WO2014146412A1 - 用户设备冲突检测方法、用户设备和基站 - Google Patents

用户设备冲突检测方法、用户设备和基站 Download PDF

Info

Publication number
WO2014146412A1
WO2014146412A1 PCT/CN2013/083816 CN2013083816W WO2014146412A1 WO 2014146412 A1 WO2014146412 A1 WO 2014146412A1 CN 2013083816 W CN2013083816 W CN 2013083816W WO 2014146412 A1 WO2014146412 A1 WO 2014146412A1
Authority
WO
WIPO (PCT)
Prior art keywords
user equipment
dch
rnti
base station
check code
Prior art date
Application number
PCT/CN2013/083816
Other languages
English (en)
French (fr)
Inventor
李秉肇
陈燕燕
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201380010067.7A priority Critical patent/CN104604313A/zh
Priority to EP13879023.3A priority patent/EP2961232B1/en
Publication of WO2014146412A1 publication Critical patent/WO2014146412A1/zh
Priority to US14/859,169 priority patent/US20160014814A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0808Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using carrier sensing, e.g. as in CSMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a user equipment conflict detection method, a user equipment, and a base station. Background technique
  • the UTRAN Registration Area (URA) of the UMTS Terrestrial Radio Access Network (UTRAN) in the Universal Mobile Telecommunications System (UMTS) contains several cells in the URA-PCH.
  • UE User Equipment
  • the user equipment (User Equipment, UE) in the (UTRAN Registration Area-Paging Channel) state performs cell handover in the URA area, it is not necessary to perform cell update.
  • the UE after the cell handover needs to transmit data to the base station, it needs to first switch to the CELL-FACH (CELL-Forward Access Channel) state to acquire the public uplink enhanced dedicated data channel (E-DCH) of the new cell.
  • E-RNTI Enhanced Radio Network Temporary Identifier
  • the UE carries the E-RNTI in the collision detection request sent by the UE to the base station on the common E-DCH, and the base station performs collision detection on the common E-DCH according to the E-RNTI to determine whether the E-DCH is occupied by other UEs. .
  • the E-RNTI identifier of each cell may be repeated. Therefore, when the UE performs cell handover, the UE needs to re-acquire the E-RNTI related to the new cell to complete the collision detection of the common E-DCH, and waste the network. Resources and cause conflict detection delays are large. Summary of the invention
  • the present invention provides a user equipment conflict detection method, a user equipment, and a base station, which are used to solve the problem of high network resource waste and large collision detection delay in the collision detection after the cell handover occurs in the UE in the prior art.
  • a first aspect of the present invention provides a user equipment conflict detection method, including: The user equipment sends a conflict detection request to the base station on the enhanced uplink dedicated data channel E-DCH, where the conflict detection request carries the first temporary wireless network identifier RNTI corresponding to the user equipment, so that the base station detects the E- Whether the DCH is occupied by other user equipments other than the user equipment;
  • the user equipment determines whether the E-DCH is an available resource according to the first RNTI identifier, the AG information, and the CRC check code.
  • the first RNTI identifier includes a first defined bit and a second defined bit
  • Determining, by the user equipment, whether the E-DCH is an available resource according to the first RNTI identifier, the AG information, and the CRC check code including:
  • the user equipment uses the first defined bit to demask the CRC check code; if the CRC check code is successfully verified, and the second defined bit is included in the AG information, the user The device determines that the E-DCH is an available resource.
  • the user equipment determines, according to the first RNTI identifier, the AG information, and the CRC check code, whether the E-DCH is Available resources, including:
  • the user equipment determines that the E-DCH is an available resource.
  • the user equipment determines, according to the first RNTI identifier, the AG information, and the CRC check code, whether the E-DCH is Available resources, including:
  • the user equipment uses the first RNTI identifier to demask the CRC check code; if the CRC check code is successfully verified, the user equipment determines that the E-DCH is an available resource.
  • the user equipment is on an enhanced uplink dedicated data channel E-DCH Before the base station sends the conflict detection request, it also includes:
  • the user equipment sends a conflict detection request to the base station on the enhanced uplink dedicated data channel E-DCH, which specifically includes:
  • the user equipment sends a conflict detection request carrying the E-RNTI identifier to the base station on the E-DCH.
  • the user equipment determines the E according to the first RNTI identifier, the AG information, and the CRC check code -DCH is an available resource, including:
  • the user equipment uses the E-RNTI identifier to demask the CRC check code. If the CRC check code is successfully verified, the user equipment determines that the E-DCH is an available resource.
  • the user equipment is on the enhanced uplink dedicated data channel E-DCH Before the base station sends the conflict detection request, it also includes:
  • the second broadcast message carries common E-DCH resource information, so that the user equipment selects, according to the public E-DCH resource information,
  • the E-DCH of the E-RNTI identifier, the second broadcast message further carries an E-RNTI list of the cell accessed by the user equipment.
  • the user equipment determines the first RNTI identifier Corresponding E-RNTI identifiers in the cell accessed by the user equipment, including:
  • the user equipment uses the value of the first RNTI as a dividend, uses the number of E-RNTIs in the E-RNTI list as a divisor, obtains a corresponding remainder, and acquires the E-RNTI column.
  • the sequence number in the table is the E-RNTI of the remainder.
  • the first broadcast message or the second broadcast message may also carry a public
  • E-RNTI identifier corresponding to the E-DCH resource information
  • the user equipment After the user equipment determines that the E-DCH is an available resource, the user equipment performs data transmission with the base station by using the E-RNTI identifier corresponding to the E-DCH.
  • a second aspect of the present invention provides a user equipment conflict detection method, including: receiving, by a base station, a conflict detection request sent by a user equipment on an enhanced uplink dedicated data channel E-DCH, where the conflict detection request carries a corresponding a first temporary wireless network identifier RNTI;
  • the eNB sends an acknowledgment message to the user equipment according to the judgment result, where the acknowledgment message carries an absolute authorization AG information and a cyclic redundancy CRC check code, so that the user equipment is configured according to the first RNTI,
  • the AG information and the CRC check code determine whether the E-DCH is an available resource.
  • the first RNTI identifier includes a first defined bit and a second defined bit
  • the base station Before the base station sends an acknowledgement message to the user equipment according to the determination result, the base station further includes:
  • the base station uses the first defined bit to mask the CRC check code; the base station determines the second defined bit as the AG information.
  • the base station uses the first RNTI identifier to mask a sequence consisting of the AG information and the CRC check code.
  • the base station uses the first RNTI identifier to mask the CRC check code.
  • the base station receives the user equipment in an enhanced uplink dedicated data channel.
  • the base station sends a first broadcast message to the user equipment, where the first broadcast message carries the public E-DCH resource information, so that the user equipment selects to send the first according to the common E-DCH resource information.
  • RNTI's E-DCH RNTI's E-DCH.
  • the method further includes:
  • the base station uses the E-RNTI identifier to mask the CRC check code.
  • the method before the base station receives the conflict detection request sent by the user equipment on the enhanced uplink dedicated data channel E-DCH, the method further includes:
  • the base station sends a second broadcast message to the user equipment, where the second broadcast message carries the public E-DCH resource information, so that the user equipment selects to send the conflict detection according to the common E-DCH resource information.
  • the requested E-DCH, where the second broadcast message further carries an E-RNTI list of cells accessed by the user equipment.
  • a third aspect of the present invention provides a user equipment, including:
  • a sending module configured to send a conflict detection request to the base station on the enhanced uplink dedicated data channel E-DCH, where the conflict detection request carries a first temporary wireless network identifier RNTI corresponding to the user equipment, so that the base station detects the Whether the E-DCH is occupied by other user equipments other than the user equipment;
  • a receiving module configured to receive an acknowledgment message sent by the base station, where the acknowledgment message carries an absolute authorization AG information and a cyclic redundancy CRC check code;
  • a determining module configured to determine, according to the first RNTI identifier, the AG information, and the CRC check code, whether the E-DCH is an available resource.
  • the first RNTI identifier includes a first defined bit and a second defined bit
  • the user equipment further includes: a first de-masking module, configured to perform masking on the CRC check code by using the first defined bit; If the CRC checksum is successful, and the second defined bit is included in the AG information, the determining module is specifically configured to determine that the E-DCH is an available resource.
  • the user equipment further includes: a second de-masking module, configured to use the first RNTI identifier pair by the AG information and the The sequence consisting of the CRC check code is demasked;
  • the determining module is specifically configured to determine that the E-DCH is an available resource.
  • the user equipment further includes: a third de-masking module, configured to use the first RNTI identifier to solve the CRC check code Cover
  • the determining module is specifically configured to determine that the E-DCH is an available resource.
  • the sending module sends a conflict detection request to the base station on the enhanced uplink dedicated data channel E-DCH
  • the receiving module is further configured to: receive a first broadcast message sent by the base station, where the first broadcast message carries common E-DCH resource information, so that the user equipment is configured according to the public E-DCH resource. The information is selected to send the E-DCH of the first RNTI.
  • the determining module is further configured to: determine, by the first RNTI, a corresponding E-RNTI identifier in a cell that the user equipment accesses ;
  • the sending module is specifically configured to send, by using the E-DCH, a conflict detection request that carries the E-RNTI identifier to the base station.
  • the user equipment further includes: a fourth de-masking module, configured to use the E-RNTI identifier to identify the CRC Check the code to perform the masking;
  • the determining module is specifically configured to determine that the E-DCH is an available resource.
  • the sending module is in enhancing the uplink dedicated data channel E-DCH Before receiving the conflict detection request from the base station, the receiving module is further configured to: receive the second broadcast message sent by the base station, where the second broadcast message carries the public E-DCH resource information, so that the user equipment is configured according to the The common E-DCH resource information is used to select an E-DCH for transmitting a collision detection request, and the second broadcast message further carries an E-RNTI list of the cell accessed by the user equipment.
  • the determining module is specifically configured to: The value of the first RNTI is used as a dividend, and the number of E-RNTIs in the E-RNTI list is used as a divisor to obtain a corresponding remainder, and the E-RNTI in which the sequence number in the E-RNTI list is the remainder is obtained.
  • the first broadcast message or the second broadcast message may further carry the common E-DCH resource
  • the user equipment After the user equipment determines that the E-DCH is an available resource, the user equipment performs data transmission with the base station by using the E-RNTI identifier corresponding to the E-DCH.
  • a fourth aspect of the present invention provides a base station, including:
  • a receiving module configured to receive a conflict detection request sent by the user equipment on the enhanced uplink dedicated data channel E-DCH, where the conflict detection request carries a first temporary wireless network identifier RNTI corresponding to the user equipment;
  • a determining module configured to determine whether the E-DCH is occupied by another user equipment other than the user equipment
  • a sending module configured to send an acknowledgment message to the user equipment according to the judgment result, where the acknowledgment message carries an absolute authorization AG information and a cyclic redundancy CRC check code, so that the user equipment is configured according to the first RNTI
  • the identity, the AG information, and the CRC check code determine whether the E-DCH is an available resource.
  • the first RNTI identifier includes a first defined bit and a second defined bit
  • the base station Before the sending module sends an acknowledgment message to the user equipment according to the determining result, the base station further includes:
  • a first masking module configured to add the CRC check code by using the first definition bit Cover
  • a first determining module configured to determine the second definition bit as the AG information.
  • the base station before the sending, by the sending, the sending, by the sending, the sending, by the user equipment, the base station, the base station further includes:
  • a second masking module configured to mask a sequence consisting of the AG information and the CRC check code by using the first RNTI identifier.
  • the base station before the sending, by the sending module, the sending the acknowledgment message to the user equipment, the base station further includes:
  • a third masking module configured to mask the CRC check code by using the first RNTI identifier.
  • the receiving module receives a conflict that the user equipment sends on the enhanced uplink dedicated data channel E-DCH Before the request is detected, the sending module is further configured to send a first broadcast message to the user equipment, where the first broadcast message carries public E-DCH resource information, so that the user equipment is based on the public E- The DCH resource information is selected to transmit the E-DCH of the first RNTI.
  • the base station further includes: a fourth masking module, before the transmitting module sends an acknowledgement message to the user equipment according to the determining result;
  • the fourth masking module is configured to mask the CRC check code by using the E-RNTI identifier.
  • the receiving module before receiving the conflict detection request sent by the user equipment on the enhanced uplink dedicated data channel E-DCH, the sending The module is further configured to send a second broadcast message to the user equipment, where the second broadcast message carries common E-DCH resource information, so that the user equipment selects to send according to the public E-DCH resource information.
  • the E-DCH of the conflict detection request, the second broadcast message further carrying an E-RNTI list of the cell accessed by the user equipment.
  • a fifth aspect of the present invention provides a user equipment, including:
  • a transmitter configured to send a collision detection request to the base station on the enhanced uplink dedicated data channel E-DCH, where the collision detection request carries a first temporary wireless network identifier RNTI corresponding to the user equipment, so that the base station detects the Whether the E-DCH is occupied by other user equipments other than the user equipment;
  • a receiver configured to receive an acknowledgment message sent by the base station, where the acknowledgment message carries an absolute authorization AG information and a cyclic redundancy CRC check code;
  • a processor configured to determine, according to the first RNTI identifier, the AG information, and the CRC check code, whether the E-DCH is an available resource.
  • the RNTI identifier includes a first definition bit and a second definition bit
  • the processor is further configured to perform masking on the CRC check code by using the first defined bit;
  • the processor is specifically configured to determine that the E-DCH is an available resource.
  • the processor is further configured to: use the first RNTI identifier to form a sequence consisting of the AG information and the CRC check code Uncovering;
  • the processor is specifically configured to determine that the E-DCH is an available resource.
  • the processor is further configured to perform masking on the CRC check code by using the first RNTI identifier
  • the processor is specifically configured to determine that the E-DCH is an available resource.
  • the transmitter sends a collision detection request to the base station on the enhanced uplink dedicated data channel E-DCH
  • the receiver is further configured to: receive a first broadcast message sent by the base station, where the first broadcast message carries common E-DCH resource information, so that the user equipment is configured according to the public E-DCH resource. The information is selected for transmitting the E-DCH of the first RNTI.
  • the processor The method further includes: determining, by the first RNTI, an E-RNTI identifier corresponding to a cell that is accessed by the user equipment;
  • the transmitter is specifically configured to send, on the E-DCH, a conflict detection request that carries the E-RNTI identifier to a base station.
  • the processor is further configured to perform masking on the CRC check code by using the E-RNTI identifier;
  • the processor is further configured to determine that the E-DCH is an available resource.
  • the transmitter sends a collision detection to the base station on the enhanced uplink dedicated data channel E-DCH Before the request, the receiver is further configured to: receive a second broadcast message sent by the base station, where the second broadcast message carries common E-DCH resource information, so that the user equipment is according to the public E-DCH The resource information is used to select an E-DCH for transmitting a collision detection request, and the second broadcast message further carries an E-RNTI list of the cell accessed by the user equipment.
  • the processor is specifically configured to: The value of the first RNTI is used as a dividend, and the number of E-RNTIs in the E-RNTI list is used as a divisor to obtain a corresponding remainder, and the E-RNTI in which the sequence number in the E-RNTI list is the remainder is obtained.
  • the first broadcast message or the second broadcast message may further carry the common E-DCH resource
  • the processor determines that the E-DCH is an available resource, the E-DCH is used.
  • the E-RNTI identifies data transmission with the base station.
  • a sixth aspect of the present invention provides a base station, including:
  • a receiver configured to receive a conflict detection request sent by the user equipment on the enhanced uplink dedicated data channel E-DCH, where the conflict detection request carries a first temporary wireless network identifier RNTI corresponding to the user equipment;
  • a processor configured to determine whether the E-DCH is occupied by other user equipments other than the user equipment;
  • a transmitter configured to send an acknowledgment message to the user equipment according to the judgment result, where the acknowledgment message carries an absolute authorization AG information and a cyclic redundancy CRC check code, so that the user equipment is configured according to the first RNTI
  • the identity, the AG information, and the CRC check code determine whether the E-DCH is an available resource.
  • the first RNTI identifier includes a first defined bit and a second defined bit
  • the processor is further configured to: perform masking on the CRC check code by using the first defined bit;
  • the second definition bit is determined as the AG information.
  • the processor before the sending, by the sender, the acknowledgment message to the user equipment, the processor is further configured to adopt the foregoing An RNTI indicator masks a sequence consisting of the AG information and the CRC check code.
  • the processor before the sending, by the sender, the confirmation message to the user equipment, the processor is further configured to adopt the foregoing An RNTI identifier masks the CRC check code.
  • the receiver receives a conflict that the user equipment sends on the enhanced uplink dedicated data channel E-DCH Before detecting the request, the sender is further configured to send a first broadcast message to the user equipment, where the first broadcast message carries public E-DCH resource information, so that the user equipment is configured according to the public E- The DCH resource information is selected to transmit the E-DCH of the first RNTI.
  • the processor is further configured to perform masking on the CRC check code by using the E-RNTI identifier.
  • the receiver is configured to send a second broadcast message to the user equipment, where the second broadcast is sent to the user equipment, before the receiver receives the conflict detection request sent by the user equipment on the enhanced uplink dedicated data channel E-DCH.
  • the message carries the public E-DCH resource information, so that the user equipment selects an E-DCH for sending a conflict detection request according to the common E-DCH resource information, where the second broadcast message further carries the user equipment.
  • E-RNTI list of visited cells is configured to send a second broadcast message to the user equipment, where the second broadcast is sent to the user equipment, before the receiver receives the conflict detection request sent by the user equipment on the enhanced uplink dedicated data channel E-DCH.
  • the user equipment conflict detection method, the user equipment, and the base station provided by the embodiment of the present invention, the user equipment sends a conflict detection request to the base station on the E-DCH, where the conflict detection request carries the first RNTI corresponding to the user equipment, and the receiving base station sends the Determining a message, and determining whether the E-DCH is an available resource according to the AG information and the CRC check code carried in the first RNTI and the acknowledgment message, so that the user equipment does not need to update the first RNTI when performing collision detection after switching the cell, thereby Reduce network resource waste during conflict detection and shorten collision detection delay.
  • FIG. 1 is a flowchart of an embodiment of a user equipment conflict detection method according to the present invention
  • FIG. 2 is a schematic diagram of a format of a first RNTI
  • FIG. 3 is a schematic diagram of masking a CRC check code by a first defined bit of a first RNTI
  • FIG. 4 is a schematic diagram of masking a CRC check code by an E-RNTI corresponding to a first RNTI
  • FIG. 6 is a flowchart of another embodiment of a user equipment conflict detection method according to the present invention
  • FIG. 7 is still another embodiment of a user equipment conflict detection method according to the present invention
  • Figure 8 is a schematic structural diagram of an embodiment of a user equipment provided by the present invention.
  • FIG. 9 is a schematic structural diagram of still another embodiment of a user equipment according to the present invention.
  • FIG. 10 is a schematic structural diagram of another embodiment of a user equipment according to the present invention
  • FIG. 11 is a schematic structural diagram of another embodiment of a user equipment according to the present invention
  • FIG. 12 is a schematic structural diagram of another embodiment of a user equipment according to the present invention.
