throbber
TSG-RAN WG1 #43
`Seoul, Korea, November 7-11, 2005
`
`Source:
`Title:
`Agenda Item:
`Document for:
`
`
`Ericsson
`E-UTRA Random Access
`8.6
`Discussion and Decision
`
`R1-051445
`
`Introduction
`1.
`An orthogonal uplink, where the Node B scheduler is responsible for rapidly allocating resources among UEs
`having data for transmission, has emerged as the main candidate for E-UTRA. To maintain uplink orthogonality
`among UEs, both frequency and time synchronization of the signal transmitted from the UEs are needed.
`Frequency synchronization can be achieved by the UE locking its local oscillator to the downlink signal. The
`remaining frequency misalignment as the Node B is due to Doppler, which is the same situation as for scheduled
`data transmissions and requires no further consideration.
`Time synchronization when the UE is transmitting can be achieved by the Node B measuring on the received
`signal and sending timing advance commands to the UE, which adjusts its uplink transmission timing
`accordingly. Through the use of scheduling request, UEs known to the scheduler can request uplink resources
`and, once the request has been granted, uplink transmissions can take place.
`However, in absence of recent uplink transmissions, the Node B cannot control the transmission timing. Hence,
`there is a need for a (random access) procedure to establish synchronization with the Node B, e.g., at power-on.
`As uplink synchronization not yet has been established, a guard time is required. The random access procedure
`should, as a minimum, support time synchronization of the UE transmission timing.
`To summarize, the following two cases can be distinguished:
` Synchronized uplink transmissions, e.g., scheduling requests or user data.
` Non-synchronized uplink transmissions, i.e., random access. A guard time is required to account for
`timing uncertainties.
`Scheduling requests are transmitted using a time synchronized uplink and does in principle not differ from other
`uplink control signaling used by an active UE. Hence, scheduling requests are not further discussed in this
`contribution.
`2. Random Access
`The main purpose of the E-UTRA random access procedure is to obtain uplink time synchronization within a
`fraction of the uplink cyclic prefix. In WCDMA, the random access is non-orthogonal to the uplink data
`transmission. This provides the benefit of not having to semi-statically allocate any resources for random access,
`but requires a power ramping procedure to control the inter-UE interference. Alternatively, if the random access
`is made orthogonal to the (scheduled) data transmissions, no power ramping procedure is required to control the
`interference between random access and data transmissions, thereby allowing for a faster random access. The
`random access can be separated from data transmissions in the time domain by reserving one sub-frame at
`regular intervals for random access. This is illustrated in Figure 1, where one sub-frame per TRACH-REP period is
`allocated for random access. The value of TRACH-REP could be signaled to the UE using a broadcast channel.
`Within a RACH sub-frame, a random access burst is transmitted. A guard time of 2t = 6.7 s/km is required to
`not interfere with neighboring subframes. For a UE-NodeB distance less than 15 km, 100 s is sufficient, leaving
`approximately 400 s for the random access burst part (around 700 symbols using the numerology in the TR). In
`case of very large cell sizes, additional guard time can be obtained by ensuring the scheduler is not using the
`subsequent subframe for data transmission.
`The bandwidth of the random access should be wide enough to allow for a sufficiently accurate timing estimate.
`An estimation accuracy of less than the cyclic prefix is needed, e.g., the accuracy should be in the order of 1 s.
`This requires a bandwidth of the RACH burst of around 1 MHz, which is in line with the smallest supported E-
`UTRA spectrum allocation of 1.25 MHz. For E-UTRA deployments using larger spectrum allocations, either
`multiple 1.25 MHz random access channels can be defined (providing an increased random access capacity), or
`higher RACH bandwidth can be defined for these cases. The former has the advantage of resulting in a single
`RACH procedure, regardless of the system bandwidth, while the latter may have a diversity benefit. A third
`
`ZTE/SAMSUNG 1037-0001
`
`1
`
`APPLE 1037
`
`

