throbber
US 20100067495A1
`
`(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2010/0067495 A1
`Lee et al.
`(43) Pub. Date: Mar. 18, 2010
`
`
`(54) METHOD OF PERFORMING RANDOM
`ACCESS IN A WIRELESS COMMUNCATION
`SYSTEM
`
`(76)
`
`Inventors:
`
`Young Dae Lee, Anyang-si (KR);
`Sung Duck Chun, Anyang-si (KR);
`Sung Jun Park, Anyang-si (KR);
`Seung June Yi, Anyang-si (KR)
`
`Correspondence Address:
`MCKENNA LONG & ALDRIDGE LLP
`1900 K STREET, NW
`WASHINGTON, DC 20006 (US)
`
`(21) Appl. No.:
`
`12/312,172
`
`(22) PCT Filed:
`
`Oct. 30, 2007
`
`(86) PCT No.:
`
`PCT/KR2007/005384
`
`§ 371 (0(1),
`(2), (4) Date:
`
`Apr. 29, 2009
`
`Related US. Application Data
`
`(60) Provisional application No. 60/863,545, filed on Oct.
`30, 2006.
`
`(30)
`
`Foreign Application Priority Data
`
`Feb. 7, 2007
`
`(KR) .......................... 1020070012749
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`H043 7/216
`
`(2006.01)
`
`(52) U.S.Cl. ........................................................ 370/335
`
`(57)
`
`ABSTRACT
`
`A method of performing random access in a wireless com-
`munication system is disclosed. The method of performing
`random access in a user equipment of a wireless communi-
`cation system which uses multiple carriers includes transmit-
`ting a preamble for random access to a network, receiving a
`random access response message from the network in
`response to the preamble, transmitting a connection setup
`request message to the network, the connection setup request
`message requesting connection establishment with the net-
`work, and receiving a first message from the network, the first
`message including connection setup information and conten-
`tion resolution information in a random access procedure. If
`a user equipment identifier of the user equipment is included
`in the message, the user equipment determines that it has
`successfully performed random access and performs a next
`procedure in accordance with the connection setup informa-
`tion. If the user equipment identifier of the user equipment is
`not included in the message, the user equipment determines
`that it has failed in random access and transmits a random
`
`access preamble to the network again after the lapse of a
`predetermined time period.
`
` E—UTRAN _
`
`
`APPLE 1025
`
`APPLE 1025
`
`

`

`Patent Application Publication Mar. 18, 2010 Sheet 1 0f 6
`
`US 2010/0067495 A1
`
`
`
`

`

`Patent Application Publication Mar. 18, 2010 Sheet 2 of 6
`
`US 2010/0067495 A1
`
`‘ FIG. 2
`
`. NAS Security
`
`SAE Bearer Control -
`
`Idle State Mobility
`Handing
`
`Mobility Anchring
`
`EPC
`
`I|I
`
`II
`
`II IIIII
`
`I
`
`._
`
`eNB
`
`,
`
`Inter Cell RRM
`
`’
`
`Connection
`Mobility Cont.
`
`RB Control
`
`‘
`
`Radio Admission
`Control
`
`eNB
`Measurement
`Configuration
`& Provision
`
`
`
`'
`
`Dynamic ‘
`Resource
`Allocation
`(Scheduler)
`
`
`
`~
`
`
`
`- ‘
`3%S
`
`.
`
`.4
`
`I
`
`L
`4’
`
`v,
`
`..
`
`.
`
`-
`
`E-UTRAN -
`
`:
`
`III
`
`III
`
`l
`
`lI
`
`I
`I
`I
`
` SAE Gateway
`
` Sl
`
`

`

`Patent Application Publication Mar. 18, 2010 Sheet 3 0f 6
`
`US 2010/0067495 A1
`
`FIG. 3A
`
`
`
`

`

`Patent Application Publication Mar. 18, 2010 Sheet 4 0f 6
`
`US 2010/0067495 A1
`
`FIG. 3B
`
`
`
`

`

`Patent Application Publication Mar. 18, 2010 Sheet 5 of 6
`
`US 2010/0067495 A1
`
`Time
`
`.
`
`FIG.__4'
`
`m
`
`\\\\\\\\\\\\\‘
`
`m
`
`m\\\\\\\\\\\‘
`
`~.\\\\\\\\\\\\\\‘ '
`
`l\\\\\\\\\\\\\‘
`
`\\‘\\\\\\\\\\\\
`
`
`
`
`
`
`
`.aL1/L2controlinformationregionBData
`region
`V
`
`\\\\\\\\\\\\\_‘ .
`
`\V
`
`Subframe\]
`vFrequency
`
`