  • FIG. 13 is a schematic structural diagram of an embodiment of a base station according to the present invention.
  • FIG. 14 is a schematic structural diagram of still another embodiment of a base station according to the present invention.
  • FIG. 15 is a schematic structural diagram of another embodiment of a base station according to the present invention.
  • FIG. 16 is a schematic structural diagram of still another embodiment of a base station according to the present invention.
  • FIG. 17 is a schematic structural diagram of another embodiment of a base station according to the present invention.
  • FIG. 18 is a schematic structural diagram of an embodiment of a user equipment according to the present invention.
  • FIG. 19 is a schematic structural diagram of an embodiment of a base station according to the present invention. detailed description
  • GSM Global System for Mobile Communications
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDM A Orthogonal Frequency-Division Multiple Access
  • SC-FDMA single carrier FDMA
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • the user equipment involved in the present application may be a wireless terminal or a wired terminal, and the wireless terminal may be a device that provides voice and/or data connectivity to the user, a handheld device with wireless connectivity, or a wireless modem. Other processing equipment.
  • the wireless terminal can communicate with one or more core networks via a radio access network (eg, RAN, Radio Access Network), which can be a mobile terminal, such as a mobile phone (or "cellular" phone) and with a mobile terminal
  • RAN Radio Access Network
  • the computers for example, can be portable, pocket-sized, handheld, computer-integrated or in-vehicle mobile devices that exchange language and/or data with the wireless access network.
  • a wireless terminal may also be referred to as a system, a subscriber unit (Subscriber Unit), and a subscriber station (Subscriber Station). Mobile Station, Mobile Station, Remote Station, Access Point, Remote Terminal, Access Terminal, User Terminal, User Agent, User Device, or User Equipment.
  • a base station (e.g., an access point) referred to in this application may refer to a device in an access network that communicates with a wireless terminal over one or more sectors over an air interface.
  • the base station can be used to convert the received air frame to the IP packet as a router between the wireless terminal and the rest of the access network, wherein the remainder of the access network can include an Internet Protocol (IP) network.
  • IP Internet Protocol
  • the base station can also coordinate attribute management of the air interface.
  • the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDM A, or may be a base station (NodeB) in WCDMA, or may be an evolved base station in LTE (NodeB or eNB or e-NodeB, evolutional Node B), this application is not limited.
  • BTS Base Transceiver Station
  • NodeB base station
  • NodeB evolved base station
  • LTE NodeB or eNB or e-NodeB, evolutional Node B
  • the base station controller may be a base station controller (BSC) in GSM or CDMA, or a radio network controller (RNC) in WCDMA, which is not limited in this application.
  • BSC base station controller
  • RNC radio network controller
  • system and “network” are used interchangeably herein.
  • the term “and/or” in this context is merely an association describing the associated object, indicating that there can be three relationships, for example, A and / or B, which can mean: A exists separately, and both A and B exist separately. B These three situations.
  • the character "/" in this article generally indicates that the contextual object is an "or" relationship.
  • FIG. 1 is a flowchart of an embodiment of a user equipment conflict detection method according to the present invention. As shown in FIG. 1, the method includes:
  • the user equipment sends a conflict detection request to the base station on the enhanced uplink dedicated data channel E-DCH, where the conflict detection request carries the first temporary wireless network identifier RNTI corresponding to the user equipment, so that the base station detects whether the E-DCH is external to the user equipment.
  • the other user devices are occupied.
  • the radio network controller can allocate an E-RNTI resource pool to the base station and the RNC, and each E-RNTI resource pool includes multiple Es. -RNTI logo.
  • the RNC may extend the E-RNTI identifier in the E-RNTI resource pool to obtain the first RNTI.
  • the 16-bit E-RNTI identifier may be extended to 22 bits to obtain the first RNTI, as shown in FIG. 2 .
  • the first RNTI It can be a unique identifier corresponding to the user equipment in a certain area.
  • the first RNTI is a unique identifier corresponding to the user equipment in an area formed by multiple cells, or a unique identifier corresponding to the user equipment in the UTRAN registration area URA.
  • the first RNTI is allocated to the user equipment by the RNC through dedicated signaling.
  • the base station may provide the user equipment with common E-DCH resource information in the cell where the user equipment is located by using the cell broadcast mode.
  • the base station may send the first broadcast message to the user equipment, where the first broadcast message carries the public E-DCH resource information in the cell where the user equipment is located, so that the user equipment can select to use according to the public E-DCH resource information. Send the E-DCH of the collision detection request.
  • the base station may also send a second broadcast message to the user equipment, where the second broadcast message carries the public E-DCH resource information and the E-RNTI list in the cell where the user equipment is located.
  • the user equipment determines the E-RNTI in the corresponding E-RNTI list according to the first RNTI identifier, and carries the E-RNTI when the uplink data unit is sent on the common E-DCH resource.
  • each set of common E-DCH resource information in the cell where the user equipment is located in the second broadcast message includes an E-RNTI.
  • the user equipment determines that the E-RNTI identifier corresponding to the first RNTI identifier in the cell that the user equipment accesses may be: using the value of the first RNTI as a dividend, and using the E-RNTI The number of E-RNTIs in the list is used as a divisor to obtain the corresponding remainder, and the E-RNTI whose sequence number is the remainder in the E-RNTI list is obtained.
  • the UE can obtain the resource after selecting the public E-DCH resource. Corresponding E-RNTI.
  • the base station may determine whether the E-DCH is occupied by other user equipments. If the E-DCH is not occupied by other user equipments, the base station may Sending an acknowledgment message carrying the AG information and the CRC check code; if the E-DCH is occupied by other user equipments, the base station may send an acknowledgment message of other user equipments occupying the E-DCH to the user equipment.
  • the base station may detect, according to the first defined bit of the first RNTI in the conflict detection request of the user equipment, a CRC check code.
  • the masking is performed to determine the second defined bit in the first RNTI as the absolute grant AG information.
  • the acknowledge message including the AG information and the masked CRC check code is sent to the user equipment.
  • the first defined bit of the first RNTI is before the expansion in FIG. 2
  • the 16-bit E-RNTI, the second defined bit is the extension bit in Figure 2.
  • the eNB adds a mask to the CRC according to the first defined bit of the first RNTI, where the eNB may perform the XOR of the CRC check code according to the first defined bit.
  • the base station may further detect the first RNTI in the request according to the conflict of the user equipment, and check the information by the AG and the CRC.
  • the sequence of the code is masked.
  • the masking method may be: the base station sums the sequence of the AG information and the CRC check code according to the first RNTI, and then modulo 2, and still obtains the sum after masking. Add a sequence of the same number of bits before.
  • the base station may further mask the CRC check code by using the first RNTI.
  • the CRC check code is a check code generated by the base station according to the AG information, and the number of bits of the CRC check code generated by the base station is the same as the number of bits of the first RNTI.
  • the base station may further determine, according to the first RNTI in the conflict detection request of the user equipment, the intra-cell corresponding to the user equipment.
  • the E-RNTI uses the E-RNTI to mask the CRC check code.
  • the acknowledgment message including the AG information and the masked CRC check code is sent to the user equipment.
  • the user equipment receives an acknowledgement message sent by the base station, where the acknowledgement message carries Absolute Grant (AG) information and a Cyclic Redundancy Check (CRC) check code.
  • AG Absolute Grant
  • CRC Cyclic Redundancy Check
  • all user equipments that send collision detection requests to the base station through the same E-DCH can receive the acknowledgement message sent by the base station through the E-DCH.
  • the user equipment determines, according to the first RNTI identifier, the AG information, and the CRC check code, whether the E-DCH is an available resource.
  • the first RNTI identifier includes a first defined bit and a second defined bit.
  • the first defined bit may be 16 bits, such as the 16-bit E-RNTI before the extension in FIG. 2 .
  • the second definition bit can be 6 bits, as shown in the extension bits in Figure 2.
  • the user equipment determines that the E-DCH is an available resource. And use this E-DCH as its own dedicated resource. The user equipment determines whether the E-DCH is an available resource according to the AG information and the CRC check code carried in the first RNTI identifier and the acknowledgment message, and the AG information and the CRC check code carried in the acknowledgment message are determined by the base station according to the first RNTI identifier.
  • the first RNTI can support 22 bits, and the total RNTI can support 4 million users to support the RNC level without replacing the first RNTI. Therefore, after the cell handover occurs, the first RNTI identifier does not need to be changed. The collision detection may be continued in the new cell using the first RNTI.
  • the AG information is 101100 and the second definition bit is 1011, it means that the second definition bit is included in the AG information.
  • the AG information is 010110 and the second definition bit is 1011, it also indicates that the second definition bit is included in the AG information.
  • the user equipment may reselect the E-DCH for transmitting the collision detection request in the common E-DCH resource, and send a collision detection request to the base station by using the E-DCH, according to the base station.
  • a confirmation message is sent to determine whether the E-DCH is an available resource.
  • the base station uses the first RNTI to mask the sequence consisting of the AG information and the CRC check code
  • the sequence of the masked AG information and the CRC check code is sent to the user equipment.
  • the user equipment can use the first RNTI identifier to demask the sequence consisting of the AG information and the CRC check code; if the CRC check code is successfully verified, the user equipment determines that the E-DCH is an available resource, and the E -DCH as its own dedicated resource.
  • the base station generates a CRC check code according to the information of the AG, where the number of bits of the CRC check code generated by the base station is the same as the number of bits of the first RNTI, for example, the first RNTI and the CRC check code.
  • the number of bits is 22 bits.
  • the base station uses the first RNTI to mask the CRC. After the masked CRC is sent to the user equipment, the user equipment can use the first RNTI identifier to check the CRC. If the CRC check code is successfully verified, the user equipment determines that the E-DCH is an available resource, and uses the E-DCH as its own dedicated resource.
  • the base station uses the E-RNTI identifier corresponding to the first RNTI identifier to mask the CRC check code, and sends an acknowledgement message including the AG information and the masked CRC check code to the user equipment.
  • the AG information is used to determine the number of times the user equipment sends to the base station.
  • the user equipment can use the E-RNTI identifier corresponding to the first RNTI identifier to demask the masked CRC check code, and perform CRC check. If the check succeeds,
  • the E-DCH is used as its own dedicated resource, so that the user equipment can transmit data to the base station through the E-DCH or receive data transmitted by the base station.
  • the user equipment may re-select the E-DCH for transmitting the collision detection request in the common E-DCH resource sent by the base station, and send the E corresponding to the first RNTI identifier on the E-DCH. -RNTI logo.
  • the user equipment may send a conflict detection request to the base station through the E-DCH, and determine, according to the acknowledgement message sent by the base station, whether the E-DCH is an available resource.
  • the user equipment may send a data packet to the base station through the E-DCH or receive a data packet sent by the base station.
  • the data packet can carry the data content, but does not need to carry the E-RNTI identifier corresponding to the E-DCH resource.
  • the base station may also send the absolute authorization AG information and the CRC check code to the user equipment through the AG channel.
  • the AG information is used to determine when the user equipment sends the data packet to the base station.
  • the CRC check code is used to determine that the AG information is sent to the user equipment instead of being sent to other user equipment.
  • the user conflict detection method provided by the embodiment of the present invention can also be applied to a user equipment that does not have a dedicated E-RNTI but needs to acquire E-DCH resources in the cell for data transmission.
  • the user equipment without the dedicated E-RNTI may refer to a user equipment in a non-dedicated connection state such as CELL_FACH, CELL_PCH, URA_PCH or idle.
  • the E-DCH resource can be selected and user conflict detection can be performed; or the user equipment in the CELL_FACH state needs to directly send DCCH/DTCH data after the cell handover, and can select E-DCH resources and perform user conflict detection.
  • the E-DCH resource here may include a common E-DCH (Common E-DCH) resource.
  • the user equipment sends a conflict detection request to the base station on the E-DCH, where the conflict detection request carries the first RNTI corresponding to the user equipment, and receives the acknowledgement message sent by the base station, and Determining, according to the first RNTI and the acknowledgement message carrying the AG information and the CRC check code, whether the E-DCH is an available resource, so that the user sets
  • the first RNTI does not need to be updated, thereby reducing network resource waste during collision detection and shortening the collision detection delay.
  • FIG. 5 is a flowchart of still another embodiment of a user equipment conflict detection method according to the present invention. As shown in FIG. 5, the method includes:
  • the base station receives a conflict detection request sent by the user equipment on the enhanced uplink dedicated data channel E-DCH, where the conflict detection request carries the first temporary wireless network identifier RNTIo corresponding to the user equipment.
  • the base station may send a first broadcast message to the user equipment, where the first broadcast message carries the public E-DCH resource information in the cell where the user equipment is located.
  • the user equipment may send a collision detection request to the base station on the selected E-DCH.
  • the base station may send a second broadcast message to the user equipment, where the second broadcast message carries the public E-DCH resource information and the E-RNTI list in the cell where the user equipment is located.
  • the user equipment may send a conflict detection request carrying the E-RNTI identifier to the base station on the E-DCH.
  • the base station determines whether the E-DCH is occupied by other user equipments other than the user equipment. After receiving the conflict detection request sent by the user equipment through the E-DCH, the base station may determine whether the E-DCH is occupied by other user equipments. If the E-DCH is not occupied by other user equipments, the base station may Sending an acknowledgment message for the user equipment; if the E-DCH is occupied by other user equipments, the base station may send an acknowledgment message of other user equipments occupying the E-DCH to the user equipment.
  • the base station sends an acknowledgement message to the user equipment according to the judgment result, where the acknowledgement message carries the absolute grant AG information and the cyclic redundancy CRC check code, so that the user equipment determines the E- according to the first RNTI identifier, the AG information, and the CRC check code. Whether DCH is an available resource.
  • the base station may use the first defined bit in the first RNTI identifier to add the cyclic redundancy CRC check code.
  • the base station may adopt the first RNTI pair by the AG information and the CRC.
  • the sequence consisting of the check code is masked, and the masked sequence consisting of the AG information and the CRC check code is sent to the user equipment.
  • the base station may generate a CRC check code according to the AG information, where the number of bits of the CRC check code generated by the base station is the same as the number of bits of the first RNTI, and the base station uses the first RNTI to add the CRC check code.
  • Mask send the masked CRC check code to the user equipment.
  • the base station may use the E-RNTI identifier in the conflict detection request sent by the user equipment to mask the CRC check code, and send the acknowledge message including the AG information and the masked CRC check code. Give the user device.
  • the base station may send an acknowledgement message of the other user equipments occupying the E-DCH to the user equipment. If the user equipment uses the E-RNTI identifier to demask the CRC check code in the acknowledgment message, the unmasking is unsuccessful, and the user equipment confirms that the E-DCH is occupied by other user equipments, and the E-DCH is not an available resource.
  • the base station receives the conflict detection request sent by the user equipment on the E-DCH, where the conflict detection request carries the first RNTI corresponding to the user equipment, and determines whether the E-DCH is If the user equipment is occupied by the user equipment, the user equipment sends an acknowledgement message to the user equipment according to the judgment result, so that the user equipment determines whether the E-DCH is an available resource according to the first RNTI and the acknowledgement message carrying the AG information and the CRC check code.
  • the first RNTI does not need to be updated, thereby reducing network resource waste during collision detection and shortening the collision detection delay.
  • FIG. 6 is a flowchart of another embodiment of a user equipment conflict detection method according to the present invention, as shown in FIG. 6.
  • the specific implementation scenario is that the base station broadcasts the public E-DCH resource information in the cell where the user equipment is located to the user equipment, where the method includes:
  • the base station sends a first broadcast message to the user equipment, where the first broadcast message carries the public E-DCH resource information in the cell where the user equipment is located.
  • the RNC may allocate the first RNTI identifier to the user equipment, and broadcast the public E-DCH resource information of the cell where the user equipment is located to the user equipment.
  • the first RNTI identifier is obtained by the radio network controller RNC extending the E-RNTI identifier in the E-RNTI resource pool.
  • the base station may broadcast the common E-DCH resource information of the cell where the user equipment is currently located to the user equipment.
  • the user equipment selects an E-DCH according to the public E-DCH resource information carried in the first broadcast message.
  • the user equipment When the user equipment needs to transmit data to the base station or receive data transmitted by the base station, the user equipment selects one E-DCH resource information from the common E-DCH resource information, so that the base station according to the E-DCH resource information, the corresponding E- The DCH resource is allocated to the user equipment.
  • the user equipment sends a conflict detection request to the base station by using the selected E-DCH, where the conflict detection request carries the first RNTI identifier corresponding to the user equipment.
  • the first RNTI identifier may include a first defined bit and a second defined bit.
  • the first fixed bit can be 16 bits, as shown in the expanded 16-bit E-RNTI in Figure 2, and the second defined bit can be 6 bits, as shown in Figure 2.
  • the user equipment may send the first RNTI identifier to the base station in the form of a MAC packet, and the MAC packet header carries the first RNTI information.
  • the MAC header can also carry indication information.
  • the base station may determine, according to the indication information, whether the first RNTI information is carried in the MAC packet. For example, when the value of the indication information in the MAC header is 1, the first RNTI information is carried in the MAC packet. When the value of the indication information in the MAC header is 0, the first RNTI information is not carried in the MAC packet.
  • the indication information may be located in a logical channel identifier of the MAC packet.
  • the base station After receiving the conflict detection request sent by the user equipment, the base station determines whether the E-DCH is occupied by another user equipment.
  • the base station sends an acknowledgement message to the user equipment according to the judgment result, where the acknowledgement message carries the absolute grant AG information and the cyclic redundancy CRC check code, so that the user equipment determines the E- according to the first RNTI identifier, the AG information, and the CRC check code. Whether DCH is an available resource.
  • the base station uses the first defined bit in the first RNTI identifier to mask the CRC check code, and the first RNTI is used.
  • the value of the second defined bit in the identifier is determined as AG information, and an acknowledgement message including the AG information and the masked CRC check code is sent to the user equipment.
  • the base station uses the first defined bit in the first RNTI identifier corresponding to the other user equipment to mask the CRC check code.
  • the value of the second defined bit in the first RNTI identifier corresponding to the other user equipment is determined as the AG information, and the acknowledgment message including the AG information and the masked CRC check code corresponding to the other device is sent to the user equipment.
  • the base station may also perform the first information and the CRC check according to the first RNTI in the conflict detection request of the user equipment.
  • the sequence consisting of codes is masked, and the masked sequence consisting of the AG information and the CRC check code is sent to the user equipment.
  • the base station may further generate a CRC check code according to the AG information, where the number of bits of the CRC check code generated by the base station The base station uses the first RNTI to mask the CRC check code, and sends the masked CRC check code to the user equipment.
  • the user equipment determines, according to the first RNTI identifier, the AG information, and the CRC check code, whether the E-DCH is an available resource.
  • the base station when the base station masks the CRC check code by using the first defined bit, the second defined bit is determined as the AG information, and the acknowledgment message including the AG information and the masked CRC check code is included.
  • the user equipment may use the first defined bit in the first RNTI identifier to demask the masked CRC check code in the acknowledgement message, and verify the masked CRC check code. If the verification is successful, the user equipment determines whether the second defined bit in the first RNTI identifier is included in the AG information. If the second defined bit is included in the AG information, the user equipment determines that the E-DCH is an available resource.