`

`possibility is to use part of the spectrum in the RACH sub-frame for scheduled data transmissions, given that the
`interference from the non-synchronized RACH transmissions is acceptable.
`As a minimum, the RACH burst should contain a signature sequence identifying the random access attempt.
`Additionally, a small payload, e.g., a UE identity (if the UE has been assigned a identity from the system) or user
`data, could be included. However, the payload size may be limited to a relatively small value as the signature
`sequence and guard time occupy part f the subframe.
`
`Can be used for other RACH channels or data transmission.
`
`Frequency hopping for
`multiple attempts?
`
`
`
`Data transmission
`
`TRACH
`
`0.5 ms sub-frame
`TRACH-REP (10 ms radio frame?)
`
`
`
`(Scheduled) Data transmission(Scheduled) Data transmission
`
`
`
`RACH burstRACH burst
`
`
`
`Guard timeGuard time
`
`BWRACH
`
`
`Figure 1: Random access subframe.
`The signature sequences used for the random access burst should have good auto-correlation properties to
`provide good timing estimation accuracy in the Node B. The mutual cross-correlation should also be low to
`reduce the interference between users in case of simultaneous random access attempts from multiple users.
`Finally, these properties should also hold at high Doppler as E-UTRA should be functional also at very high UE
`speeds. The number of signature sequences should be kept reasonable small to reduce complexity as the Node B
`has to search for all possible signature sequences in a random access subframe.
`The same structure and principles can be used for both FDD and TDD.
`
`2.1. UE procedure
`A UE performing a random access randomly selects one signature sequence from a small set of sequences to use
`in the RACH subframe. The UE transmission timing (i.e., assumed subframe start) can be obtained from the
`downlink timing. Open-loop power control can be used to obtain a suitable transmission power.
`Once the random access burst has been transmitted, the UE monitors the appropriate downlink control channel
`for response from the Node B. It may be possible to reuse the downlink control channel normally used for
`scheduling assignments (“HS-SCCH-like”) in which case no additional downlink control channels are required.
`As a minimum, the downlink control signaling includes information for timing control of the UE. Additionally, it
`may also contain a resource reservation (“scheduling grant”), providing the UE with resources for transmission
`of the payload. If no resource reservation information is included, a subsequent scheduling request can be used
`instead.
`
`ZTE/SAMSUNG 1037-0002
`
`2
`
`

`

`Finally, if the UE does not receive a response from the Node B within a certain time interval, a new random
`access attempt can be performed at a subsequent RACH sub-frame, possibly after a random back-off time. In
`case of multiple RACH sub-channels are defined on separate frequencies, a different frequency may be used for
`different attempts to avoid being stuck in a deep fading dip.
`
`2.2. Node B procedure
`The Node B correlates the received signal in the RACH subframe with all possible signature sequences. Once
`the Node B detects a sufficiently strong correlation peak, the timing of the (unidentified) UE performing the
`random access is known. In response, the Node B sends a timing adjustment command on the downlink control
`channel, possibly along with a resource assignment. The identity included on the downlink control channel is
`linked to the identity of the identified signature sequence in the uplink (or the UE ID if included), thus indicating
`in response to which random access attempt the downlink control signaling relates.
`
`2.3. Example
`An example of a random access procedure followed by regular scheduled data transmission is found in Figure 2.
`In this example, if the UE has no data to transmit, dummy data (e.g., an empty scheduling request) is transmitted
`at regular intervals to maintain uplink synchronization. This allows for rapid transmission of a scheduling
`request and a corresponding resource assignment. When no user data has been transmitted for a certain time, the
`transmission of dummy data stops and the uplink is allowed to go out-of-sync.
`
`Resource Request
`Timi ng A djus t m ent
`
`ming Request
`
`Ti
`
`S c heduling G ra nt
`
`Resource Request
`
`User data or RRC signaling
`Timi ng A dj. , Res ou rc e Gra nt
`
`Random Access
`
`
`
`Unsynchonized
`
`Uplink synchronized
`
`Unsynchonized
`
`Random
`Access
`
`Scheduled Data
`Transmission
`
`Transmission of dummy
`data to maintain
`synchronization (optional,
`in absence of user data)
`
`
`Figure 2: Example of random access and scheduled data transmission.
`3. Conclusion
`A framework for E-UTRA random access has been outlined:
` Orthogonal separation of user data and random access
` Using the random access burst for timing estimation at the Node B
` Responding with a timing adjustment and (optionally) a resource assignment.
` It is proposed to include the text proposal in Section 4 in TR 25.814.
`4. Text Proposal
`--- Begin text Proposal ---
`
`ZTE/SAMSUNG 1037-0003
`
`3
`
`

`

`
`Random access procedure
`9.1.2.1
`The random access procedure is used when the UE uplink has not been time synchronized and shall allow the
`Node B to estimate, and if needed adjust, the UE transmission timing within a fraction of the cyclic prefix. The
`random access burst consists of at least a signature sequence. Inclusion of additional data symbols is FFS.
`Random access and data transmission are time multiplexed as illustrated in Figure X, where certain subframes
`are reserved for random access transmissions.
`
`Data transmission
`
`
`
`BWRACH
`
`TRACH
`
`sub-frame
`
`TRACH-REP
`
`
`
`(Scheduled) Data transmission(Scheduled) Data transmission
`
`
`
`RACH burstRACH burst
`
`
`
`Guard timeGuard time
`
`Figure X: Reserving a subframe for random access attempts.
`--- End text Proposal ---
`
`
`
`
`ZTE/SAMSUNG 1037-0004
`
`4
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket