1. The basic random access procedure is for a UE 1 to send a random access preamble (message 1), which carries the signature access to Node B 5. However, the access signature is only sent to meet coverage requirement for non- synchronized random access within the LTE framework.
[163] The waveform of the LTE signature is based on Zadoff-Chu (ZC) with zero- correlation zones (ZCZ) and different mother sequence indexes when the required number of zones cannot be generated. This is because the number of ZCZ sequences is reduced inversely proportionally to cell radius. Therefore, additional ZCZ sequences from another index are added when the number of ZCZ sequences insufficient.
[164] The zero-correlation zones allow for ideal detection in the presence of interfering preambles. The optimal auto-correlation property of the CAZAC sequence is destroyed when the Doppler spread of a high-speed mobility UE 1 induces the frequency offset, thereby resulting in degraded detection performance. Doppler shift and frequency error on the uplink have properties depending on the channel condition, for example, line- of-site (LOS) condition or Non-line-of-site (NLOS) condition.
[165] Frequency offset due to UE 1 mobility is spread over a range from the carrier frequency In NLOS. Therefore, a UE 1 tracks around the
Figure imgf000027_0001
frequency offset. The frequency offset of the received uplink signal is nearly zero and one way Doppler spread can be considered.
[166] The maximum frequency offset of the receiver signal In LOS, such as when a highspeed mobility vehicle moves towards or away from the Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) 2, is described as:
[167] foffset, UL = ΔfuE + 2fDoppler_max, where fBs denotes the base station frequency drift,
ΔfuE denotes UE 1 frequency error and
ΪDoppier max denotes the maximum Doppler frequency.
[168] The worst-case frequency offset is around 1400Hz with mobility of 350 km/h at a 2 GHz carrier frequency. A UE 1 tracks around 650Hz Doppler shift on the downlink in the LOS environment and then transmits uplink data compensated frequency offset in advance based on the estimated frequency offset on the downlink. Therefore, the frequency offset due to UE 1 mobility becomes twice of the Doppler shift of the channel at the NodeB 2, for example, 1300Hz.
[169] There may be two or three dominant components at the detection stage if there is frequency offset at the receiver due to Doppler spread or residual frequency offset, as illustrated in FIG. 17. Therefore, the frequency offset spreads the channel response over a wide range depending on the sequence index M that is used. [170] It is possible to predict where the channel response will occur if frequency offset exists when the ZC sequence index is known. The circular shift should be designed such that the alias channel response is not overlapped with the other circular shift positions. Therefore, the cyclic shift is depends not only on the cell size but also is proportional to the sequence index M, which results in the restricted set of cyclic shifts as compared to the low Doppler case and also in different RACH signature mapping.
[171] The methods and approaches regarding how to design the cyclic shifts when a cell supports high-speed mobility are known in the art. For example, rules for three different approaches are proposed.
[172] The first approach is an "additional margin method" where:
[173] 1 < M < 2T0 and N - 2T0 < M < N - 1
[174] [00171] The second approach is a "multiple circular shifts as one opportunity method" where:
[175] 2T0 < M < |_N/3j and N - [_N/3j < M < N - 2T0 [176] The third approach is an "index selection method" where: [177]
LN/3J < M < L2N/3J
[178] In all three approaches, N is a sequence length or ZC sequence length, M is one sequence index or a ZC root index, and T0 is the minimum cyclic shift for a given cell based on cell size. The necessary information, such as N, can be fixed in a standard while other information, such as T0 and M, should be broadcast on the system information.
[179] The present invention proposes that the network broadcast one information bit to inform a UE 1 if high-speed mobility UEs is supported. This information bit would enable correct mapping of RACH signatures onto the cyclic shifted ZC sequences. A UE 1 reads the information bit indicating support of high-speed mobility in a cell or indicating the use of a restricted set of cyclic shifts upon receiving a broadcast message relative to RACH information.
[180] Information related to TO and M shall have already obtained by a UE 1 from information broadcast by the E-UTRAN 2 before processing the information bit. The UE 1 shall have also already obtained information related to N and the maximum number of RACH signatures from the broadcast information if those values are not fixed by a standard. The UE 1 then determines whether the information bit indicates that highspeed mobility is supported.
[181] Mapping of RACH signatures onto the cyclic shifted ZC sequences can be easily performed for each cell when high-speed mobility is not supported, as indicated by the information bit having a value of "FALSE" or "0." A UE 1 and E-UTRAN 2 can map RACH signatures onto the ZC sequences of index M, with RACH signatures incrementally mapped onto subsequent cyclic- shifted versions by T0 of the same ZC sequence until all possible cyclic shifts have been mapped for a given index M. New consecutive indexes M are added until the total number of signatures equals a value specified in the standard or system information.
[182] The E-UTRAN 2 may broadcast only one index M, with the UE 1 using consecutive indexes to generate the number of required preambles. An alternative is for the E- UTRAN 2 to broadcast a set of several indexes M not necessarily consecutive to each other, with the UE 1 using the first index within the set and then using consecutive indexes within the set and mapping signatures in the same manner by starting from a higher or lower sequence index.
[183] Specifically, the UE 1 starts mapping RACH signatures onto the cyclic shifted ZC sequences by mapping onto the first ZC sequence of the received index M or on the first index M in a received list. The UE 1 then incrementally maps the next subsequent signatures onto subsequent right-cyclic-shifted versions by the minimum cyclic shift length T0 of the same ZC sequence index M until the maximum number of RACH signatures is reached or all possible cyclic shifts of index M have been obtained.
[184] The UE 1 maps the next signature onto the next ZC sequence index M+l or the next index in the list if the maximum number of RACH signatures is not reached before all possible cyclic shifts of index M are used. The UE 1 then maps the next subsequent signatures onto its subsequent right-cyclic-shifted versions by the minimum cyclic shift length T0. This signature mapping is repeated over all ZC sequence indexes and stops when the maximum number of RACH signatures is reached.