  • the base station uses the first RNTI to mask the sequence consisting of the AG information and the CRC check code
  • the sequence of the masked AG information and the CRC check code is sent to the user equipment.
  • the user equipment can use the first RNTI identifier to demask the sequence consisting of the AG information and the CRC check code; if the CRC check code is successfully verified, the user equipment determines that the E-DCH is an available resource, and the E -DCH as its own dedicated resource.
  • the base station when the base station generates a CRC check code according to the AG information, the number of bits of the CRC check code generated by the base station is the same as the number of bits of the first RNTI, and the base station uses the first RNTI to add the CRC check code.
  • the user equipment may use the E-RNTI identifier corresponding to the first RNTI identifier to perform the masked CRC check.
  • the code performs deblocking and performs CRC check. If the check is successful, the E-DCH is used as its own dedicated resource, so that the user equipment can transmit data to the base station through the E-DCH or receive data transmitted by the base station.
  • the user equipment sends a conflict detection request to the base station on the E-DCH, where the conflict detection request carries the first RNTI corresponding to the user equipment, and the base station determines whether the E-DCH is The other user equipment is occupied. If it is determined that the E-DCH is not occupied by other user equipments, the acknowledgment message including the CRC check code and the AG information is sent to the user equipment, so that the user equipment judges according to the first RNTI and the acknowledgement message.
  • FIG. 7 is a flowchart of still another embodiment of a user equipment conflict detection method according to the present invention, as shown in FIG. 7.
  • the specific implementation scenario is that the base station broadcasts the public E-DCH resource information and the E-RNTI list in the cell where the user equipment is located to the user equipment, where the method includes:
  • the base station sends a second broadcast message to the user equipment, where the second broadcast message carries the public E-DCH resource information and the E-RNTI list in the cell where the user equipment is located.
  • the user equipment determines, according to the public E-DCH resource information and the E-RNTI list carried in the second broadcast message, the E-RNTI identifier corresponding to the first RNTI identifier.
  • the user equipment may use the first RNTI identifier as the dividend, and use the number of E-RNTIs in the E-RNTI list as the divisor to obtain the corresponding remainder, and the E is obtained.
  • the E-RNTI identifier with the sequence number being the remainder in the RNTI list as the E-RNTI identifier corresponding to the first RNTI identifier.
  • the user equipment selects an E-DCH according to the common E-DCH resource, and sends a conflict detection request to the base station on the E-DCH, where the conflict detection request carries the E-RNTI identifier.
  • the base station After receiving the conflict detection request sent by the user equipment, the base station determines whether the E-DCH is occupied by another user equipment.
  • the base station sends an acknowledgement message to the user equipment according to the determination result, where the acknowledgement message carries the AG information and the CRC check code.
  • the base station determines that the E-DCH is not occupied by other user equipments, the base station uses the E-RNTI identifier corresponding to the first RNTI identifier to mask the CRC check code, and includes the AG information and the masked CRC check.
  • a confirmation message of the code is sent to the user equipment.
  • the base station uses the E-RNTI identifier corresponding to the first RNTI identifier of the other user equipment to mask the CRC check code, and includes the AG information for other user equipments. And a confirmation message of the masked CRC is sent to the user equipment.
  • the user equipment determines, according to the first RNTI identifier, the AG information, and the CRC check code, whether the E-DCH is an available resource.
  • the user equipment may use the E-RNTI identifier corresponding to the first RNTI identifier to demask the CRC check code in the acknowledgment message, and perform verification on the CRC check code obtained by the masking. If the check succeeds, the user equipment determines E. -DCH is an available resource.
  • the user equipment sends a conflict detection request to the base station on the E-DCH, where the conflict detection request carries the first RNTI corresponding to the user equipment, and the base station determines whether the E-DCH is The other user equipment is occupied.
  • the acknowledgment message carrying the AG information and the CRC check code is sent to the user equipment, and the user equipment according to the E-RNTI identifier corresponding to the first RNTI And confirming the message, determining whether the E-DCH is an available resource, so that the user equipment does not need to update the first RNTI when performing collision detection after the cell is switched, thereby reducing network resource waste during collision detection and shortening the collision detection delay.
  • FIG. 8 is a schematic structural diagram of an embodiment of a user equipment provided by the present invention. As shown in FIG. 8, the method includes:
  • the sending module 81 is configured to send a conflict detection request to the base station on the enhanced uplink dedicated data channel E-DCH, where the conflict detection request carries the first temporary wireless network identifier corresponding to the user equipment RNTI, so that the base station detects whether the E-DCH is occupied by other user equipments other than the user equipment; in the first implementation scenario, the sending module 81 receives the collision detection request before transmitting the collision detection request to the base station on the enhanced uplink dedicated data channel E-DCH.
  • the module 82 receives the first broadcast message sent by the base station, where the first broadcast message carries the common E-DCH resource information in the cell where the user equipment is located, and the user equipment can select the E- to send the conflict detection request according to the common E-DCH resource information. DCH.
  • the receiving module 82 receives the second broadcast message sent by the base station, where the second broadcast message carries the user equipment.
  • the common E-DCH resource information of the incoming cell and the E-RNTI list after the user equipment determines the corresponding E-RNTI identifier in the accessed cell according to the first RNTI identifier, and sends the E-RNTI to the base station by using the E-DCH.
  • the identified conflict detection request before the sending module 81 sends a conflict detection request to the base station on the enhanced uplink dedicated data channel E-DCH, the receiving module 82 receives the second broadcast message sent by the base station, where the second broadcast message carries the user equipment.
  • the common E-DCH resource information of the incoming cell and the E-RNTI list after the user equipment determines the corresponding E-RNTI identifier in the accessed cell according to the first RNTI identifier, and sends the E-RNTI to the base station by using the E-DCH.
  • the determining module 83 is further configured to: use the value of the first RNTI as a dividend, use the number of E-RNTIs in the E-RNTI list as a divisor, obtain a corresponding remainder, and obtain an E - The E-RNTI whose sequence number is the remainder in the RNTI list.
  • the receiving module 82 is configured to receive an acknowledgement message sent by the base station, where the acknowledgement message carries the AG information and the CRC check code.
  • the determining module 83 is configured to determine, according to the first RNTI identifier, the AG information, and the CRC check code, whether the E-DCH is an available resource.
  • the first RNTI identifier includes a first definition bit and a second definition bit
  • the user equipment may further include: a first de-masking module 84, as shown in FIG.
  • the CRC check code in the acknowledgment message is de-masked, and the CRC check code is checked. If the check is successful, and the second defined bit is included in the AG information, the determining module 83 is specifically used to determine E. -DCH is an available resource.
  • the user equipment may further include: a second unmasking module 85, as shown in the figure
  • a first RNTI identifier configured to use a first RNTI identifier to de-mask a sequence consisting of an AG information and a CRC check code; if the CRC check code is successfully verified, the user equipment determines that the E-DCH is an available resource, and the E-DCH is its own dedicated resource.
  • the user equipment may further include: a third de-masking module 86, as shown in FIG. 11, configured to perform masking on the CRC check code by using the first RNTI identifier; If the code verification is successful, the user equipment determines that the E-DCH is an available resource, and uses the E-DCH as its own dedicated resource.
  • a third de-masking module 86 as shown in FIG. 11, configured to perform masking on the CRC check code by using the first RNTI identifier; If the code verification is successful, the user equipment determines that the E-DCH is an available resource, and uses the E-DCH as its own dedicated resource.
  • the user equipment may further include: a fourth de-masking module 87, as shown in FIG. 12, for confirming the corresponding E-RNTI identifier pair in the cell accessed by the user equipment by using the first RNTI identifier.
  • the CRC check code in the message is demasked, and the determining module 83 is specifically configured to check the CRC code that is decoded, and if the check succeeds, determine that the E-DCH is an available resource.
  • the determining module 83 may perform data transmission with the base station by using the E-RNTI identifier corresponding to the E-DCH.
  • the user equipment sends a conflict detection request to the base station on the E-DCH, where the conflict detection request carries the first RNTI corresponding to the user equipment, receives the acknowledgement message sent by the base station, and according to the first RNTI and the acknowledgement message. And determining whether the E-DCH is an available resource, so that the user equipment does not need to update the first RNTI when performing collision detection after the cell is switched, thereby reducing network resource waste during collision detection and shortening the collision detection delay.
  • FIG. 13 is a schematic structural diagram of an embodiment of a base station according to the present invention. As shown in FIG. 13, the method includes:
  • the receiving module 131 is configured to receive a conflict detection request sent by the user equipment on the enhanced uplink dedicated data channel E-DCH, where the conflict detection request carries the first temporary wireless network identifier RNTI corresponding to the user equipment;
  • the sending module 133 before the receiving module 131 receives the conflict detection request sent by the user equipment on the enhanced uplink dedicated data channel E-DCH, the sending module 133 is further configured to send the first broadcast message to the user equipment, where the first broadcast message is sent.
  • the public E-DCH resource information in the cell where the user equipment is located is carried in, so that the user equipment selects the E-DCH for sending the conflict detection request according to the common E-DCH resource information.
  • the sending module 133 is further configured to send the second broadcast message to the user equipment, where the second broadcast is performed.
  • the message carries the public E-DCH resource information of the cell accessed by the user equipment and the E-RNTI list, so that the user equipment determines the E-DCH to send the conflict detection request, and determines the cell in which the first RNTI identifier is accessed by the user equipment.
  • the determining module 132 is configured to determine whether the E-DCH is occupied by other user equipments other than the user equipment;
  • the sending module 133 is configured to send an acknowledgment message to the user equipment according to the judgment result, where the acknowledgment message carries the AG information and the CRC check code, so that the user equipment determines whether the E-DCH is determined according to the first RNTI identifier, the AG information, and the CRC check code. Is available resources.
  • the first RNTI identifier includes a first definition bit and a second definition bit
  • the base station further includes a first masking module 134 and a first determining module 135.
  • the sending module 133 provides the user to the user.
  • the first masking module 134 performs masking on the cyclic redundancy CRC check code by using the first defined bit
  • the first determining module 135 is configured to determine the second defined bit as the absolute authorized AG information, which is included.
  • the base station further includes a second masking module 136.
  • the second masking module 136 uses the first RNTI pair by the AG information and The sequence consisting of the CRC check code is masked, and the masked sequence consisting of the AG information and the CRC check code is sent to the user equipment.
  • the base station further includes a third masking module 137.
  • the third masking module 137 uses the first RNTI pair CRC check code. Perform masking to send the masked CRC check code to the user equipment.
  • the base station further includes a fourth masking module 138.
  • the fourth masking module 138 is configured to adopt the first RNTI.
  • the corresponding E-RNTI identifier in the cell accessed by the user equipment is used to mask the CRC check code.
  • the user equipment can determine whether the E-DCH is an available resource according to the E-RNTI identifier corresponding to the first RNTI identifier and the acknowledgment message carrying the AG information and the CRC check code.
  • the base station receives the conflict detection request sent by the user equipment on the E-DCH, where the conflict detection request carries the first RNTI corresponding to the user equipment, and determines whether the E-DCH is occupied by other user equipments other than the user equipment. And sending an acknowledgment message to the user equipment according to the judgment result, so that the user equipment determines, according to the first RNTI and the acknowledgment message, whether the E-DCH is an available resource, so that the user equipment does not need to update the first when performing collision detection after switching the cell.
  • RNTI which reduces network resource waste during collision detection and shortens collision detection delay.
  • FIG. 18 is a schematic structural diagram of an embodiment of a user equipment according to the present invention. As shown in FIG. 18, the method includes:
  • the transmitter 181 is configured to send a collision detection request to the base station on the enhanced uplink dedicated data channel E-DCH, where the conflict detection request carries the first temporary wireless network identifier RNTI corresponding to the user equipment, so that the base station detects whether the E-DCH is used by the user.
  • Other user equipments other than the device are occupied; in the first implementation scenario, before the transmitter 181 sends a collision detection request to the base station on the enhanced uplink dedicated data channel E-DCH, the receiver 182 receives the first broadcast message sent by the base station, A broadcast message carries the public E-DCH resource information in the cell where the user equipment is located, and the user equipment can select the E-DCH used to send the conflict detection request according to the public E-DCH resource information.
  • the receiver 182 before the transmitter 181 sends a collision detection request to the base station on the enhanced uplink dedicated data channel E-DCH, the receiver 182 receives the second broadcast message sent by the base station, where the second broadcast message carries the user equipment.
  • the common E-DCH resource information of the incoming cell and the E-RNTI list after the user equipment determines the corresponding E-RNTI identifier in the accessed cell according to the first RNTI identifier, and sends the E-RNTI to the base station by using the E-DCH.
  • the identified conflict detection request is the identified conflict detection request.
  • the processor 183 is further configured to: use the value of the first RNTI as a dividend, use the number of E-RNTIs in the E-RNTI list as a divisor, obtain a corresponding remainder, and obtain an E - The E-RNTI whose sequence number is the remainder in the RNTI list.
  • the receiver 182 is configured to receive an acknowledgement message sent by the base station, where the acknowledgement message carries the AG information and the CRC check code.
  • the processor 183 is configured to determine, according to the first RNTI identifier, the AG information, and the CRC check code, whether the E-DCH is an available resource.
  • the first RNTI identifier includes a first definition bit and a second definition bit
  • the processor 183 is further configured to use the first definition bit to demask the CRC check code.
  • the masked CRC is checked. If the check is successful, and the second defined bit is included in the AG information, the processor 183 is specifically configured to determine that the E-DCH is an available resource.
  • the processor 183 is further configured to adopt the first RNTI.
  • the identifier de-masks the sequence consisting of the AG information and the CRC check code; if the CRC check code is successfully verified, the user equipment determines that the E-DCH is an available resource.
  • the processor 183 is further configured to use the first RNTI identifier to perform masking on the CRC check code; if the CRC check code is successfully verified, the user equipment determines the E- The DCH is an available resource and uses the E-DCH as its own dedicated resource.
  • the processor 183 is further configured to use the first RNTI identifier to demask the CRC check code in the acknowledgement message corresponding to the E-RNTI identifier in the cell accessed by the user equipment, if the CRC is The verification of the code is successful, and the processor 183 is further configured to determine that the E-DCH is an available resource.
  • the processor 183 may perform data transmission with the base station by using the E-RNTI identifier corresponding to the E-DCH.
  • the user equipment sends a conflict detection request to the base station on the E-DCH, where the conflict detection request carries the first RNTI corresponding to the user equipment, receives the acknowledgement message sent by the base station, and according to the first RNTI and the acknowledgement message. And determining whether the E-DCH is an available resource, so that the user equipment does not need to update the first RNTI when performing collision detection after the cell is switched, thereby reducing network resource waste during collision detection and shortening the collision detection delay.
  • FIG. 19 is a schematic structural diagram of an embodiment of a base station according to the present invention. As shown in FIG. 19, the method includes:
  • the receiver 191 is configured to receive a conflict detection request sent by the user equipment on the enhanced uplink dedicated data channel E-DCH, where the conflict detection request carries the first temporary wireless network identifier RNTI corresponding to the user equipment;
  • the receiver 191 is configured to send the first broadcast message to the user equipment, the first broadcast message, before the receiver 191 receives the conflict detection request sent by the user equipment on the enhanced uplink dedicated data channel E-DCH.
  • the public E-DCH resource information in the cell where the user equipment is located is carried in, so that the user equipment selects the E-DCH for sending the conflict detection request according to the common E-DCH resource information.
  • the transmitter 193 is further configured to send the second broadcast message to the user equipment, where the second broadcast is performed.
  • the public of the cell that the user equipment accesses in the message The E-DCH resource information and the E-RNTI list, so that the user equipment determines the E-DCH to send the collision detection request, and determines the corresponding E-RNTI identifier of the first RNTI identifier in the cell accessed by the user equipment, and passes the E
  • the DCH sends a collision detection request carrying the E-RNTI identity to the base station.
  • the processor 192 is configured to determine whether the E-DCH is occupied by other user equipments other than the user equipment.
  • the transmitter 193 is configured to send an acknowledgment message to the user equipment according to the judgment result, where the acknowledgment message carries the AG information and the CRC check code, so that the user equipment determines whether the E-DCH is determined according to the first RNTI identifier, the AG information, and the CRC check code. Is available resources.
  • the first RNTI identifier includes a first definition bit and a second definition bit.
  • the processor 192 is further configured to use the first defined bit pair to cycle.
  • the redundant CRC check code is masked, and is used to determine the second defined bit as the absolute grant AG information, and obtains an acknowledge message including the AG information and the masked CRC check code.
  • the processor 192 is further configured to use the first RNTI to mask the sequence consisting of the AG information and the CRC check code, and add The masked sequence consisting of the AG information and the CRC check code is sent to the user equipment.
  • the processor 192 is further configured to mask the CRC check code by using the first RNTI, and the masked CRC check code is used. Sent to the user device.
  • the processor 192 before the transmitter 193 sends the acknowledgment message to the user equipment, the processor 192 is further configured to: use the first RNTI to identify the corresponding E-RNTI identifier in the cell accessed by the user equipment. The check code is masked. After the sender 193 sends an acknowledgment message to the user equipment, the user equipment can determine whether the E-DCH is an available resource according to the E-RNTI identifier corresponding to the first RNTI identifier and the acknowledgment message carrying the AG information and the CRC check code.
  • the base station receives the conflict detection request sent by the user equipment on the E-DCH, where the conflict detection request carries the first RNTI corresponding to the user equipment, and determines whether the E-DCH is occupied by other user equipments other than the user equipment. Sending a confirmation to the user equipment based on the judgment result And acknowledging the message, so that the user equipment determines, according to the first RNTI and the acknowledgment message, whether the E-DCH is an available resource, so that the user equipment does not need to update the first RNTI when performing collision detection after switching the cell, thereby reducing the network during collision detection. Waste of resources, shortening conflict detection delays.
  • the disclosed systems, devices, and methods may be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the modules or units is only a logical function division.
  • there may be another division manner for example, multiple units or components may be used. Combined or can be integrated into another system, or some features can be ignored, or not executed.
  • the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical, mechanical or otherwise.
  • the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, i.e., may be located in one place, or may be distributed over multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • a computer readable storage medium including a number of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to execute the application All or part of the steps of the methods described in the various embodiments are contemplated.
  • the foregoing storage medium includes: u disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM), disk or optical disk, and the like, which can store program code. .

