WO2010028537A1 - Method for detecting signals of random access channel - Google Patents

Method for detecting signals of random access channel Download PDF

Info

Publication number
WO2010028537A1
WO2010028537A1 PCT/CN2009/000902 CN2009000902W WO2010028537A1 WO 2010028537 A1 WO2010028537 A1 WO 2010028537A1 CN 2009000902 W CN2009000902 W CN 2009000902W WO 2010028537 A1 WO2010028537 A1 WO 2010028537A1
Authority
WO
WIPO (PCT)
Prior art keywords
equal
point
detection
max
less
Prior art date
Application number
PCT/CN2009/000902
Other languages
French (fr)
Chinese (zh)
Inventor
薛妍
谭欢喜
翟羽佳
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2010028537A1 publication Critical patent/WO2010028537A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J11/00Orthogonal multiplex systems, e.g. using WALSH codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J13/00Code division multiplex systems
    • H04J13/0007Code type
    • H04J13/0055ZCZ [zero correlation zone]
    • H04J13/0059CAZAC [constant-amplitude and zero auto-correlation]
    • H04J13/0062Zadoff-Chu

Definitions

  • the present invention relates to the field of communications, and in particular, to a signal detection method for a random access channel. Background technique
  • the UE User Equipment, User Terminal
  • the UE first performs downlink synchronization through the SCH (Synchronization Channel) to find the receiving start point and the cell number of the radio frame and the subframe ( Cell ID);
  • the system information is obtained through the BCH (Broadcast Channel), and the system information includes the configuration information of the RACH (Random Access Channel).
  • the uplink synchronization is performed through the RACH to complete the work of the access system. .
  • the UE In the process of uplink synchronization, the UE first finds the transmission location of the RACH channel based on the radio frame and the reception start point of the subframe determined in the following row synchronization, and determines the available sequence of the cell for RACH transmission from the obtained system information, and then A random one of the available sequences is selected for transmission as a preamble.
  • the base station detects the preamble to determine the amount of uplink timing adjustment and sends it to the UE.
  • the UE adjusts the transmission timing of the uplink signal according to the timing adjustment amount, and implements uplink time synchronization.
  • the uplink random access preamble of LTE uses a ZC (Zadoff-Chu) sequence, and the w-th ZC sequence is defined as:
  • N zc is the length of the ZC sequence and N zc is a prime number, which is specified as 839 in LTE.
  • each cell allocates 64 sequences for preambles, which may be different cyclic shift sequences from the same root sequence, or different cyclic shift sequences from different root sequences.
  • the ZC sequence is Constant Amplitude Zero Auto-correlation Code (Constant Amplitude Zero Auto-correlation Code, For the sequence of CAZAC, the correlation of ZC sequences has the following characteristics: The correlation between different cyclic shift sequences of the same sequence is 0; the correlation between different root sequences and their cyclic shift sequences is That is, the correlation between different root sequences is very small, approximately 0. Therefore, the base station can perform time domain correlation detection on the random access signal by using the correlation property of the ZC sequence to obtain an uplink timing adjustment amount.
  • time domain correlation detection method is intuitively defined as point multiplication of the received signal and the complex conjugate of each cyclic shift of the local sequence and summing to obtain the time domain correlation value of each cyclic shift sample, which can be mathematically Equivalent to the received frequency domain signal and the local frequency domain sequence complex conjugate point multiplication and then converted to the time domain by inverse Fourier transform.
  • the mathematical form of time domain correlation detection is expressed as follows:
  • the time domain of the received signal is ( ), the frequency domain is ⁇ ⁇ ); the local sequence time domain is x( ), the frequency domain is; ⁇ ) , and the local sequence complex conjugate is in the time domain ( ) , the frequency domain form; the correlation function R(m) of the two, expressed as:
  • m is the cyclic shift sample and ⁇ is the number of samples of the ZC sequence. Therefore, for a RACH user using a different cyclic shift of the same root sequence as a preamble, the received signal is converted to the frequency domain and then multiplied by the complex conjugate point of the frequency sequence of the root sequence. The result is converted into the time domain by inverse Fourier transform, and the time domain correlation value corresponding to each cyclic shift sample can be obtained.
  • FIG. 1 is a schematic diagram of a RACH time domain correlation detection method.
  • the two receiving antennas are taken as an example to describe an implementation method for time domain correlation detection of a received signal, which is briefly described as follows:
  • IFFT Inverse Fast Fourier Transform, Fast Fourier transform
  • the N time-domain correlation values of the local root sequence are modulo squared for the N time-domain correlation values, and the obtained N-point time-domain correlation value reflects the magnitude of the signal and the noise power; and finally the time of the two receiving antennas
  • the domain correlation values are combined to obtain N time-domain correlation values after the antennas are combined, and then peak detection is performed to obtain the position of the preamble and the
  • RACH time domain correlation detection ie, detection of preamble, also known as RACH preamble detection
  • RACH detection the detection threshold corresponding to the given false alarm rate target is first determined when the signal is not transmitted, and then the detection rate of the random access signal detection when transmitting the signal is tested according to the threshold.
  • the false alarm rate is defined as the probability that the preamble is detected when there is no preamble transmission; the miss detection rate is defined as detecting an erroneous preamble, or not detecting a transmitted preamble, or detecting the correct preamble However, the probability of occurrence of an error timing adjustment amount or the like is estimated.
  • the target false alarm rate is generally required to be 10 or slightly less than 10. False alarm rate is reached when no transmission signal 10_ 3 or slightly smaller than the detection limit of the door 10-3 of the peak detection threshold.
  • the threshold for peak detection is divided into absolute threshold and relative threshold.
  • the absolute threshold is related to the magnitude of the noise.
  • the threshold is independent of the noise power, so the ratio of the signal correlation value to the noise power is used.
  • the relative threshold for peak detection When detecting the RACH signal, the system generally presets a relative threshold, and then estimates the magnitude of the noise in the detection. The noise level and the relative threshold multiply can obtain an absolute threshold, so the above is given when the signal is not sent. Determining the corresponding detection threshold under the target of the false alarm rate refers to the relative threshold.
  • the RACH signal When the ratio of the correlation value of the received signal to the noise power is greater than the relative threshold, the RACH signal is considered to be present. Under normal circumstances, the higher the relative threshold is, the harder it is for users to access. The lower the setting, the more false alarms. In general, this threshold is taken as: The ratio of the signal to the noise at a false alarm rate of 10 (and therefore also the false alarm threshold). In the false alarm threshold, when the UE transmits RACH signal, if no frequency offset (the offset) and other interference, the false alarm rate is generally not higher than 10-3.
  • the energy of the RACH signal will be dispersed, because the preamble uses a ZC sequence, which is defined so that the energy of the RACH signal is dispersed to another cyclic shift sequence when there is a frequency offset, and thus appears. Detection error.
  • the frequency offset characteristics of the ZC sequence are described in detail below.
  • the frequency offset of the uplink RACH is not particularly large. Due to the movement of the UE The speed is generally less than 375 km/h, so it is generally considered that RACH only has a frequency offset of less than or equal to 1 time.
  • a 1x offset (which can be a positive 1x offset or a negative 1x offset) is generated.
  • the RACH sequence of the received frequency domain be ZW, and its time domain form is recorded as follows. According to the nature of IDFT (Inverse Discrete Fourier Transform), for the IDFT of N points, we have:
  • the sequence between the sequence and the sequence of the original sequence after cyclic shift (the sequence obtained after the original sequence is shifted by 1 frequency), and the received signal and the original sequence without frequency offset and 1
  • the sequence generated by the octave offset (that is, the sequence after the cyclic shift of the original sequence) will produce a correlation peak, and two copies of the cyclic shift search window will appear at the same time (called a replica search due to frequency offset). Window, or simply a copy window).
  • a cyclic shift of 0 is given in Fig. 2, from which the relationship of d:, and the relationship between the cyclic shift window and the replica window can be understood, wherein the dotted line portion is an equivalent negative frequency offset window, and
  • the negative frequency offset window used by the time domain correlation method is a cyclic cyclic shift relationship.
  • Figure 3 shows an example of a cyclic shift window and a copy window corresponding to a cyclic shift that is not zero.
  • the distance between the two replica windows and their cyclic shift windows can be derived using only the values defined in TS 36.211 (i.e., values less than N zc /2). In fact, it is the distance between the start of the cyclic shift search window and the start of the copy window.
  • the cyclic shift used for generating the preamble sequence is divided into an unrestricted set unrestricted set (also called a regular set normal set) and a restricted set restricted set (also called a high speed set high speed set).
  • Set Two.
  • the limit set (high speed set) takes into account the frequency offset effect caused by the high speed, and in order to ensure that the search windows of the respective preamble sequences do not overlap each other, the cyclic shift amount Cv used for generating the preamble sequence is limited.
  • the cyclic shift amount generated by the preamble sequence is not limited, and the value of the leading cyclic shift is generated.
  • the frequency offset characteristic of the ZC sequence since the RACH signal received by the base station is frequency offset, in addition to the cyclic shift corresponding search window (referred to as a cyclic shift search window) in the RACH preamble detection, There will also be peaks in the copy window.
  • the Doppler frequency is relatively large, so the copy window
  • the correlation value of the RACH signal will be relatively large. It is considered that the cyclic shift window and the two duplicate windows may have signals at the time of detection. It is necessary to comprehensively detect the cyclic shift window and the two replica windows, because the high-speed cell uses the limit set, each The cyclic shift window corresponding to each preamble and its copy window do not coincide with the cyclic shift window of other preambles and its copy window, so that there is no phenomenon that two different preambles are in one search window. For medium and low-speed cells, the Doppler frequency offset is relatively small, and the signal correlation value in the cyclic shift window is often much higher than the signal correlation value in the replica window. Therefore, only the signal in the cyclic shift window is considered during the detection, that is, only Preamble detection is performed in the cyclic shift window, and the replica window is not detected.
  • the medium-low speed cell uses an unrestricted set, that is, there is no cyclic shift.
  • Bit limit although the cyclic shift window corresponding to each preamble does not coincide with the cyclic shift window of other preambles, the cyclic shift window corresponding to each preamble may coincide with the copy window of other preambles.
  • the signal correlation value in the cyclic shift window is much larger than the signal correlation value due to the frequency offset in the replica window, but when the signal-to-noise ratio is high, the correlation value brought by the frequency offset in the replica window It will be big.
  • the preamble C1 is transmitted, and the preamble C2 is not transmitted.
  • the frequency offset copy signal of C1 may fall to the cyclic shift search window of C2.
  • the technical problem to be solved by the present invention is to overcome the deficiencies of the prior art and provide a signal detection method for a random access channel, which suppresses false alarms caused by frequency offsets of cells using non-limiting sets (middle and low speed cells).
  • the present invention provides a signal detection method for a random access channel, including:
  • step B If there are remaining detection points, and the largest time domain correlation value in the remaining detection points is greater than the peak detection threshold, then jump to step B; otherwise, the detection of the current root sequence is ended;
  • N zc is the length of the root sequence
  • d u is the distance between the start of the cyclic shift search window and the start of the replica window.
  • step B after finding the m-max, the following operations can also be performed:
  • a point greater than or equal to m3 and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to m4 is regarded as a non-detection point; otherwise, a point greater than or equal to m3 and less than or equal to m4 is regarded as non-detection Point; and/or
  • a point greater than or equal to m5 and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to m6 is regarded as a non-detection point; otherwise, a point greater than or equal to m5 and less than or equal to m6 is regarded as non-detection Point
  • step B after the m_max is found, other detection points exceeding the peak detection threshold that belong to the same cyclic shift search window as the m-max may be found in the current detection point: m[l] m [K]; identifies m[k] - d u and/or m[k] + d u in the current detection point as non-detection points;
  • step B after the detection point is found: m[l] m[K], the following operations can also be performed: If m7[k] > m8[k] , a point greater than or equal to m7[k] and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to m8[k] is used as a non-detection point; otherwise, a point greater than or equal to m7[k] and less than or equal to m8[k] as a non-detection point; and/or
  • a point greater than or equal to m9[k] and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to ml0[k] is used as the non-detection point; otherwise, a point greater than or equal to m9[k] and less than or equal to ml0[k] as a non-detection point;
  • m7[k] (N+m[k] - d u - X) mod N
  • m8[k] (N+m[k] - d u + X) mod N
  • m7[k] and m8 [k] is a positive integer
  • m9[k] (N+m[k] + d u — X) mod N
  • ml0[k] (m[k] + d u + X) mod N
  • m9 [ k] and mlO [k] are positive integers
  • X int(N/(N zc x 2)) , int means rounded up or down.
  • step B after the m_max is found, all the detection points in the current detection point that belong to the same cyclic shift search window as the m-max may also be identified as non-detection points.
  • O - JmodA ⁇ ⁇ 1 , greater than or equal to 2 and less than N /2 ; where int() means round up or round down.
  • the peak detection threshold can be determined by the following steps:
  • noise estimation on the received signal to obtain a noise mean value; using the product of the above noise mean value and a preset relative threshold value as a peak detection threshold;
  • the relative threshold is a ratio of a false alarm signal to a noise that reaches a target false alarm rate when no signal is transmitted.
  • noise mean can be determined by the following steps:
  • root sequence is a ZC sequence.
  • FIG. 1 is a schematic diagram of a method for detecting RACH time domain correlation
  • FIG. 2 is a schematic diagram showing the relationship between the positive and negative frequency offset window and the cyclic shift window when the cyclic shift is 0 in the RACH time domain correlation detection;
  • FIG. 3 is a schematic diagram of a cyclic shift search window and a frequency offset copy window corresponding to a cyclic shift that is not 0 in RACH time domain correlation detection;
  • FIG. 4 is a flowchart of a RACH time domain correlation detecting method according to an embodiment of the present invention.
  • Figure 5 is a schematic diagram of the false alarm caused by the frequency offset in the RACH correlation detection.
  • the basic idea of the present invention is that, since the frequency offset causes a large number of false alarms, the position of the false alarms can be found according to the frequency offset characteristic of the ZC sequence when performing peak detection in the RACH time domain correlation detection process, and these possibilities are removed. It is the location of false alarms to achieve the purpose of false alarm suppression.
  • FIG. 4 is a flow chart of a RACH time domain correlation detection method according to an embodiment of the present invention.
  • FIG. 4 partially merges and simplifies FIG. 1, and only describes a single receiving antenna as an example.
  • the method includes the following steps:
  • N zc is the length of the ZC sequence, which is specified as 839 in LTE.
  • This step is an optional step.
  • the time domain correlation value after the modulo square processing actually reflects the signal power value.
  • the peak detection is performed on the N time-domain correlation values of each sequence. The following takes the u-th root sequence as an example, which specifically includes the following steps:
  • Threshold B can be calculated as follows:
  • Threshold A can be equal to: Maximum time domain correlation value X noise estimation ratio; where noise estimation ratio is greater than 0 and less than 1, for example, noise estimation ratio The value can be taken as 0.6.
  • the noise mean Calculate the mean of all time-domain correlation values less than threshold A (called the noise mean); the noise mean actually reflects the amount of noise power.
  • the threshold A and the noise mean can also be calculated using other methods of the prior art.
  • the relative threshold can be the ratio of the false alarm signal to the noise at the target false alarm rate (for example, 0.1%) when no signal is sent.
  • threshold B the role of the peak detection threshold is to distinguish between noise and signal. In the present invention, only the function of stopping detection is performed (that is, the time domain correlation value less than the threshold is not detected), in the prior art. There are many other settings and calculation methods.
  • ml (N+m - max - d u ) mod N
  • m2 (m— max + d u ) mod N
  • ml and m2 are both positive integers.
  • m- max - d u and m- max + d u to Xi Bu can capture interval ⁇ [m- max- d u - X, m- max - d u + X] and [m- max + d u - Other values in X, m - max + d u + X] are removed from the set of points to be detected.
  • [ ] denotes a closed interval
  • X int(N/(N zc x2)), and int denotes rounding up or down.
  • M5 (N+m - max + d u - X) mod N
  • m6 (m - max + d u + X) mod N
  • m5 and m6 are positive integers.
  • d u is the distance between the start point of the cyclic shift search window and the start of the replica window.
  • du l
  • the loop shift window and the copy window almost coincide, and it is not necessary to delete the point of the copy window. Therefore, it is possible to limit the operation of step 406 only when d u is greater than or equal to 2.
  • N ZC N ZC
  • the preamble corresponding to the cyclic shift window in which the maximum correlation value in the current set of points to be detected is located is used as the detected preamble, and the position of the maximum correlation value, m_max, and the maximum correlation value are cyclically shifted.
  • to-be-detected point set further includes a to-be-detected point, skip to step 405, otherwise Peak detection of the uth root sequence of the beam.
  • Fig. 5 is a schematic diagram of a false alarm caused by frequency offset in RACH correlation detection; an application example of the present invention will be described below with reference to Fig. 5.
  • the time domain correlation values smaller than the threshold A are averaged, and the mean values of the data reflect the noise power mean of the root sequence. Means and noise false alarm rate relative to the target gate 10-3 when the threshold limit value as the product of B.
  • the length of the search window configured by the system is Ncs
  • the user uses a cyclic shift Cvl of a certain root sequence
  • the user's cyclic shift search window from Cvl to Cvl+Ncs, one
  • the copy window is Cvl - d u to Cvl - d u + Ncs
  • the other copy window is Cvl + d u to Cvl + d u + Ncs.
  • the replica window of the cyclic shift Cvl may be a cyclic shift search window of other RACH users.
  • point x2 will be judged as another RACH user whose cyclic shift is Cv2, and point x2 will become a false alarm. If the signal-to-noise ratio is high, a false alarm will appear in the copy window corresponding to the cyclic shift window of the RACH signal, which will bring a lot of signal overhead.
  • the distance between point x2 and point xl is exactly d u , which means that point x2 may be caused by the frequency offset of point xl.
  • Point x2 and its left and right points may be false alarm points.
  • point x2 and The left and right points are removed from the set of points to be detected, so that the signals at these positions are not detected, and no false alarms are generated. Since the preamble signal has been detected by the cyclic shift search window corresponding to the point x1, the non-detection position further includes all points in the cyclic shift search window corresponding to the point x1. In order to avoid repeated detection, it is also necessary to move from Cvl to Cvl.
  • Ncs The location of Ncs is marked as a non-detected location.
  • all the detectable positions are detected again, and it is found that the time domain correlation value of the threshold B is not exceeded, and then the peak detection process of the root sequence is determined to be ended.
  • the final result of the correlation detection of the root sequence is that only the cyclic shift of the point xl is detected.
  • the leading position corresponding to the bit search window, corresponding to the cyclic shift search window where the point x2 is located The lead is not reported as a result of the test.
  • the peak point of a cyclic shift cvl frequency offset copy coincides with the same sequence and another cyclic shift cv2 peak point.
  • the above false alarm suppression method may cause The missed detection of the signal corresponding to cv2 is cyclically shifted, but this situation rarely occurs because the position of each user in the actual system is random from the base station, and the delay is also different. And when the length of the search window is large, the available cyclic shift of the same sequence will be small, and the probability of such coincidence is even smaller.
  • d u is less than 2 (that is, in the peak detection, the position determined as the preamble in a certain cyclic shift search window is regarded as the non-corresponding position of the copy window thereof.
  • the detection position ensures that there is no missed detection when there is a peak overlap between a cyclic shift window and its own copy.
  • the above embodiment has various transformations, such as:
  • step 405 after determining m_max, the following processing may also be performed: First, all the points in the set of points to be detected are located in the same cyclic shift search window as m-max, and then located at m-max. The points of the same cyclic shift search window and/or the corresponding points in the copy window corresponding to the cyclic shift search window are deleted from the set of points to be detected.
  • m_maxl may be deleted from the set of points to be detected.
  • m maxl, m maxl - d u and / or m maxl + d u be the set of detection points may be m maxl - d u and / or m- maxl + d u to be removed from the collection point detection.
  • the interval may also be won ⁇ [m- maxl- d u - X, m maxl - d u + X] , and - other values [m- maxl + d u X, m maxl + d u + X] to be in the The detection point is removed from the collection.
  • m[l] m[K] the following operations can also be performed: If m7[ k] > m8[k] , then a point greater than or equal to m7[k] and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to m8[k] as a non-detection point; otherwise, greater than or equal to m7 [k] and small a point equal to m8[k] as a non-detection point; and/or
  • a point greater than or equal to m9[k] and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to ml0[k] is used as the non-detection point; otherwise, a point greater than or equal to m9[k] and less than or equal to ml0[k] as a non-detection point;
  • m7 [k] (N+m[k] - d u - X) mod N
  • m8 [k] (N+m[k] - d u + X) mod N
  • m7[k] and m8 [k] is a positive integer
  • M9[k] (N+m[k] + d u - X) mod N
  • ml0[k] (m[k] + d u + X) mod N
  • m9 [k] and mlO [k] are A positive integer.
  • the above embodiment describes the present invention by taking a single receiving antenna as an example.
  • the present invention is also applicable to the case of multiple receiving antennas, and only needs to add N time-domain correlation values corresponding to the receiving antennas separately. Peak detection is sufficient.
  • the set of points to be detected is used, and each point in the set of detection points is subjected to peak detection, and each non-detected point or the detected point is deleted from the set of points to be detected;
  • Other methods can be used, for example, to identify detected or non-detected points to avoid repeated detection or detection of false alarm points.
  • the method of the present invention can effectively suppress false alarms caused by frequency offset in cells using non-limiting sets (middle and low-speed cells), reduce signaling overhead caused by false alarms, and avoid The missed detection of the random access signal ensures the successful access of more users.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses a method for detecting the signals of the random access channel (RACH), which includes: A. after a base station obtains N time domain correlation values R(m) of the uth root sequence, all m values corresponding to the N time domain correlation values are set as detection points, wherein m=1,2, ,N; B. among all the present detection points, the detection point m_max corresponding to the maximum time domain correlation value R(m_max) is found out; when the maximum time domain correlation value R(m_max) is greater than the peak detection threshold, it is determined that the preamble of the RACH is detected at a cyclic shift searching window corresponding to the m_max, and the m_max and the point m1 and/or point m2 of the present detection points are set as non-detection points, wherein m1=(N+m_max-d u )mod N, m2=(m_max+d u )mod N, and m1 and m2 are integer; and C. if the detection points remain, and the maximum time domain correlation value of the remained detection points is greater than the peak detection threshold, the step is jumped to step B, otherwise the detecting of the present root sequence is ended, wherein N=N zc , N zc is the length of the root sequence, d u is the span between the starting point of the cyclic shift searching window and the duplicated searching window.