[185] The rules for using a restricted set of cyclic shifts for cells supporting high-speed mobility UEs 1 are applied when the information bit has a value of "TRUE" or "1." These rules can be either fixed in a standard or broadcast by the E-UTRAN 2.
[186] A UE 1 and the E-UTRAN 2 calculate the available cyclic shifts proportional to the index M and add new consecutive indexes M+l by adjusting the cyclic shifts proportionally until the total number of signatures equals a value specified in the standard or system information. The relationship between the three cyclic shift approaches and the sequence index M is applied as illustrated In FIG. 18.
[187] The E-UTRAN 2 may broadcast only one index M, with the UE 1 using consecutive indexes to generate the number of required preambles. An alternative is for the E- UTRAN 2 to broadcast a set of several indexes M not necessarily consecutive to each other, with the UE 1 using the first index within the set and then using consecutive indexes within the set and mapping signatures in the same manner by starting from a higher or lower sequence index and mapping signatures in the same manner by applying the relationships illustrated in FIG. 18, starting from a higher or lower sequence index.
[188] Specifically, the UEl starts mapping RACH signatures onto the cyclic shifted ZC sequences by determining, for received index M or for the first index M in a received list, the cyclic shift that can be applied according to the restricted set of cyclic shifts that can be used. The previously described rules are used as an example, but it should be noted that other possible rules for determining the restricted set of cyclic shifts could be applied.
[189] The UE 1 determines the minimum cyclic shift Tmn according to the first approach if
1 < M < 2T0 or N - 2T0 < M < N - 1.
The UE 1 determines the minimum cyclic shift Tmn according to the second approach if
2T0 < M < LN/3J or N - LN/3J < M < N - 2T0.
The UE 1 determines the minimum cyclic shift Tmn according to the third approach if LN/3_] < M < |_2N/3j.
The determined Tmin value is then set with the minimum cyclic shift of index M. [190] The UE 1 maps the first signature onto the first ZC sequence of the received index M or on the first index M in a received list. The UE 1 then incrementally maps the next subsequent signatures onto subsequent right-cyclic-shifted versions by the minimum cyclic shift length Tmn of the same ZC sequence index M until the maximum number of RACH signatures is reached or all possible cyclic shifts of index M have been obtained.
[191] The UE 1 selects the next ZC sequence index M+l or the next index in the list and maps the next signature onto the ZC sequence of index M+l or the next index in the list if the maximum number of RACH signatures is not reached before all possible cyclic shifts of index M are used. The UE 1 determines the minimum cyclic shift Tmin according to the first approach if 1 < (M + 1 ) < 2T0 or N - 2T0 < (M + 1 ) < N - 1.
The UE 1 determines the minimum cyclic shift Tmn according to the second approach if
2T0 < (M + 1 ) < LN/3J or N - LN/3J < (M + 1 ) < N - 2T0. The UE 1 determines the minimum cyclic shift Tmn according to the third approach if
LN/3j < (M + 1) < L2N/3j.
The determined Tmn value is then set with the minimum cyclic shift of index M + l. [192] The determined Tmn value is then set with the minimum cyclic shift of index M + l. The UE 1 then incrementally maps the next subsequent signatures onto subsequent right-cyclic- shifted versions by the minimum cyclic shift length Tmnof the same ZC sequence index M + 1 until the maximum number of RACH signatures is reached or all possible cyclic shifts of index M + 1 have been obtained. This signature mapping is repeated over all ZC sequence indexes and stops when the maximum number of RACH signatures is reached.
[193] FIG. 19 illustrates a block diagram of a mobile station (MS) or UE 1. The AT 2 includes a processor (or digital signal processor) 510, RF module 535, power management module 505, antenna 540, battery 555, display 515, keypad 520, memory 530, SIM card 525 (which may be optional), speaker 545 and microphone 550.
[194] A user enters instructional information, such as a telephone number, for example, by pushing the buttons of a keypad 520 or by voice activation using the microphone 550. The microprocessor 510 receives and processes the instructional information to perform the appropriate function, such as to dial the telephone number. Operational data may be retrieved from the Subscriber Identity Module (SIM) card 525 or the memory module 530 to perform the function. Furthermore, the processor 510 may display the instructional and operational information on the display 515 for the user's reference and convenience.
[195] The processor 510 issues instructional information to the RF module 535, to initiate communication, for example, transmits radio signals comprising voice communication data. The RF module 535 comprises a receiver and a transmitter to receive and transmit radio signals. An antenna 540 facilitates the transmission and reception of radio signals. Upon receiving radio signals, the RF module 535 may forward and convert the signals to baseband frequency for processing by the processor 510. The processed signals would be transformed into audible or readable information outputted via the speaker 545, for example. The processor 510 also includes the protocols and functions necessary to perform the various processes described herein.
[196] As the present invention may be embodied in several forms without departing from the spirit or essential characteristics thereof, it should also be understood that the above-described embodiments are not limited by any of the details of the foregoing description, unless otherwise specified, but rather should be construed broadly within its spirit and scope as defined in the appended claims. Therefore, all changes and modifications that fall within the metes and bounds of the claims, or equivalence of such metes and bounds are intended to be embraced by the appended claims.
[197] The foregoing embodiments and advantages are merely exemplary and are not to be construed as limiting the present invention. The present teaching can be readily applied to other types of apparatuses.
[198] The description of the present invention is intended to be illustrative, and not to limit the scope of the claims. Many alternatives, modifications, and variations will be apparent to those skilled in the art. In the claims, means-plus-function clauses are intended to cover the structure described herein as performing the recited function and not only structural equivalents but also equivalent structures.