Abstract

本发明提供一种用户设备冲突检测方法、用户设备和基站,用于解决现有技术中用户设备发生小区切换后,进行E-DCH冲突检测,存在的网络资源浪费以及冲突检测时延较大的问题。其中,用户设备冲突检测方法包括:用户设备在E-DCH上向基站发送冲突检测请求,冲突检测请求中携带用户设备对应的第一临时无线网络标识RNTI,以使基站检测E-DCH是否被用户设备以外的其他用户设备占用,用户设备接收基站发送的确认消息,确认消息中携带绝对授权AG信息和循环冗余CRC校验码,用户设备根据第一RNTI标识和确认消息中携带的AG信息和CRC校验码确定E-DCH是否为可用资源。

Description

用户设备冲突检测方法、 用户设备和基站
技术领域
本发明涉及通信技术领域, 尤其涉及一种用户设备冲突检测方法、 用 户设备和基站。 背景技术
通用禾多动通信系统 (Universal Mobile Telecommunications System, UMTS)中的陆地无线接入网 (UMTS Terrestrial Radio Access Network, UTRAN) 的注册区 (UTRAN Registration Area, URA) 中包含若干个小 区, 处于 URA-PCH (UTRAN Registration Area-Paging Channel)状态的用 户设备 (User Equipment, UE)在 URA区域内进行小区切换时, 不需要进行 小区更新。 当切换小区后的 UE 需要向基站传输数据时, 需要先切换到 CELL-FACH(CELL-Forward Access Channel)状态,获取新小区的公共的增 强上行专用数据信道 (Enhanced uplink Dedicated Channel, E-DCH) , 以 及与新小区相关的增强 -临时无线网络标识(Enhanced Radio Network Temporary Identifier, E-RNTI)。
现有技术中, UE在公共 E-DCH上向基站发送的冲突检测请求中携带 E-RNTI,基站根据 E-RNTI对该公共 E-DCH进行冲突检测,确定该 E-DCH 是否被其他 UE占用。
然而, 现有技术中, 各个小区的 E-RNTI标识可能重复, 因此, 当 UE 发生小区切换时, UE 需重新获取与新小区相关的 E-RNTI 来完成公共 E-DCH的冲突检测, 浪费网络资源并且导致冲突检测时延较大。 发明内容
本发明提供一种用户设备冲突检测方法、 用户设备和基站, 用于解决 现有技术中 UE发生小区切换后, 进行冲突检测所存在的网络资源浪费高 以及冲突检测时延较大的问题。
本发明的第一方面提供一种用户设备冲突检测方法, 包括: 用户设备在增强上行专用数据信道 E-DCH上向基站发送冲突检测请 求, 所述冲突检测请求中携带所述用户设备对应的第一临时无线网络标识 RNTI, 以使所述基站检测所述 E-DCH是否被所述用户设备以外的其他用 户设备占用;
所述用户设备接收所述基站发送的确认消息, 所述确认消息中携带绝 对授权 AG信息和循环冗余 CRC校验码;
所述用户设备根据所述第一 RNTI标识、所述 AG信息和所述 CRC校 验码确定所述 E-DCH是否为可用资源。
结合第一方面, 在第一方面的第一种可行的实施方式中, 所述第一 RNTI标识包括第一定义位和第二定义位;
所述用户设备根据所述第一 RNTI标识、所述 AG信息和所述 CRC校 验码确定所述 E-DCH是否为可用资源, 包括:
所述用户设备采用所述第一定义位对所述 CRC校验码进行解掩; 若 CRC校验码校验成功, 且所述第二定义位包含在所述 AG信息中, 则所述用户设备确定所述 E-DCH为可用资源。
结合第一方面, 在第一方面的第二种可行的实施方式中, 所述用户设 备根据所述第一 RNTI标识、 所述 AG信息和所述 CRC校验码确定所述 E-DCH是否为可用资源, 包括:
所述用户设备采用所述第一 RNTI标识对由所述 AG信息和所述 CRC 校验码组成的序列进行解掩;
若 CRC校验码校验成功, 则所述用户设备确定所述 E-DCH为可用资 源。
结合第一方面, 在第一方面的第三种可行的实施方式中, 所述用户设 备根据所述第一 RNTI标识、 所述 AG信息和所述 CRC校验码确定所述 E-DCH是否为可用资源, 包括:
所述用户设备采用所述第一 RNTI标识对所述 CRC校验码进行解掩; 若 CRC校验码校验成功, 则所述用户设备确定所述 E-DCH为可用资 源。
结合第一方面或第一方面的第一到第三种可行的实施方式, 在第四种 可行的实施方式中, 所述用户设备在增强上行专用数据信道 E-DCH上向 基站发送冲突检测请求之前, 还包括:
所述用户设备接收所述基站发送的第一广播消息, 所述第一广播消息 中携带公共 E-DCH资源信息, 以使所述用户设备根据所述公共 E-DCH资 源信息选择用于发送第一 RNTI的 E-DCH。
结合第一方面, 在第一方面的第五种可行的实施方式中, 所述用户设 备在增强上行专用数据信道 E-DCH上向基站发送冲突检测请求, 具体包 括:
所述用户设备确定所述第一 RNTI标识在所述用户设备接入的小区中 对应的 E-RNTI标识;
所述用户设备在 E-DCH上向基站发送携带所述 E-RNTI标识的冲突检 测请求。
结合第一方面的第五种可行的实施方式, 在第六种可行的实施方式 中, 所述用户设备根据所述第一 RNTI标识、所述 AG信息和所述 CRC校 验码确定所述 E-DCH是否为可用资源, 包括:
所述用户设备采用所述 E-RNTI标识对所述 CRC校验码进行解掩; 若所述 CRC校验码校验成功, 则所述用户设备确定所述 E-DCH为可 用资源。
结合第一方面的第五种可行的实施方式或第六种可行的实施方式, 在 第一方面的第七种可行的实施方式中, 所述用户设备在增强上行专用数据 信道 E-DCH上向基站发送冲突检测请求之前, 还包括:
所述用户设备接收所述基站发送的第二广播消息, 所述第二广播消息 中携带公共 E-DCH资源信息, 以使所述用户设备根据所述公共 E-DCH资 源信息选择用于发送所述 E-RNTI标识的 E-DCH, 所述第二广播消息中还 携带所述用户设备接入的小区的 E-RNTI列表。
结合第一方面的第五种可行的实施方式或第六种可行的实施方式或 第七种可行的实施方式, 在第八种可行的实施方式中, 所述用户设备确定 所述第一 RNTI标识在所述用户设备接入的小区中对应的 E-RNTI标识, 包括:
所述用户设备将所述第一 RNTI的值作为被除数, 将所述 E-RNTI列 表中 E-RNTI的个数作为除数, 获取对应的余数, 并获取所述 E-RNTI列 表中序列号为所述余数的 E-RNTI。
结合第一方面或第一方面的八种可行的实施方式中的一种, 在第九种 可行的实施方式中, 所述第一广播消息或第二广播消息中还可以携带公共
E-DCH资源信息对应的 E-RNTI标识;
所述用户设备确定所述 E-DCH为可用资源后,采用所述 E-DCH对应 的 E-RNTI标识与基站进行数据传输。
本发明的第二方面提供一种用户设备冲突检测方法, 包括: 基站接收用户设备在增强上行专用数据信道 E-DCH上发送的冲突检 测请求, 所述冲突检测请求中携带所述用户设备对应的第一临时无线网络 标识 RNTI;
所述基站判断所述 E-DCH是否被所述用户设备以外的其他用户设备 占用;
所述基站根据所述判断结果向所述用户设备发送确认消息, 所述确认 消息中携带绝对授权 AG信息和循环冗余 CRC校验码, 以使所述用户设 备根据所述第一 RNTI标识、 所述 AG信息和所述 CRC校验码确定所述 E-DCH是否为可用资源。
结合第二方面, 在第二方面的第一种可行的实施方式中, 所述第一 RNTI标识包括第一定义位和第二定义位;
所述基站根据所述判断结果向所述用户设备发送确认消息之前, 还包 括:
所述基站采用所述第一定义位对所述 CRC校验码进行加掩; 所述基站将所述第二定义位确定为所述 AG信息。
结合第二方面, 在第二方面的第二种可行的实施方式中, 所述基站根 据所述判断结果向所述用户设备发送确认消息之前, 还包括:
所述基站采用所述第一 RNTI标识对由所述 AG信息和所述 CRC校验 码组成的序列进行加掩。
结合第二方面, 在第二方面的第三种可行的实施方式中, 所述基站根 据所述判断结果向所述用户设备发送确认消息之前, 还包括:
所述基站采用所述第一 RNTI标识对 CRC校验码进行加掩。
结合第二方面或第二方面的第一到第三种可行的实施方式, 在第四种 可行的实施方式中, 所述基站接收用户设备在增强上行专用数据信道
E-DCH上发送的冲突检测请求之前, 还包括:
所述基站向所述用户设备发送第一广播消息, 所述第一广播消息中携 带公共 E-DCH资源信息, 以使所述用户设备根据所述公共 E-DCH资源信 息选择用于发送第一 RNTI的 E-DCH。
结合第二方面, 在第二方面的第五种可行的实施方式中, 若所述冲突 检测请求中携带所述第一 RNTI标识在所述用户设备接入的小区中对应的 E-RNTI 标识, 则所述基站根据所述判断结果向所述用户设备发送确认消 息之前, 还包括:
所述基站采用所述 E-RNTI标识对所述 CRC校验码进行加掩。
结合第二方面的第五种可行的实施方式, 在第六种可行的实施方式 中, 所述基站接收用户设备在增强上行专用数据信道 E-DCH上发送的冲 突检测请求之前, 还包括:
所述基站向所述用户设备发送第二广播消息, 所述第二广播消息中携 带公共 E-DCH资源信息, 以使所述用户设备根据所述公共 E-DCH资源信 息选择用于发送冲突检测请求的 E-DCH,所述第二广播消息中还携带所述 用户设备接入的小区的 E-RNTI列表。
本发明的第三方面提供一种用户设备, 包括:
发送模块, 用于在增强上行专用数据信道 E-DCH上向基站发送冲突 检测请求, 所述冲突检测请求中携带所述用户设备对应的第一临时无线网 络标识 RNTI, 以使所述基站检测所述 E-DCH是否被所述用户设备以外的 其他用户设备占用;
接收模块, 用于接收所述基站发送的确认消息, 所述确认消息中携带 绝对授权 AG信息和循环冗余 CRC校验码;
确定模块, 用于根据所述第一 RNTI标识、 所述 AG信息和所述 CRC 校验码确定所述 E-DCH是否为可用资源。
结合第三方面, 在第三方面的第一种可行的实施方式中, 所述第一 RNTI标识包括第一定义位和第二定义位;
所述用户设备还包括: 第一解掩模块, 用于采用所述第一定义位对所 述 CRC校验码进行解掩; 若 CRC校验码校验成功, 且所述第二定义位包含在所述 AG信息中, 所述确定模块具体用于, 确定所述 E-DCH为可用资源。
结合第三方面, 在第三方面的第二种可行的实施方式中, 所述用户设 备还包括: 第二解掩模块, 用于采用所述第一 RNTI标识对由所述 AG信 息和所述 CRC校验码组成的序列进行解掩;
若 CRC校验码校验成功, 所述确定模块具体用于, 确定所述 E-DCH 为可用资源。
结合第三方面, 在第三方面的第三种可行的实施方式中, 所述用户设 备还包括:第三解掩模块,用于采用所述第一 RNTI标识对所述 CRC校验 码进行解掩;
若 CRC校验码校验成功, 所述确定模块具体用于, 确定所述 E-DCH 为可用资源。
结合第三方面或第三方面的第一到第三种可行的实施方式, 在第四种 可行的实施方式中, 所述发送模块在增强上行专用数据信道 E-DCH上向 基站发送冲突检测请求之前, 所述接收模块还用于, 接收所述基站发送的 第一广播消息, 所述第一广播消息中携带公共 E-DCH资源信息, 以使所 述用户设备根据所述公共 E-DCH 资源信息选择用于发送第一 RNTI 的 E-DCH。
结合第三方面, 在第三方面的第五种可行的实施方式中, 所述确定模 块还用于, 确定所述第一 RNTI标识在所述用户设备接入的小区中对应的 E-RNTI标识;
所述发送模块具体用于, 在所述 E-DCH 上向基站发送携带所述 E-RNTI标识的冲突检测请求。
结合第三方面的第五种可行的实施方式, 在第六种可行的实施方式 中, 所述用户设备还包括: 第四解掩模块, 用于采用所述 E-RNTI标识对 所述 CRC校验码进行解掩;
若所述 CRC 校验码校验成功, 所述确定模块具体用于, 确定所述 E-DCH为可用资源。
结合第三方面的第五种可行的实施方式或第六种可行的实施方式, 在 第五种可行的实施方式中,所述发送模块在增强上行专用数据信道 E-DCH 上向基站发送冲突检测请求之前, 所述接收模块还用于, 接收所述基站发 送的第二广播消息, 所述第二广播消息中携带公共 E-DCH资源信息, 以 使所述用户设备根据所述公共 E-DCH资源信息选择用于发送冲突检测请 求的 E-DCH , 所述第二广播消息中还携带所述用户设备接入的小区的 E-RNTI列表。
结合第三方面的第五种可行的实施方式、 第六种可行的实施方式或第 七种可行的实施方式, 在第八种可行的实施方式中, 所述确定模块具体用 于, 将所述第一 RNTI 的值作为被除数, 将所述 E-RNTI列表中 E-RNTI 的个数作为除数, 获取对应的余数, 并获取所述 E-RNTI列表中序列号为 所述余数的 E-RNTI。
结合第三方面或第三方面的八种可行的实施方式中的一种, 在第九种 可行的实施方式中, 所述第一广播消息或第二广播消息中还可以携带公共 E-DCH资源信息对应的 E-RNTI标识;
所述用户设备确定所述 E-DCH为可用资源后,采用所述 E-DCH对应 的 E-RNTI标识与基站进行数据传输。
本发明的第四方面提供一种基站, 包括:
接收模块, 用于接收用户设备在增强上行专用数据信道 E-DCH上发 送的冲突检测请求, 所述冲突检测请求中携带所述用户设备对应的第一临 时无线网络标识 RNTI;
判断模块, 用于判断所述 E-DCH是否被所述用户设备以外的其他用 户设备占用;
发送模块, 用于根据所述判断结果向所述用户设备发送确认消息, 所 述确认消息中携带绝对授权 AG信息和循环冗余 CRC校验码, 以使所述 用户设备根据所述第一 RNTI标识、所述 AG信息和所述 CRC校验码确定 所述 E-DCH是否为可用资源。
结合第四方面, 在第四方面的第一种可行的实施方式中, 所述第一 RNTI标识包括第一定义位和第二定义位;
所述发送模块根据所述判断结果向所述用户设备发送确认消息之前, 所述基站还包括:
第一加掩模块, 用于采用所述第一定义位对所述 CRC校验码进行加 掩;
第一确定模块, 用于将所述第二定义位确定为所述 AG信息。
结合第四方面, 在第四方面的第二种可行的实施方式中, 所述发送模 块根据所述判断结果向所述用户设备发送确认消息之前, 所述基站还包 括:
第二加掩模块, 用于采用所述第一 RNTI标识对由所述 AG信息和所 述 CRC校验码组成的序列进行加掩。
结合第四方面, 在第四方面的第三种可行的实施方式中, 所述发送模 块根据所述判断结果向所述用户设备发送确认消息之前, 所述基站还包 括:
第三加掩模块,用于采用所述第一 RNTI标识对 CRC校验码进行加掩。 结合第四方面或第四方面的第一到第三种可行的实施方式, 在第四种 可行的实施方式中, 所述接收模块接收用户设备在增强上行专用数据信道 E-DCH上发送的冲突检测请求之前, 所述发送模块还用于, 向所述用户设 备发送第一广播消息, 所述第一广播消息中携带公共 E-DCH资源信息, 以使所述用户设备根据所述公共 E-DCH资源信息选择用于发送第一 RNTI 的 E-DCH。
结合第四方面, 在第四方面的第四种可行的实施方式中, 若所述冲突 检测请求中携带所述第一 RNTI标识在所述用户设备接入的小区中对应的 E-RNTI 标识, 则所述发送模块根据所述判断结果向所述用户设备发送确 认消息之前, 所述基站还包括: 第四加掩模块;
所述第四加掩模块用于,采用所述 E-RNTI标识对所述 CRC校验码进 行加掩。
结合第四方面的第四种可行的实施方式, 在第五种可行的实施方式 中, 所述接收模块接收用户设备在增强上行专用数据信道 E-DCH上发送 的冲突检测请求之前, 所述发送模块还用于, 向所述用户设备发送第二广 播消息, 所述第二广播消息中携带公共 E-DCH资源信息, 以使所述用户 设备根据所述公共 E-DCH 资源信息选择用于发送冲突检测请求的 E-DCH, 所述第二广播消息中还携带所述用户设备接入的小区的 E-RNTI 列表。 本发明的第五方面提供一种用户设备, 包括:
发送器, 用于在增强上行专用数据信道 E-DCH上向基站发送冲突检 测请求, 所述冲突检测请求中携带所述用户设备对应的第一临时无线网络 标识 RNTI, 以使所述基站检测所述 E-DCH是否被所述用户设备以外的其 他用户设备占用;
接收器, 用于接收所述基站发送的确认消息, 所述确认消息中携带绝 对授权 AG信息和循环冗余 CRC校验码;
处理器, 用于根据所述第一 RNTI标识、所述 AG信息和所述 CRC校 验码确定所述 E-DCH是否为可用资源。
结合第五方面, 在第五方面的第一种可行的实施方式中, 所述第一
RNTI标识包括第一定义位和第二定义位;
所述处理器, 还用于采用所述第一定义位对所述 CRC校验码进行解 掩;
若 CRC校验码校验成功, 且所述第二定义位包含在所述 AG信息中, 所述处理器具体用于, 确定所述 E-DCH为可用资源。
结合第五方面,在第五方面的第二种可行的实施方式中,所述处理器, 还用于采用所述第一 RNTI标识对由所述 AG信息和所述 CRC校验码组成 的序列进行解掩;
若 CRC校验码校验成功, 所述处理器具体用于, 确定所述 E-DCH为 可用资源。
结合第五方面,在第五方面的第三种可行的实施方式中,所述处理器, 还用于采用所述第一 RNTI标识对所述 CRC校验码进行解掩;
若 CRC校验码校验成功, 所述处理器具体用于, 确定所述 E-DCH为 可用资源。
结合第五方面或第五方面的第一到第三种可行的实施方式, 在第四种 可行的实施方式中, 所述发送器在增强上行专用数据信道 E-DCH上向基 站发送冲突检测请求之前, 所述接收器还用于, 接收所述基站发送的第一 广播消息, 所述第一广播消息中携带公共 E-DCH资源信息, 以使所述用 户设备根据所述公共 E-DCH资源信息选择用于发送第一 RNTI的 E-DCH。
结合第五方面, 在第五方面的第五种可行的实施方式中, 所述处理器 还用于, 确定所述第一 RNTI 标识在所述用户设备接入的小区中对应的 E-RNTI标识;
所述发送器具体用于, 在所述 E-DCH上向基站发送携带所述 E-RNTI 标识的冲突检测请求。
结合第五方面的第五种可行的实施方式, 在第六种可行的实施方式 中, 所述处理器, 还用于采用所述 E-RNTI标识对所述 CRC校验码进行解 掩;
若所述 CRC校验码校验成功, 所述处理器还用于确定所述 E-DCH为 可用资源。
结合第五方面的第五种可行的实施方式或第六种可行的实施方式, 在 第七种可行的实施方式中, 所述发送器在增强上行专用数据信道 E-DCH 上向基站发送冲突检测请求之前, 所述接收器还用于, 接收所述基站发送 的第二广播消息, 所述第二广播消息中携带公共 E-DCH资源信息, 以使 所述用户设备根据所述公共 E-DCH资源信息选择用于发送冲突检测请求 的 E-DCH , 所述第二广播消息中还携带所述用户设备接入的小区的 E-RNTI列表。
结合第五方面的第五种可行的实施方式、 第六种可行的实施方式或第 七种可行的实施方式,在第八种可行的实施方式中,所述处理器具体用于, 将所述第一 RNTI的值作为被除数, 将所述 E-RNTI列表中 E-RNTI的个 数作为除数, 获取对应的余数, 并获取所述 E-RNTI列表中序列号为所述 余数的 E-RNTI。
结合第五方面或第五方面的八种可行的实施方式中的一种, 在第九种 可行的实施方式中, 所述第一广播消息或第二广播消息中还可以携带公共 E-DCH资源信息对应的 E-RNTI标识;
所述处理器确定所述 E-DCH为可用资源后,采用所述 E-DCH对应的
E-RNTI标识与基站进行数据传输。
本发明的第六方面提供一种基站, 包括:
接收器, 用于接收用户设备在增强上行专用数据信道 E-DCH上发送 的冲突检测请求, 所述冲突检测请求中携带所述用户设备对应的第一临时 无线网络标识 RNTI; 处理器, 用于判断所述 E-DCH是否被所述用户设备以外的其他用户 设备占用;
发送器, 用于根据所述判断结果向所述用户设备发送确认消息, 所述 确认消息中携带绝对授权 AG信息和循环冗余 CRC校验码, 以使所述用 户设备根据所述第一 RNTI标识、所述 AG信息和所述 CRC校验码确定所 述 E-DCH是否为可用资源。
结合第六方面, 在第六方面的第一种可行的实施方式中, 所述第一 RNTI标识包括第一定义位和第二定义位;
所述发送器根据所述判断结果向所述用户设备发送确认消息之前, 所 述处理器, 还用于采用所述第一定义位对所述 CRC校验码进行加掩; 用 于将所述第二定义位确定为所述 AG信息。
结合第六方面, 在第六方面的第二种可行的实施方式中, 所述发送器 根据所述判断结果向所述用户设备发送确认消息之前, 所述处理器, 还用 于采用所述第一 RNTI标识对由所述 AG信息和所述 CRC校验码组成的序 列进行加掩。
结合第六方面, 在第六方面的第三种可行的实施方式中, 所述发送器 根据所述判断结果向所述用户设备发送确认消息之前, 所述处理器, 还用 于采用所述第一 RNTI标识对 CRC校验码进行加掩。
结合第六方面或第六方面的第一到第三种可行的实施方式, 在第四种 可行的实施方式中, 所述接收器接收用户设备在增强上行专用数据信道 E-DCH上发送的冲突检测请求之前, 所述发送器还用于, 向所述用户设备 发送第一广播消息, 所述第一广播消息中携带公共 E-DCH资源信息, 以 使所述用户设备根据所述公共 E-DCH 资源信息选择用于发送第一 RNTI 的 E-DCH。
结合第六方面, 在第六方面的第五种可行的实施方式中, 若所述冲突 检测请求中携带所述第一 RNTI标识在所述用户设备接入的小区中对应的 E-RNTI 标识, 则所述发送器根据所述判断结果向所述用户设备发送确认 消息之前, 所述处理器, 还用于采用所述 E-RNTI标识对所述 CRC校验码 进行加掩。
结合第六方面的第五种可行的实施方式, 在第六种可行的实施方式 中, 所述接收器接收用户设备在增强上行专用数据信道 E-DCH上发送的 冲突检测请求之前, 所述发送器还用于, 向所述用户设备发送第二广播消 息, 所述第二广播消息中携带公共 E-DCH资源信息, 以使所述用户设备 根据所述公共 E-DCH资源信息选择用于发送冲突检测请求的 E-DCH, 所 述第二广播消息中还携带所述用户设备接入的小区的 E-RNTI列表。
本发明实施例提供的用户设备冲突检测方法、 用户设备和基站, 用户 设备通过在 E-DCH上向基站发送冲突检测请求, 该冲突检测请求中携带 用户设备对应的第一 RNTI, 接收基站发送的确认消息, 并根据第一 RNTI 和确认消息中携带的 AG信息和 CRC校验码确定 E-DCH是否为可用资源, 以使用户设备在切换小区后进行冲突检测时, 无需更新第一 RNTI, 从而 减少冲突检测时的网络资源浪费, 缩短冲突检测时延。 附图说明
