Non-competitive random access method and equipment on secondary cell (SCell)

A technology of random access and random access response, which is applied in the field of communication and can solve the problem that the way of SCell random access has not yet been defined.

Active Publication Date: 2011-11-09
DATANG MOBILE COMM EQUIP CO LTD
View PDF1 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] In the process of implementing the present invention, the inventors found that at least the following problems exist in the prior art: the way of performing random access on SCell has not been defined in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-competitive random access method and equipment on secondary cell (SCell)
  • Non-competitive random access method and equipment on secondary cell (SCell)
  • Non-competitive random access method and equipment on secondary cell (SCell)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] Embodiment 1 of the present invention provides a method for non-contention random access on a secondary cell, such as image 3 As shown, the method includes the following steps:

[0061] Step 301, the network side (such as eNB) notifies the UE to initiate non-contention random access on the secondary cell. For example, the eNB notifies the UE to initiate a non-contention random access procedure on the SCell through messages such as PDCCH order (command) or RRC.

[0062] In step 302, the UE receives a notification from the network side of initiating non-contention random access on the secondary cell.

[0063] In step 303, the UE initiates non-contention random access on the SCell, and sends a dedicated preamble on the SCell.

[0064] Step 304, the network side receives the dedicated preamble from the UE. Wherein, when the network side receives the dedicated preamble on the PRACH resource corresponding to the secondary cell, the dedicated preamble is used to identify t...

Embodiment 2

[0080] Embodiment 2 of the present invention provides a method for non-contention random access on a secondary cell, such as Figure 4 As shown, the method includes the following steps:

[0081] In step 401, the eNB notifies the UE to initiate a non-contention random access procedure on the SCell through messages such as PDCCH order or RRC.

[0082] In step 402, the UE sends a dedicated preamble on the SCell. The way to select and send the dedicated preamble is the same as the way on the PCell in the current protocol.

[0083] Step 403 , the eNB identifies the UE through a dedicated preamble, and sends the RA-RNTI scrambled PDCCH corresponding to the preamble transmission in the UE-specific search space corresponding to the SCell in the scheduling carrier corresponding to the SCell.

[0084] Step 404: If the UE monitors the PDCCH scrambled by the corresponding RA-RNTI, it receives the PDSCH information on the SCell according to the resource indicated in the PDCCH, and decode...

Embodiment 3

[0088] Embodiment 3 of the present invention provides a method for non-competitive random access in a secondary cell, such as Figure 5 As shown, the method includes the following steps:

[0089] In step 501, the eNB notifies the UE to initiate a non-contention random access procedure on the SCell through messages such as PDCCH order or RRC.

[0090] In step 502, the UE sends a dedicated preamble on the SCell. The way to select and send the dedicated preamble is the same as the way on the PCell in the current protocol.

[0091] In step 503, the eNB identifies the UE through a dedicated preamble, and includes UE initial TA value information (such as 11-bit downlink data) in downlink dedicated data subsequently transmitted to the UE. Among them, the 11-bit TA information can be carried by introducing new MAC CE.

[0092] Step 504, after receiving the TA information, the UE applies the effective TA value in the TA Group to which the SCell belongs, and starts or restarts the TA...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses non-competitive random access method and equipment on a secondary cell (SCell). The method comprises the following steps: a network side notifies UE (user equipment) to initiate non-competitive random access on the SCell; the network side receives a special preamble from the UE; and the network side sends the scheduling information carrying TA (timing alignment) value information to the UE through the search space of a non-SCell public search space of the UE. In the embodiment of the invention, the UE can initiate a non-competitive random access process on the SCell; and moreover, the UE can finish the random access process on the premise of not monitoring the PDCCH (physical downlink control channel) of the SCell public search space, and can obtain the TA information on the SCell.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and device for non-contention random access on a secondary cell. Background technique [0002] (1) Carrier aggregation technology. [0003] The peak rate of LTE-A (LTE Advanced, Advanced LTE) has been greatly improved compared with LTE (Long Term Evolution, long-term evolution). compatibility. Based on the need to increase the peak rate, be compatible with the LTE system, and make full use of spectrum resources, a CA (Carrier Aggregation, Carrier Aggregation) technology is introduced in the LTE-A system. [0004] The carrier aggregation technology refers to a mechanism in which a UE (User Equipment, user equipment) can simultaneously aggregate multiple cells (cells), and multiple cells can simultaneously provide data transmission services for the UE. In the carrier aggregation system, the carriers corresponding to each cell can be continuous or disconti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W74/08
Inventor 许芳丽赵亚利刘佳敏
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products