Claims

Claims
[1] A method of establishing a communication link between a mobile terminal and a network, the method comprising: receiving an indication of whether a communication cell supports high-speed mobility; generating sequences corresponding to signatures available for random access; and requesting access to the network using a selected one of the generated sequences, wherein either the sequences are generated according to whether high-speed mobility is supported or the generated sequence is selected according to whether high-speed mobility is supported.
[2] The method of claim 1, wherein the generated sequences are cyclic shifted
Zadoff-Chu (ZC) sequences and further comprising mapping allowable signatures onto the cyclic shifted ZC sequences.
[3] The method of claim 2, wherein each available random access signature is mapped onto a cyclic shifted ZC sequence using all possible cyclic shifted ZC sequences if high mobility is not supported.
[4] The method of claim 2, wherein each available random access signature is mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to a sequence index.
[5] A method of establishing a communication link between a mobile terminal and a network, the method comprising: generating sequences corresponding to signatures available for random access, the sequences generated according to a process that either supports high mobility or does not support high-speed mobility; transmitting an indication of whether a cell supports high-speed mobility; receiving an access request from a mobile terminal, the access request using a selected one of the generated sequences; and correlating the received request to each of the generated sequences in order to determine which of the generated sequences was used by the mobile terminal.
[6] The method of claim 5, wherein the generated sequences are cyclic shifted
Zadoff-Chu (ZC) sequences and further comprising mapping allowable signatures onto the cyclic shifted ZC sequences.
[7] The method of claim 6, wherein each available random access signature is mapped onto a cyclic shifted ZC sequence using all possible cyclic shifted ZC sequences if high-speed mobility is not supported.
[8] The method of claim 6, wherein each available random access signature is mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to a sequence index.
[9] A method of establishing a communication link between a mobile terminal and a network, the method comprising: receiving an indication of whether a cell supports high-speed mobility; and requesting access to the network using the indication, wherein the indication indicates information on restricted use of cyclic shifts.
[10] The method of claim 9, wherein the indication comprises one bit.
[11] The method of claim 9, wherein requesting access to the network comprises: generating sequences corresponding to signatures available for random access; and requesting access to the network using a selected one of the generated sequences, wherein either the sequences are generated according whether high-speed mobility is supported or the generated sequence is selected according to whether high-speed mobility is supported.
[12] The method of claim 11, wherein the generated sequences are cyclic shifted
Zadoff-Chu (ZC) sequences and further comprising mapping allowable signatures onto the cyclic shifted ZC sequences, each available random access signature mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to the indication.
[13] A method of establishing a communication link between a mobile terminal and a network, the method comprising: transmitting an indication of whether a cell supports high-speed mobility; and receiving a request to access the network from the mobile terminal, wherein the indication indicates information on restricted use of cyclic shifts and the request is based on the indication.
[14] The method of claim 13, wherein the indication comprises one bit.
[15] The method of claim 13, further comprising: generating sequences corresponding to signatures available for random access, the sequences generated according to a process that either supports high mobility or does not support high-speed mobility; receiving the access request from the mobile terminal, the access request using a selected one of the generated sequences; and correlating the received request to each of the generated sequences in order to determine which of the generated sequences was used by the mobile terminal.
[16] The method of claim 15, wherein the generated sequences are cyclic shifted
Zadoff-Chu (ZC) sequences and further comprising mapping allowable signatures onto the cyclic shifted ZC sequences, each available random access signature mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to the indication.
[17] A mobile terminal for of establishing a communication link with a network, the mobile terminal comprising: a transmitting/receiving unit transmitting and receiving messages between the mobile terminal and the network; a display unit displaying user interface information; an input unit receiving inputs from a user; and a processing unit processing a received indication of whether a communication cell supports high-speed mobility, generating sequences corresponding to signatures available for random access and controlling the transmitting/receiving unit to request access to the network using a selected one of the generated sequences, wherein the processing unit either generates the sequences according to whether high-speed mobility is supported or the selects the generated sequence according to whether high-speed mobility is supported.
[18] The mobile terminal of claim 17, wherein the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and the processing unit further maps allowable signatures onto the cyclic shifted ZC sequences.
[19] The mobile terminal of claim 18, wherein the processing unit maps each available random access signature onto a cyclic shifted ZC sequence using all possible cyclic shifted ZC sequences if high mobility is not supported.
[20] The mobile terminal of claim 18, wherein the processing unit maps each available random access signature onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to a sequence index.
[21] A mobile terminal for of establishing a communication link with a network, the mobile terminal comprising: a transmitting/receiving unit transmitting and receiving messages between the mobile terminal and the network; a display unit displaying user interface information; an input unit receiving inputs from a user; and a processing unit processing a received indication of whether a cell supports high-speed mobility and controlling the transmitting/receiving unit to request access to the network using the indication, wherein the indication indicates information on restricted use of cyclic shifts.
[22] The mobile terminal of claim 21, wherein the indication comprises one bit.
[23] The mobile terminal of claim 21, wherein processing unit controls the transmitting/receiving unit to request access to the network by: generating sequences corresponding to signatures available for random access; and requests access to the network using a selected one of the generated sequences, wherein the processing unit either generates the sequences according to whether high-speed mobility is supported or the selects the generated sequence according to whether high-speed mobility is supported.
[24] The mobile terminal of claim 23, wherein the generated sequences are cyclic shifted Zadoff-Chu (ZC) sequences and the processing unit maps allowable signatures onto the cyclic shifted ZC sequences, each available random access signature mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to the indication.
[25] A network for establishing a communication link with a mobile terminal, the network comprising: a transmitter transmitting messages to the mobile terminal; a receiver receiving messages from the mobile terminal; and a controller generating sequences corresponding to signatures available for random access, controlling the transmitter to transmit an indication of whether high-speed mobility is supported, processing a received access request from a mobile terminal that uses a selected one of the generated sequences, and correlating the received request to each of the generated sequences in order to determine which of the generated sequences was used by the mobile terminal, wherein the controller generates the sequences according to a process that either supports high mobility or does not support high-speed mobility.
[26] The network of claim 25, wherein the generated sequences are cyclic shifted
Zadoff-Chu (ZC) sequences and the controller maps allowable signatures onto the cyclic shifted ZC sequences.
[27] The network of claim 26, wherein the controller maps each available random access signature onto a cyclic shifted ZC sequence using all possible cyclic shifted ZC sequences if high-speed mobility is not supported.
[28] The network of claim 26, wherein the controller maps each available random access signature onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to a sequence index.
[29] A network for establishing a communication link with a mobile terminal, the network comprising: a transmitter transmitting messages to the mobile terminal; a receiver receiving messages from the mobile terminal; and a controller controlling the transmitter to transmit an indication of whether a cell supports high-speed mobility and processing a received request to access the network from the mobile terminal, wherein the indication indicates information on restricted use of cyclic shifts and the access request is based on the indication.
[30] The network of claim 29, wherein the indication comprises one bit.
[31] The network of claim 29, wherein the controller further: generates sequences corresponding to signatures available for random access, the sequences generated according to a process that either supports high mobility or does not support high-speed mobility; and correlates the received access request to each of the generated sequences in order to determine which of the generated sequences the mobile terminal used when sending the access request. [32] The network of claim 31, wherein the generated sequences are cyclic shifted
Zadoff-Chu (ZC) sequences and the controller maps allowable signatures onto the cyclic shifted ZC sequences, each available random access signature mapped onto a cyclic shifted ZC sequence using a restricted set of all possible sequences, the restricted set determined according to the indication.
PCT/KR2007/006493 2007-02-12 2007-12-13 Methods and procedures for high speed ue access WO2008100009A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
CN2007800511999A CN101606334B (en) 2007-02-12 2007-12-13 Methods and procedures for high speed UE access
BRPI0721302-6A BRPI0721302A2 (en) 2007-02-12 2007-12-13 HIGH SPEED EU ACCESS METHODS AND PROCEDURES
EP07851464.3A EP2119059B1 (en) 2007-02-12 2007-12-13 Methods for high speed mobile terminal access
JP2009548983A JP4934203B2 (en) 2007-02-12 2007-12-13 Fast UE access method and procedure
MX2009008273A MX2009008273A (en) 2007-02-12 2007-12-13 Methods and procedures for high speed ue access.
CA2675929A CA2675929C (en) 2007-02-12 2007-12-13 Methods and procedures for high speed ue access