`

`Patent Application Publication Mar. 18, 2010 Sheet 6 of 6
`
`US 2010/0067495 A1
`
`FIG. 5
`
`
`Random access preamble
`-851
`
`
`
`
`
`Random access response
`
`RRC connection request
`
`
`
`RRC connectionsetup message and -'
`
`RRC contention resolution message
`
`FIG. 6
`
`
` Random access preamble
`
`
`
`
`
`,
`
`Random access response
`
`MAC scheduling request
`
`
`
`Resource grant message and -
`
`. MAC contention resolution message
`
`ssz '
`
`SS3
`
`354 .
`
`S61
`
`S62
`
`S63
`
`S64
`
`

`

`US 2010/0067495 A1
`
`Mar. 18, 2010
`
`METHOD OF PERFORMING RANDOM
`ACCESS IN A WIRELESS COMMUNCATION
`SYSTEM
`
`TECHNICAL FIELD
`
`[0001] The present invention relates to a wireless commu-
`nication system, and more particularly, to a method of per-
`forming random access in a wireless communication system.
`
`BACKGROUND ART
`
`In a wideband code division multiple access
`[0002]
`(WCDMA) system according to asynchronous mobile com-
`munication system standard (3GPP: 3rd Generation Partner-
`ship Project), examples of a downlink transmission channel
`which transmits data from a network (UTRAN: UMTS Ter-
`restrial Radio Access Network) to a user equipment include a
`broadcast channel (BCH) which transmits system informa-
`tion and a downlink shared channel (DL-SCH) which trans-
`mits user traffic or control messages. Trafiic or control mes-
`sages of downlink multicast or broadcast service (MBMS:
`Multimedia Broadcasting and Multicast Service) may be
`transmitted through the DL-SCH or a separate multicast
`channel (MCH). Meanwhile, examples of an uplink transmis-
`sion channel which transmits data from a user equipment to a
`network include a random access channel (RACH) which
`transmits initial control message and an uplink shared chan-
`nel (UL-SCH) which transmits user traffic or control mes-
`sages.
`[0003] Hereinafter, the RACH in the WCDMA system will
`be described. The RACH is used to transmit data of short
`
`length to an uplink, and some RRC messages such as RRC
`connection request message, cell update message, and URA
`update message can be transmitted through the RACH. Fur-
`thermore, a common control channel (CCCH), a dedicated
`control channel (DCCH), or a dedicated trafiic channel
`(DTCH), which is one of logical channels, can be mapped
`with the RACH which is one of transmission channels. Fur-
`thermore, the RACH which is one oftransmission channels is
`again mapped with a physical
`random access channel
`(PRACH) which is one of physical channels.
`[0004]
`If a medium access control (MAC) layer of a user
`equipment commands a physical layer of the user equipment
`to perform PRACH transmission, the physical layer of the
`user equipment selects one access slot and one signature and
`transmits PRACH preamble to the uplink depending on the
`selected result. The preamble is transmitted for an access slot
`period oflength of l .33 ms, and one signature among 16 kinds
`of signatures is selected and transmitted for a first certain
`length of the access slot.
`[0005]
`Ifthe user equipment transmits the preamble, a base
`station transmits a response signal through an acquisition
`indicator channel (AICH) which is a downlink physical chan-
`nel. The AICH transmitted in response to the preamble trans-
`mits the signature selected by the preamble for a first certain
`time period of an access slot corresponding to the access slot
`to which the preamble is transmitted. At this time, the base
`station transmits acknowledgement (ACK) or non-acknowl-
`edgement (NACK) through the signature transmitted from
`the AICH. If the user equipment receives ACK, the user
`equipment transmits a message part of 10 ms or 20 ms by
`using an orthogonal variable spreading factor (OVSF) code