Description

一种随机接入信道的信号检测方法  Signal detection method for random access channel
技术领域 Technical field
本发明涉及通信领域, 尤其涉及一种随机接入信道的信号检测方法。 背景技术  The present invention relates to the field of communications, and in particular, to a signal detection method for a random access channel. Background technique
在 LTE ( Long Term Evolution, 长期演进 )系统中 , UE ( User Equipment, 用户终端)开机之后首先通过 SCH ( Synchronization Channel, 同步信道)进 行下行同步, 找到无线帧及子帧的接收起点和小区号 (Cell ID ) ; 然后通过 BCH ( Broadcast Channel , 广播信道)获取系统信息, 系统信息中包括 RACH ( Random Access Channel, 随机接入信道) 的配置信息; 最后通过 RACH进 行上行同步, 完成接入系统的工作。  In the LTE (Long Term Evolution) system, the UE (User Equipment, User Terminal) first performs downlink synchronization through the SCH (Synchronization Channel) to find the receiving start point and the cell number of the radio frame and the subframe ( Cell ID); Then, the system information is obtained through the BCH (Broadcast Channel), and the system information includes the configuration information of the RACH (Random Access Channel). Finally, the uplink synchronization is performed through the RACH to complete the work of the access system. .
在上行同步的过程中, UE首先以下行同步时确定的无线帧及子帧的接收 起点为基础找到 RACH信道的发射位置, 从获得的系统信息中确定本小区用 于 RACH传输的可用序列, 然后从可用的序列中随机的选择一条作为前导码 ( preamble )发送。基站对前导码进行检测以确定上行定时调整量, 并将其发 送给 UE。 UE根据这个定时调整量调整上行信号的发送时刻, 实现上行的时 间同步。  In the process of uplink synchronization, the UE first finds the transmission location of the RACH channel based on the radio frame and the reception start point of the subframe determined in the following row synchronization, and determines the available sequence of the cell for RACH transmission from the obtained system information, and then A random one of the available sequences is selected for transmission as a preamble. The base station detects the preamble to determine the amount of uplink timing adjustment and sends it to the UE. The UE adjusts the transmission timing of the uplink signal according to the timing adjustment amount, and implements uplink time synchronization.
LTE的上行随机接入前导码使用的是 ZC ( Zadoff-Chu )序列, 第 w根 ZC 序列的定义为:
Figure imgf000003_0001
The uplink random access preamble of LTE uses a ZC (Zadoff-Chu) sequence, and the w-th ZC sequence is defined as:
Figure imgf000003_0001
其中, j为虚数单位; u是根序列索引号; Nzc是 ZC序列的长度且 Nzc是 素数, 在 LTE中规定为 839。 Where j is an imaginary unit; u is the root sequence index number; N zc is the length of the ZC sequence and N zc is a prime number, which is specified as 839 in LTE.
在 LTE中, 每个小区都会分配 64条用于前导码的序列, 这 64条序列可 以是来自同一个根序列的不同循环移位序列, 也可以是来自不同根序列的不 同循环移位序列。  In LTE, each cell allocates 64 sequences for preambles, which may be different cyclic shift sequences from the same root sequence, or different cyclic shift sequences from different root sequences.
ZC序列是恒幅零自相关( Constant Amplitude Zero Auto-correlation Code, 简称 CAZAC ) 的序列, ZC序列的相关性有以下特点: 相同才艮序列的不同循 环移位序列之间的相关性为 0; 不同根序列及其循环移位序列之间的相关性 为
Figure imgf000004_0001
; 即不同根序列之间的相关性非常小, 近似为 0。 因此基站可以利 用 ZC序列的相关性质对随机接入信号进行时域相关检测来获得上行的定时 调整量。
The ZC sequence is Constant Amplitude Zero Auto-correlation Code (Constant Amplitude Zero Auto-correlation Code, For the sequence of CAZAC, the correlation of ZC sequences has the following characteristics: The correlation between different cyclic shift sequences of the same sequence is 0; the correlation between different root sequences and their cyclic shift sequences is
Figure imgf000004_0001
That is, the correlation between different root sequences is very small, approximately 0. Therefore, the base station can perform time domain correlation detection on the random access signal by using the correlation property of the ZC sequence to obtain an uplink timing adjustment amount.
时域相关检测方法直观上定义为对收到的信号和本地序列的各循环移位 的复共轭进行点乘并求和得到每个循环移位样点的时域相关值, 在数学上可 以等效成接收的频域信号和本地频域序列复共轭点乘后通过反傅里叶变换转 换到时域。 时域相关检测的数学形式表示如下:  The time domain correlation detection method is intuitively defined as point multiplication of the received signal and the complex conjugate of each cyclic shift of the local sequence and summing to obtain the time domain correlation value of each cyclic shift sample, which can be mathematically Equivalent to the received frequency domain signal and the local frequency domain sequence complex conjugate point multiplication and then converted to the time domain by inverse Fourier transform. The mathematical form of time domain correlation detection is expressed as follows:
假设接收信号的时域形式为 ( ) , 频域形式为 ί ^) ; 本地序列时域形式 为 x( ) , 频域形式为; Π^) , 本地序列复共轭的时域形式为 ( ) , 频域形式 ; 两者的相关函数 R(m), 用公式表示为:  Suppose the time domain of the received signal is ( ), the frequency domain is ί ^); the local sequence time domain is x( ), the frequency domain is; Π^) , and the local sequence complex conjugate is in the time domain ( ) , the frequency domain form; the correlation function R(m) of the two, expressed as:
R{m) = (1)
Figure imgf000004_0002
R{m) = (1)
Figure imgf000004_0002
其中, m为循环移位样点, Ν为 ZC序列的样点数。 因此, 对使用同一 个根序列的不同循环移位作为前导码的 RACH用户, 把接收到的信号转换到 频域后将其与该根序列的频域序列复共轭点乘, 对点乘后的结果进行反傅里 叶变换转换到时域, 可以得到每个循环移位样点对应的时域相关值。  Where m is the cyclic shift sample and Ν is the number of samples of the ZC sequence. Therefore, for a RACH user using a different cyclic shift of the same root sequence as a preamble, the received signal is converted to the frequency domain and then multiplied by the complex conjugate point of the frequency sequence of the root sequence. The result is converted into the time domain by inverse Fourier transform, and the time domain correlation value corresponding to each cyclic shift sample can be obtained.
通过对本地根序列的各循环移位序列对应循环移位搜索窗的时域相关值 进行峰值检测, 可以知道 UE使用的是哪一条前导码, 并根据检测到的 UE 使用的前导码得到 UE的定时提前量。  By performing peak detection on the time domain correlation value of the cyclic shift search window of each cyclic shift sequence of the local root sequence, it is possible to know which preamble the UE uses, and obtain the UE according to the detected preamble used by the UE. Timing advance.
图 1是 RACH时域相关检测的方法示意图, 图中以两根接收天线为例, 描述了对接收信号进行时域相关检测的实现方法, 简要描述如下:  FIG. 1 is a schematic diagram of a RACH time domain correlation detection method. The two receiving antennas are taken as an example to describe an implementation method for time domain correlation detection of a received signal, which is briefly described as follows:
基站首先对各接收天线的接收信号进行频率校正和降釆样, 然后进行 M 点 (比如 M=1024 ) 的 FFT ( Fast Fourier Transform, 快速傅立叶变换) , 提 取出 839点的 RACH频域信号; 然后将 839点的 RACH频域信号与每个本地 频域根序列复共轭点乘, 补零到 Ν点( Ν大于 839 , 比如 Ν可以等于 2048 ) , 进行 Ν点的 IFFT ( Inverse Fast Fourier Transform, 快速傅立叶逆变换 )得到 该本地根序列的 N个时域相关值, 对这 N个时域相关值求模平方, 得到的 N 点时域相关值大小反映了信号及噪声功率的大小; 最后将两根接收天线的时 域相关值合并, 得到天线合并后的 N个时域相关值, 然后进行峰值检测, 得 到前导码的位置以及对应的时间提前量。 The base station first performs frequency correction and downlink sampling on the received signals of each receiving antenna, and then performs an FFT (Fast Fourier Transform) of M points (such as M=1024) to extract a RACH frequency domain signal of 839 points; Multiply the 839-point RACH frequency domain signal with the complex conjugate point of each local frequency domain root sequence, and add zero to the defect point (Ν is greater than 839, for example, Ν can be equal to 2048), and perform IFFT (Inverse Fast Fourier Transform, Fast Fourier transform The N time-domain correlation values of the local root sequence are modulo squared for the N time-domain correlation values, and the obtained N-point time-domain correlation value reflects the magnitude of the signal and the noise power; and finally the time of the two receiving antennas The domain correlation values are combined to obtain N time-domain correlation values after the antennas are combined, and then peak detection is performed to obtain the position of the preamble and the corresponding timing advance.
RACH时域相关检测(即对前导码进行检测 ,也称为 RACH前导码检测 ) 的性能可以用前导码的漏检率、 虚警率和检测门限来表征。 在 RACH进行检 测时, 首先在不发送信号时确定给定虚警率目标下对应的检测门限, 然后根 据这个门限来测试发射信号时随机接入信号检测的漏检率。  The performance of RACH time domain correlation detection (ie, detection of preamble, also known as RACH preamble detection) can be characterized by the missed detection rate, false alarm rate, and detection threshold of the preamble. In the RACH detection, the detection threshold corresponding to the given false alarm rate target is first determined when the signal is not transmitted, and then the detection rate of the random access signal detection when transmitting the signal is tested according to the threshold.
虚警率的定义是当没有前导码发送时检测到前导码的概率; 漏检率的定 义是检测到一个错误的前导码、 或者没有检测到一个已发送的前导码、 或者 检测到正确的前导码但是估计出错误的定时调整量等情况发生的概率。  The false alarm rate is defined as the probability that the preamble is detected when there is no preamble transmission; the miss detection rate is defined as detecting an erroneous preamble, or not detecting a transmitted preamble, or detecting the correct preamble However, the probability of occurrence of an error timing adjustment amount or the like is estimated.
一般要求目标虚警率为 10 或略小于 10 。 当不发送信号时达到虚警率为 10_3或略小于 10- 3的检测门限为峰值检测的门限。 The target false alarm rate is generally required to be 10 or slightly less than 10. False alarm rate is reached when no transmission signal 10_ 3 or slightly smaller than the detection limit of the door 10-3 of the peak detection threshold.