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US88952007P 2007-02-12 2007-02-12
US60/889,520 2007-02-12

Publications (1)

Publication Number Publication Date
WO2008100009A1 true WO2008100009A1 (en) 2008-08-21

Family

ID=39686275

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2007/006493 WO2008100009A1 (en) 2007-02-12 2007-12-13 Methods and procedures for high speed ue access

Country Status (10)

Country Link
US (5) US8787957B2 (en)
EP (1) EP2119059B1 (en)
JP (1) JP4934203B2 (en)
CN (1) CN101606334B (en)
BR (1) BRPI0721302A2 (en)
CA (1) CA2675929C (en)
MX (1) MX2009008273A (en)
RU (1) RU2429567C2 (en)
TW (1) TWI376899B (en)
WO (1) WO2008100009A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013179714A (en) * 2009-01-02 2013-09-09 Lg Electronics Inc Random access scheme for terminal
US8681750B2 (en) 2006-12-29 2014-03-25 Nokia Corporation Apparatus, methods, and computer program products providing limited use of Zadoff-Chu sequences in pilot or preamble signals
US8971281B2 (en) 2008-06-18 2015-03-03 Lg Electronics Inc. Method for transmitting MAC PDUs
US9049728B2 (en) 2009-01-02 2015-06-02 Lg Electronics Inc. Random access scheme for user equipment
US9078236B2 (en) 2009-01-05 2015-07-07 Lg Electronics Inc. Random access scheme for preventing unnecessary retransmission and user equipment for the same
US9125164B2 (en) 2008-06-18 2015-09-01 Lg Electronics Inc. Method of transmitting power headroom reporting in wireless communication system
US9265070B2 (en) 2008-06-18 2016-02-16 Lg Electronics Inc. Method for detecting failures of random access procedures
WO2016122377A1 (en) * 2015-01-30 2016-08-04 Telefonaktiebolaget Lm Ericsson (Publ) Methods of operating wireless terminals and network nodes using high speed vehicle network indicators and related wireless terminals and network nodes
CN107371184A (en) * 2016-05-13 2017-11-21 中兴通讯股份有限公司 resource allocation method, device and base station