`corresponding to the transmitted signature. If the user equip-
`ment receives NACK, the MAC of the UE again commands
`
`the physical layer of the user equipment to perform the
`PRACH transmission after a proper time period. Meanwhile,
`if the user equipment does not receive the AICH correspond-
`ing to the transmitted preamble, the user equipment transmits
`a new preamble at a power higher than that of the previous
`preamble by one level after a given access slot.
`[0006] Hereinafter, examples where the user equipment
`transmits messages by using the RACH in the WCDMA
`system will be described.
`[0007]
`In case of the first example, the user equipment
`which is in an idle mode transmits an initial control message
`to a network through the RACH. Generally, the user equip-
`ment uses the RACH when the user equipment temporally
`synchronizes with the network and when the user equipment
`desires to acquire radio resources to transmit data to an
`uplink. For example, if the user equipment is powered on and
`first accesses a new cell, the user equipment generally syn-
`chronizes with a downlink and receives system information in
`a cell where the user equipment desires to access. After
`receiving system information, the user equipment transmits
`an access request message for RRC connection. However,
`since the user equipment is not synchronized with the net-
`work temporally and does not yet acquire radio resource of
`the uplink, the user equipment uses the RACH. In other
`words, the user equipment requests the network to provide
`radio resources for transmission of a connection request mes-
`sage, through the RACH. The base station which has been
`requested to provide corresponding radio resources allocates
`proper radio resources to the user equipment so that the user
`equipment can transmit RRC connection request message.
`Then, the user equipment can transmit the RRC connection
`request message to the network through the radio resources.
`[0008]
`In case ofthe second example, in a state that the user
`equipment is connected with the network in a type of RRC,
`the user equipment which is in an RRC connected mode uses
`the RACH. In this case, the user equipment is allocated with
`radio resources in accordance with radio resource scheduling
`of the network, and transmits data to the network through the
`allocated radio resources. However, if data to be transmitted
`do not remain in a buffer ofthe user equipment any longer, the
`network will not allocate radio resources of the uplink any
`longer. This is because that allocating radio resources of the
`uplink to the user equipment having no data to be transmitted
`is inefficient.
`
`[0009] The buffer status ofthe user equipment is reported to
`the network periodically or whenever a specific event occurs.
`If new data occur in the buffer of the user equipment having
`no radio resources, since there are no radio resources of the
`uplink allocated to the user equipment, the user equipment
`uses the RACH. In other words, the user equipment requests
`the network to provide radio resources required for data trans-
`mission, through the RACH.
`[0010] The RACH is an uplink common channel and is a
`channel available for all user equipments which desires to try
`initial access to the network. Accordingly, if two or more user
`equipments use the RACH simultaneously, collision may
`occur. If collision occurs due to the two or more user equip-
`ments, the network should select one of the user equipments
`to perform a normal procedure, and should perform next
`procedures for the other user equipments after resolving a
`problem caused by the collision. In this case, it is necessary to
`define a procedure of avoiding delay in procedures after ran-
`
`