图 1为本发明提供的用户设备冲突检测方法一个实施例的流程图; 图 2为第一 RNTI的格式示意图;
图 3为第一 RNTI的第一定义位对 CRC校验码进行加掩的示意图; 图 4为第一 RNTI对应的 E-RNTI对 CRC校验码进行加掩的示意图; 图 5为本发明提供的用户设备冲突检测方法又一个实施例的流程图; 图 6为本发明提供的用户设备冲突检测方法另一个实施例的流程图; 图 7为本发明提供的用户设备冲突检测方法再一个实施例的流程图; 图 8为本发明提供的用户设备一个实施例的结构示意图;
图 9为本发明提供的用户设备又一个实施例的结构示意图;
图 10为本发明提供的用户设备另一个实施例的结构示意图; 图 11为本发明提供的用户设备又一个实施例的结构示意图; 图 12为本发明提供的用户设备另一个实施例的结构示意图; 图 13为本发明提供的基站一个实施例的结构示意图;
图 14为本发明提供的基站又一个实施例的结构示意图;
图 15为本发明提供的基站另一个实施例的结构示意图;
图 16为本发明提供的基站又一个实施例的结构示意图;
图 17为本发明提供的基站另一个实施例的结构示意图; 图 18为本发明提供的用户设备一个实施例的结构示意图; 图 19为本发明提供的基站一个实施例的结构示意图。 具体实施方式
为使本发明实施例的目的、 技术方案和优点更加清楚, 下面将结合本 发明实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描 述, 显然,所描述的实施例是本发明一部分实施例, 而不是全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没有做出创造性劳动前提 下所获得的所有其他实施例, 都属于本发明保护的范围。
本文中描述的技术可用于各种通信系统, 例如当前 2G, 3G通信系统 和下一代通信系统, 例如全球移动通信系统 (GSM , Global System for Mobile communications ) , 石马分多址 ( CDMA, Code Division Multiple Access ) 系统, 时分多址 (TDMA, Time Division Multiple Access ) 系统, 宽带码分多址 ( WCDMA, Wideband Code Division Multiple Access Wireless ) , 频分多址 (FDMA, Frequency Division Multiple Addressing ) 系统, 正交频分多址 (OFDM A , Orthogonal Frequency-Division Multiple Access )系统,单载波 FDMA ( SC-FDMA )系统,通用分组无线业务(GPRS , General Packet Radio Service )系统,长期演进 ( LTE, Long Term Evolution) 系统, 以及其他此类通信系统。
本申请中涉及的用户设备, 可以是无线终端也可以是有线终端, 无线 终端可以是指向用户提供语音和 /或数据连通性的设备,具有无线连接功能 的手持式设备、 或连接到无线调制解调器的其他处理设备。 无线终端可以 经无线接入网 (例如, RAN, Radio Access Network)与一个或多个核心网 进行通信, 无线终端可以是移动终端, 如移动电话 (或称为"蜂窝"电话) 和具有移动终端的计算机, 例如, 可以是便携式、 袖珍式、 手持式、 计算 机内置的或者车载的移动装置, 它们与无线接入网交换语言和 /或数据。例 如, 个人通信业务 (PCS , Personal Communication Service ) 电话、 无绳电 话、会话发起协议(SIP )话机、无线本地环路(WLL, Wireless Local Loop ) 站、 个人数字助理 (PDA, Personal Digital Assistant) 等设备。 无线终端 也可以称为系统、订户单元(Subscriber Unit)、订户站(Subscriber Station ), 移动站 (Mobile Station) 、 移动台 (Mobile) 、 远程站 (Remote Station) 、 接入点(Access Point)、远程终端( Remote Terminal )、接入终端(Access Terminal) 、 用户终端 (User Terminal) 、 用户代理 (User Agent) 、 用户 设备 (User Device) 、 或用户装备 (User Equipment) 。
本申请中涉及的基站 (例如, 接入点) 可以是指接入网中在空中接口 上通过一个或多个扇区与无线终端通信的设备。基站可用于将收到的空中 帧与 IP 分组进行相互转换, 作为无线终端与接入网的其余部分之间的路 由器, 其中接入网的其余部分可包括网际协议 (IP) 网络。 基站还可协调 对空中接口的属性管理。例如,基站可以是 GSM或 CDM A中的基站( BTS, Base Transceiver Station) , 也可以是 WCDMA中的基站 (NodeB ) , 还可 以是 LTE中的演进型基站(NodeB或 eNB或 e-NodeB, evolutional Node B ) , 本申请并不限定。
基站控制器,可以是 GSM或 CDMA中的基站控制器(BSC, base station controller),也可以是 WCDMA中的无线网络控制器(RNC, Radio Network Controller) , 本申请并不限定。
另外, 本文中术语"系统"和"网络"在本文中常被可互换使用。 本文中 术语"和 /或", 仅仅是一种描述关联对象的关联关系, 表示可以存在三种关 系, 例如, A和 /或 B , 可以表示: 单独存在 A, 同时存在 A和 B , 单独存 在 B 这三种情况。 另外, 本文中字符 "/" , 一般表示前后关联对象是一 种 "或" 的关系。
图 1为本发明提供的用户设备冲突检测方法一个实施例的流程图, 如 图 1所示, 包括:
101、用户设备在增强上行专用数据信道 E-DCH上向基站发送冲突检 测请求, 冲突检测请求中携带用户设备对应的第一临时无线网络标识 RNTI, 以使基站检测 E-DCH是否被用户设备以外的其他用户设备占用。
用户设备在 E-DCH上向基站发送冲突检测请求之前, 无线网络控制 器 (Radio Network Controller, RNC) 可以为基站和 RNC分配 E-RNTI资 源池,每个 E-RNTI资源池中包括多个 E-RNTI标识。 RNC可以对 E-RNTI 资源池中的 E-RNTI标识进行扩展, 得到第一 RNTI, 例如: 可以将 16位 的 E-RNTI标识扩展为 22位得到第一 RNTI,如图 2所示。其中,第一 RNTI 可以为用户设备在一定区域内对应的唯一标识。 可选的, 第一 RNTI为用 户设备在多个小区组成的区域内对应的唯一标识, 或者用户设备在 UTRAN注册区 URA内对应的唯一标识。 可选的, 第一 RNTI为 RNC通 过专用信令分配给用户设备的。
在第一种实施场景下, 基站可以通过小区广播方式向用户设备提供用 户设备所在小区内的公共 E-DCH资源信息。 可选的, 基站可以向用户设 备发送第一广播消息, 在第一广播消息中携带用户设备所在小区内的公共 E-DCH资源信息, 从而使用户设备可以根据公共 E-DCH资源信息选择用 于发送冲突检测请求的 E-DCH。
在第二种实施场景下, 基站还可以向用户设备发送第二广播消息, 在 第二广播消息中携带用户设备所在小区内的公共 E-DCH 资源信息以及 E-RNTI列表。用户设备根据第一 RNTI标识确定对应的 E-RNTI列表中的 E-RNTI, 并在公共 E-DCH资源上发送上行数据单元时携带该 E-RNTI。可 选的, 第二广播消息中的用户设备所在小区内的每套公共 E-DCH资源信 息中都包含一个 E-RNTI。
可选的, 在第二种实施场景下, 用户设备确定第一 RNTI标识在用户 设备接入的小区中对应的 E-RNTI标识具体可以为: 将第一 RNTI的值作 为被除数, 将 E-RNTI列表中 E-RNTI的个数作为除数, 获取对应的余数, 并获取 E-RNTI 列表中序列号为余数的 E-RNTI, 可选的, UE 选定公共 E-DCH资源之后就可以获得该资源对应的 E-RNTI。
基站接收到用户设备通过 E-DCH发送的冲突检测请求后, 可以判断 该 E-DCH是否被其他的用户设备占用, 若该 E-DCH未被其他的用户设备 占用, 则基站可以向该用户设备发送携带 AG信息和 CRC校验码的确认 消息; 若该 E-DCH被其他的用户设备占用, 则基站可以将占用该 E-DCH 的其他用户设备的确认消息发送给该用户设备。
可选的, 在第一种实施场景下, 当该 E-DCH未被其他的用户设备占 用时, 基站可以根据用户设备的冲突检测请求中的第一 RNTI的第一定义 位对 CRC校验码进行加掩,将第一 RNTI中的第二定义位确定为绝对授权 AG信息, 如图 3所示, 将包括 AG信息和加掩后的 CRC校验码的确认消 息发送给用户设备。 其中, 第一 RNTI的第一定义位为图 2中的扩展前的 16位 E-RNTI,第二定义位为图 2中的扩展位。可选的,基站根据第一 RNTI 的第一定义位对 CRC校验码进行加掩, 具体可以为: 基站根据第一定义 位对 CRC校验码按位取异或。
可选的, 在第一种实施场景下, 当该 E-DCH未被其他的用户设备占 用时, 基站还可以根据用户设备的冲突检测请求中的第一 RNTI, 对由 AG 信息和 CRC校验码组成的序列进行加掩, 其中, 加掩方法具体可以为: 基站根据第一 RNTI对 AG信息和 CRC校验码组成的序列按位求和之后并 对 2取模, 加掩后仍然得到和加掩之前相同位数的序列。
可选的, 在第一种实施场景下, 当该 E-DCH未被其他的用户设备占 用时, 基站还可以采用第一 RNTI对 CRC校验码进行加掩。 其中, CRC 校验码是基站根据 AG信息所生成的校验码, 基站生成的 CRC校验码的 位数与第一 RNTI的位数相同。
可选的, 在第二种实施场景下, 当该 E-DCH未被其他的用户设备占 用时, 基站还可以根据用户设备的冲突检测请求中的第一 RNTI, 确定用 户设备所在的小区内对应的 E-RNTI, 利用 E-RNTI对 CRC校验码进行加 掩, 如图 4所示, 将包括 AG信息和加掩后的 CRC校验码的确认消息发 送给用户设备。
102、 用户设备接收基站发送的确认消息, 确认消息中携带绝对授权 (Absolute Grant, AG)信息和循环冗余(Cyclic Redundancy Check, CRC) 校验码。
在基站的覆盖范围内, 通过同一个 E-DCH 向基站发送冲突检测请求 的所有用户设备都可以接收到基站通过该 E-DCH发送的确认消息。
103、 用户设备根据第一 RNTI 标识、 AG 信息和 CRC 校验码确定 E-DCH是否为可用资源。
在第一种实施场景下,第一 RNTI标识包括第一定义位和第二定义位。 可选的, 第一定义位可以为 16位, 如图 2中的扩展前的 16位 E-RNTI。 第二定义位可以为 6 位, 如图 2 中的扩展位。 当基站采用第一定义位对 CRC校验码进行加掩, 将第二定义位确定为 AG信息, 将包含 AG信息和 加掩后的 CRC校验码的确认消息发送给用户设备后, 用户设备可以采用 第一定义位对加掩后的 CRC校验码进行解掩, 对解掩后的 CRC校验码进 行校验, 若 CRC校验码校验成功, 用户设备判断第二定义位是否包含在 AG信息中, 若第二定义位包含在 AG信息中, 则用户设备确定该 E-DCH 为可用资源, 并将该 E-DCH作为自己的专用资源。 由于用户设备根据第 一 RNTI标识和确认消息中携带的 AG信息和 CRC校验码确定 E-DCH是 否为可用资源, 确认消息中携带的 AG信息和 CRC校验码是由基站根据 第一 RNTI标识进行确定和加掩得到的, 第一 RNTI可支持 22位, 共计支 持 400万个用户可以支持 RNC级别内不用更换第一 RNTI, 因此, 当用户 设备发生小区切换后, 第一 RNTI 标识不需要改变, 可以继续使用第一 RNTI在新小区内进行冲突检测。
例如, 若 AG信息为 101100, 第二定义位为 1011, 则表示第二定义 位包含在 AG信息中。又例如,若 AG信息为 010110,第二定义位为 1011, 也表示第二定义位包含在 AG信息中。
进一步地, 若 CRC校验码校验不成功, 用户设备可以在公共 E-DCH 资源中重新选择用于发送冲突检测请求的 E-DCH, 通过该 E-DCH向基站 发送冲突检测请求, 根据基站发送的确认消息, 确定该 E-DCH是否为可 用资源。
在第二种实施场景下,当基站采用第一 RNTI对由 AG信息和 CRC校 验码组成的序列进行加掩, 将加掩后的由 AG信息和 CRC校验码组成的 序列发送给用户设备后, 用户设备可以采用第一 RNTI标识对由 AG信息 和 CRC校验码组成的序列进行解掩; 若 CRC校验码校验成功, 则用户设 备确定 E-DCH为可用资源, 并将该 E-DCH作为自己的专用资源。
在第三种实施场景下, 当基站根据 AG信息生成 CRC校验码, 其中, 基站生成的 CRC校验码的位数与第一 RNTI的位数相同,例如,第一 RNTI 和 CRC校验码的位数均为 22位,基站采用第一 RNTI对 CRC校验码进行 加掩, 将加掩后的 CRC校验码发送给用户设备后, 用户设备可以采用第 一 RNTI标识对 CRC校验码进行解掩; 若 CRC校验码校验成功, 则用户 设备确定所述 E-DCH为可用资源, 并将该 E-DCH作为自己的专用资源。
在第四种实施场景下, 基站采用第一 RNTI标识对应的 E-RNTI标识 对 CRC校验码进行加掩, 并将包含 AG信息和加掩后的 CRC校验码的确 认消息发送给用户设备, 此时, AG信息用于确定用户设备向基站发送数 据包时, 一次可以发送的数据包的大小, 用户设备可以采用第一 RNTI标 识对应的 E-RNTI标识对加掩后的 CRC校验码进行解掩,进行 CRC校验, 若校验成功, 将该 E-DCH作为自己的专用资源, 以使用户设备可以通过 该 E-DCH向基站传输数据, 或者接收基站传输的数据。
进一步地, 若 CRC校验不成功, 用户设备可以重新在基站发送的公 共 E-DCH资源中选择用于发送冲突检测请求的 E-DCH, 在该 E-DCH上 发送第一 RNTI标识对应的 E-RNTI标识。用户设备可以通过该 E-DCH向 基站发送冲突检测请求, 根据基站发送的确认消息, 确定该 E-DCH是否 为可用资源。
当用户设备将 E-DCH作为自己的专用资源后, 冲突检测过程结束。 用户设备可以通过 E-DCH 向基站发送数据包, 或者接收基站发送的数据 包。数据包中可以携带数据内容,但不需要携带 E-DCH资源对应的 E-RNTI 标识。 当用户设备将 E-DCH作为自己的专用资源后, 基站也可以通过 AG 信道向用户设备发送绝对授权 AG信息和 CRC校验码, 此时, AG信息用 于确定用户设备向基站发送数据包时, 一次可以发送的数据包的大小, CRC校验码用于确定 AG信息是发送给该用户设备,而不是发送给其他用 户设备的。
另外, 本发明实施例提供的用户冲突检测方法还可以适用于没有专用 的 E-RNTI而又需要获取小区内的 E-DCH资源以进行数据传输的用户设 备。 所述没有专用的 E-RNTI 的用户设备可以指处于 CELL_FACH, CELL_PCH, URA_PCH或 idle等非专用连接态的用户设备。 例如: 处于 URA_PCH 状态的用户设备需要发送 DCCH/DTCH 数据时, 可以选择 E-DCH资源并执行用户冲突检测; 或者处于 CELL_FACH状态的用户设 备在小区切换之后需要直接发送 DCCH/DTCH数据时, 可以选择 E-DCH 资源并执行用户冲突检测。 这里的 E-DCH资源可以包括 common E-DCH (公共 E-DCH) 资源。
本发明实施例提供的用户设备冲突检测方法中, 用户设备通过在 E-DCH上向基站发送冲突检测请求,该冲突检测请求中携带用户设备对应 的第一 RNTI,接收基站发送的确认消息, 并根据第一 RNTI和携带 AG信 息和 CRC校验码的确认消息, 判断 E-DCH是否为可用资源, 以使用户设 备在切换小区后进行冲突检测时, 无需更新第一 RNTI, 从而减少冲突检 测时的网络资源浪费, 缩短冲突检测时延。 图 5为本发明提供的用户设备冲突检测方法又一个实施例的流程图, 如图 5所示, 包括:
501、基站接收用户设备在增强上行专用数据信道 E-DCH上发送的冲 突检测请求, 冲突检测请求中携带用户设备对应的第一临时无线网络标识 RNTIo
在一种实施场景下, 基站可以向用户设备发送第一广播消息, 在第一 广播消息中携带用户设备所在小区内的公共 E-DCH资源信息。 用户设备 根据公共 E-DCH资源信息选择用于发送冲突检测请求的 E-DCH后, 可以 在选择的 E-DCH上向基站发送冲突检测请求。 在另一种实施场景下, 基 站可以向用户设备发送第二广播消息, 在第二广播消息中携带用户设备所 在小区内的公共 E-DCH资源信息以及 E-RNTI列表。 用户设备确定第一 RNTI标识在用户设备接入的小区中对应的 E-RNTI标识后,可以在 E-DCH 上向基站发送携带 E-RNTI标识的冲突检测请求。
502、 基站判断 E-DCH是否被用户设备以外的其他用户设备占用。 基站接收到用户设备通过 E-DCH发送的冲突检测请求后, 可以判断 该 E-DCH是否被其他的用户设备占用, 若该 E-DCH未被其他的用户设备 占用, 则基站可以向该用户设备发送针对该用户设备的确认消息; 若该 E-DCH被其他的用户设备占用, 则基站可以将占用该 E-DCH的其他用户 设备的确认消息发送给该用户设备。
503、 基站根据判断结果向用户设备发送确认消息, 确认消息中携带 绝对授权 AG信息和循环冗余 CRC校验码, 以使用户设备根据第一 RNTI 标识、 AG信息和 CRC校验码确定 E-DCH是否为可用资源。
若基站判断用户设备选择的 E-DCH未被其他的用户设备占用时, 在 第一种实施场景下, 基站可以采用第一 RNTI标识中的第一定义位对循环 冗余 CRC校验码进行加掩, 将第二定义位确定为绝对授权 AG信息, 将 包括 AG信息和加掩后的 CRC校验码的确认消息发送给用户设备。
在第二种实施场景下, 基站可以采用第一 RNTI对由 AG信息和 CRC 校验码组成的序列进行加掩, 将加掩后的由 AG信息和 CRC校验码组成 的序列发送给用户设备。
在第三种实施场景下, 基站可以根据 AG信息生成 CRC校验码, 基 站生成的 CRC校验码的位数与第一 RNTI的位数相同,基站采用第一 RNTI 对 CRC校验码进行加掩, 将加掩后的 CRC校验码发送给用户设备。
在第四种实施场景下, 基站可以采用用户设备发送的冲突检测请求中 的 E-RNTI标识对 CRC校验码进行加掩,将包括 AG信息和加掩后的 CRC 校验码的确认消息发送给用户设备。
若基站判断 E-DCH 被其他的用户设备占用时, 基站可以将占用该 E-DCH 的其他用户设备的确认消息发送给该用户设备。 若用户设备采用 E-RNTI标识对该确认消息中的 CRC校验码进行解掩, 则解掩不成功, 用 户设备确认该 E-DCH被其他的用户设备占用, 该 E-DCH不是可用资源。
本发明实施例提供的用户设备冲突检测方法中, 基站通过接收用户设 备在 E-DCH上发送的冲突检测请求, 该冲突检测请求中携带用户设备对 应的第一 RNTI,判断该 E-DCH是否被用户设备以外的其他用户设备占用, 根据判断结果向用户设备发送确认消息, 以使用户设备根据第一 RNTI和 携带 AG信息和 CRC校验码的确认消息, 判断 E-DCH是否为可用资源, 以使用户设备在切换小区后进行冲突检测时, 无需更新第一 RNTI, 从而 减少冲突检测时的网络资源浪费, 缩短冲突检测时延。 图 6为本发明提供的用户设备冲突检测方法另一个实施例的流程图, 如图 6所示。 本实施例中, 具体实施场景为基站向用户设备广播用户设备 所在小区内的公共 E-DCH资源信息, 该方法包括:
601、 基站向用户设备发送第一广播消息, 第一广播消息中携带用户 设备所在小区内的公共 E-DCH资源信息。
当用户设备转入 URA-PCH状态, 进入 UTRAN注册区 URA内时, RNC可以为用户设备分配第一 RNTI标识, 并将用户设备所在小区的公共 E-DCH资源信息广播给用户设备。 其中, 第一 RNTI标识是由无线网络控 制器 RNC对 E-RNTI资源池中的 E-RNTI标识扩展得到的。 另外, 当用户 设备在 UTRAN注册区 URA内进行小区切换时, 基站可以将用户设备目 前所在小区的公共 E-DCH资源信息广播给用户设备。
602、用户设备根据第一广播消息中携带的公共 E-DCH资源信息选择 E-DCH。
当用户设备需要向基站传输数据或者接收基站传输的数据时, 用户设 备从公共 E-DCH资源信息中选择一个 E-DCH资源信息, 以使基站根据该 E-DCH资源信息, 将对应的 E-DCH资源分配给用户设备。
603、 用户设备通过选择的 E-DCH向基站发送冲突检测请求, 冲突检 测请求中携带用户设备对应的第一 RNTI标识。
可选的, 第一 RNTI标识可以包括第一定义位和第二定义位。 第一定 义位可以为 16位, 如图 2中的扩展前的 16位 E-RNTI, 第二定义位可以 为 6位, 如图 2中的扩展位。用户设备可以以 MAC包的形式将第一 RNTI 标识发送给基站, MAC包头携带第一 RNTI信息。 另外, MAC包头中还 可以携带指示信息。 基站可以根据指示信息来确定 MAC包中是否携带第 一 RNTI信息。 例如, 当 MAC包头中的指示信息的值为 1时, 说明 MAC 包中携带第一 RNTI信息; 当 MAC包头中的指示信息的值为 0时, 说明 MAC包中没有携带第一 RNTI信息。 可选的, 指示信息可以位于 MAC包 的逻辑信道标识中。
604、 基站接收到用户设备发送的冲突检测请求后, 判断该 E-DCH是 否被其他用户设备占用。
605、 基站根据判断结果向用户设备发送确认信息, 确认消息中携带 绝对授权 AG信息和循环冗余 CRC校验码, 以使用户设备根据第一 RNTI 标识、 AG信息和 CRC校验码确定 E-DCH是否为可用资源。
在第一种实施场景下, 当基站判断得知该 E-DCH没有被其他用户设 备占用时,基站采用第一 RNTI标识中的第一定义位对 CRC校验码进行加 掩, 将第一 RNTI标识中的第二定义位的值确定为 AG信息, 将包括 AG 信息和加掩后的 CRC校验码的确认消息发送给用户设备。