Families Citing this family (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2429567C2 (en) 2007-02-12 2011-09-20 Эл Джи Электроникс Инк. Methods and procedures for high-speed accessing user equipment
EP2675088B1 (en) * 2007-03-19 2015-11-04 Godo Kaisha IP Bridge 1 Sequence report method and sequence report device
TW200840380A (en) * 2007-03-21 2008-10-01 Asustek Comp Inc Method and apparatus for handling random access procedure in a wireless communications system
CN101299620A (en) 2007-04-30 2008-11-05 华为技术有限公司 Method for determining zero correlation section length set, apparatus and mobile communication system thereof
US8223908B2 (en) * 2007-05-02 2012-07-17 Qualcomm Incorporated Selection of acquisition sequences for optimal frequency offset estimation
US8773968B2 (en) * 2007-08-06 2014-07-08 Texas Instruments Incorporated Signaling of random access preamble sequences in wireless networks
US20090073944A1 (en) * 2007-09-17 2009-03-19 Jing Jiang Restricted Cyclic Shift Configuration for Random Access Preambles in Wireless Networks
KR101622986B1 (en) * 2007-09-28 2016-05-23 시그널 트러스트 포 와이어리스 이노베이션 Method and apparatus for terminating transmission of a message in an enhanced random access channel
KR101712872B1 (en) 2007-10-25 2017-03-07 시그널 트러스트 포 와이어리스 이노베이션 Methods and apparatuses for management and setup of enhanced mac-e/es resources in cell-fach state
BRPI0819956A2 (en) 2008-01-02 2015-06-16 Interdigital Patent Holdings Methods and apparatus of new cellular selection.
MX2010006095A (en) * 2008-01-11 2010-07-01 Ericsson Telefon Ab L M Methods and devices for random access power control in a communications network.
DE602008003093D1 (en) * 2008-02-06 2010-12-02 Ericsson Telefon Ab L M Method for carrying out a random access method in a mobile device
WO2010060749A1 (en) 2008-11-03 2010-06-03 Nokia Siemens Networks Oy Random access preamble transmission design with multiple available random access channel resources
WO2010051662A1 (en) * 2008-11-04 2010-05-14 Huawei Technologies Co., Ltd. Method, apparatus and system for determining resource indices
KR20100096347A (en) * 2009-02-24 2010-09-02 주식회사 팬택 Method for random access process in mobile communication
EP2446671B1 (en) * 2009-06-26 2013-12-25 Nokia Solutions and Networks Oy Wake up procedure for a base station in a communications network
CN101959312B (en) * 2009-07-17 2013-03-27 大唐移动通信设备有限公司 UE (User Equipment)-aided method, device and system for adjusting power control parameters of PRACH (Packet Random Access Channel)
JP5402685B2 (en) * 2010-02-01 2014-01-29 富士通株式会社 Mobile station and radio communication method
CN103168496B (en) * 2010-07-30 2016-10-19 德国电信股份公司 The methods and procedures that community in cellular network stops
CN102438292B (en) * 2010-09-29 2015-06-10 中兴通讯股份有限公司 Radio resource control method and system
EP2490389B1 (en) * 2011-02-18 2015-10-21 Alcatel Lucent Apparatus, method and computer program for determining a frequency offset
EP2690901A4 (en) * 2011-03-25 2015-05-06 Fujitsu Ltd Base station, communication system, and communication method
US20130007196A1 (en) * 2011-06-30 2013-01-03 Alfano Frank M Connectionless Operation in a Wireless Network
CN103797882A (en) * 2011-07-14 2014-05-14 交互数字专利控股公司 Method and apparatus for ranging power control for machine-to-machine communications
JP6138125B2 (en) * 2011-08-19 2017-05-31 エスシーエー アイピーエルエー ホールディングス インコーポレイテッド Mobile communication system, infrastructure equipment, mobile communication terminal, and method for communicating user data in an uplink random access channel
JP2013055461A (en) * 2011-09-02 2013-03-21 Sony Corp Communication device, communication method, communication system, and base station
US9301324B2 (en) * 2011-11-14 2016-03-29 Lg Electronics Inc. Method and apparatus for controlling network access in a wireless communication system
GB2504701A (en) * 2012-08-06 2014-02-12 Nec Corp Determining current state of a mobile device
CN103581944B (en) 2012-08-07 2016-12-07 华为技术有限公司 Ultrahigh speed random access processing method, Apparatus and system