`

`US 2010/0067495 A1
`
`Mar. 18, 2010
`
`dom access for the selected user equipment and resolving the
`problem caused by collision for the other user equipments.
`
`DISCLOSURE OF THE INVENTION
`
`[0011] Accordingly, the present invention is directed to a
`method of performing random access in a wireless commu-
`nication system, which substantially obviates one or more
`problems due to limitations and disadvantages of the related
`art.
`
`[0012] An object of the present invention is to provide a
`method of performing random access in a wireless commu-
`nication system, in which random access is provided to avoid
`unnecessary delay in the wireless communication system.
`[0013] Another object ofthe present invention is to provide
`a method ofperforming random access in a wireless commu-
`nication system, in which radio resources are efficiently used
`in the wireless communication system.
`[0014]
`To achieve these objects and other advantages and in
`accordance with the purpose of the invention, as embodied
`and broadly described herein, a method of performing ran-
`dom access in a user equipment of a wireless communication
`system which uses multiple carriers comprises transmitting a
`preamble for random access to a network, receiving a random
`access response message from the network in response to the
`preamble, transmitting a connection setup request message to
`the network, the connection setup request message requesting
`connection establishment with the network, and receiving a
`first message from the network, the first message including
`connection setup information and contention resolution
`information in a random access procedure. If a user equip-
`ment identifier of the user equipment is included in the mes-
`sage, the user equipment realizes that it has succeeded in
`random access and performs a next procedure in accordance
`with the connection setup information. If the user equipment
`identifier of the user equipment is not included in the mes-
`sage, the user equipment realizes that it has failed in random
`access and transmits a random access preamble to the net-
`work again after the lapse of a predetermined time period.
`[0015]
`In another aspect of the present invention, a method
`of performing random access in a user equipment of a wire-
`less communication system which uses multiple carriers
`comprises transmitting a preamble for random access to a
`network in a state that the user equipment is connected with
`the network, receiving a random access response message
`from the network in response to the preamble, the random
`access response message including a temporary user equip-
`ment identifier of the user equipment, requesting the network
`to allocate uplink resources, and receiving at least one of a
`resource grant message and a contention resolution message
`from the network by using the temporary user equipment
`identifier and a private user equipment identifier of the user
`equipment.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 illustrates a network structure of an E-UMTS
`[0016]
`(Evolved-Universal Mobile Telecommunications System);
`[0017]
`FIG. 2 is a schematic view illustrating an E-UTRAN
`(Evolved Universal Terrestrial Radio Access Network);
`[0018]
`FIG. 3A and FIG. 3B illustrate a structure of a radio
`interface protocol between a user equipment (UE) and E-UT-
`RAN, in which FIG. 3A is a schematic view of a control plane
`protocol and FIG. 3B is a schematic view of a user plane
`protocol;
`
`FIG. 4 illustrates an example of a structure of physi-
`[0019]
`cal channels used in an E-UMTS system;
`[0020]
`FIG. 5 is a flow chart
`illustrating a procedure
`according to one embodiment of the present invention; and
`[0021]
`FIG. 6 is a flow chart
`illustrating a procedure
`according to another embodiment of the present invention.
`
`BEST MODE FOR CARRYING OUT THE
`INVENTION
`
`[0022] Hereinafter, structures, operations, and other fea-
`tures of the present invention will be understood readily by
`the preferred embodiments ofthe present invention, examples
`of which are illustrated in the accompanying drawings.
`Embodiments described later are examples in which techni-
`cal features of the present invention are applied to E-UMTS
`(Evolved Universal Mobile Telecommunications System).
`[0023]
`FIG.
`1
`illustrates
`a network structure of an
`E-UMTS. An E-UMTS is a system evolving from the con-
`ventional WCDMA UMTS and its basic standardization is
`
`currently handled by the 3GPP (3rd Generation Partnership
`Project). The E-UMTS can also be called an LTE (Long Term
`Evolution) system. Release 7 and Release 8 of 3GPP techni-
`cal specifications (3rd Generation Partnership Project; Tech-
`nical Specification Group Radio Access Network) can be
`referred to obtain detailed information about the UMTS and
`E-UMTS.
`
`[0024] Referring to FIG. 1, an E-UTRAN includes base
`stations (hereinafter, referred to as ‘eNode B’ or ‘eNB’),
`wherein respective eNBs are connected with each other
`through X2 interface. Also, each of eNBs is connected with a
`user equipment (UE) through a radio interface and connected
`with EPC (Evolved Packet Core) through Si interface. The
`EPC includes a mobility management entity/system architec-
`ture evolution (MME/SAE) gateway.
`[0025] Layers of a radio interface protocol between a UE
`and a network can be classified into a first layer L1, a second
`layer L2 and a third layer L3 based on three lower layers of
`OSI (open system interconnection) standard model widely
`known in communication systems. A physical layer belong-
`ing to the first layer L1 provides an information transfer
`service using a physical channel. A radio resource control
`(hereinafter, abbreviated as ‘RRC’) located at the third layer
`plays a role in controlling radio resources between the UE and
`the network. For this, the RRC layer enables RRC messages
`to be exchanged between the UE and the network. The RRC
`layer can be distributively located at network nodes including
`Node B, an AG and the like or at either the Node B or the AG.
`[0026]
`FIG. 2 is a schematic view illustrating an E-UTRAN
`(UMTS terrestrial radio access network). In FIG. 2, a hatch-
`ing part represents functional entities of a user plane and a
`non-hatching part represents functional entities of a control
`plane.
`FIG. 3A and FIG. 3B illustrate a structure of a radio
`[0027]
`interface protocol between the user equipment (UE) and the
`E-UTRAN, in which FIG. 3A is a schematic view of a control
`plane protocol and FIG. 3B is a schematic view ofa userplane
`protocol. Referring to FIG. 3A and FIG. 3B, a radio interface
`protocol vertically includes a physical layer, a data link layer,
`and a network layer and horizontally includes a user plane for
`data information transfer and a control plane for signaling
`transfer. The protocol layers in FIG. 3A and FIG. 3B can be
`classified into L1 (first layer), L2 (secondlayer), and L3 (third
`
`