当基站判断得知该 E-DCH被其他用户设备占用时, 基站采用其他用 户设备对应的第一 RNTI标识中的第一定义位对 CRC校验码进行加掩,将 其他用户设备对应的第一 RNTI标识中的第二定义位的值确定为 AG信息, 将与其他设备对应的包括 AG信息和加掩后的 CRC校验码的确认消息发 送给用户设备。
在第二种实施场景下, 当基站判断得知该 E-DCH未被其他的用户设 备占用时, 基站还可以根据用户设备的冲突检测请求中的第一 RNTI, 对 由 AG信息和 CRC校验码组成的序列进行加掩,将加掩后的由 AG信息和 CRC校验码组成的序列发送给用户设备。
在第三种实施场景下, 当基站判断得知该 E-DCH未被其他的用户设 备占用时, 基站还可以根据 AG信息生成 CRC校验码, 其中, 基站生成 的 CRC校验码的位数与第一 RNTI的位数相同, 基站采用第一 RNTI对 CRC校验码进行加掩, 将加掩后的 CRC校验码发送给用户设备。
606、 用户设备根据第一 RNTI 标识、 AG 信息和 CRC 校验码确定 E-DCH是否为可用资源。
在第一种实施场景下, 当基站采用第一定义位对 CRC校验码进行加 掩,将第二定义位确定为 AG信息,将包含 AG信息和加掩后的 CRC校验 码的确认消息发送给用户设备后, 用户设备可以采用第一 RNTI标识中的 第一定义位对确认消息中的加掩后的 CRC校验码进行解掩, 对解掩后的 CRC校验码进行校验, 若校验成功, 则用户设备判断第一 RNTI标识中的 第二定义位是否包含在 AG信息中, 若第二定义位包含在 AG信息中, 则 用户设备确定 E-DCH为可用资源。
在第二种实施场景下,当基站采用第一 RNTI对由 AG信息和 CRC校 验码组成的序列进行加掩, 将加掩后的由 AG信息和 CRC校验码组成的 序列发送给用户设备后, 用户设备可以采用第一 RNTI标识对由 AG信息 和 CRC校验码组成的序列进行解掩; 若 CRC校验码校验成功, 则用户设 备确定 E-DCH为可用资源, 并将该 E-DCH作为自己的专用资源。
在第三种实施场景下, 当基站根据 AG信息生成 CRC校验码, 基站 生成的 CRC校验码的位数与第一 RNTI的位数相同, 基站采用第一 RNTI 对 CRC校验码进行加掩, 将加掩后的 CRC校验码发送给用户设备后, 用 户设备可以采用第一 RNTI标识对应的 E-RNTI标识对加掩后的 CRC校验 码进行解掩, 进行 CRC校验, 若校验成功, 将该 E-DCH作为自己的专用 资源, 以使用户设备可以通过该 E-DCH 向基站传输数据, 或者接收基站 传输的数据。
本发明实施例提供的用户设备冲突检测方法中, 用户设备通过在 E-DCH上向基站发送冲突检测请求,该冲突检测请求中携带用户设备对应 的第一 RNTI, 基站判断该 E-DCH是否被其他用户设备占用, 若判断得知 该 E-DCH未被其他用户设备占用, 则包含 CRC校验码和 AG信息的确认 消息发送给用户设备, 以使用户设备根据第一 RNTI 和确认消息, 判断 E-DCH是否为可用资源, 以使用户设备在切换小区后进行冲突检测时, 无 需更新第一 RNTI, 从而减少冲突检测时的网络资源浪费, 缩短冲突检测 时延。 图 7为本发明提供的用户设备冲突检测方法再一个实施例的流程图, 如图 7所示。 本实施例中, 具体实施场景为基站向用户设备广播用户设备 所在小区内的公共 E-DCH资源信息以及 E-RNTI列表, 该方法包括:
701、 基站向用户设备发送第二广播消息, 第二广播消息中携带用户 设备所在小区内的公共 E-DCH资源信息以及 E-RNTI列表。
702、用户设备根据第二广播消息中携带的公共 E-DCH资源信息以及 E-RNTI列表, 确定第一 RNTI标识对应的 E-RNTI标识。
当用户设备需要向基站传输数据或者接收基站传输的数据时, 用户设 备可以以第一 RNTI标识作为被除数, 以 E-RNTI列表中的 E-RNTI的个 数作为除数, 获取对应的余数, 将 E-RNTI列表中序列号为余数的 E-RNTI 标识, 作为与第一 RNTI标识对应的 E-RNTI标识。
703、用户设备根据公共 E-DCH资源中选择一个 E-DCH,在该 E-DCH 上向基站发送冲突检测请求, 冲突检测请求中携带 E-RNTI标识。
704、 基站接收到用户设备发送的冲突检测请求后, 判断该 E-DCH是 否被其他用户设备占用。
705、 基站根据判断结果向用户设备发送确认信息, 确认消息中携带 AG信息和 CRC校验码。 当基站判断得知该 E-DCH没有被其他用户设备占用时, 基站采用第 一 RNTI标识对应的 E-RNTI标识对 CRC校验码进行加掩, 将包括 AG信 息和加掩后的 CRC校验码的确认消息发送给用户设备。
当基站判断得知该 E-DCH被其他用户设备占用时, 基站采用其他用 户设备的第一 RNTI标识对应的 E-RNTI标识对 CRC校验码进行加掩, 将 针对其他用户设备的包括 AG信息和加掩后的 CRC校验码的确认消息发 送给用户设备。
706、 用户设备根据第一 RNTI 标识、 AG 信息和 CRC 校验码确定 E-DCH是否为可用资源。
用户设备可以采用第一 RNTI标识对应的 E-RNTI标识对确认消息中 的 CRC校验码进行解掩, 对解掩得到的 CRC校验码进行校验, 若校验成 功, 则用户设备确定 E-DCH为可用资源。
本发明实施例提供的用户设备冲突检测方法中, 用户设备通过在 E-DCH上向基站发送冲突检测请求,该冲突检测请求中携带用户设备对应 的第一 RNTI, 基站判断该 E-DCH是否被其他用户设备占用, 若判断得知 该 E-DCH未被其他用户设备占用, 则将携带 AG信息和 CRC校验码的确 认消息发送给用户设备, 用户设备根据第一 RNTI对应的 E-RNTI标识和 确认消息, 判断 E-DCH是否为可用资源, 以使用户设备在切换小区后进 行冲突检测时, 无需更新第一 RNTI, 从而减少冲突检测时的网络资源浪 费, 缩短冲突检测时延。
本领域普通技术人员可以理解: 实现上述各方法实施例的全部或部分 步骤可以通过程序指令相关的硬件来完成。 前述的程序可以存储于一计算 机可读取存储介质中。 该程序在执行时, 执行包括上述各方法实施例的步 骤; 而前述的存储介质包括: ROM、 RAM, 磁碟或者光盘等各种可以存 储程序代码的介质。 图 8为本发明提供的用户设备一个实施例的结构示意图,如图 8所示, 包括:
发送模块 81, 用于在增强上行专用数据信道 E-DCH上向基站发送冲 突检测请求, 冲突检测请求中携带用户设备对应的第一临时无线网络标识 RNTI, 以使基站检测 E-DCH是否被用户设备以外的其他用户设备占用; 在第一种实施场景下, 发送模块 81在增强上行专用数据信道 E-DCH 上向基站发送冲突检测请求之前, 接收模块 82接收基站发送的第一广播 消息, 第一广播消息中携带用户设备所在小区内的公共 E-DCH资源信息, 用户设备可以根据公共 E-DCH 资源信息选择用于发送冲突检测请求的 E-DCH。
在第二种实施场景下, 发送模块 81在增强上行专用数据信道 E-DCH 上向基站发送冲突检测请求之前, 接收模块 82接收基站发送的第二广播 消息, 第二广播消息中携带用户设备接入的小区的公共 E-DCH资源信息 以及 E-RNTI列表, 用户设备根据第一 RNTI标识确定在所接入的小区中 对应的 E-RNTI标识后,通过 E-DCH向基站发送携带 E-RNTI标识的冲突 检测请求。
进一步地, 在第二种实施场景下, 确定模块 83还用于, 将第一 RNTI 的值作为被除数, 将 E-RNTI列表中 E-RNTI的个数作为除数, 获取对应 的余数, 并获取 E-RNTI列表中序列号为余数的 E-RNTI。
接收模块 82, 用于接收基站发送的确认消息, 确认消息中携带 AG信 息和 CRC校验码;
确定模块 83, 用于根据第一 RNTI标识和、 AG信息和 CRC校验码确 定 E-DCH是否为可用资源。
在第一种实施场景下,第一 RNTI标识包括第一定义位和第二定义位, 用户设备还可以包括: 第一解掩模块 84, 如图 9所示, 用于采用第一定义 位对确认消息中的 CRC校验码进行解掩, 对解掩后的 CRC校验码进行校 验, 若校验成功, 且第二定义位包含在 AG信息中, 确定模块 83具体用 于, 确定 E-DCH为可用资源。
在第二种实施场景下, 用户设备还可以包括: 第二解掩模块 85, 如图
10所示, 用于采用第一 RNTI标识对由 AG信息和 CRC校验码组成的序 列进行解掩; 若 CRC校验码校验成功, 则用户设备确定 E-DCH为可用资 源, 并将该 E-DCH作为自己的专用资源。
在第三种实施场景下, 用户设备还可以包括: 第三解掩模块 86, 如图 11所示, 用于采用第一 RNTI标识对 CRC校验码进行解掩; 若 CRC校验 码校验成功, 则用户设备确定所述 E-DCH为可用资源, 并将该 E-DCH作 为自己的专用资源。
在另一种实施场景下, 用户设备还可以包括: 第四解掩模块 87, 如图 12所示,用于采用第一 RNTI标识在用户设备接入的小区中对应的 E-RNTI 标识对确认消息中的 CRC校验码进行解掩, 确定模块 83具体用于, 对解 掩后的 CRC校验码进行校验, 若校验成功, 确定 E-DCH为可用资源。
另外, 确定模块 83确定 E-DCH为可用资源后, 可以采用 E-DCH对 应的 E-RNTI标识与基站进行数据传输。
本发明实施例中, 用户设备通过在 E-DCH上向基站发送冲突检测请 求, 该冲突检测请求中携带用户设备对应的第一 RNTI, 接收基站发送的 确认消息, 并根据第一 RNTI和确认消息, 判断 E-DCH是否为可用资源, 以使用户设备在切换小区后进行冲突检测时, 无需更新第一 RNTI, 从而 减少冲突检测时的网络资源浪费, 缩短冲突检测时延。 图 13为本发明提供的基站一个实施例的结构示意图, 如图 13所示, 包括:
接收模块 131,用于接收用户设备在增强上行专用数据信道 E-DCH上 发送的冲突检测请求, 冲突检测请求中携带用户设备对应的第一临时无线 网络标识 RNTI;
在一种实施场景下, 接收模块 131接收用户设备在增强上行专用数据 信道 E-DCH上发送的冲突检测请求之前, 发送模块 133还用于, 向用户 设备发送第一广播消息, 第一广播消息中携带用户设备所在小区内的公共 E-DCH资源信息, 以使用户设备根据公共 E-DCH资源信息选择用于发送 冲突检测请求的 E-DCH。
在另一种实施场景下, 接收模块 131接收用户设备在增强上行专用数 据信道 E-DCH上发送的冲突检测请求之前, 发送模块 133还用于, 向用 户设备发送第二广播消息, 第二广播消息中携带用户设备接入的小区的公 共 E-DCH资源信息以及 E-RNTI列表,以使用户设备确定要发送冲突检测 请求的 E-DCH, 以及确定第一 RNTI标识在用户设备接入的小区中对应的 E-RNTI标识, 并通过 E-DCH向基站发送携带 E-RNTI标识的冲突检测请 求。
判断模块 132,用于判断 E-DCH是否被用户设备以外的其他用户设备 占用;
发送模块 133, 用于根据判断结果向用户设备发送确认消息, 确认消 息中携带 AG信息和 CRC校验码, 以使用户设备根据第一 RNTI标识、 AG信息和 CRC校验码确定 E-DCH是否为可用资源。
在第一种实施场景下,第一 RNTI标识包括第一定义位和第二定义位, 基站还包括第一加掩模块 134和第一确定模块 135, 如图 14所示, 发送模 块 133向用户设备发送确认消息之前, 第一加掩模块 134采用第一定义位 对循环冗余 CRC校验码进行加掩, 第一确定模块 135用于将第二定义位 确定为绝对授权 AG信息,得到包括 AG信息和加掩后的 CRC校验码的确 认消息。
在第二种实施场景下, 基站还包括第二加掩模块 136, 如图 15所示, 发送模块 133向用户设备发送确认消息之前, 第二加掩模块 136采用第一 RNTI对由 AG信息和 CRC校验码组成的序列进行加掩, 将加掩后的由 AG信息和 CRC校验码组成的序列发送给用户设备。
在第三种实施场景下, 基站还包括第三加掩模块 137, 如图 16所示, 发送模块 133向用户设备发送确认消息之前, 第三加掩模块 137采用第一 RNTI对 CRC校验码进行加掩, 将加掩后的 CRC校验码发送给用户设备。
在另一第四种实施场景下, 基站还包括第四加掩模块 138, 如图 17 所示, 发送模块 133向用户设备发送确认消息之前, 第四加掩模块 138用 于, 采用第一 RNTI标识在用户设备接入的小区中对应的 E-RNTI标识对 CRC校验码进行加掩。发送模块 133向用户设备发送确认消息后, 用户设 备可以根据第一 RNTI标识对应的 E-RNTI标识,以及携带 AG信息和 CRC 校验码的确认消息, 确定 E-DCH是否为可用资源。
本发明实施例中, 基站接收用户设备在 E-DCH上发送的冲突检测请 求, 该冲突检测请求中携带用户设备对应的第一 RNTI, 判断该 E-DCH是 否被用户设备以外的其他用户设备占用, 根据判断结果向用户设备发送确 认消息, 以使用户设备根据第一 RNTI和确认消息, 判断 E-DCH是否为 可用资源, 以使用户设备在切换小区后进行冲突检测时, 无需更新第一 RNTI, 从而减少冲突检测时的网络资源浪费, 缩短冲突检测时延。 图 18为本发明提供的用户设备一个实施例的结构示意图, 如图 18所 示, 包括:
发送器 181,用于在增强上行专用数据信道 E-DCH上向基站发送冲突 检测请求, 冲突检测请求中携带用户设备对应的第一临时无线网络标识 RNTI, 以使基站检测 E-DCH是否被用户设备以外的其他用户设备占用; 在第一种实施场景下, 发送器 181 在增强上行专用数据信道 E-DCH 上向基站发送冲突检测请求之前, 接收器 182接收基站发送的第一广播消 息, 第一广播消息中携带用户设备所在小区内的公共 E-DCH资源信息, 用户设备可以根据公共 E-DCH 资源信息选择用于发送冲突检测请求的 E-DCH。
在第二种实施场景下, 发送器 181 在增强上行专用数据信道 E-DCH 上向基站发送冲突检测请求之前, 接收器 182接收基站发送的第二广播消 息, 第二广播消息中携带用户设备接入的小区的公共 E-DCH资源信息以 及 E-RNTI列表, 用户设备根据第一 RNTI标识确定在所接入的小区中对 应的 E-RNTI标识后,通过 E-DCH向基站发送携带 E-RNTI标识的冲突检 测请求。
进一步地, 在第二种实施场景下, 处理器 183还用于, 将第一 RNTI 的值作为被除数, 将 E-RNTI列表中 E-RNTI的个数作为除数, 获取对应 的余数, 并获取 E-RNTI列表中序列号为余数的 E-RNTI。
接收器 182, 用于接收基站发送的确认消息, 确认消息中携带 AG信 息和 CRC校验码;
处理器 183, 用于根据第一 RNTI标识、 AG信息和 CRC校验码确定 E-DCH是否为可用资源。
可选的, 在第一种实施场景下, 第一 RNTI标识包括第一定义位和第 二定义位, 处理器 183, 还用于采用第一定义位对 CRC校验码进行解掩, 对解掩后的 CRC校验码进行校验, 若校验成功, 且第二定义位包含在 AG 信息中, 处理器 183具体用于, 确定 E-DCH为可用资源。
可选的, 在第二种实施场景下, 处理器 183, 还用于采用第一 RNTI 标识对由 AG信息和 CRC校验码组成的序列进行解掩; 若 CRC校验码校 验成功, 则用户设备确定 E-DCH为可用资源。
可选的, 在第三种实施场景下, 处理器 183, 还用于采用第一 RNTI 标识对 CRC校验码进行解掩; 若 CRC校验码校验成功, 则用户设备确定 所述 E-DCH为可用资源, 并将该 E-DCH作为自己的专用资源。
在第四种实施场景下, 处理器 183, 还用于采用第一 RNTI标识在用 户设备接入的小区中对应的 E-RNTI标识对确认消息中的 CRC校验码进行 解掩, 若 CRC校验码校验成功, 处理器 183具体还用于, 确定 E-DCH为 可用资源。
另外, 处理器 183确定 E-DCH为可用资源后, 可以采用 E-DCH对应 的 E-RNTI标识与基站进行数据传输。
本发明实施例中, 用户设备通过在 E-DCH上向基站发送冲突检测请 求, 该冲突检测请求中携带用户设备对应的第一 RNTI, 接收基站发送的 确认消息, 并根据第一 RNTI和确认消息, 判断 E-DCH是否为可用资源, 以使用户设备在切换小区后进行冲突检测时, 无需更新第一 RNTI, 从而 减少冲突检测时的网络资源浪费, 缩短冲突检测时延。 图 19为本发明提供的基站一个实施例的结构示意图, 如图 19所示, 包括:
接收器 191,用于接收用户设备在增强上行专用数据信道 E-DCH上发 送的冲突检测请求, 冲突检测请求中携带用户设备对应的第一临时无线网 络标识 RNTI;
在一种实施场景下, 接收器 191接收用户设备在增强上行专用数据信 道 E-DCH上发送的冲突检测请求之前, 发送器 193还用于, 向用户设备 发送第一广播消息, 第一广播消息中携带用户设备所在小区内的公共 E-DCH资源信息, 以使用户设备根据公共 E-DCH资源信息选择用于发送 冲突检测请求的 E-DCH。
在另一种实施场景下, 接收器 191接收用户设备在增强上行专用数据 信道 E-DCH上发送的冲突检测请求之前, 发送器 193还用于, 向用户设 备发送第二广播消息, 第二广播消息中携带用户设备接入的小区的公共 E-DCH资源信息以及 E-RNTI列表, 以使用户设备确定要发送冲突检测请 求的 E-DCH, 以及确定第一 RNTI 标识在用户设备接入的小区中对应的 E-RNTI标识, 并通过 E-DCH向基站发送携带 E-RNTI标识的冲突检测请 求。
处理器 192,用于判断 E-DCH是否被用户设备以外的其他用户设备占 用;
发送器 193, 用于根据判断结果向用户设备发送确认消息, 确认消息 中携带 AG信息和 CRC校验码, 以使用户设备根据第一 RNTI标识、 AG 信息和 CRC校验码确定 E-DCH是否为可用资源。
在第一种实施场景下,第一 RNTI标识包括第一定义位和第二定义位, 发送器 193根据判断结果向用户设备发送确认消息之前, 处理器 192还用 于采用第一定义位对循环冗余 CRC校验码进行加掩, 用于将第二定义位 确定为绝对授权 AG信息,得到包括 AG信息和加掩后的 CRC校验码的确 认消息。
在第二种实施场景下, 发送器 193根据判断结果向用户设备发送确认 消息之前,处理器 192还用于采用第一 RNTI对由 AG信息和 CRC校验码 组成的序列进行加掩, 将加掩后的由 AG信息和 CRC校验码组成的序列 发送给用户设备。
在第三种实施场景下, 发送器 193根据判断结果向用户设备发送确认 消息之前, 处理器 192还用于采用第一 RNTI对 CRC校验码进行加掩,将 加掩后的 CRC校验码发送给用户设备。
在第四种实施场景下, 发送器 193根据判断结果向用户设备发送确认 消息之前, 处理器 192还用于, 采用第一 RNTI标识在用户设备接入的小 区中对应的 E-RNTI标识对 CRC校验码进行加掩。发送器 193向用户设备 发送确认消息后,用户设备可以根据第一 RNTI标识对应的 E-RNTI标识, 以及携带 AG信息和 CRC校验码的确认消息, 确定 E-DCH是否为可用资 源。
本发明实施例中, 基站接收用户设备在 E-DCH上发送的冲突检测请 求, 该冲突检测请求中携带用户设备对应的第一 RNTI, 判断该 E-DCH是 否被用户设备以外的其他用户设备占用, 根据判断结果向用户设备发送确 认消息, 以使用户设备根据第一 RNTI和确认消息, 判断 E-DCH是否为 可用资源, 以使用户设备在切换小区后进行冲突检测时, 无需更新第一 RNTI, 从而减少冲突检测时的网络资源浪费, 缩短冲突检测时延。
所属领域的技术人员可以清楚地了解到, 为描述的方便和简洁, 仅以 上述各功能模块的划分进行举例说明, 实际应用中, 可以根据需要而将上 述功能分配由不同的功能模块完成, 即将装置的内部结构划分成不同的功 能模块, 以完成以上描述的全部或者部分功能。 上述描述的系统, 装置和 单元的具体工作过程, 可以参考前述方法实施例中的对应过程, 在此不再 赘述。
在本申请所提供的几个实施例中, 应该理解到, 所揭露的系统, 装置 和方法, 可以通过其它的方式实现。 例如, 以上所描述的装置实施例仅仅 是示意性的, 例如, 所述模块或单元的划分, 仅仅为一种逻辑功能划分, 实际实现时可以有另外的划分方式, 例如多个单元或组件可以结合或者可 以集成到另一个系统, 或一些特征可以忽略, 或不执行。 另一点, 所显示 或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口, 装 置或单元的间接耦合或通信连接, 可以是电性, 机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的, 作为单元显示的部件可以是或者也可以不是物理单元, 即可以位于一个地 方, 或者也可以分布到多个网络单元上。 可以根据实际的需要选择其中的 部分或者全部单元来实现本实施例方案的目的。
另外, 在本申请各个实施例中的各功能单元可以集成在一个处理单元 中, 也可以是各个单元单独物理存在, 也可以两个或两个以上单元集成在 一个单元中。 上述集成的单元既可以采用硬件的形式实现, 也可以采用软 件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品 销售或使用时, 可以存储在一个计算机可读取存储介质中。 基于这样的理 解, 本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技 术方案的全部或部分可以以软件产品的形式体现出来, 该计算机软件产品 存储在一个存储介质中, 包括若干指令用以使得一台计算机设备 (可以是 个人计算机, 服务器, 或者网络设备等) 或处理器 (processor) 执行本申 请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括: u盘、 移动硬盘、 只读存储器 (ROM , Read-Only Memory ) 、 随机存取存储器 ( RAM, Random Access Memory ) 、 磁碟或者光盘等各种可以存储程序 代码的介质。
以上所述, 以上实施例仅用以对本申请的技术方案进行了详细介绍, 但以上实施例的说明只是用于帮助理解本发明的方法及其核心思想, 不应 理解为对本发明的限制。本技术领域的技术人员在本发明揭露的技术范围 内, 可轻易想到的变化或替换, 都应涵盖在本发明的保护范围之内。