峰值检测的门限分为绝对门限和相对门限两种。 一般来说, 绝对门限与 噪声的大小有关,而将随机接入信号的相关值和噪声功率的比值作为门限时, 则这个门限就和噪声功率无关了, 因此将信号相关值和噪声功率的比值定义 为峰值检测的相对门限。 在对 RACH信号进行检测时, 一般是系统预设一个 相对门限, 然后在检测中估计噪声的大小, 噪声大小和相对门限相乘可以得 到绝对门限, 所以上面所说的在不发送信号时在给定虚警率目标下确定对应 的检测门限是指相对门限。 当接收信号的相关值与噪声功率的比值大于相对 门限时, 认为有 RACH信号。 在正常情况下, 相对门限设的越高, 用户越难 接入, 设的越低, 虚警就越多。 一般来说, 这个门限取值为: 虚警率为 10 时 的信号与噪声的比值(因此也可称为虚警门限) 。 在虚警门限下, 当 UE发射 RACH信号时, 如果没有频率偏移 (简称频 偏)和其他干扰, 虚警率一般不会高于 10-3。 但在有频率偏移时, RACH信号 的能量会分散, 因为前导码使用的是 ZC序列, 该序列的定义使得 RACH信 号在有频偏时能量会分散到另外一条循环移位序列上, 从而出现检测错误。 下面详细介绍 ZC序列的这个频偏特性。 The threshold for peak detection is divided into absolute threshold and relative threshold. In general, the absolute threshold is related to the magnitude of the noise. When the ratio of the correlation value of the random access signal to the noise power is used as the threshold, the threshold is independent of the noise power, so the ratio of the signal correlation value to the noise power is used. Defined as the relative threshold for peak detection. When detecting the RACH signal, the system generally presets a relative threshold, and then estimates the magnitude of the noise in the detection. The noise level and the relative threshold multiply can obtain an absolute threshold, so the above is given when the signal is not sent. Determining the corresponding detection threshold under the target of the false alarm rate refers to the relative threshold. When the ratio of the correlation value of the received signal to the noise power is greater than the relative threshold, the RACH signal is considered to be present. Under normal circumstances, the higher the relative threshold is, the harder it is for users to access. The lower the setting, the more false alarms. In general, this threshold is taken as: The ratio of the signal to the noise at a false alarm rate of 10 (and therefore also the false alarm threshold). In the false alarm threshold, when the UE transmits RACH signal, if no frequency offset (the offset) and other interference, the false alarm rate is generally not higher than 10-3. However, when there is a frequency offset, the energy of the RACH signal will be dispersed, because the preamble uses a ZC sequence, which is defined so that the energy of the RACH signal is dispersed to another cyclic shift sequence when there is a frequency offset, and thus appears. Detection error. The frequency offset characteristics of the ZC sequence are described in detail below.
在下行频偏校正之后, 上行 RACH的频偏不会特别大。 由于 UE的运动 速度一般小于 375km/h, 所以通常认为, RACH只存在小于等于 1倍的频偏。 为了便于分析, 我们先假定产生了 1倍频偏(可以是正的 1倍频偏或负的 1 倍频偏) 。 设接收到的频域的 RACH序列为 ZW, 其时域形式记为 , 根 据 IDFT ( Inverse Discrete Fourier Transform, 离散反傅立叶变换)的性质, 对 N点的 IDFT, 我们有: After the downlink frequency offset correction, the frequency offset of the uplink RACH is not particularly large. Due to the movement of the UE The speed is generally less than 375 km/h, so it is generally considered that RACH only has a frequency offset of less than or equal to 1 time. For ease of analysis, we assume that a 1x offset (which can be a positive 1x offset or a negative 1x offset) is generated. Let the RACH sequence of the received frequency domain be ZW, and its time domain form is recorded as follows. According to the nature of IDFT (Inverse Discrete Fourier Transform), for the IDFT of N points, we have:
(n) = IDFT(z(k ± 1)) = z(«)-exp(n) = IDFT(z(k ± 1)) = z(«)-exp
Figure imgf000006_0001
Figure imgf000006_0001
π  π
根据 ZC序列的表达式: z(«) = exp -J -un(n + 1) , 对序列长度是 L的  According to the expression of the ZC sequence: z(«) = exp -J -un(n + 1) , the length of the sequence is L
N.  N.
ZC序列在循环移位整数 之后, 我们得 After the ZC sequence is cyclically shifted by an integer, we have to
Figure imgf000006_0002
Figure imgf000006_0002
.2π  .2π
则 z(n + du) = ζ{ή) exp - / u d„ ·η β (4) Then z(n + d u ) = ζ{ή) exp - / ud„ · η β (4)
J Ν "  J Ν "
由上面的分析可以看 出 , 只有当 u-du =m-Nzc±\的时候, 有 z{n + du) = z {n)- , 即在产生 1倍频偏的时候, RACH序列的相关峰会产生偏 移, 即整个循环移位搜索窗内的信号都会有偏移。 这里 m是整数, 且 m的取 值保证 ί ·ί/„
Figure imgf000006_0003
成立, 时 d可表示为: d = 对正的一倍频偏, 有 w · d: =m+ -Nzc +\ , m +和 du +都是整数; u-du~ =m~ -Nzc-\ , —和 — 是整数。 因为 w.(Nzc— —) = 0— m— ).Nzc+l, SLu-nf 为整数。 ^ 0<du + < N 2 , 令 Nze- dT„为正整数, Nzc/2<d-u =Nzc-du + <Nzc 当 < d: < Nzc ,令 Nzc -d~u为正整数, 则有 0 < d-u = Nzc -d: < Nzc/2。 注意 Nzc 是素数, 所以 Nze/2不是整数, 而 和 都是正整数。
It can be seen from the above analysis that only when ud u =mN zc ±\, there is z{n + d u ) = z {n)- , that is, when the 1x frequency offset is generated, the correlation peak of the RACH sequence The offset is generated, that is, the signal in the entire cyclic shift search window is offset. Where m is an integer, and the value of m is guaranteed to be ί ·ί/„
Figure imgf000006_0003
When established, d can be expressed as: d = double the frequency offset, w · d: =m + -N zc +\ , m + and d u + are integers; ud u ~ =m~ -N Zc -\ , -- and -- are integers. Since w.(N zc — —) = 0— m— ).N zc +l, SLu-nf is an integer. ^ 0<d u + < N 2 , let N ze - dT„ be a positive integer, N zc /2<d- u =N zc -d u + < N zc when < d: < N zc , let N zc - When d~ u is a positive integer, then 0 < d- u = N zc -d: < N zc /2. Note that N zc is a prime number, so N ze /2 is not an integer, and the sum is a positive integer.
另外, 观察下面公式(公式(5) )也可以发现正负一倍频偏时 的取值 规律。  In addition, observing the following formula (Equation (5)), we can also find the law of the value of positive and negative doubling.
(m- Nzc ± 1) · ") = Qxp(±j —-n)
Figure imgf000006_0004
从上面公式推导可知, 如果频偏为子载波间隔的小数倍时, 由于 Μ· 不 会为小数, 所以接收到的时域序列不会产生循环移位, 而是处于原序列 (无 频偏时的序列 )与原序列经过循环移位 后的序列 (原序列在 1倍频偏后得 到的序列)之间的状态, 这时接收到的信号与没有频偏的原序列之间以及与 1 倍频偏所产生的序列之间 (即原序列循环移位 之后的序列)都会产生相 关峰, 这时候就会同时出现循环移位搜索窗的两个副本(称为因为频偏造成 的副本搜索窗, 或简称为副本窗) 。
(m- N zc ± 1) · ") = Qxp(±j --n)
Figure imgf000006_0004
It can be seen from the above formula that if the frequency offset is a fractional multiple of the subcarrier spacing, since Μ · will not be a decimal, the received time domain sequence will not produce a cyclic shift, but will be in the original sequence (no frequency offset). The sequence between the sequence and the sequence of the original sequence after cyclic shift (the sequence obtained after the original sequence is shifted by 1 frequency), and the received signal and the original sequence without frequency offset and 1 The sequence generated by the octave offset (that is, the sequence after the cyclic shift of the original sequence) will produce a correlation peak, and two copies of the cyclic shift search window will appear at the same time (called a replica search due to frequency offset). Window, or simply a copy window).
在 3GPP对 LTE的物理层标准 TS36.211中, 对 的取值有明确的规定:  In 3GPP's physical layer standard TS36.211 for LTE, the values of the pair are clearly defined:
"
Figure imgf000007_0001
, 其中, M- ' modNzc表示 Μ · = . Nze ± l , m是使 为正整数的最小整数, 总是小于 N /2。 在图 2中给出了循环移位为 0的一个例子,从中可以理解 d:、 和 的关系以及循环移位窗和副本窗的关系, 其中虚线部分是等效的 负频偏副本窗, 和时域相关法使用的负频偏副本窗是周期循环移位的关系。 图 3给出了某个不为 0的循环移位对应的循环移位窗和副本窗的一个例子。 从图 2和图 3可以看出, 只用 TS36.211中定义的 (即小于 Nzc/2的 值), 就可以推导出两个副本窗和其循环移位窗的距离。 实际上, 是循环移位搜 索窗起点和副本窗起点的距离。
"
Figure imgf000007_0001
, where M- ' modNzc denotes Μ · = . N ze ± l , m is the smallest integer that makes a positive integer, always less than N /2. An example of a cyclic shift of 0 is given in Fig. 2, from which the relationship of d:, and the relationship between the cyclic shift window and the replica window can be understood, wherein the dotted line portion is an equivalent negative frequency offset window, and The negative frequency offset window used by the time domain correlation method is a cyclic cyclic shift relationship. Figure 3 shows an example of a cyclic shift window and a copy window corresponding to a cyclic shift that is not zero. As can be seen from Figures 2 and 3, the distance between the two replica windows and their cyclic shift windows can be derived using only the values defined in TS 36.211 (i.e., values less than N zc /2). In fact, it is the distance between the start of the cyclic shift search window and the start of the copy window.
在 LTE物理层协议 TS36.211中, 在 LTE中, 对产生前导序列使用的循 环移位分为非限制集 unrestricted set (也叫常规集 normal set ) 和限制集 restricted set (也叫高速集 high speed set ) 两种。 限制集 (高速集)考虑了高 速带来的频偏影响, 为了保证各个前导序列的搜索窗相互之间没有交叠, 前 导序列的产生使用的循环移位量 Cv会受到限制。 但对 LTE的非限制集(常规 集) , 用于频偏艮小的场景 (比如中低速小区) , 其前导序列产生的循环移 位量不会受限制,产生前导的循环移位的取值 Cv = v. Nra ,其中 v=0, 1 , 2,
Figure imgf000007_0002
- 1 ; W 表示取小于或等于 x的最大整数, 即对 X向下取整, Ncs为 搜索窗的长度(即产生循环移位序列的步长) 。
In the LTE physical layer protocol TS36.211, in LTE, the cyclic shift used for generating the preamble sequence is divided into an unrestricted set unrestricted set (also called a regular set normal set) and a restricted set restricted set (also called a high speed set high speed set). Set ) Two. The limit set (high speed set) takes into account the frequency offset effect caused by the high speed, and in order to ensure that the search windows of the respective preamble sequences do not overlap each other, the cyclic shift amount Cv used for generating the preamble sequence is limited. However, for the non-limiting set of LTE (regular set), for scenes with small frequency offset (such as low- and medium-speed cells), the cyclic shift amount generated by the preamble sequence is not limited, and the value of the leading cyclic shift is generated. C v = v. N ra , where v=0, 1 , 2,
Figure imgf000007_0002
- 1 ; W means take the largest integer less than or equal to x, that is, round down X, and N cs is the length of the search window (that is, the step size of the cyclic shift sequence).
根据 ZC序列的频偏特性, 由于基站收到的 RACH信号是有频偏的, 在 RACH前导码检测中除了循环移位对应的搜索窗 (简称循环移位搜索窗)夕卜, 在副本窗也会有峰值。 对高速小区, 多普勒频偏比较大, 因此副本窗内的According to the frequency offset characteristic of the ZC sequence, since the RACH signal received by the base station is frequency offset, in addition to the cyclic shift corresponding search window (referred to as a cyclic shift search window) in the RACH preamble detection, There will also be peaks in the copy window. For high-speed cells, the Doppler frequency is relatively large, so the copy window
RACH信号的相关值会比较大, 在检测时认为循环移位窗和两个副本窗都可 能会出现信号, 要对循环移位窗和两个副本窗综合检测, 因为高速小区使用 限制集, 每个前导码对应的循环移位窗和其副本窗都和别的前导码的循环移 位窗和其副本窗不重合, 因此不会出现两个不同的前导码在一个搜索窗的现 象。 对中低速小区, 多普勒频偏比较小, 往往循环移位窗内的信号相关值远 高于副本窗内的信号相关值, 因此在检测时只认为循环移位窗中存在信号, 即仅在循环移位窗进行前导码检测, 不检测副本窗。 The correlation value of the RACH signal will be relatively large. It is considered that the cyclic shift window and the two duplicate windows may have signals at the time of detection. It is necessary to comprehensively detect the cyclic shift window and the two replica windows, because the high-speed cell uses the limit set, each The cyclic shift window corresponding to each preamble and its copy window do not coincide with the cyclic shift window of other preambles and its copy window, so that there is no phenomenon that two different preambles are in one search window. For medium and low-speed cells, the Doppler frequency offset is relatively small, and the signal correlation value in the cyclic shift window is often much higher than the signal correlation value in the replica window. Therefore, only the signal in the cyclic shift window is considered during the detection, that is, only Preamble detection is performed in the cyclic shift window, and the replica window is not detected.