`

`US 2010/0067495 Al
`
`Mar. 18, 2010
`
`layer) based on three lower layers of the open system inter-
`connection (OSI) standard model widely known in the com-
`munications systems.
`[0028] The physical layer as the first layer provides infor-
`mation transfer service to an upper layer using physical chan-
`nels. The physical layer (PHY) is connected to a medium
`access control (hereinafter, abbreviated as ‘MAC’) layer
`above the physical layer via transport channels. Data are
`transferred between the medium access control layer and the
`physical layer via the transport channels. Moreover, data are
`transferred between different physical layers, and more par-
`ticularly, between one physical layer of a transmitting side
`and the other physical layer of a receiving side via the physi-
`cal channels. The physical channel of the E-UMTS is modu-
`lated according to an orthogonal frequency division multi-
`plexing (OFDM) scheme, and time and frequency are used as
`radio resources.
`
`[0029] The medium access control (hereinafter, abbrevi-
`ated as ‘MAC’) layer ofthe second layer provides a service to
`a radio link control (hereinafter, abbreviated as ‘RLC’) layer
`above the MAC layer via logical channels. The RLC layer of
`the second layer supports reliable data transfer. In order to
`effectively transmit IP packets (e.g., IPv4 or IPv6) within a
`radio-communication period having a narrow bandwidth, a
`PDCP layer of the second layer (L2) performs header com-
`pression to reduce the size of a relatively-large IP packet
`header containing unnecessary control information.
`[0030] A radio resource control (hereinafter, abbreviated as
`‘RRC’) layer located on a lowest part of the third layer is
`defined in the control plane only and is associated with con-
`figuration, reconfiguration and release ofradio bearers (here-
`inafter, abbreviated as ‘RBs’) to be in charge of controlling
`the logical, transport and physical channels. In this case, the
`RB means a service provided by the second layer for the data
`transfer between the UE and the UTRAN.
`
`[0031] As downlink transport channels carrying data from
`the network to UEs, there are provided a broadcast channel
`(BCH) carrying system information, a paging channel (PCH)
`carrying paging message, and a downlink shared channel
`(SCH) carrying user traffic or control messages. The traffic or
`control messages ofa downlink multicast or broadcast service
`can be transmitted via the downlink SCH or an additional
`
`downlink multicast channel (MCH). Meanwhile, as uplink
`transport channels carrying data from UEs to the network,
`there are provided a random access channel (RACH) carrying
`an initial control message and an uplink shared channel (UL-
`SCH) carrying user traffic or control message. As logical
`channels located above the transport channels and mapped
`with the transport channels, there are provided a broadcast
`channel (BCCH), a paging control channel (PCCH), a com-
`mon control channel (CCCH), a multicast control channel
`(MCCH), and a multicast traffic channel (MTCH).
`[0032]
`In the E-UMTS system, an OFDM is used on the
`downlink and a single carrier frequency division multiple
`access (SC-FDMA) on the uplink. The OFDM scheme using
`multiple carriers allocates resources by unit of multiple sub-
`carriers including a group of carriers and utilizes an orthogo-
`nal frequency division multiple access (OFDMA) as an
`access scheme.
`
`[0033] A physical layer of an OFDM or OFDMA scheme
`divides active carriers into a plurality of groups and transmits
`respective groups to different receiving sides. Radio resource
`allocated to each UE which is defined by a time-frequency
`region on a two-dimensional sphere comprises continuous
`
`sub-carriers. A time-frequency region in the OFDM or
`OFDMA scheme is a rectangular form sectioned by time and
`sub-carrier coordinates. In other words, one time-frequency
`region could be a rectangular form sectioned by at least one
`symbol on a time axis and sub-carriers on a frequency axis.
`Such a time-frequency region can be allocated to an uplink for
`a specific UE, or an eNB can transmit the time-frequency
`region to a specific UE in a downlink. In order to define such
`a time-frequency region on the two-dimensional sphere, the
`number of OFDM symbols and the number of continuous
`sub-carriers starting from a point having an offset from a
`reference point should be given.
`[0034] The E-UMTS which is currently being discussed
`uses 10 ms radio frame comprising 20 sub-frames. Namely, a
`sub-frame has a length of 0.5 ms. A resource block comprises
`one sub-frame and twelve sub-carriers, each of which is 15
`kHz. One sub-frame comprises a plurality of OFDM symbols
`and a part (for example, first symbol) of the plurality of
`OFDM symbols can be used for transmission of L1/L2 con-
`trol information.
`
`FIG. 4 is a diagram illustrating a structure of physi-
`[0035]
`cal channels used in the E-UMTS. In FIG. 4, a sub-frame
`comprises an L1/L2 control information transmission region
`(the hatching part) and a data transmission region (the non-
`hatching part).
`illustrating a procedure
`[0036]
`FIG. 5 is a flow chart
`according to one embodiment of the present invention. In the
`embodiment of FIG. 5,
`technical features of the present
`invention are applied to a procedure of initial random access
`of a user equipment which is in an idle mode.
`[0037] Referring to FIG. 5, the user equipment transmits a
`random access preamble to a base station eNB [$51]. In other
`words, the user equipment selects a specific signature among
`a plurality of signatures through one access slot and transmits
`the selected signature to the base station. At this time, the
`random access preamble may include uplink message infor-
`mation or channel measurement information so that the base
`
`station may perform resource allocation for uplink message
`transmission. In this case, if at least two user equipments
`simultaneously perform uplink transmission of random
`access preambles by using same radio resources such as same
`signatures, collision may occur.
`[0038] The base station transmits a random access response
`message to the user equipment in response to the random
`access preamble [SS2]. The random access response message
`includes the signature transmitted from the user equipment,
`grant or rejection information ofthe random access preamble
`transmission, a temporary cell radio network temporary iden-
`tifier (Temporary C-RNTI) allocated to the user equipment,
`and control information related to transmission of the RRC
`
`connection request message, etc. The control information
`related to transmission of the RRC connection request mes-
`sage includes radio resource allocation information, a mes-
`sage size, and radio parameters (modulation and coding infor-
`mation and hybrid ARQ information) for transmission of the
`RRC connection request message.
`[0039] The base station transmits signaling information for
`receiving the random access response message to the user
`equipment through L1/L2 control channel. The signaling
`information includes a random access radio network tempo-
`rary identifier (RA-RNTI) indicating transmission of the ran-
`dom access response message and transmission parameters
`related to transmission of the random access response mes-
`sage. Since the RA-RNTI is previously forwarded from the
`
`