Claims

权 利 要 求 书
1、 一种用户设备冲突检测方法, 其特征在于, 包括:
用户设备在增强上行专用数据信道 E-DCH上向基站发送冲突检测请 求, 所述冲突检测请求中携带所述用户设备对应的第一临时无线网络标识 RNTI, 以使所述基站检测所述 E-DCH是否被所述用户设备以外的其他用 户设备占用;
所述用户设备接收所述基站发送的确认消息, 所述确认消息中携带绝 对授权 AG信息和循环冗余 CRC校验码;
所述用户设备根据所述第一 RNTI标识、所述 AG信息和所述 CRC校 验码确定所述 E-DCH是否为可用资源。
2、 根据权利要求 1所述的方法, 其特征在于, 所述第一 RNTI标识包 括第一定义位和第二定义位;
所述用户设备根据所述第一 RNTI标识、所述 AG信息和所述 CRC校 验码确定所述 E-DCH是否为可用资源, 包括:
所述用户设备采用所述第一定义位对所述 CRC校验码进行解掩; 若 CRC校验码校验成功, 且所述第二定义位包含在所述 AG信息中, 则所述用户设备确定所述 E-DCH为可用资源。
3、 根据权利要求 1 所述的方法, 其特征在于, 所述用户设备根据所 述第一 RNTI标识、 所述 AG信息和所述 CRC校验码确定所述 E-DCH是 否为可用资源, 包括:
所述用户设备采用所述第一 RNTI标识对由所述 AG信息和所述 CRC 校验码组成的序列进行解掩;
若 CRC校验码校验成功, 则所述用户设备确定所述 E-DCH为可用资 源。
4、 根据权利要求 1 所述的方法, 其特征在于, 所述用户设备根据所 述第一 RNTI标识、 所述 AG信息和所述 CRC校验码确定所述 E-DCH是 否为可用资源, 包括:
所述用户设备采用所述第一 RNTI标识对所述 CRC校验码进行解掩; 若 CRC校验码校验成功, 则所述用户设备确定所述 E-DCH为可用资 源。
5、 根据权利要求 1-4任一项所述的方法, 其特征在于, 所述用户设备 在增强上行专用数据信道 E-DCH上向基站发送冲突检测请求之前, 还包 括:
所述用户设备接收所述基站发送的第一广播消息, 所述第一广播消息 中携带公共 E-DCH资源信息, 以使所述用户设备根据所述公共 E-DCH资 源信息选择用于发送第一 RNTI的 E-DCH。
6、 根据权利要求 1 所述的方法, 其特征在于, 所述用户设备在增强 上行专用数据信道 E-DCH上向基站发送冲突检测请求, 具体包括:
所述用户设备确定所述第一 RNTI标识在所述用户设备接入的小区中 对应的 E-RNTI标识;
所述用户设备在 E-DCH上向基站发送携带所述 E-RNTI标识的冲突检 测请求。
7、 根据权利要求 6所述的方法, 其特征在于, 所述用户设备根据所 述第一 RNTI标识、 所述 AG信息和所述 CRC校验码确定所述 E-DCH是 否为可用资源, 包括:
所述用户设备采用第一 RNTI对应的所述 E-RNTI标识对所述 CRC校 验码进行解掩;
若所述 CRC校验码校验成功, 则所述用户设备确定所述 E-DCH为可 用资源。
8、 根据权利要求 6或 7所述的方法, 其特征在于, 所述用户设备在 增强上行专用数据信道 E-DCH上向基站发送冲突检测请求之前, 还包括: 所述用户设备接收所述基站发送的第二广播消息, 所述第二广播消息 中携带公共 E-DCH资源信息, 以使所述用户设备根据所述公共 E-DCH资 源信息选择用于发送所述 E-RNTI标识的 E-DCH, 所述第二广播消息中还 携带所述用户设备接入的小区的 E-RNTI列表。
9、 根据权利要求 6-8任一项所述的方法, 其特征在于, 所述用户设备 确定所述第一 RNTI标识在所述用户设备接入的小区中对应的 E-RNTI标 识, 包括:
所述用户设备将所述第一 RNTI的值作为被除数, 将所述 E-RNTI列 表中 E-RNTI的个数作为除数, 获取对应的余数, 并获取所述 E-RNTI列 表中序列号为所述余数的 E-RNTI。
10、 根据权利要求 1-9任一项所述的方法, 其特征在于, 所述第一广 播消息或第二广播消息中还可以携带公共 E-DCH资源信息对应的 E-RNTI 标识;
所述用户设备确定所述 E-DCH为可用资源后,采用所述 E-DCH对应 的 E-RNTI标识与基站进行数据传输。
11、 一种用户设备冲突检测方法, 其特征在于, 包括:
基站接收用户设备在增强上行专用数据信道 E-DCH上发送的冲突检 测请求, 所述冲突检测请求中携带所述用户设备对应的第一临时无线网络 标识 RNTI;
所述基站判断所述 E-DCH是否被所述用户设备以外的其他用户设备 占用;
所述基站根据所述判断结果向所述用户设备发送确认消息, 所述确认 消息中携带绝对授权 AG信息和循环冗余 CRC校验码, 以使所述用户设 备根据所述第一 RNTI标识、 所述 AG信息和所述 CRC校验码确定所述 E-DCH是否为可用资源。
12、 根据权利要求 11所述的方法, 其特征在于, 所述第一 RNTI标识 包括第一定义位和第二定义位;
所述基站根据所述判断结果向所述用户设备发送确认消息之前, 还包 括:
所述基站采用所述第一定义位对所述 CRC校验码进行加掩; 所述基站将所述第二定义位确定为所述 AG信息。
13、 根据权利要求 11 所述的方法, 其特征在于, 所述基站根据所述 判断结果向所述用户设备发送确认消息之前, 还包括:
所述基站采用所述第一 RNTI标识对由所述 AG信息和所述 CRC校验 码组成的序列进行加掩。
14、 根据权利要求 11 所述的方法, 其特征在于, 所述基站根据所述 判断结果向所述用户设备发送确认消息之前, 还包括:
所述基站采用所述第一 RNTI标识对 CRC校验码进行加掩。
15、 根据权利要求 11-14任一项所述的方法, 其特征在于, 所述基站 接收用户设备在增强上行专用数据信道 E-DCH上发送的冲突检测请求之 前, 还包括 Γ
所述基站向所述用户设备发送第一广播消息, 所述第一广播消息中携 带公共 E-DCH资源信息, 以使所述用户设备根据所述公共 E-DCH资源信 息选择用于发送第一 RNTI的 E-DCH。
16、 根据权利要求 11 所述的方法, 其特征在于, 若所述冲突检测请 求中携带所述第一 RNTI 标识在所述用户设备接入的小区中对应的 E-RNTI 标识, 则所述基站根据所述判断结果向所述用户设备发送确认消 息之前, 还包括:
所述基站采用所述 E-RNTI标识对所述 CRC校验码进行加掩。
17、 根据权利要求 16所述的方法, 其特征在于, 所述基站接收用户 设备在增强上行专用数据信道 E-DCH上发送的冲突检测请求之前, 还包 括:
所述基站向所述用户设备发送第二广播消息, 所述第二广播消息中携 带公共 E-DCH资源信息, 以使所述用户设备根据所述公共 E-DCH资源信 息选择用于发送冲突检测请求的 E-DCH,所述第二广播消息中还携带所述 用户设备接入的小区的 E-RNTI列表。
18、 一种用户设备, 其特征在于, 包括:
发送模块, 用于在增强上行专用数据信道 E-DCH上向基站发送冲突 检测请求, 所述冲突检测请求中携带所述用户设备对应的第一临时无线网 络标识 RNTI, 以使所述基站检测所述 E-DCH是否被所述用户设备以外的 其他用户设备占用;
接收模块, 用于接收所述基站发送的确认消息, 所述确认消息中携带 绝对授权 AG信息和循环冗余 CRC校验码;
确定模块, 用于根据所述第一 RNTI标识、 所述 AG信息和所述 CRC 校验码确定所述 E-DCH是否为可用资源。
19、 根据权利要求 18所述的用户设备, 其特征在于, 所述第一 RNTI 标识包括第一定义位和第二定义位;
所述用户设备还包括: 第一解掩模块, 用于采用所述第一定义位对所 述 CRC校验码进行解掩; 若 CRC校验码校验成功, 且所述第二定义位包含在所述 AG信息中, 所述确定模块具体用于, 确定所述 E-DCH为可用资源。
20、 根据权利要求 18所述的用户设备, 其特征在于, 所述用户设备 还包括: 第二解掩模块, 用于采用所述第一 RNTI标识对由所述 AG信息 和所述 CRC校验码组成的序列进行解掩;
若 CRC校验码校验成功, 所述确定模块具体用于, 确定所述 E-DCH 为可用资源。
21、 根据权利要求 18所述的用户设备, 其特征在于, 所述用户设备 还包括: 第三解掩模块,用于采用所述第一 RNTI标识对所述 CRC校验码 进行解掩;
若 CRC校验码校验成功, 所述确定模块具体用于, 确定所述 E-DCH 为可用资源。
22、 根据权利要求 18-21任一项所述的用户设备, 其特征在于, 所述 发送模块在增强上行专用数据信道 E-DCH上向基站发送冲突检测请求之 前, 所述接收模块还用于, 接收所述基站发送的第一广播消息, 所述第一 广播消息中携带公共 E-DCH资源信息, 以使所述用户设备根据所述公共 E-DCH资源信息选择用于发送第一 RNTI的 E-DCH。
23、 根据权利要求 18所述的用户设备, 其特征在于, 所述确定模块 还用于, 确定所述第一 RNTI 标识在所述用户设备接入的小区中对应的 E-RNTI标识;
所述发送模块具体用于, 在所述 E-DCH 上向基站发送携带所述 E-RNTI标识的冲突检测请求。
24、 根据权利要求 23 所述的用户设备, 其特征在于, 所述用户设备 还包括: 第四解掩模块, 用于采用所述 E-RNTI标识对所述 CRC校验码进 行解掩;
若所述 CRC 校验码校验成功, 所述确定模块具体用于, 确定所述 E-DCH为可用资源。
25、 根据权利要求 23或 24所述的用户设备, 其特征在于, 所述发送 模块在增强上行专用数据信道 E-DCH上向基站发送冲突检测请求之前, 所述接收模块还用于, 接收所述基站发送的第二广播消息, 所述第二广播 消息中携带公共 E-DCH 资源信息, 以使所述用户设备根据所述公共 E-DCH资源信息选择用于发送冲突检测请求的 E-DCH, 所述第二广播消 息中还携带所述用户设备接入的小区的 E-RNTI列表。
26、 根据权利要求 23-25任一项所述的用户设备, 其特征在于, 所述 确定模块具体用于, 将所述第一 RNTI 的值作为被除数, 将所述 E-RNTI 列表中 E-RNTI 的个数作为除数, 获取对应的余数, 并获取所述 E-RNTI 列表中序列号为所述余数的 E-RNTI。
27、 根据权利要求 18-26任一项所述的用户设备, 其特征在于, 所述 第一广播消息或第二广播消息中还可以携带公共 E-DCH资源信息对应的 E-RNTI标识;
所述确定模块确定所述 E-DCH为可用资源后,采用所述 E-DCH对应 的 E-RNTI标识与基站进行数据传输。
28、 一种基站, 其特征在于, 包括:
接收模块, 用于接收用户设备在增强上行专用数据信道 E-DCH上发 送的冲突检测请求, 所述冲突检测请求中携带所述用户设备对应的第一临 时无线网络标识 RNTI;
判断模块, 用于判断所述 E-DCH是否被所述用户设备以外的其他用 户设备占用;
发送模块, 用于根据所述判断结果向所述用户设备发送确认消息, 所 述确认消息中携带绝对授权 AG信息和循环冗余 CRC校验码, 以使所述 用户设备根据所述第一 RNTI标识、所述 AG信息和所述 CRC校验码确定 所述 E-DCH是否为可用资源。
29、 根据权利要求 28所述的基站, 其特征在于, 所述第一 RNTI标识 包括第一定义位和第二定义位;
所述发送模块根据所述判断结果向所述用户设备发送确认消息之前, 所述基站还包括:
第一加掩模块, 用于采用所述第一定义位对所述 CRC校验码进行加 掩;
第一确定模块, 用于将所述第二定义位确定为所述 AG信息。
30、 根据权利要求 28所述的基站, 其特征在于, 所述发送模块根据 所述判断结果向所述用户设备发送确认消息之前, 所述基站还包括: 第二加掩模块, 用于采用所述第一 RNTI标识对由所述 AG信息和所 述 CRC校验码组成的序列进行加掩。
31、 根据权利要求 28所述的基站, 其特征在于, 所述发送模块根据 所述判断结果向所述用户设备发送确认消息之前, 所述基站还包括:
第三加掩模块,用于采用所述第一 RNTI标识对 CRC校验码进行加掩。
32、 根据权利要求 28-31任一项所述的基站, 其特征在于, 所述接收 模块接收用户设备在增强上行专用数据信道 E-DCH上发送的冲突检测请 求之前, 所述发送模块还用于, 向所述用户设备发送第一广播消息, 所述 第一广播消息中携带公共 E-DCH资源信息, 以使所述用户设备根据所述 公共 E-DCH资源信息选择用于发送第一 RNTI的 E-DCH。
33、 根据权利要求 28所述的基站, 其特征在于, 若所述冲突检测请 求中携带所述第一 RNTI 标识在所述用户设备接入的小区中对应的 E-RNTI 标识, 则所述发送模块根据所述判断结果向所述用户设备发送确 认消息之前, 所述基站还包括: 第四加掩模块;
所述第四加掩模块用于,采用所述 E-RNTI标识对所述 CRC校验码进 行加掩。
34、 根据权利要求 33所述的基站, 其特征在于, 所述接收模块接收 用户设备在增强上行专用数据信道 E-DCH上发送的冲突检测请求之前, 所述发送模块还用于, 向所述用户设备发送第二广播消息, 所述第二广播 消息中携带公共 E-DCH 资源信息, 以使所述用户设备根据所述公共 E-DCH资源信息选择用于发送冲突检测请求的 E-DCH, 所述第二广播消 息中还携带所述用户设备接入的小区的 E-RNTI列表。
35、 一种用户设备, 其特征在于, 包括:
发送器, 用于在增强上行专用数据信道 E-DCH上向基站发送冲突检 测请求, 所述冲突检测请求中携带所述用户设备对应的第一临时无线网络 标识 RNTI, 以使所述基站检测所述 E-DCH是否被所述用户设备以外的其 他用户设备占用;
接收器, 用于接收所述基站发送的确认消息, 所述确认消息中携带绝 对授权 AG信息和循环冗余 CRC校验码; 处理器, 用于根据所述第一 RNTI标识、所述 AG信息和所述 CRC校 验码确定所述 E-DCH是否为可用资源。
36、 根据权利要求 35所述的用户设备, 其特征在于, 所述第一 RNTI 标识包括第一定义位和第二定义位;
所述处理器, 还用于采用所述第一定义位对所述 CRC校验码进行解 掩;
若 CRC校验码校验成功, 且所述第二定义位包含在所述 AG信息中, 所述处理器具体用于, 确定所述 E-DCH为可用资源。
37、 根据权利要求 35 所述的用户设备, 其特征在于, 所述处理器, 还用于采用所述第一 RNTI标识对由所述 AG信息和所述 CRC校验码组成 的序列进行解掩;
若 CRC校验码校验成功, 所述处理器具体用于, 确定所述 E-DCH为 可用资源。
38、 根据权利要求 35 所述的用户设备, 其特征在于, 所述处理器, 还用于采用所述第一 RNTI标识对所述 CRC校验码进行解掩;
若 CRC校验码校验成功, 所述处理器具体用于, 确定所述 E-DCH为 可用资源。
39、 根据权利要求 35-38任一项所述的用户设备, 其特征在于, 所述 发送器在增强上行专用数据信道 E-DCH上向基站发送冲突检测请求之前, 所述接收器还用于, 接收所述基站发送的第一广播消息, 所述第一广播消 息中携带公共 E-DCH资源信息, 以使所述用户设备根据所述公共 E-DCH 资源信息选择用于发送第一 RNTI的 E-DCH。
40、 根据权利要求 35 所述的用户设备, 其特征在于, 所述处理器还 用于, 确定所述第一 RNTI 标识在所述用户设备接入的小区中对应的 E-RNTI标识;
所述发送器具体用于, 在所述 E-DCH上向基站发送携带所述 E-RNTI 标识的冲突检测请求。
41、 根据权利要求 40所述的用户设备, 其特征在于, 所述处理器, 还用于采用所述 E-RNTI标识对所述 CRC校验码进行解掩;
若所述 CRC校验码校验成功, 所述处理器还用于确定所述 E-DCH为 可用资源。
42、 根据权利要求 40或 41所述的用户设备, 其特征在于, 所述发送 器在增强上行专用数据信道 E-DCH上向基站发送冲突检测请求之前, 所 述接收器还用于, 接收所述基站发送的第二广播消息, 所述第二广播消息 中携带公共 E-DCH资源信息, 以使所述用户设备根据所述公共 E-DCH资 源信息选择用于发送冲突检测请求的 E-DCH,所述第二广播消息中还携带 所述用户设备接入的小区的 E-RNTI列表。
43、 根据权利要求 40-42任一项所述的用户设备, 其特征在于, 所述 处理器具体用于, 将所述第一 RNTI的值作为被除数, 将所述 E-RNTI列 表中 E-RNTI的个数作为除数, 获取对应的余数, 并获取所述 E-RNTI列 表中序列号为所述余数的 E-RNTI。
44、 根据权利要求 35-43任一项所述的用户设备, 其特征在于, 所述 第一广播消息或第二广播消息中还可以携带公共 E-DCH资源信息对应的 E-RNTI标识;
所述处理器确定所述 E-DCH为可用资源后,采用所述 E-DCH对应的
E-RNTI标识与基站进行数据传输。
45、 一种基站, 其特征在于, 包括:
接收器, 用于接收用户设备在增强上行专用数据信道 E-DCH上发送 的冲突检测请求, 所述冲突检测请求中携带所述用户设备对应的第一临时 无线网络标识 RNTI;
处理器, 用于判断所述 E-DCH是否被所述用户设备以外的其他用户 设备占用;
发送器, 用于根据所述判断结果向所述用户设备发送确认消息, 所述 确认消息中携带绝对授权 AG信息和循环冗余 CRC校验码, 以使所述用 户设备根据所述第一 RNTI标识、所述 AG信息和所述 CRC校验码确定所 述 E-DCH是否为可用资源。
46、 根据权利要求 45所述的基站, 其特征在于, 所述第一 RNTI标识 包括第一定义位和第二定义位;
所述发送器根据所述判断结果向所述用户设备发送确认消息之前, 所 述处理器, 还用于采用所述第一定义位对所述 CRC校验码进行加掩; 用 于将所述第二定义位确定为所述 AG信息。
47、 根据权利要求 45 所述的基站, 其特征在于, 所述发送器根据所 述判断结果向所述用户设备发送确认消息之前, 所述处理器, 还用于采用 所述第一 RNTI标识对由所述 AG信息和所述 CRC校验码组成的序列进行 加掩。
48、 根据权利要求 45 所述的基站, 其特征在于, 所述发送器根据所 述判断结果向所述用户设备发送确认消息之前, 所述处理器, 还用于采用 所述第一 RNTI标识对 CRC校验码进行加掩。
49、 根据权利要求 45-48任一项所述的基站, 其特征在于, 所述接收 器接收用户设备在增强上行专用数据信道 E-DCH上发送的冲突检测请求 之前, 所述发送器还用于, 向所述用户设备发送第一广播消息, 所述第一 广播消息中携带公共 E-DCH资源信息, 以使所述用户设备根据所述公共 E-DCH资源信息选择用于发送第一 RNTI的 E-DCH。
50、 根据权利要求 45 所述的基站, 其特征在于, 若所述冲突检测请 求中携带所述第一 RNTI 标识在所述用户设备接入的小区中对应的
E-RNTI 标识, 则所述发送器根据所述判断结果向所述用户设备发送确认 消息之前, 所述处理器, 还用于采用所述 E-RNTI标识对所述 CRC校验码 进行加掩。
51、 根据权利要求 50所述的基站, 其特征在于, 所述接收器接收用 户设备在增强上行专用数据信道 E-DCH上发送的冲突检测请求之前, 所 述发送器还用于, 向所述用户设备发送第二广播消息, 所述第二广播消息 中携带公共 E-DCH资源信息, 以使所述用户设备根据所述公共 E-DCH资 源信息选择用于发送冲突检测请求的 E-DCH,所述第二广播消息中还携带 所述用户设备接入的小区的 E-RNTI列表。
PCT/CN2013/083816 2013-03-20 2013-09-18 用户设备冲突检测方法、用户设备和基站 WO2014146412A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201380010067.7A CN104604313A (zh) 2013-03-20 2013-09-18 用户设备冲突检测方法、用户设备和基站
EP13879023.3A EP2961232B1 (en) 2013-03-20 2013-09-18 Method for detecting user equipment conflict, user equipment, and base station
US14/859,169 US20160014814A1 (en) 2013-03-20 2015-09-18 User equipment collision detection method, user equipment, and base station

