Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method of implementing random access

An implementation method and random access technology, which are applied in code division multiplexing systems, data exchange through path configuration, electrical components, etc., can solve the problems of large system resource overhead and large complexity of Signature processing table, etc. Achieve the effect of less resource overhead, improved random access performance, and low network management complexity

Active Publication Date: 2009-06-03
HUAWEI TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, in the above-mentioned second access strategy, since there may be 16 Signatures representing 16 users in each access slot in PRACH at the same time, and it is necessary to ensure that each access slot should be changed as much as possible. The order of table lookup makes the management of the Signature processing table more complicated, and the overhead of occupying system resources is also relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of implementing random access
  • Method of implementing random access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041]It has been discussed in the above prior art that on the base station side of the mobile communication network, due to the limitation of limited access resources, it is generally unable to support simultaneous data sent by 16 users identified by 16 different signatures in one access time slot. Demodulation; therefore, under the condition that system access resources allow, it is necessary to reflect the principle of fair access among users. The implementation method of random access in the present invention is based on the above principles, and provides a processing method based on table lookup, which can not only reduce the management complexity of the network side, but also occupy less overhead of system resources. On the basis of , the random access performance of the network system can be improved to a greater extent.

[0042] The specific implementation process of the method for realizing random access of the present invention will be described in detail below in co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses one random interfacing realization method, which comprises the following steps: setting user selected signature with different priority to different interface and processing each user by each signature according to each signal priority order of each interface gap. This invention method can make each user reduce network management complexity and materials spending on base of even opportunity to interface to network.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a method for implementing random access in a Wideband Code Division Multiple Access (WCDMA, Wideband Code Division Multiple Access) system. Background technique [0002] In a WCDMA system, a physical random access channel (PRACH, Physical Random Access Channel) is a physical channel used to carry a random access channel (RACH, Random Access Channel) (wherein RACH is a logical channel), when the user equipment (UE , User Equipment) needs to access the network side through the PRACH, it is necessary to first select the available signature (Signature) to send the access request information (Preamble) in an access slot (Slot) on the PRACH, and then delay 1.5 to 2.5 After access time slots, by judging the acquisition indication (AI, Acquisition Indicator) on the acquisition indicator channel (AICH, Acquisition Indicator Channel) to know whether the network allows its acce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/28H04J13/00
Inventor 赵建荣常玉辉
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products