US10813131B2 (en) * 2013-07-30 2020-10-20 Innovative Sonic Corporation Method and apparatus for improving random access preamble transmission in a wireless communication system
CN105580292B (en) 2013-09-24 2019-01-08 Lg电子株式会社 For the communication between the MAC and PHY of the parallel random access procedure of dual link
US9571953B2 (en) * 2013-10-31 2017-02-14 Alcatel Lucent Methods and systems for implementing a repetition level for a channel
KR102470913B1 (en) 2014-01-29 2022-11-28 인터디지탈 패튼 홀딩스, 인크 Method of access and link adaptation for coverage enhanced wireless transmissions
WO2015184977A1 (en) 2014-06-03 2015-12-10 华为技术有限公司 Method and device for generating zc sequence of random access channel
JP6422999B2 (en) 2014-06-13 2018-11-14 アップル インコーポレイテッドApple Inc. Extended PRACH scheme for power saving, range improvement, and improved detection
US9788318B2 (en) * 2014-08-18 2017-10-10 Telefonaktiebolaget Lm Ericsson (Publ) Channel capacity on collision based channels
US10129910B2 (en) * 2014-10-06 2018-11-13 Qualcomm Incorporated PRACH transmission power adjustment
JP6457088B2 (en) * 2014-11-20 2019-01-23 テレフオンアクチーボラゲット エルエム エリクソン(パブル) Method and apparatus for verifying system information
US20160150522A1 (en) * 2014-11-21 2016-05-26 Qualcomm Incorporated Uplink resource management during radio link control (rlc) transmission window full state
EP3216157B1 (en) * 2014-12-03 2024-10-09 Huawei Technologies Duesseldorf GmbH Method to prioritize random access with preamble coding
US9918271B2 (en) * 2015-02-25 2018-03-13 Qualcomm Incorporated Optimized barred timer handling in high-speed scenario
WO2016140558A1 (en) * 2015-03-05 2016-09-09 엘지전자 주식회사 Method and apparatus for detecting rach preamble on basis of plurality of zero-correlation zones in wireless communication system
EP4131837A1 (en) * 2015-06-17 2023-02-08 Apple Inc. Ack/nack signals for next generation lte devices and systems
US9954633B2 (en) * 2015-06-18 2018-04-24 Nxp Usa, Inc. Apparatus and method of performing a decimation on a signal for pattern detection
US9913137B2 (en) * 2015-09-02 2018-03-06 Huawei Technologies Co., Ltd. System and method for channel security
WO2017049639A1 (en) 2015-09-25 2017-03-30 华为技术有限公司 Method, device and system for generating random access sequence
CN107396454B (en) * 2016-05-16 2022-11-01 中兴通讯股份有限公司 Random access method, device and system
US10652851B2 (en) * 2016-11-03 2020-05-12 Huawei Technologies Co., Ltd. Uplink-based user equipment tracking for connected inactive state
CN108271161B (en) * 2016-12-31 2020-10-16 普天信息技术有限公司 Method and device for optimizing Prach root sequence in LTE system
AR111023A1 (en) * 2017-02-03 2019-05-29 Ericsson Telefon Ab L M SYSTEMS AND METHODS TO DIFFER A TRANSMISSION OF A MESSAGE
CN108512626B (en) * 2017-02-24 2020-04-17 中国移动通信有限公司研究院 Information transmission method, user equipment and base station
JP6814281B2 (en) * 2017-03-23 2021-01-13 京セラ株式会社 Communication control method and wireless terminal
JP7265480B2 (en) * 2017-05-05 2023-04-26 エルジー エレクトロニクス インコーポレイティド Method and apparatus for performing cell access
CN109451592B (en) * 2017-09-08 2020-06-16 华为技术有限公司 Information transmission method and device
CN112996083A (en) * 2017-11-16 2021-06-18 北京小米移动软件有限公司 Cell access method and cell access device
CN116347639A (en) 2018-11-14 2023-06-27 中兴通讯股份有限公司 Wireless communication method and apparatus, and non-transitory computer readable medium
CN109874168B (en) * 2019-03-07 2020-04-21 中山大学 Method for detecting random access leader sequence and determining timing advance of mobile communication system
US11483870B2 (en) * 2019-03-28 2022-10-25 Qualcomm Incorporated Resource mapping and waveform generation for uplink transmission
US11425760B2 (en) * 2019-10-04 2022-08-23 Qualcomm Incorporated Multi-root preamble techniques for wireless communications systems
US11924887B2 (en) * 2020-07-01 2024-03-05 Qualcomm Incorporated Capability reporting for random access channel procedure

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2214686C2 (en) 1997-10-23 2003-10-20 Телефонактиеболагет Лм Эрикссон (Пабл) Arbitrary access in mobile communication system
US6567482B1 (en) * 1999-03-05 2003-05-20 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for efficient synchronization in spread spectrum communications
JP4824852B2 (en) * 1999-06-11 2011-11-30 テキサス インスツルメンツ インコーポレイテツド Improved random access preamble coding for wireless mobile communication session initiation
AU6701100A (en) * 1999-08-10 2001-03-05 Nanotron Gesellschaft Fur Mikrotechnik Mbh Transmission method with frequency and time spread at transmitter level
GB0104610D0 (en) * 2001-02-23 2001-04-11 Koninkl Philips Electronics Nv Radio communication system
EP1971034A1 (en) * 2002-02-13 2008-09-17 Interdigital Technology Corporation System and method for efficiently detecting the identification of a received signal
KR101017212B1 (en) * 2002-09-23 2011-02-25 텔레폰악티에볼라겟엘엠에릭슨(펍) Method and device for detection of a umts signal
AU2002349315A1 (en) 2002-09-27 2004-04-19 Telefonaktiebolaget Lm Ericsson (Publ) Requesting and controlling access in a wireless communications network
KR20040064867A (en) 2003-01-10 2004-07-21 삼성전자주식회사 Method for providing random access effectively in mobile telecommunication system
JP4244670B2 (en) * 2003-03-19 2009-03-25 日本電気株式会社 Mobile communication system, radio base station apparatus and operation control method thereof
US9094699B2 (en) 2004-02-05 2015-07-28 Broadcom Corporation System and method for security key transmission with strong pairing to destination client
JP4762619B2 (en) * 2004-07-14 2011-08-31 パナソニック株式会社 Communication terminal device and wireless communication method
DE602005012677D1 (en) * 2005-05-03 2009-03-26 Ericsson Telefon Ab L M Improved performance in mobile communication systems
US20070183386A1 (en) * 2005-08-03 2007-08-09 Texas Instruments Incorporated Reference Signal Sequences and Multi-User Reference Signal Sequence Allocation
EP1985023A4 (en) * 2006-01-25 2014-08-13 Texas Instruments Inc Method and apparatus for increasing the number of orthogonal signals using block spreading
CN101479951B (en) * 2006-04-27 2013-10-30 德克萨斯仪器股份有限公司 Methods and apparatus to allocate reference signals in wireless communication systems
US8199706B2 (en) * 2006-10-27 2012-06-12 Texas Instruments Incorporated Random access design for high doppler in wireless networks
WO2008078919A2 (en) * 2006-12-22 2008-07-03 Lg Electronics Inc. Methods for sequence generation and transmission based on time and frequency domain transmission unit in a mobile communication system
PL2100402T3 (en) * 2006-12-29 2012-04-30 Nokia Technologies Oy Apparatus, methods and computer program products providing limited use of zadoff-chu sequences in pilot or preamble signals
RU2429567C2 (en) 2007-02-12 2011-09-20 Эл Джи Электроникс Инк. Methods and procedures for high-speed accessing user equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Access Procedure", 3GPP TSG-RAN WG, vol. R2-060996, March 2006 (2006-03-01), XP008115564, Retrieved from the Internet <URL:http://www.3gpp.org/ftp/tsg_ran/WG2_RL2/TSGR2_52/Tdoc-List-RAN2-52.xls> *
ROMAIN MASSON: "E-UTRA RACH within the LTE system", MASTER'S DEGREE PROJECT. STOCKHOLM, SWEDEN, 3 February 2006 (2006-02-03), XP002448009 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9326164B2 (en) 2006-11-01 2016-04-26 Lg Electronics Inc. Method for detecting failures of random access procedures
US8681750B2 (en) 2006-12-29 2014-03-25 Nokia Corporation Apparatus, methods, and computer program products providing limited use of Zadoff-Chu sequences in pilot or preamble signals
US9413507B2 (en) 2008-06-18 2016-08-09 Lg Electronics Inc. Method for transmitting MAC PDUs
US8971281B2 (en) 2008-06-18 2015-03-03 Lg Electronics Inc. Method for transmitting MAC PDUs
US9900916B2 (en) 2008-06-18 2018-02-20 Lg Electronics Inc. Method for detecting failures of random access procedures
US9674854B2 (en) 2008-06-18 2017-06-06 Lg Electronics Inc. Method for transmitting MAC PDUs
US9125164B2 (en) 2008-06-18 2015-09-01 Lg Electronics Inc. Method of transmitting power headroom reporting in wireless communication system
US9265070B2 (en) 2008-06-18 2016-02-16 Lg Electronics Inc. Method for detecting failures of random access procedures
US9949282B2 (en) 2008-06-18 2018-04-17 Lg Electronics Inc. Method for transmitting MAC PDUs
US9661527B2 (en) 2008-06-18 2017-05-23 Lg Electronics Inc. Method for detecting failures of random access procedures
US9049728B2 (en) 2009-01-02 2015-06-02 Lg Electronics Inc. Random access scheme for user equipment
US9414412B2 (en) 2009-01-02 2016-08-09 Lg Electronics Inc. Random access scheme for user equipment
JP2013179714A (en) * 2009-01-02 2013-09-09 Lg Electronics Inc Random access scheme for terminal
US9078236B2 (en) 2009-01-05 2015-07-07 Lg Electronics Inc. Random access scheme for preventing unnecessary retransmission and user equipment for the same
WO2016122377A1 (en) * 2015-01-30 2016-08-04 Telefonaktiebolaget Lm Ericsson (Publ) Methods of operating wireless terminals and network nodes using high speed vehicle network indicators and related wireless terminals and network nodes
US10009908B2 (en) 2015-01-30 2018-06-26 Telefonaktiebolaget Lm Ericsson (Publ) Methods of operating wireless terminals and network nodes using high speed vehicle network indicators and related wireless terminals and network nodes
CN107371184A (en) * 2016-05-13 2017-11-21 中兴通讯股份有限公司 resource allocation method, device and base station

Also Published As

Publication number Publication date
EP2119059A4 (en) 2013-08-21
EP2119059B1 (en) 2019-09-11
US9445437B2 (en) 2016-09-13
US20140376494A1 (en) 2014-12-25
US20080194259A1 (en) 2008-08-14
EP2119059A1 (en) 2009-11-18
MX2009008273A (en) 2009-08-12
US8862172B1 (en) 2014-10-14
RU2009133444A (en) 2011-03-20
TW200840260A (en) 2008-10-01
US20160345365A1 (en) 2016-11-24
CA2675929A1 (en) 2008-08-21
JP4934203B2 (en) 2012-05-16
RU2429567C2 (en) 2011-09-20
CN101606334A (en) 2009-12-16
CN101606334B (en) 2013-09-25
JP2010518724A (en) 2010-05-27
US20140293918A1 (en) 2014-10-02
BRPI0721302A2 (en) 2014-03-25
TWI376899B (en) 2012-11-11
US8787957B2 (en) 2014-07-22
US20170118778A1 (en) 2017-04-27
US9578660B2 (en) 2017-02-21
CA2675929C (en) 2015-06-23
US9713172B2 (en) 2017-07-18

Similar Documents

Publication Publication Date Title
US9713172B2 (en) Methods and procedures for high speed UE access
US8406201B2 (en) Methods and procedures to allocate UE dedicated signatures
US8295229B2 (en) High speed access system and method in a mobile communications network
US8081974B2 (en) Method and procedures for prioritized transmission on contention channels
US8526986B2 (en) Optimized random access channel (RACH) access
USRE44283E1 (en) Method and procedures for unsynchronized, synchronized, and synchronization stand by communications in E-UTRA systems
US8427971B2 (en) Enhancement of LTE random access procedure
US9462578B2 (en) Method for payload part transmission on contention channels

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200780051199.9

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07851464

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2675929

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: MX/A/2009/008273

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: 2007851464

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2009548983

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 5096/CHENP/2009

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2009133444

Country of ref document: RU

ENP Entry into the national phase

Ref document number: PI0721302

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20090730