Random access method of cellular wireless communication system

A communication system and random access technology, applied in the field of communication, can solve the problems of not knowing the timer protection time of high-level protocols, increasing processing complexity, etc., and achieve the effects of reducing signaling burden, reducing complexity, and improving efficiency

Active Publication Date: 2008-01-09
ZTE CORP
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] However, in fact, the physical layer does not know the timer protection time of the upper layer protocol
In this way, the physical layer will always be in the receiving state, may receive random access response information from other terminals, and send it to the high-level protocol for processing, which increases the processing complexity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Random access method of cellular wireless communication system
  • Random access method of cellular wireless communication system
  • Random access method of cellular wireless communication system

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0036] Example 1: The physical layer receives a random access response message within the receive time window

[0037] As shown in Figure 4, including the following processing:

[0038] Step S402, layer 2 and layer 3 (for example, MAC layer) trigger the physical layer to send the random access preamble;

[0039] Step S404, after the physical layer finishes sending the random access preamble, it starts to wait for the random access response message;

[0040] Step S406, if the physical layer receives the random access response message within the receiving time window, then transfer the received random access response message to layer 2 and layer 3;

[0041] In step S408, layers 2 and 3 judge whether the transmitted random access response message corresponds to the sent random access preamble, and if the judgment result is yes, notify the physical layer to stop receiving the random access response message.

[0042] In the above process, if the physical layer receives multiple r...

example 2

[0044] Example 2: The physical layer does not receive any random access response message within the receive time window

[0045] As shown in Figure 5, including the following processing:

[0046] Step S502, layer 2 and layer 3 (for example, MAC layer) trigger the physical layer to send the random access preamble;

[0047] Step S504, after the physical layer finishes sending the random access preamble, it starts to wait for the random access response message;

[0048] Step S506, if the physical layer does not receive any random access response message within the receiving time window, stop receiving the random access response message when the receiving time window arrives, and report that layer 2 and layer 3 have not received random access Respond to the message.

[0049] It should be noted that the start time for the physical layer to receive the random access response message and the end time for the physical layer to send the random access preamble may or may not be the sa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method comprises: during the process of initializing the random access, layer 2 and layer 3 send the receiving time window to the physical layer; during random access process, according to the receiving time window or indication of layer 2 or layer 3, the physical layer determines the time of stopping the random access.

Description

technical field [0001] The present invention relates to the communication field, and in particular, relates to a random access method of a cellular wireless communication system. Background technique [0002] As shown in FIG. 1 , a cellular wireless communication system is mainly composed of a terminal, a base station, and a core network (Core Network, CN). A network composed of base stations is called a radio access network (Radio Access Network, RAN), and is responsible for access layer affairs, such as management of radio resources. Physical or logical connections may exist between base stations (for example, base station 1 and base station 2 or base station 3 in FIG. 1 ) according to actual conditions. Each base station can be connected to one or more core network nodes. The core network is responsible for non-access stratum affairs, such as location updates. Terminal refers to various devices that can communicate with the cellular wireless communication system, such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04L29/08H04L1/00H04W74/04H04W74/08
CPCH04W74/0833H04W74/002H04W74/04
Inventor 张峻峰杜忠达
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products