Unlock instant, AI-driven research and patent intelligence for your innovation.
User terminal and random access method thereof
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A random access and user terminal technology, applied in the field of LTE system, can solve the problems of increased delay and achieve the effect of reducing delay, avoiding processing errors and improving system performance
Active Publication Date: 2012-10-10
ZTE CORP
View PDF0 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
Assuming that the value of the time-frequency domain resource mask index received by the UE is just these reserved values, since the current protocol does not define how the UE should handle it, the UE will not act at this time, and this will inevitably cause an increase in delay
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0040]Assuming that the parameter random access preamble NumberOfRA_Preambles=60 configured by RRC, the bit sequence of Preamble ID (6bits) and PRACH Mask Index (4bits) in Msg0 is: 1110001110. At this time, the random access method of the UE includes:
[0041] Step A, UE receives Msg0 (handover command or PDCCH command), and correctly decodesPreamble ID (111000) and PRACH Mask Index (1110).
[0042] Step B, judge whether the Preamble ID in Msg0 is 0, get PreambleID=111000=56, that is: Preamble ID! =0, go to step C.
[0043] Step C, judging whether the Preamble ID belongs to the dedicated preamble group. Since the Preamble ID<NumberOfRA_Preambles, it is considered that the preamble does not belong to the dedicated preamble group, that is, the value is invalid, and the UE performs step D.
[0044] Step D, the UE randomly selects a Preamble ID in (0, NumberOfRA_Preambles-1) (0, 59), and randomly selects a PRACH channel, and then transmits the self-selected preamble resource to...
Embodiment 2
[0046] Assuming that the current system is TDD, and the parameter Random Access Preamble NumberOfRA_Preambles=60 configured by RRC, the bit sequence of Preamble ID (6bits) and PRACHMask Index (4bits) in Msg0 is: 1111001110. At this time, the random access method of the UE includes:
[0047] Step a, UE receives Msg0 (handover command or PDCCH command), and correctly decodes Preamble ID (111100) and PRACH Mask Index (1110).
[0048] Step b, judging whether the preamble resource indicator bit (Preamble ID) in Msg0 is zero, and obtaining Preamble ID=111100=60, that is: Preamble ID! =0, execute step c.
[0049] Step c: Determine whether the Preamble ID belongs to the dedicated preamble group. Since the Preamble ID==NumberOfRA_Preambles=60, the preamble is considered to belong to the dedicated preamble group, that is, the value is valid, and the UE proceeds to step d.
[0050] Step d, judging whether the parameter PRACH Mask Index is valid, since PRACH MaskIndex=1110=14 is a reser...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a user terminal and a random access method thereof. The user terminal comprises a message receiving module and an access module, wherein the access module comprises a message judgment module. The random access method for the user terminal comprises that: when receiving random accessresource distribution message transmitted by a base station, the message receiving module sends the message to the access module; and the access module judges the validities of leading resource indication and time-frequency resource mask index information in the random access resource distribution message through the message judgment module so as to realize access according to the validities. The invention definitely defines a processing method when UE receives the Msg0 message transmitted by an eNB and containing invalid resource information so that a random access process defined by a protocol is more complete; and the method solves the problems which are thoughtless or not considered by the current protocol, avoids possible processing errors, reduces the time delay reaching a random access success state, and improves the performance of a system.
Description
technical field [0001] The present invention relates to an LTE (Long Term Evolution, long-term evolution) system, in particular to a UE (user terminal), and in the non-contention-based random access process in the system, when the UE receives the eNB (base station) The processing method when Msg0 (random access resource allocation message) contains invalid resource information. Background technique [0002] In the random access process defined by the current protocol (3GPP TS36.300 v860), the definition of Msg0 is: when there is downlink data to be sent or when handover is initiated, the eNB will notify the UE to initiate random access. The notification message is Msg0. In the current protocol, Msg0 is a handover command (HandOver command, that is, an RRC connection configuration message) or a PDCCH command (PDCCH Format 1A) when downlink data arrives. [0003] When the UE receives Msg0, it will initiate contention-based random access or non-contention-based random access ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.