但在中低速小区总是存在一定的频偏的, 比如多普勒频偏; 这样, 在副 本窗中总是会有信号的相关峰出现, 中低速小区使用的是非限制集, 即没有 循环移位限制, 虽然每个前导码对应的循环移位窗和其他前导码的循环移位 窗不重合,但每个前导码对应的循环移位窗可能和其他前导码的副本窗重合。 在中低速小区, 循环移位窗内的信号相关值要远大于副本窗内由于频偏带来 的信号相关值, 但在信噪比较高时, 副本窗内这个频偏带来的相关值也会大。 例如, 只发送前导码 C1 , 不发送前导码 C2。 当前导码 C1的副本窗与前导码 C2的循环移位搜索窗交叠时, C1的频偏副本信号可能落到 C2的循环移位搜 索窗。当对 C2的循环移位窗检测时,很容易把前导码 C1的频偏副本信号判断 成 C2的信号, 而 C2实际上是没有发送的, 这就产生了虚警。  However, there are always certain frequency offsets in the low- and medium-speed cells, such as Doppler frequency offset. In this way, there will always be a correlation peak of the signal in the replica window, and the medium-low speed cell uses an unrestricted set, that is, there is no cyclic shift. Bit limit, although the cyclic shift window corresponding to each preamble does not coincide with the cyclic shift window of other preambles, the cyclic shift window corresponding to each preamble may coincide with the copy window of other preambles. In the low- and medium-speed cells, the signal correlation value in the cyclic shift window is much larger than the signal correlation value due to the frequency offset in the replica window, but when the signal-to-noise ratio is high, the correlation value brought by the frequency offset in the replica window It will be big. For example, only the preamble C1 is transmitted, and the preamble C2 is not transmitted. When the copy window of the current guide code C1 overlaps with the cyclic shift search window of the preamble C2, the frequency offset copy signal of C1 may fall to the cyclic shift search window of C2. When detecting the cyclic shift window of C2, it is easy to judge the frequency offset copy signal of the preamble C1 as the C2 signal, and C2 is actually not transmitted, which causes a false alarm.
在某个 RACH信号有频偏且信噪比很高时, 这种虚警现象会很明显。 在 多个高信噪比用户同时接入时, 虚警率会非常高。 大量的虚警会增加随机接 入过程中的信令开销, 增加系统的处理负担, 因此需要对虚警进行抑制。  This false alarm phenomenon is obvious when a RACH signal has a frequency offset and the signal to noise ratio is high. When multiple high SNR users access simultaneously, the false alarm rate will be very high. A large number of false alarms increase the signaling overhead during the random access process and increase the processing load of the system. Therefore, the false alarm needs to be suppressed.
发明内容 Summary of the invention
本发明所要解决的技术问题是, 克服现有技术的不足, 提供一种随机接 入信道的信号检测方法, 对使用非限制集(中低速小区) 的小区由于频偏引 起的虚警进行抑制。  The technical problem to be solved by the present invention is to overcome the deficiencies of the prior art and provide a signal detection method for a random access channel, which suppresses false alarms caused by frequency offsets of cells using non-limiting sets (middle and low speed cells).
为了解决上述问题, 本发明提供一种随机接入信道的信号检测方法, 包 括:  In order to solve the above problems, the present invention provides a signal detection method for a random access channel, including:
A: 基站得到第 u个根序列的 N个时域相关值 R(m)后, 将 N个时域相关 值所对应的所有 m值作为检测点, 其中 m=l , 2 , . . . , N; A: After the base station obtains N time-domain correlation values R(m) of the u-th root sequence, N time-domain correlations are performed. All m values corresponding to the values are used as detection points, where m=l, 2, . . . , N;
B: 在当前所有检测点中, 找到最大的时域相关值 R(m— max)所对应的检 测点 m— max, 当所述最大的时域相关值 R(m— max)大于峰值检测门限时,判定 在 m— max所对应的循环移位搜索窗检测到了随机接入信道的前导码, 并将 m— max、 以及当前检测点中的点 ml和 /或点 m2作为非检测点; 其中, ml = (N+m— max - du) mod N, m2 = (m— max + du) mod N, ml和 m2都是正整数; 以 及 B: In all current detection points, find the detection point m_max corresponding to the largest time domain correlation value R(m—max), when the maximum time domain correlation value R(m−max) is greater than the peak detection gate For a time limit, it is determined that the preamble of the random access channel is detected in the cyclic shift search window corresponding to m_max, and m_max, and the point ml and/or the point m2 in the current detection point are regarded as non-detection points; , ml = (N+m - max - d u ) mod N, m2 = (m - max + d u ) mod N, ml and m2 are both positive integers;
C:如果还有剩余检测点,且剩余检测点中的最大的时域相关值大于峰值 检测门限, 则跳转至步骤 B; 否则结束当前根序列的检测;  C: If there are remaining detection points, and the largest time domain correlation value in the remaining detection points is greater than the peak detection threshold, then jump to step B; otherwise, the detection of the current root sequence is ended;
其中, N > Nze, Nzc 为根序列的长度; du为循环移位搜索窗的起点与副 本窗起点之间的距离。 Where N > N ze , N zc is the length of the root sequence; d u is the distance between the start of the cyclic shift search window and the start of the replica window.
此外, 在步骤 B中, 找到所述 m— max后, 还可进行如下操作:  In addition, in step B, after finding the m-max, the following operations can also be performed:
如果 m3 > m4, 则将大于等于 m3且小于等于 N的点, 和 /或, 大于等于 1且小于等于 m4的点作为非检测点; 否则, 将大于等于 m3且小于等于 m4 的点作为非检测点; 和 /或  If m3 > m4, a point greater than or equal to m3 and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to m4 is regarded as a non-detection point; otherwise, a point greater than or equal to m3 and less than or equal to m4 is regarded as non-detection Point; and/or
如果 m5>m6, 则将大于等于 m5且小于等于 N的点, 和 /或, 大于等于 1 且小于等于 m6的点作为非检测点; 否则, 将大于等于 m5且小于等于 m6的 点作为非检测点;  If m5>m6, a point greater than or equal to m5 and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to m6 is regarded as a non-detection point; otherwise, a point greater than or equal to m5 and less than or equal to m6 is regarded as non-detection Point
其中, m3 = (N+m max - du - X) mod N, m4 = (N+m— max - du + X) mod N, m3和 m4为正整数; 以及 m5 = (N+m— max + du - X) mod N, m6 = (m— max + du + X) mod N, m5和 m6为正整数; X=int(N/(Nzc x 2)) , int表示向上或向下取 整。 Where m3 = (N+m max - d u - X) mod N, m4 = (N+m - max - d u + X) mod N, m3 and m4 are positive integers; and m5 = (N+m - Max + d u - X) mod N, m6 = (m - max + d u + X) mod N, m5 and m6 are positive integers; X = int(N/(N zc x 2)) , int means up or Round down.
此外, 在步骤 B中, 找到所述 m— max后, 可在当前检测点中找到与所述 m— max 属于同一循环移位搜索窗的超过峰值检测门限的其它检测点: m[l] m[K];将当前检测点中的 m[k] - du和 /或 m[k] + du标识为非检测点;In addition, in step B, after the m_max is found, other detection points exceeding the peak detection threshold that belong to the same cyclic shift search window as the m-max may be found in the current detection point: m[l] m [K]; identifies m[k] - d u and/or m[k] + d u in the current detection point as non-detection points;
1 k K。 1 k K.
此外, 在步骤 B中, 找到所述检测点: m[l] m[K]后, 还可进行如 下操作: 如果 m7[k] > m8[k] , 则将大于等于 m7[k]且小于等于 N的点, 和 /或, 大 于等于 1且小于等于 m8[k]的点作为非检测点; 否则, 将大于等于 m7[k]且小 于等于 m8[k]的点作为非检测点; 和 /或 In addition, in step B, after the detection point is found: m[l] m[K], the following operations can also be performed: If m7[k] > m8[k] , a point greater than or equal to m7[k] and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to m8[k] is used as a non-detection point; otherwise, a point greater than or equal to m7[k] and less than or equal to m8[k] as a non-detection point; and/or
如果 m9[k] > ml0[k] , 则将大于等于 m9[k]且小于等于 N的点, 和 /或, 大于等于 1且小于等于 ml0[k]的点作为非检测点; 否则, 将大于等于 m9[k] 且小于等于 ml0[k]的点作为非检测点;  If m9[k] > ml0[k] , a point greater than or equal to m9[k] and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to ml0[k] is used as the non-detection point; otherwise, a point greater than or equal to m9[k] and less than or equal to ml0[k] as a non-detection point;
其中, m7[k] = (N+m[k] - du - X) mod N, m8[k] = (N+m[k] - du + X) mod N, m7[k]和 m8[k]为正整数;以及 m9[k] = (N+m[k] + du— X) mod N, ml0[k] = (m[k] + du + X) mod N, m9 [k]和 mlO [k]为正整数; X=int(N/(Nzc x 2)) , int表示向 上或向下取整。 Where m7[k] = (N+m[k] - d u - X) mod N, m8[k] = (N+m[k] - d u + X) mod N, m7[k] and m8 [k] is a positive integer; and m9[k] = (N+m[k] + d u — X) mod N, ml0[k] = (m[k] + d u + X) mod N, m9 [ k] and mlO [k] are positive integers; X=int(N/(N zc x 2)) , int means rounded up or down.
此外, 在步骤 B 中, 找到所述 m— max后, 还可将当前检测点中与所述 m— max属于同一循环移位搜索窗的所有检测点标识为非检测点。  In addition, in step B, after the m_max is found, all the detection points in the current detection point that belong to the same cyclic shift search window as the m-max may also be identified as non-detection points.
此外, 所述 du大于等于 2且小于 N /2 , 并且当 N=NZC时, 所述 du满足 如下等式: 0 ' )mod zc = ±1。 此外, 当 N>NZC 时 , du=int( d χ N/Nzc) , 且 满足如下等式:Further, the d u is greater than or equal to 2 and less than N /2 , and when N=N ZC , the d u satisfies the following equation: 0 ' ) mod zc = ±1. Further, when N>N ZC , d u =int( d χ N/N zc ), and the following equation is satisfied:
O - JmodA^ = ±1 , 大于等于 2且小于 N /2 ; 其中, int()表示向上取 整或向下取整。 O - JmodA^ = ±1 , greater than or equal to 2 and less than N /2 ; where int() means round up or round down.
此外, 所述峰值检测门限可釆用如下步骤确定:  In addition, the peak detection threshold can be determined by the following steps:
对接收信号进行噪声估计, 得到噪声均值; 将上述噪声均值与预先设定 的相对门限值的乘积作为峰值检测门限;  Performing noise estimation on the received signal to obtain a noise mean value; using the product of the above noise mean value and a preset relative threshold value as a peak detection threshold;
所述相对门限值为在没有信号发送时, 达到目标虚警率的虚警信号与噪 声的比值。  The relative threshold is a ratio of a false alarm signal to a noise that reaches a target false alarm rate when no signal is transmitted.
此外, 所述噪声均值可釆用如下步骤确定:  In addition, the noise mean can be determined by the following steps:
将接收信号的最大时域相关值与噪声估计比例的乘积作为门限 A; 将所 述 N个时域相关值中小于门限 A的时域相关值的均值作为所述噪声均值; 所 述噪声估计比例小于 1且大于 0。  Taking the product of the maximum time domain correlation value of the received signal and the noise estimation ratio as the threshold A; taking the mean value of the time domain correlation values smaller than the threshold A among the N time domain correlation values as the noise mean value; Less than 1 and greater than 0.
此外, 所述根序列为 ZC序列。 附图概述 Further, the root sequence is a ZC sequence. BRIEF abstract
图 1是 RACH时域相关检测的方法示意图;  1 is a schematic diagram of a method for detecting RACH time domain correlation;
图 2是 RACH时域相关检测中循环移位为 0时正负频偏副本窗与循环移 位窗距离关系示意图;  2 is a schematic diagram showing the relationship between the positive and negative frequency offset window and the cyclic shift window when the cyclic shift is 0 in the RACH time domain correlation detection;
图 3是 RACH时域相关检测中某个不为 0的循环移位对应的循环移位搜 索窗和频偏副本窗示意图;  3 is a schematic diagram of a cyclic shift search window and a frequency offset copy window corresponding to a cyclic shift that is not 0 in RACH time domain correlation detection;
图 4是本发明实施例 RACH时域相关检测方法流程图; 以及  4 is a flowchart of a RACH time domain correlation detecting method according to an embodiment of the present invention;
