Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for avoiding random access conflict and mobile terminal for avoiding random access conflict

A mobile terminal and random access technology, applied in wireless communication, electrical components, etc., can solve problems such as co-channel interference, prolong the access time of interfering users, and reduce spectrum utilization, so as to reduce conflicts, improve spectrum utilization, Effect of reducing random access time

Inactive Publication Date: 2012-04-04
ZTE CORP
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The disadvantage of the above processing flow is that when multiple users send a preamble at the same time, it may cause mutual co-frequency interference due to multiple users sending their respective messages 3 on the same time-frequency resource at the same time according to the same authorization , which reduces the demodulation reliability of the message 3 of the real responding user selected by the eNB, and at the same time prolongs the access time of the interfering user and reduces the spectrum utilization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for avoiding random access conflict and mobile terminal for avoiding random access conflict
  • Method for avoiding random access conflict and mobile terminal for avoiding random access conflict
  • Method for avoiding random access conflict and mobile terminal for avoiding random access conflict

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0040] Step S101, the user uses the downlink synchronization signal to estimate the downlink transmission delay t 1 .

[0041] Step S102, the user's duration is t 1 After the time offset is compensated, the random access preamble is sent.

[0042] Step S103, the user receives the random access response, and analyzes the downlink transmission delay t in the random access response belonging to it. 2 .

[0043] Step S104, judge t 1 And t 2 Relationship, satisfy|t 1 -t 2 |≤Δ 1 .

[0044] Step S105, the user sends message 3 according to the authorization information of the random access response.

specific Embodiment 2

[0045] Step S201, the user uses the downlink synchronization signal to estimate the downlink transmission delay t 1 .

[0046] Step S202, the user’s duration is t 1 After the time offset is compensated, the random access preamble is sent.

[0047] Step S203: The user receives the random access response, and analyzes the downlink transmission delay t in the random access response belonging to it. 2 .

[0048] Step S204, judge t 1 And t 2 Relationship, not satisfied |t 1 -t 2 |≤Δ 1 .

[0049] Step S205: After the user retreats, re-select the random access time to perform random access.

specific Embodiment 3

[0050] Step S301, the user uses the downlink synchronization signal to estimate the downlink transmission delay t 1 .

[0051] Step S302, the user does not perform time offset compensation, and sends a random access preamble.

[0052] Step S303: The user receives the random access response, and analyzes the downlink transmission delay t in the random access response belonging to it. 2 .

[0053] Step S304, judge t 1 And t 2 Relationship, satisfy|2×t 1 -t 2 |≤Δ 2 .

[0054] Step S305: The user sends message 3 according to the authorization information of the random access response.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for avoiding a random access conflict and a mobile terminal for avoiding the random access conflict. The method comprises the following steps that: the mobile terminal estimates the downlink transmission time delay of a downlink signal by using a downlink synchronous signal, and analyzes an uplink transmission time delay carried in a random access response after the random access response is received; when the random access response is determined to respond to a random access request of the mobile terminal according to the downlink transmission time delay and the uplink transmission time delay, a message 3 is sent; and when the random access response is determined not to respond to the random access request of the mobile terminal according to the downlink transmission time delay and the uplink transmission time delay, a random access time is reselected, and random access is initiated. The method for avoiding the random access conflict and the mobile terminal for avoiding the random access conflict can reduce the conflicts in a process of randomly accessing so as to reduce the time for users to randomly access, and increase the utilization ratio of frequency spectrums.

Description

Technical field [0001] The present invention relates to the field of wireless communication, in particular to a method and a mobile terminal for avoiding random access conflicts. Background technique [0002] In the current Long-Term Evolution (LTE) Release 8 protocol, when an enhanced NodeB (Enhanced NodeB, eNB) detects a preamble sent by a user, for a certain preamble sequence, the enhanced NodeB Perform related tests in the detection window. If the correlation peak value in the detection window exceeds a certain threshold, it is considered that a user uses the preamble sequence for random access. However, in an actual scenario, there may be multiple users simultaneously sending the same preamble sequence on the same resource block (Resource Block). In this way, in theory, the enhanced Node B can detect multiple correlation peaks within the window of the preamble sequence. The enhanced node B only makes a random access response to a correlation peak that exceeds the threshol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W74/08
CPCH04W74/08
Inventor 褚丽莉赵刚马睿
Owner ZTE CORP