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2013072940 2013-03-20
CNPCT/CN2013/072940 2013-03-20

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/859,169 Continuation US20160014814A1 (en) 2013-03-20 2015-09-18 User equipment collision detection method, user equipment, and base station

Publications (1)

Publication Number Publication Date
WO2014146412A1 true WO2014146412A1 (zh) 2014-09-25

Family

ID=51579317

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/083816 WO2014146412A1 (zh) 2013-03-20 2013-09-18 用户设备冲突检测方法、用户设备和基站

Country Status (4)

Country Link
US (1) US20160014814A1 (zh)
EP (1) EP2961232B1 (zh)
CN (1) CN104363974A (zh)
WO (1) WO2014146412A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109076439B (zh) * 2016-04-21 2021-02-12 瑞典爱立信有限公司 用于管理小区标识的方法、网络节点、设备和计算机可读介质
WO2019084926A1 (zh) * 2017-11-03 2019-05-09 Oppo广东移动通信有限公司 D2d通信中资源池共享的方法、终端设备和网络设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1825989A (zh) * 2005-02-24 2006-08-30 华为技术有限公司 一种实现即按即讲抢占业务的方法
TW201032657A (en) * 2008-10-23 2010-09-01 Qualcomm Inc Fast uplink data transmission using E-DCH enhanced random access without a UE specific E-RNTI
CN101895855A (zh) * 2009-05-18 2010-11-24 中国移动通信集团公司 移动终端的接入方法、基站及接入系统
WO2012044240A1 (en) * 2010-10-01 2012-04-05 Telefonaktiebolaget L M Ericsson (Publ) Mobile terminal, base station and methods therein
CN102932115A (zh) * 2011-08-11 2013-02-13 华为技术有限公司 预编码控制指示反馈信道配置方法和装置

Family Cites Families (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8958368B2 (en) * 2004-11-15 2015-02-17 Samsung Electronics Co., Ltd. Method and apparatus for transmitting and receiving downlink control information in a mobile communication system supporting uplink packet data service
US7688796B2 (en) * 2005-08-31 2010-03-30 Interdigital Technology Corporation Wireless communication method and apparatus for decoding enhanced dedicated channel absolute grant channel transmissions
EP1949566B1 (en) * 2005-11-04 2014-04-30 LG Electronics Inc. Random access channel hopping for frequency division multiplexing access systems
WO2007144956A1 (ja) * 2006-06-16 2007-12-21 Mitsubishi Electric Corporation 移動体通信システム及び移動端末
KR100938102B1 (ko) * 2006-08-18 2010-01-21 삼성전자주식회사 Rach 신호 송수신 방법 및 장치
CN100574276C (zh) * 2006-08-22 2009-12-23 中兴通讯股份有限公司 时分同步码分多址系统增强上行链路随机接入的控制方法
US20090086698A1 (en) * 2007-09-27 2009-04-02 Interdigital Patent Holdings, Inc. Method and apparatus for managing a collision in common e-dch transmissions
JP5143912B2 (ja) * 2007-12-20 2013-02-13 テレフオンアクチーボラゲット エル エム エリクソン(パブル) アップリンク共通e−dch伝送の制御
TWM355510U (en) * 2008-01-04 2009-04-21 Interdigital Patent Holdings Apparatus for performing an enhanced random access channel procedure in a CELL_FACH state
US8780704B2 (en) * 2008-01-10 2014-07-15 Qualcomm Incorporated Shared resource allocation
EP2086263B1 (en) * 2008-02-01 2017-07-12 Lg Electronics Inc. Method for controlling uplink load in cell_fach state
EP2243328A4 (en) * 2008-02-10 2014-04-30 Lg Electronics Inc RANDOM ACCESS CHANNEL FREQUENCY ALLOCATION
KR101161761B1 (ko) * 2008-03-19 2012-07-04 닛본 덴끼 가부시끼가이샤 통신 시스템, 이동국, 기지국, 응답 결정 방법, 리소스 컨피겨레이션 결정 방법 및 프로그램
US7983215B2 (en) * 2008-04-17 2011-07-19 Infineon Technologies Ag Communication device, method for transmitting an uplink transmission control message, method for receiving an uplink transmission control message
TWI523560B (zh) * 2008-09-15 2016-02-21 內數位專利控股公司 以共用增強專用頻道資源在cell_fach狀態中共用控制頻道傳輸之控制方法及裝置
US20100260108A1 (en) * 2009-04-13 2010-10-14 Qualcomm Incorporated Setting up a reverse link data transmission within a wireless communications system
US8451785B2 (en) * 2009-11-09 2013-05-28 Telefonaktiebolaget L M Ericsson (Publ) Control signal aggregation in a multi-carrier WCDMA system
US9007888B2 (en) * 2010-11-08 2015-04-14 Qualcomm Incorporated System and method for uplink multiple input multiple output transmission
US9264956B2 (en) * 2011-03-28 2016-02-16 Lg Electronics Inc. Method and device for handover in mobile communication system
GB2496828B (en) * 2011-04-01 2013-11-13 Renesas Mobile Corp TTI Adaptation in E-DCH
US8897267B2 (en) * 2011-04-04 2014-11-25 Qualcomm Incorporated System and method for enabling softer handover by user equipment in a non-dedicated channel state
US9520975B2 (en) * 2011-05-03 2016-12-13 Telefonaktiebolaget Lm Ericsson (Publ) Methods and devices for transmission of control data to a user equipment
GB2491859C (en) * 2011-06-14 2021-02-17 Sca Ipla Holdings Inc Telecommunications method and system
US8954084B2 (en) * 2011-08-01 2015-02-10 Alcatel Lucent Method and system for reducing MAC-is reset ambiguity for common E-DCH transmissions
US8751892B2 (en) * 2011-08-09 2014-06-10 Intel Mobile Communications GmbH Communication terminals and communication devices
CN102932925B (zh) * 2011-08-11 2015-09-30 华为技术有限公司 一种资源分配方法及装置、资源获取方法及装置
BR112014003236A2 (pt) * 2011-08-12 2017-03-01 Alcatel Lucent compartilhamento de recursos de up-link no sistema de telecomunicações móveis universal
CN103858368B (zh) * 2011-08-16 2017-04-12 Lg电子株式会社 在无线通信系统中发射上行基准信号的方法和设备
KR101892688B1 (ko) * 2011-11-07 2018-10-05 삼성전자 주식회사 다중 안테나를 위한 제어 채널 검색 방법 및 장치
JP2015530020A (ja) * 2012-08-03 2015-10-08 テレフオンアクチーボラゲット エル エム エリクソン(パブル) 拡張アップリンクのためのユーザ機器ノードの制御及び拡張アップリンクのために構成されたユーザ機器ノード
WO2014092497A1 (en) * 2012-12-14 2014-06-19 Lg Electronics Inc. Method and apparatus for supporting transmission efficiency in a wireless communication system
WO2014163539A1 (en) * 2013-02-26 2014-10-09 Telefonaktiebolaget L M Ericsson (Publ) Methods and devices for releasing a channel using a variable expiration time
US9668277B2 (en) * 2013-03-13 2017-05-30 Qualcomm Incorporated Adaptive clock rate for high speed data communications

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1825989A (zh) * 2005-02-24 2006-08-30 华为技术有限公司 一种实现即按即讲抢占业务的方法
TW201032657A (en) * 2008-10-23 2010-09-01 Qualcomm Inc Fast uplink data transmission using E-DCH enhanced random access without a UE specific E-RNTI
CN101895855A (zh) * 2009-05-18 2010-11-24 中国移动通信集团公司 移动终端的接入方法、基站及接入系统
WO2012044240A1 (en) * 2010-10-01 2012-04-05 Telefonaktiebolaget L M Ericsson (Publ) Mobile terminal, base station and methods therein
CN102932115A (zh) * 2011-08-11 2013-02-13 华为技术有限公司 预编码控制指示反馈信道配置方法和装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2961232A4 *

Also Published As

Publication number Publication date
EP2961232A1 (en) 2015-12-30
EP2961232A4 (en) 2016-02-17
CN104363974A (zh) 2015-02-18
EP2961232B1 (en) 2017-08-09
US20160014814A1 (en) 2016-01-14

Similar Documents

Publication Publication Date Title
US20210076288A1 (en) Method and apparatus supporting random access transmissions
JP4819911B2 (ja) 強化サービス範囲を有するランダムアクセス手続
TWI359583B (en) Optimized random access channel (rach) access
JP6994041B2 (ja) ランダムアクセス方法、端末装置、及びネットワーク装置
TWI472182B (zh) 隨機存取頻道響應處理方法及裝置
US8428014B2 (en) Method and apparatus for performing an enhanced random access channel procedure in a Cell—FACH state
JP6420337B2 (ja) ネットワーク選択方法およびコアネットワーク装置
US10674363B2 (en) Access control method, user equipment, and network device
CN104521311A (zh) 用于在电信系统中处置连接设置的方法和设备
EP2986041B1 (en) Communication method, user equipment and network device
WO2012136130A1 (zh) 分配信道资源的方法、基站设备、终端设备和通信系统
WO2017070901A1 (zh) 一种数据传输方法、设备及系统
CN113273115B (zh) 信息发送和接收方法以及装置
TW200814681A (en) Procedure for initial access
JP6900464B2 (ja) データ伝送方法、端末デバイス及びネットワーク側デバイス
WO2013177934A1 (zh) 一种能力同步方法、设备及通信系统
WO2013020447A1 (zh) 预编码控制指示反馈信道配置方法和装置
US10383090B2 (en) Data sending method, user equipment, and network device
WO2013152671A1 (zh) 能力匹配方法、接入网控制节点及用户设备
TWI650026B (zh) Data transmission method, first device and second device
WO2013020452A1 (zh) 一种高速专用物理控制信道上行反馈方法及相关设备
WO2014146412A1 (zh) 用户设备冲突检测方法、用户设备和基站
KR101277360B1 (ko) 무선 통신 네트워크에서 핸드오프 동안 네트워크 진입을 최적화하는 방법 및 장치
JP5462366B2 (ja) システム制御シグナリングにおけるショートユーザメッセージ
US20230328543A1 (en) Method and apparatus for multicast and broadcast services

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13879023

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2013879023

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2013879023

Country of ref document: EP