图 5为 RACH相关检测中由频偏引起的虚警示意图。  Figure 5 is a schematic diagram of the false alarm caused by the frequency offset in the RACH correlation detection.
本发明的较佳实施方式 Preferred embodiment of the invention
本发明的基本思路是, 由于频率偏移会造成大量虚警, 因此可以在进行 RACH时域相关检测过程中的峰值检测时, 根据 ZC序列的频偏特性找到这 些虚警的位置, 去掉这些可能是虚警的位置, 来达到虚警抑制的目的。  The basic idea of the present invention is that, since the frequency offset causes a large number of false alarms, the position of the false alarms can be found according to the frequency offset characteristic of the ZC sequence when performing peak detection in the RACH time domain correlation detection process, and these possibilities are removed. It is the location of false alarms to achieve the purpose of false alarm suppression.
下面将结合附图和实施例对本发明进行详细描述。  The invention will now be described in detail in conjunction with the drawings and embodiments.
图 4是本发明实施例 RACH时域相关检测方法流程图。 为了突出本发明 的重点, 图 4对图 1进行了部分合并和简化, 并仅以单根接收天线为例进行 描述。 如图 4所示, 该方法包括如下步骤:  4 is a flow chart of a RACH time domain correlation detection method according to an embodiment of the present invention. In order to highlight the gist of the present invention, FIG. 4 partially merges and simplifies FIG. 1, and only describes a single receiving antenna as an example. As shown in FIG. 4, the method includes the following steps:
401 : 从接收信号中提取 Nzc个点的 RACH频域信号值; 401: extract RACH frequency domain signal values of N zc points from the received signal;
如上所述, Nzc为 ZC序列的长度, 在 LTE中规定为 839。 As described above, N zc is the length of the ZC sequence, which is specified as 839 in LTE.
402:将上述 Nze个点的 RACH频域信号值与每个本地根序列的复共轭进 行点乘得到 Nze个点乘值, 并补零成 N点 (即进行时域过釆样)后, 进行 N 点的 IFFT, 得到每一本地根序列的 N个时域相关值: R(m), 1 < m < N; 402: Multiply the RACH frequency domain signal value of the N ze points and the complex conjugate of each local root sequence to obtain N ze point multiplication values, and add zeros to N points (ie, perform time domain over-sampling) After that, an IFFT of N points is performed, and N time-domain correlation values of each local root sequence are obtained: R(m), 1 < m <N;
其中, 上述补零处理为可选操作, 其作用是可以使用快速的反傅里叶变 换, 减少计算量, 如果不进行补零处理, 则 N = NZCWherein, the above zero padding processing is an optional operation, and the function is that a fast inverse Fourier transform can be used to reduce the amount of calculation, and if zero padding is not performed, N = N ZC .
403: 将上述 N个时域相关值进行模平方;  403: modulo square the foregoing N time domain correlation values;
本步骤为可选步骤, 经过模平方处理的时域相关值实际上反映了信号功 率值。 对每一根序列的 N个时域相关值进行峰值检测, 以下以第 u个根序列为 例进行描述, 具体包含如下步骤: This step is an optional step. The time domain correlation value after the modulo square processing actually reflects the signal power value. The peak detection is performed on the N time-domain correlation values of each sequence. The following takes the u-th root sequence as an example, which specifically includes the following steps:
404: 在 N个时域相关值中, 将所有大于峰值检测门限(记为门限 B )的 时域相关值所对应的 m值(循环移位样点, 或称为检测点)作为初始的待检 测点集合;  404: In the N time domain correlation values, all m values (cyclic shift samples, or detection points) corresponding to time domain correlation values greater than the peak detection threshold (denoted as threshold B) are taken as initial waiting Set of detection points;
门限 B可以釆用如下方法计算:  Threshold B can be calculated as follows:
404A: 对接收信号进行噪声估计, 得到噪声门限(记为门限 A ) ; 门限 A可以等于: 最大时域相关值 X噪声估计比例; 其中, 噪声估计比 例大于 0且小于 1 , 例如, 噪声估计比例值可以取为 0.6。  404A: Perform noise estimation on the received signal to obtain the noise threshold (denoted as threshold A); Threshold A can be equal to: Maximum time domain correlation value X noise estimation ratio; where noise estimation ratio is greater than 0 and less than 1, for example, noise estimation ratio The value can be taken as 0.6.
404B: 计算所有小于门限 A的时域相关值的均值(称为噪声均值) ; 噪声均值实际上反映了噪声功率的大小。  404B: Calculate the mean of all time-domain correlation values less than threshold A (called the noise mean); the noise mean actually reflects the amount of noise power.
当然, 门限 A和噪声均值也可以釆用现有技术的其它方法计算。  Of course, the threshold A and the noise mean can also be calculated using other methods of the prior art.
相对门限可以取没有信号发送时, 达到目标虚警率(例如 0.1 % )的虚警 信号与噪声的比值。 The relative threshold can be the ratio of the false alarm signal to the noise at the target false alarm rate (for example, 0.1%) when no signal is sent.
需要注意的是, 峰值检测门限 (门限 B ) 的作用是区分噪声和信号, 在 本发明中仅起到停止检测的作用(即小于该门限的时域相关值不进行检测 ) , 现有技术中还有其它多种设置和计算方法。  It should be noted that the role of the peak detection threshold (threshold B) is to distinguish between noise and signal. In the present invention, only the function of stopping detection is performed (that is, the time domain correlation value less than the threshold is not detected), in the prior art. There are many other settings and calculation methods.
405: 找到当前待检测点集合中各待检测点的时域相关值的最大值 R(m max),判定在 m— max所对应的循环移位搜索窗检测到了前导码,并根据 m— max确定前导码所对应的该根序列的循环移位量和时间提前量;  405: Find a maximum value R(m max) of the time domain correlation value of each point to be detected in the current set of points to be detected, and determine that the preamble is detected in the cyclic shift search window corresponding to m—max, and according to m—max Determining a cyclic shift amount and a timing advance of the root sequence corresponding to the preamble;
406: 将 m— max从当前待检测点集合中删除(以避免重复检测) , 如果 m— max - du和 /或 m— max + du位于当前待检测集合 ,将 m— max - du和 /或 m— max + du从当前待检测点集合中删除; 406: Remove m—max from the current set of points to be detected (to avoid repeated detection), if m−max− du and/or m−max+d u are located in the current to-be-detected set, m−max− du And / or m - max + d u is deleted from the current set of points to be detected;
考虑到 m— max - du和 m— max + du有可能不在区间 [1 , N]的范围内, 实际 从待检测点集合中删除的点为: ml = (N+m— max - du) mod N, m2 = (m— max + du) mod N, ml和 m2都是正整数。 除了 m— max - du和 m— max + du以夕卜, 还可以 ^夺区间 [m— max— du — X , m— max - du + X]和 [m— max + du - X, m— max + du + X]中的其它值从待检测点集 合中删除。 其中, [ ]表示闭区间; X= int(N/(Nzc x2)), int表示向上或向下取 整。 Considering that m - max - d u and m - max + d u may not be in the range of interval [1 , N], the point actually deleted from the set of points to be detected is: ml = (N+m - max - d u ) mod N, m2 = (m— max + d u ) mod N, ml and m2 are both positive integers. In addition m- max - d u and m- max + d u to Xi Bu, can capture interval ^ [m- max- d u - X, m- max - d u + X] and [m- max + d u - Other values in X, m - max + d u + X] are removed from the set of points to be detected. Where [ ] denotes a closed interval; X= int(N/(N zc x2)), and int denotes rounding up or down.
同样, 考虑到 m— max - du ± X和 m— max + du ± X有可能不在区间 [1 , N] 的范围内, 实际上应当将满足以下条件的点从待检测点集合中删除: Similarly, considering that m - max - d u ± X and m - max + d u ± X may not be in the range of interval [1 , N], points that satisfy the following conditions should actually be deleted from the set of points to be detected :
如果 m3 > m4, 则删除大于等于 m3且小于等于 N的点, 和 /或, 删除大 于等于 1且小于等于 m4的点; 否则,删除大于等于 m3且小于等于 m4的点; 如果 m5>m6, 则删除大于等于 m5且小于等于 N的点, 和 /或, 删除大于 等于 1且小于等于 m6的点; 否则, 删除大于等于 m5且小于等于 m6的点; 其中, m3 = (N+m max - du - X) mod N, m4 = (N+m— max - du + X) mod N, m3和 m4为正整数; If m3 > m4, delete a point greater than or equal to m3 and less than or equal to N, and/or delete a point greater than or equal to 1 and less than or equal to m4; otherwise, delete a point greater than or equal to m3 and less than or equal to m4; if m5>m6, Then deleting a point greater than or equal to m5 and less than or equal to N, and/or deleting a point greater than or equal to 1 and less than or equal to m6; otherwise, deleting a point greater than or equal to m5 and less than or equal to m6; wherein, m3 = (N+m max - d u - X) mod N, m4 = (N+m - max - d u + X) mod N, m3 and m4 are positive integers;
m5 = (N+m— max + du - X) mod N, m6 = (m— max + du + X) mod N, m5和 m6为正整数。 M5 = (N+m - max + d u - X) mod N, m6 = (m - max + d u + X) mod N, m5 and m6 are positive integers.
上述 du为循环移位搜索窗的起点与副本窗起点的距离。 在 du=l 时循环 移位窗和副本窗几乎重合, 可以不用删除副本窗的点。 因此可以限定只在 du 大于等于 2时进行步骤 406的操作。 The above d u is the distance between the start point of the cyclic shift search window and the start of the replica window. When du=l, the loop shift window and the copy window almost coincide, and it is not necessary to delete the point of the copy window. Therefore, it is possible to limit the operation of step 406 only when d u is greater than or equal to 2.
当 N=NZC时, 满足: 0 · ) mod Nzc = ±1且 小于 NZc /2; When N=N ZC , it satisfies: 0 · ) mod N zc = ±1 and less than N Zc /2;
当 N>NZC时, du=int< „ x N/Nzc), 且 0· ί 'Μ )mod zc = ±1并且^小于 N / 2 , 其中 int()表示向上取整或向下取整。 When N>N ZC , d u =int< „ x N/N zc ), and 0· ί ' Μ )mod zc = ±1 and ^ is less than N / 2 , where int() means round up or down Rounding.
u为根序列序号, 运算符 mod表示取余数, 且当 0 < x y时, (x) mod (y) 的值小于或等于「 /2 , 「·]表示向上取整, 例如: 838 mod 839= - 1。  u is the root sequence number, the operator mod represents the remainder, and when 0 < xy, the value of (x) mod (y) is less than or equal to " /2 , "·] means round up, for example: 838 mod 839= - 1.
通过本步骤, 将当前待检测点集合中的最大相关值所在循环移位窗对应 的前导码作为检测到的前导码, 并且将该最大相关值的位置 m— max、 该最大 相关值所在循环移位窗对应的两个副本窗中与该最大相关值的位置 m— max对 应位置 ( m— max - du和 m— max + du ) 以及位置 m— max _ du、 位置 m— max + du 相邻的若干个位置作为虚警位置从待检测点集合中去除, 以减少虚警率。 In this step, the preamble corresponding to the cyclic shift window in which the maximum correlation value in the current set of points to be detected is located is used as the detected preamble, and the position of the maximum correlation value, m_max, and the maximum correlation value are cyclically shifted. m- max positions corresponding to positions of the two copies of the window level and the window corresponding to the maximum correlation value (m- max - d u and m- max + d u) and the position m- max _ d u, the position m- max + A number of positions adjacent to d u are removed from the set of points to be detected as false alarm positions to reduce the false alarm rate.
407: 如果待检测点集合中还包含待检测点, 则跳转至步骤 405, 否则结 束第 u个根序列的峰值检测。 407: If the to-be-detected point set further includes a to-be-detected point, skip to step 405, otherwise Peak detection of the uth root sequence of the beam.
图 5为 RACH相关检测中由频偏引起的虚警示意图; 下面将结合图 5对 本发明的一个应用实例进行介绍。  Fig. 5 is a schematic diagram of a false alarm caused by frequency offset in RACH correlation detection; an application example of the present invention will be described below with reference to Fig. 5.