`

`US 2010/0067495 A1
`
`Mar. 18, 2010
`
`user equipment to the base station through system informa-
`tion, etc., the user equipment acquires the signaling informa-
`tion through the L1/L2 control channel by using the RA-
`RNTI and receives the random access response message by
`using the acquired signaling information.
`[0040]
`Ifthe signature transmitted from the user equipment
`and grant information for signature transmission are included
`in the random access response message, the user equipment
`transmits the RRC connection request message to the base
`station [S53]. At this time, the user equipment transmits the
`RRC connection request message to the base station by using
`the uplink radio resource allocation information, the message
`size, and the radio parameters, which are included in the
`random access response message. The RRC connection
`request message includes a user equipment identifier for iden-
`tifying the user equipment. Examples of the user equipment
`identifier include wideband UE identifiers such as an inter-
`
`national mobile subscriber identity (IMSI) or a temporary
`mobile subscriber identity (TMSI).
`[0041]
`Ifthe signature transmitted from the user equipment
`and the rejection information of the signature transmission
`are included in the random access response message, or if the
`signature transmitted from the user equipment is not included
`in the random access response message, the user equipment
`retransmits the random access preamble after a certain time
`without transmitting the RRC connection request message.
`[0042]
`If the RRC connection request message is received
`from the user equipment, the RRC layer of the base station
`transmits the RRC connection setup message or the RRC
`contention resolution message to the user equipment. Prefer-
`ably,
`the RRC layer transmits one RRC message which
`includes the RRC connection setup message and the RRC
`contention resolution message. For another example, after
`transmitting the RRC connection setup message to the user
`equipment, the base station can transmit the RRC contention
`resolution message.
`[0043]
`If one RRC message which including the RRC con-
`nection setup message and the RRC contention resolution
`message is transmitted, padding included in the message can
`be reduced, whereby the radio resources can be used effi-
`ciently. The RRC message includes user equipment identifier
`of a user equipment which has succeeded in random access.
`Preferably, the user equipment identifier is a user equipment
`identifier included in the RRC connection request message,
`for example, IMSI and TMSI.
`[0044]
`If a plurality of user equipments collide with one
`another during a transmission procedure ofthe random access
`preamble or the RRC connection setup message, only one
`user equipment which has successfully performed random
`access is operated in accordance with the RRC connection
`setup message. In this case, the success ofthe user equipment
`which has succeeded in the random access means that the
`
`random access preamble transmitted from the user equipment
`has been successfully received by the base station and then
`the RRC connection request has been successfully per-
`formed.
`
`[0045] As described above, the RRC connection setup mes-
`sage included in the RRC message includes the wideband
`user equipment identifier such as IMSI and TMSI of the user
`equipment which has succeeded in the random access. The
`user equipment receives control
`information required to
`receive the RRC message through the L1/L2 control channel
`by using its temporary C-RNTI. For example, the user equip-
`ment can identify whether a specific channel of the L1/L2
`
`control channel is transmitted to itself in accordance with the
`
`result of cyclic redundancy code (CRC) test of the specific
`channel by using the temporary C-RNTI. For another
`example, the user equipment receives a message indicated by
`the temporary C-RNTI if the temporary C-RNTI is received
`through the L1/L2 control channel. If the specific channel is
`transmitted to the user equipment,
`the user equipment
`receives the RRC message transmitted to a downlink channel