在得到某一才艮序列所对应的 N个时域相关值后,对小于门限 A的时域相 关值求均值, 这些数据的均值反映了该根序列的噪声功率均值。 将噪声均值 与虚警率目标为 10-3时的相对门限值的乘积作为门限 B。 假设系统配置的搜索窗的长度为 Ncs, 有一个 RACH用户接入, 该用户 使用的是某个根序列的循环移位 Cvl , 则该用户的循环移位搜索窗从 Cvl到 Cvl+Ncs, 一个副本窗为 Cvl - du到 Cvl - du+Ncs; 另一个副本窗为 Cvl+du 到 Cvl+du+Ncs。 对低速小区, 没有循环移位限制, 所以循环移位 Cvl的副本 窗可能是其他 RACH用户的循环移位搜索窗。 After obtaining the N time domain correlation values corresponding to a certain sequence, the time domain correlation values smaller than the threshold A are averaged, and the mean values of the data reflect the noise power mean of the root sequence. Means and noise false alarm rate relative to the target gate 10-3 when the threshold limit value as the product of B. Suppose the length of the search window configured by the system is Ncs, there is a RACH user access, the user uses a cyclic shift Cvl of a certain root sequence, then the user's cyclic shift search window from Cvl to Cvl+Ncs, one The copy window is Cvl - d u to Cvl - d u + Ncs; the other copy window is Cvl + d u to Cvl + d u + Ncs. For low-speed cells, there is no cyclic shift limitation, so the replica window of the cyclic shift Cvl may be a cyclic shift search window of other RACH users.
如图 5所示, 当对所有检测位置进行检测后, 发现点 xl ( ml , R(ml) ) 和点 x2 ( m2, R(m2) )都是超过门限 B的点; 点 xl对应的峰值功率 R(ml) 最大, 并落在 Cvl的循环移位搜索窗内, 因此判定检测到循环移位是 Cvl的 RACH用户。 点 x2也是超过门限 B的点, 实际上点 x2是由点 xl处 RACH 的频偏造成的, 但在中低速小区没有循环移位限制的情况下, 因为 x2 落在 Cv2 的循环移位窗内, 如果不进行虚警抑制, 会把点 x2 判断成循环移位是 Cv2的另一个 RACH用户, 点 x2就会成为虚警。 假如信噪比很高, 每个有 RACH信号的循环移位窗对应的副本窗都会出现虚警, 这将会带来很大的信 令开销。  As shown in Fig. 5, when all the detected positions are detected, it is found that the points xl (ml, R(ml)) and the points x2 (m2, R(m2)) are points exceeding the threshold B; the peak corresponding to the point xl The power R(ml) is the largest and falls within the cyclic shift search window of Cvl, so it is determined that the cyclic shift is a RACH user of Cvl. Point x2 is also the point that exceeds threshold B. In fact, point x2 is caused by the frequency offset of RACH at point xl, but in the case where the low- and medium-speed cells have no cyclic shift limit, because x2 falls within the cyclic shift window of Cv2. If false alarm suppression is not performed, point x2 will be judged as another RACH user whose cyclic shift is Cv2, and point x2 will become a false alarm. If the signal-to-noise ratio is high, a false alarm will appear in the copy window corresponding to the cyclic shift window of the RACH signal, which will bring a lot of signal overhead.
点 x2和点 xl的距离正好是 du, 这说明点 x2有可能是点 xl的频偏造成 的, 点 x2以及其左右两点都可能会是虚警点, 在检测中需要把点 x2以及其 左右两点从待检测点集合中去掉, 这样就不会检测到这些位置的信号, 也就 不会产生虚警了。 因为点 xl对应的循环移位搜索窗已经检测到前导信号, 这 时非检测位置还包括点 xl对应的循环移位搜索窗内的所有点,为了避免重复 检测, 因此还需要把从 Cvl到 Cvl + Ncs的位置都标明是非检测位置。 接下 来再次对所有可检测位置进行检测, 发现没有超过门限 B的时域相关值, 则 判定该根序列的峰值检测过程结束, 该根序列相关检测的最后结果是只检测 到点 xl所在循环移位搜索窗对应的前导, 点 x2所在循环移位搜索窗对应的 前导不作为检测的结果上报。 The distance between point x2 and point xl is exactly d u , which means that point x2 may be caused by the frequency offset of point xl. Point x2 and its left and right points may be false alarm points. In the detection, point x2 and The left and right points are removed from the set of points to be detected, so that the signals at these positions are not detected, and no false alarms are generated. Since the preamble signal has been detected by the cyclic shift search window corresponding to the point x1, the non-detection position further includes all points in the cyclic shift search window corresponding to the point x1. In order to avoid repeated detection, it is also necessary to move from Cvl to Cvl. + The location of Ncs is marked as a non-detected location. Next, all the detectable positions are detected again, and it is found that the time domain correlation value of the threshold B is not exceeded, and then the peak detection process of the root sequence is determined to be ended. The final result of the correlation detection of the root sequence is that only the cyclic shift of the point xl is detected. The leading position corresponding to the bit search window, corresponding to the cyclic shift search window where the point x2 is located The lead is not reported as a result of the test.
在一些极少的情况下会出现某个循环移位 cvl频偏副本的峰值点和同一 根序列另一个循环移位 cv2峰值点重合的情况, 这时使用我们上述的虚警抑 制方法可能会造成循环移位 cv2对应的信号的漏检, 但这种情况是极少发生 的, 因为实际系统中各个用户距离基站位置是随机的, 其时延也不同。 并且 当搜索窗长度比较大时, 同一根序列的可用循环移位会很少, 这种重合的概 率就更小了。  In some rare cases, the peak point of a cyclic shift cvl frequency offset copy coincides with the same sequence and another cyclic shift cv2 peak point. In this case, the above false alarm suppression method may cause The missed detection of the signal corresponding to cv2 is cyclically shifted, but this situation rarely occurs because the position of each user in the actual system is random from the base station, and the delay is also different. And when the length of the search window is large, the available cyclic shift of the same sequence will be small, and the probability of such coincidence is even smaller.
另外, 我们限制在 du小于 2的情况不进行本发明的虚警抑制处理 (即在 峰值检测中将某一循环移位搜索窗中确定为前导码的位置在其副本窗的对应 位置作为非检测位置) , 可以保证某个循环移位窗和其自身的副本之间有峰 值交叠时不会出现漏检的现象。 In addition, we limit the false alarm suppression process of the present invention in the case where d u is less than 2 (that is, in the peak detection, the position determined as the preamble in a certain cyclic shift search window is regarded as the non-corresponding position of the copy window thereof. The detection position) ensures that there is no missed detection when there is a peak overlap between a cyclic shift window and its own copy.
根据本发明的基本原理, 上述实施例还有多种变换方式, 例如:  According to the basic principle of the present invention, the above embodiment has various transformations, such as:
(一)在步骤 405中, 确定 m— max后, 还可以进行如下处理: 首先在待 检测点集合中找到所有与 m— max位于同一循环移位搜索窗的点, 然后将与 m— max位于同一循环移位搜索窗的点和 /或该循环移位搜索窗所对应的副本 窗中的各对应点从待检测点集合中删除。  (1) In step 405, after determining m_max, the following processing may also be performed: First, all the points in the set of points to be detected are located in the same cyclic shift search window as m-max, and then located at m-max. The points of the same cyclic shift search window and/or the corresponding points in the copy window corresponding to the cyclic shift search window are deleted from the set of points to be detected.
也就是说,如果在待检测点集合中存在与 m— max位于同一循环移位搜索 窗的 m maxl , m maxl所对应的副本窗中的点是 m maxl - du和 m maxl + du (如果 m maxl、 m maxl - du和 m maxl + du在待检测点集合中,则说明其对 应的时域相关值大于门限 B ) , 则可以将 m— maxl从待检测点集合中删除, 如果 m maxl、 m maxl - du和 /或 m maxl + du在待检测点集合中, 也可以将 m maxl - du和 /或 m— maxl + du从待检测点集合中删除。 That is, if there is m maxl located in the same cyclic shift search window as m-max in the set of points to be detected, the points in the copy window corresponding to m maxl are m maxl - d u and m maxl + d u ( If m maxl, m maxl - d u and m maxl + d u are in the set of points to be detected, indicating that the corresponding time domain correlation value is greater than the threshold B), m_maxl may be deleted from the set of points to be detected. If m maxl, m maxl - d u and / or m maxl + d u be the set of detection points may be m maxl - d u and / or m- maxl + d u to be removed from the collection point detection.
当然, 还可以 ^夺区间 [m— maxl— du— X, m maxl - du + X]和 [m— maxl + du - X , m maxl + du + X]中的其它值从待检测点集合中删除。 Of course, the interval may also be won ^ [m- maxl- d u - X, m maxl - d u + X] , and - other values [m- maxl + d u X, m maxl + d u + X] to be in the The detection point is removed from the collection.
一般情况下,在当前检测点中找到与 m— max属于同一循环移位搜索窗的 超过峰值检测门限的其它检测点: m[l] m[K]后, 还可以进行如下操作: 如果 m7[k] > m8[k] , 则将大于等于 m7[k]且小于等于 N的点, 和 /或, 大 于等于 1且小于等于 m8[k]的点作为非检测点; 否则, 将大于等于 m7[k]且小 于等于 m8[k]的点作为非检测点; 和 /或 In general, after finding other detection points that exceed the peak detection threshold of m-max in the same cyclic shift search window in the current detection point: m[l] m[K], the following operations can also be performed: If m7[ k] > m8[k] , then a point greater than or equal to m7[k] and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to m8[k] as a non-detection point; otherwise, greater than or equal to m7 [k] and small a point equal to m8[k] as a non-detection point; and/or
如果 m9[k] > ml0[k] , 则将大于等于 m9[k]且小于等于 N的点, 和 /或, 大于等于 1且小于等于 ml0[k]的点作为非检测点; 否则, 将大于等于 m9[k] 且小于等于 ml0[k]的点作为非检测点;  If m9[k] > ml0[k] , a point greater than or equal to m9[k] and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to ml0[k] is used as the non-detection point; otherwise, a point greater than or equal to m9[k] and less than or equal to ml0[k] as a non-detection point;
其中, m7 [k] = (N+m[k] - du - X) mod N , m8 [k] = (N+m[k] - du + X) mod N , m7[k]和 m8[k]为正整数; Where m7 [k] = (N+m[k] - d u - X) mod N , m8 [k] = (N+m[k] - d u + X) mod N , m7[k] and m8 [k] is a positive integer;
m9[k] = (N+m[k] + du - X) mod N, ml0[k] = (m[k] + du + X) mod N, m9 [k] 和 mlO [k]为正整数。 M9[k] = (N+m[k] + d u - X) mod N, ml0[k] = (m[k] + d u + X) mod N, m9 [k] and mlO [k] are A positive integer.
(二)上述实施例以单根接收天线为例对本发明进行了描述, 本发明同 样适用于多接收天线的情况, 只需将各接收天线所对应的 N个时域相关值分 别相加后进行峰值检测即可。  (II) The above embodiment describes the present invention by taking a single receiving antenna as an example. The present invention is also applicable to the case of multiple receiving antennas, and only needs to add N time-domain correlation values corresponding to the receiving antennas separately. Peak detection is sufficient.
(三) 实施例中使用了待检测点集合, 对待检测点集合中的各点进行峰 值检测, 将每个非检测点或已经检测过的点从待检测点集合中删除; 很显然 具体实现时可以釆用其它方式, 例如, 将检测过的点或非检测点进行标识, 以避免重复检测或对虚警点进行检测。  (3) In the embodiment, the set of points to be detected is used, and each point in the set of detection points is subjected to peak detection, and each non-detected point or the detected point is deleted from the set of points to be detected; Other methods can be used, for example, to identify detected or non-detected points to avoid repeated detection or detection of false alarm points.
工业实用性 Industrial applicability
综上所述, 釆用本发明的方法, 能够对使用非限制集(中低速小区) 的 小区中因为频偏引起的虚警进行有效的抑制, 减少了虚警引起的信令开销, 同时避免了对随机接入信号的漏检, 保证了更多用户的成功接入。  In summary, the method of the present invention can effectively suppress false alarms caused by frequency offset in cells using non-limiting sets (middle and low-speed cells), reduce signaling overhead caused by false alarms, and avoid The missed detection of the random access signal ensures the successful access of more users.

Claims

权 利 要 求 书 Claim
1、 一种随机接入信道的信号检测方法, 包括:  A signal detection method for a random access channel, comprising:
A: 基站得到第 u个根序列的 N个时域相关值 R(m)后, 将所述 N个时域 相关值所对应的所有 m值作为检测点, 其中 m=l , 2 , ... , N;  A: After the base station obtains the N time domain correlation values R(m) of the uth root sequence, all the m values corresponding to the N time domain correlation values are used as detection points, where m=l, 2, .. . , N;
B: 在当前所有检测点中, 找到最大的时域相关值 R(m— max)所对应的检 测点 m— max, 当所述最大的时域相关值 R(m— max)大于峰值检测门限时,判定 在 m— max所对应的循环移位搜索窗检测到了随机接入信道的前导码, 并将 m— max、 以及当前检测点中的点 ml和 /或点 m2作为非检测点; 其中, ml = (N+m— max - du) mod N, m2 = (m— max + du) mod N, ml和 m2都是正整数; 以 及 B: In all current detection points, find the detection point m_max corresponding to the largest time domain correlation value R(m—max), when the maximum time domain correlation value R(m−max) is greater than the peak detection gate For a time limit, it is determined that the preamble of the random access channel is detected in the cyclic shift search window corresponding to m_max, and m_max, and the point ml and/or the point m2 in the current detection point are regarded as non-detection points; , ml = (N+m - max - d u ) mod N, m2 = (m - max + d u ) mod N, ml and m2 are both positive integers;
C:如果还有剩余检测点,且剩余检测点中的最大的时域相关值大于峰值 检测门限, 则跳转至步骤 B; 否则结束当前根序列的检测;  C: If there are remaining detection points, and the largest time domain correlation value in the remaining detection points is greater than the peak detection threshold, then jump to step B; otherwise, the detection of the current root sequence is ended;
其中, N > NZC, Nzc 为根序列的长度; du为循环移位搜索窗的起点与副 本窗起点之间的距离。 Where N > N ZC , N zc is the length of the root sequence; d u is the distance between the start of the cyclic shift search window and the start of the replica window.
2、 如权利要求 1所述的方法, 其中:  2. The method of claim 1 wherein:
在所述步骤 B中, 找到所述 m— max后,  In the step B, after the m-max is found,
如果 m3 > m4, 则将大于等于 m3且小于等于 N的点, 和 /或大于等于 1 且小于等于 m4的点作为非检测点; 否则, 将大于等于 m3且小于等于 m4的 点作为非检测点; 和 /或 如果 m5>m6, 则将大于等于 m5且小于等于 N的点, 和 /或大于等于 1且 小于等于 m6的点作为非检测点; 否则, 将大于等于 m5且小于等于 m6的点 作为非检测点;  If m3 > m4, a point greater than or equal to m3 and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to m4 is regarded as a non-detection point; otherwise, a point greater than or equal to m3 and less than or equal to m4 is regarded as a non-detection point And/or if m5>m6, a point greater than or equal to m5 and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to m6 is regarded as a non-detection point; otherwise, a point greater than or equal to m5 and less than or equal to m6 As a non-detection point;
其中, m3 = (N+m max - du - X) mod N, m4 = (N+m— max - du + X) mod N, m3和 m4为正整数; 以及 Where m3 = (N+m max - d u - X) mod N, m4 = (N+m - max - d u + X) mod N, m3 and m4 are positive integers;
m5 = (N+m— max + du - X) mod N, m6 = (m— max + du + X) mod N, m5和 m6为正整数; M5 = (N+m - max + d u - X) mod N, m6 = (m - max + d u + X) mod N, m5 and m6 are positive integers;
X=int (N /(Nzc x 2)) , int表示向上或向下取整。 X=int (N /(N zc x 2)) , int means round up or down.
3、 如权利要求 1所述的方法, 其中: 3. The method of claim 1 wherein:
在所述步骤 B中, 找到所述 m— max后,  In the step B, after the m-max is found,
在当前检测点中找到与所述 m— max属于同一循环移位搜索窗的超过峰值 检测门限的其它检测点: m[l] m[K] ; 以及  Finding other detection points exceeding the peak detection threshold that belong to the same cyclic shift search window as the m-max in the current detection point: m[l] m[K] ;
将当前检测点中的 m[k] - du和 /或 m[k] + du作为非检测点; m[k] - d u and/or m[k] + d u in the current detection point as non-detection points;
其中 1 k K。  Where 1 k K.
4、 如权利要求 3所述的方法, 其中:  4. The method of claim 3, wherein:
在所述步骤 B中, 找到所述检测点: m[l] m[K]后,  In the step B, after the detection point is found: m[l] m[K],
如果 m7[k] > m8[k] , 则将大于等于 m7[k]且小于等于 N的点, 和 /或大于 等于 1且小于等于 m8[k]的点作为非检测点; 否则, 将大于等于 m7[k]且小于 等于 m8[k]的点作为非检测点; 和 /或  If m7[k] > m8[k] , a point greater than or equal to m7[k] and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to m8[k] is regarded as a non-detection point; otherwise, it will be greater than a point equal to m7[k] and less than or equal to m8[k] as a non-detection point; and/or
如果 m9[k] > ml0[k] , 则将大于等于 m9[k]且小于等于 N的点, 和 /或大 于等于 1且小于等于 ml0[k]的点作为非检测点; 否则, 将大于等于 m9[k]且 小于等于 ml0[k]的点作为非检测点;  If m9[k] > ml0[k] , a point greater than or equal to m9[k] and less than or equal to N, and/or a point greater than or equal to 1 and less than or equal to ml0[k] is regarded as a non-detection point; otherwise, it will be greater than a point equal to m9[k] and less than or equal to ml0[k] as a non-detection point;
其中, m7 [k] = (N+m[k] - du - X) mod N , m8 [k] = (N+m[k] - du + X) mod N , m7[k]和 m8[k]为正整数; 以及 m9[k] = (N+m[k] + du - X) mod N, ml0[k] = (m[k] + du + X) mod N, m9 [k] 和 mlO [k]为正整数; Where m7 [k] = (N+m[k] - d u - X) mod N , m8 [k] = (N+m[k] - d u + X) mod N , m7[k] and m8 [k] is a positive integer; and m9[k] = (N+m[k] + d u - X) mod N, ml0[k] = (m[k] + d u + X) mod N, m9 [ k] and mlO [k] are positive integers;
X=int (N l(Nzc x 2)) , int表示向上或向下取整。 X=int (N l(N zc x 2)) , int means round up or down.
5、 如权利要求 1或 3或 4所述的方法, 其中:  5. The method of claim 1 or 3 or 4, wherein:
在所述步骤 B中,找到所述 m— max后 ,还将当前检测点中与所述 m— max 属于同一循环移位搜索窗的所有检测点作为非检测点。  In the step B, after the m-max is found, all the detection points in the current detection point that belong to the same cyclic shift search window as the m-max are regarded as non-detection points.
6、 如权利要求 1所述的方法, 其中:  6. The method of claim 1 wherein:
所述 du大于等于 2 且小于 N /2 , 并且当 N=NZC时, 所述 du满足: ( )mod zc = ±l。 The d u is greater than or equal to 2 and less than N /2 , and when N=N ZC , the d u satisfies: ( ) mod zc = ±l.
7、 如权利要求 1所述的方法, 其中: 7. The method of claim 1 wherein:
当 N>NZC时, du=int( 'a N/Nzc), 3.d 满足: ( · d ) moA Nzc = ±1 , d u 大于等于 2且小于 N /2 ; When N>N ZC , d u =int( ' a N/N zc ), 3.d satisfies: ( · d ) moA N zc = ±1 , d u Greater than or equal to 2 and less than N /2 ;
其中, int()表示向上取整或向下取整。  Where int() means rounding up or rounding down.
8、如权利要求 1所述的方法,其中所述峰值检测门限釆用如下步骤确定: 对接收信号进行噪声估计, 得到噪声均值; 将所述噪声均值与预先设定 的相对门限值的乘积作为峰值检测门限; 其中所述相对门限值为在没有信号 发送时, 达到目标虚警率的虚警信号与噪声的比值。  8. The method of claim 1 wherein said peak detection threshold is determined using the following steps: noise estimation of the received signal to obtain a noise mean; product of said noise mean and a predetermined relative threshold As a peak detection threshold; wherein the relative threshold is a ratio of a false alarm signal to a noise that reaches a target false alarm rate when no signal is transmitted.
9、 如权利要求 8所述的方法, 其中所述噪声均值釆用如下步骤确定: 将接收信号的最大时域相关值与噪声估计比例的乘积作为门限 A; 将所 述 N个时域相关值中小于门限 A的时域相关值的均值作为所述噪声均值; 其 中所述噪声估计比例小于 1且大于 0。  9. The method according to claim 8, wherein the noise mean is determined by using: a product of a maximum time domain correlation value of the received signal and a noise estimation ratio as a threshold A; the N time domain correlation values The mean value of the time domain correlation value smaller than the threshold A is taken as the noise mean value; wherein the noise estimation ratio is less than 1 and greater than 0.
10、 如权利要求 1所述的方法, 其中所述根序列为 ZC序列。  10. The method of claim 1 wherein the root sequence is a ZC sequence.
PCT/CN2009/000902 2008-09-10 2009-08-07 Method for detecting signals of random access channel WO2010028537A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2008102115131A CN101355383B (en) 2008-09-10 2008-09-10 Signal detection method for stochastic access channel
CN200810211513.1 2008-09-10

Publications (1)

Publication Number Publication Date
WO2010028537A1 true WO2010028537A1 (en) 2010-03-18

Family

ID=40308002

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/000902 WO2010028537A1 (en) 2008-09-10 2009-08-07 Method for detecting signals of random access channel

Country Status (2)

Country Link
CN (1) CN101355383B (en)
WO (1) WO2010028537A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102026231A (en) * 2010-12-14 2011-04-20 中国科学院声学研究所 Method for detecting random access of wireless communication system
CN102143103A (en) * 2011-05-19 2011-08-03 新邮通信设备有限公司 Method for generating pilot frequency sequence

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355383B (en) * 2008-09-10 2012-05-23 中兴通讯股份有限公司 Signal detection method for stochastic access channel
CN101944929B (en) * 2009-07-06 2013-08-07 中兴通讯股份有限公司 Detection method and device based on random access process
CN101997590B (en) * 2009-08-10 2014-06-11 中兴通讯股份有限公司 Method for detecting random access signal and baseband processing plate as well as base station
CN102065535B (en) * 2009-11-11 2014-07-23 电信科学技术研究院 Method and device for determining timing advance in random access process
CN102075960A (en) * 2009-11-25 2011-05-25 中兴通讯股份有限公司 Method for detecting random access signals and base station
CN102098246B (en) * 2009-12-09 2015-06-10 中兴通讯股份有限公司 Peak detection method and communication system
CN102209052B (en) * 2010-03-31 2015-06-24 中兴通讯股份有限公司 Method and device for carrying out frequency offset compensation on random access signals
CN102421184A (en) * 2010-09-28 2012-04-18 大唐移动通信设备有限公司 Method and device for determining time advance
CN101977170A (en) * 2010-10-15 2011-02-16 北京星河亮点通信软件有限责任公司 Random access detection device and detection method in TD-LTE (Time Division-Long Term Evolution) system
CN102404724B (en) * 2011-10-28 2015-07-08 华为技术有限公司 User filtering method and base station for user filtering
CN103139797B (en) * 2011-11-30 2016-08-03 京信通信系统(中国)有限公司 The signal detecting method of a kind of RACH, device and base station
CN102547831A (en) * 2012-01-09 2012-07-04 大唐移动通信设备有限公司 Random access detection method and device thereof
CN102447532B (en) * 2012-01-19 2014-05-28 大唐移动通信设备有限公司 Preamble detection method and device for same
US9001678B2 (en) * 2012-02-29 2015-04-07 Hong Kong Applied Science And Technology Research Institute Co., Ltd. False alarm reduction with search windowing and peak suppression
CN103581927A (en) * 2012-08-07 2014-02-12 工业和信息化部电信传输研究所 Method for generating detection signal
CN103841072B (en) * 2012-11-23 2017-09-22 上海贝尔股份有限公司 Method and apparatus for detecting the lead code in PRACH received data
CN106533604A (en) * 2015-09-14 2017-03-22 中兴通讯股份有限公司 Signal generating method and apparatus
CN109474920A (en) * 2018-11-02 2019-03-15 上海华虹集成电路有限责任公司 A kind of detection method of low-power consumption bluetooth data packet
CN111385041B (en) * 2018-12-28 2021-04-16 大唐移动通信设备有限公司 Method and device for measuring interference noise intensity and storage medium
CN114731701B (en) * 2019-12-04 2023-11-28 华为技术有限公司 Sequence detection method and device
CN111372227B (en) * 2020-02-19 2021-10-26 锐迪科微电子(上海)有限公司 Signal detection method, device, equipment and storage medium
CN112887241B (en) * 2021-04-29 2021-07-16 成都星联芯通科技有限公司 Frequency offset estimation method, device, communication equipment and storage medium
CN113347653B (en) * 2021-08-02 2021-11-16 四川创智联恒科技有限公司 Optimization method for estimating timing advance TA in NR-5G
CN116506968B (en) * 2023-06-21 2023-11-03 极芯通讯技术(南京)有限公司 Link time offset determination method and device and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101193436A (en) * 2006-11-29 2008-06-04 中兴通讯股份有限公司 Device for acquiring pilot detection threshold of random access channel at physical layer of the base station Node B
WO2008081311A2 (en) * 2006-12-29 2008-07-10 Nokia Corporation Apparatus, methods and computer program products providing limited use of zadoff-chu sequences in pilot or preamble signals
CN101355383A (en) * 2008-09-10 2009-01-28 中兴通讯股份有限公司 Signal detection method for stochastic access channel

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123467A (en) * 2006-08-07 2008-02-13 大唐移动通信设备有限公司 A method and device for enhancing random access
CN101203029B (en) * 2006-12-11 2010-11-10 大唐移动通信设备有限公司 Method for implementation of random accessing and base station

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101193436A (en) * 2006-11-29 2008-06-04 中兴通讯股份有限公司 Device for acquiring pilot detection threshold of random access channel at physical layer of the base station Node B
WO2008081311A2 (en) * 2006-12-29 2008-07-10 Nokia Corporation Apparatus, methods and computer program products providing limited use of zadoff-chu sequences in pilot or preamble signals
CN101355383A (en) * 2008-09-10 2009-01-28 中兴通讯股份有限公司 Signal detection method for stochastic access channel

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Channels and Modulation (Release 8)", 3GPP TS 36.211 V8.3.0, 3RD GENERATION PARTNERSHIP PROJECT, May 2008 (2008-05-01) *
ZAKHAROV, Y.V. ET AL., DETECTION OF PREAMBLE OF RANDOM ACCESS BURST IN W-CDMA SYSTEM, PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2000, vol. 1, September 2000 (2000-09-01), pages 82 - 86 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102026231A (en) * 2010-12-14 2011-04-20 中国科学院声学研究所 Method for detecting random access of wireless communication system
CN102143103A (en) * 2011-05-19 2011-08-03 新邮通信设备有限公司 Method for generating pilot frequency sequence

Also Published As

Publication number Publication date
CN101355383B (en) 2012-05-23
CN101355383A (en) 2009-01-28

Similar Documents

Publication Publication Date Title
WO2010028537A1 (en) Method for detecting signals of random access channel
CN110224968B (en) Frame timing synchronization method and device in OFDM communication system
WO2009155882A1 (en) Detecting method of random access preamble
CN101944929B (en) Detection method and device based on random access process
JP5301710B2 (en) Synchronous transmission in wireless communication systems
RU2365054C2 (en) System and method of frame synchronisation and reception of initial readout of symbol time
CN102209052B (en) Method and device for carrying out frequency offset compensation on random access signals
CN101309250B (en) Timing synchronizing method and apparatus for communication system and receiver
CN105007146B (en) The generation method of leading symbol in physical frame
CN109428847B (en) Method and device for detecting and synchronizing downlink subsynchronous signals in NB-IoT system
WO2010124650A1 (en) Method, base station, terminal and communication system for uplink synchronization
JP2016532361A (en) Method and apparatus for estimating signal-to-interference and noise ratio for a random access channel in a wireless network
CN103108338B (en) Detection method, device and base station for random access signal
CN104022995A (en) OFDM (Orthogonal Frequency Division Multiplexing) precise timing synchronous method based on Zadoff-Chu sequence
CN112637099B (en) Method and device for searching peak value in timing synchronization mode
CN101193398A (en) An uplink distance measuring method, device and base station
US8649466B2 (en) Device and method for detecting cyclic prefix length
WO2008022598A1 (en) A testing method, terminal and network side device for random access
US20130279448A1 (en) Synchronization Transmissions in a Wireless Communication System
WO2015074210A1 (en) Initial search method and apparatus for user equipment and cell thereof
TW201110633A (en) Methods and systems for time tracking in OFDM systems
CN114727329B (en) NR5G PUCCH Format0 processing optimization method
TW200808086A (en) FFT-size detector and FFT-size detection method and cell search apparatus and cell search method in cellular system
EP3804248A1 (en) Radio signal detection
WO2013091155A1 (en) Carrier frequency offset estimation method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09812604

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09812604

Country of ref document: EP

Kind code of ref document: A1