`of a data region, for example, a downlink shared channel
`(DL-SCH) by using control information transmitted through
`the specific channel.
`[0046]
`If the wideband user equipment identifier transmit-
`ted through the RRC connection request message is included
`in the RRC connection setup message, the user equipment
`realizes that it has succeeded in the random access and rec-
`
`ognizes the RRC connection setup message as its message. At
`this time, the user equipment uses the temporary user equip-
`ment identifier (temporary C-RNTI) as a private C-RNTI for
`performing communication with a network later.
`[0047]
`If the wideband user equipment identifier transmit-
`ted through the RRC connection request message is not
`included in the RRC message, the user equipment realizes
`that it has failed in the random access. Also, if the RRC
`message which includes the wideband user equipment iden-
`tifier is not received for a certain time period, the user equip-
`ment realizes that it has failed in the random access. At this
`
`time, the user equipment can start a random access procedure
`again by retransmitting the random access preamble to the
`base station after a certain time period.
`[0048] The aforementioned embodiments of the present
`invention can be applied to a random access procedure for
`initial access performed after radio link failure or handover.
`[0049]
`FIG. 6 is a flow chart
`illustrating a procedure
`according to another embodiment of the present invention. In
`the embodiment of FIG. 6, technical features of the present
`invention are applied to a random access procedure of a user
`equipment which is in an RRC connected mode. For example,
`if radio resources for data to be transmitted to the base station
`
`are not allocated to the user equipment, the user equipment
`can transmit data through the random access procedure
`through the RACH. The embodiments described hereinafter
`can be applied to the case where the base station is not uplink-
`synchronized with the user equipment even though it has
`downlink data to be transmitted to the user equipment which
`is in the RRC connected mode.
`
`[0050] Referring to FIG. 6, the user equipment transmits a
`random access preamble to the base station eNB [S61], and
`receives a random access response message from the base
`station in response to the random access preamble [S62].
`Since the steps S61 and S61 are the same as S51 and S52 of
`FIG. 5, their detailed description will be omitted.
`[0051]
`Ifthe signature transmitted from the user equipment
`and grant information for signature transmission are included
`in the random access response message, the user equipment
`transmits a MAC scheduling request message to the base
`station [S63]. At this time, the user equipment transmits the
`MAC scheduling request message to the base station by using
`the uplink radio resource allocation information, the message
`size, and the radio parameters, which are included in the
`random access response message. Preferably,
`the MAC
`scheduling request message includes a wideband user equip-
`ment identifier for identifying the user equipment. Examples
`of the user equipment identifier include wideband UE iden-
`tifiers such as international mobile subscriber identity (IMSI)
`
`

`

`US 2010/0067495 A1
`
`Mar. 18, 2010
`
`identity (TMSI). The
`temporary mobile subscriber
`or
`embodiment of FIG. 6 is different from that of FIG. 5 in that
`
`scheduling request and contention resolution procedures are
`performed by the MAC layer.
`[0052]
`Ifthe signature transmitted from the user equipment
`and the rejection information of the signature transmission
`are included in the random access response message, or if the
`signature transmitted from the user equipment is not included
`in the random access response message, the user equipment
`retransmits the random access preamble after a certain time
`without transmitting the MAC scheduling request message.
`[0053]
`If the MAC scheduling request message is received
`from the user equipment, the MAC layer of the base station
`transmits a resource grant message and MAC contention
`r

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket