Method for avoiding random access conflict and mobile terminal for avoiding random access conflict
A mobile terminal and random access technology, applied in wireless communication, electrical components, etc., can solve problems such as co-channel interference, prolong the access time of interfering users, and reduce spectrum utilization, so as to reduce conflicts, improve spectrum utilization, Effect of reducing random access time
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment 1
[0040] Step S101, the user uses the downlink synchronization signal to estimate the downlink transmission delay t 1 .
[0041] Step S102, the user's duration is t 1 After the time offset is compensated, the random access preamble is sent.
[0042] Step S103, the user receives the random access response, and analyzes the downlink transmission delay t in the random access response belonging to it. 2 .
[0043] Step S104, judge t 1 And t 2 Relationship, satisfy|t 1 -t 2 |≤Δ 1 .
[0044] Step S105, the user sends message 3 according to the authorization information of the random access response.
specific Embodiment 2
[0045] Step S201, the user uses the downlink synchronization signal to estimate the downlink transmission delay t 1 .
[0046] Step S202, the user’s duration is t 1 After the time offset is compensated, the random access preamble is sent.
[0047] Step S203: The user receives the random access response, and analyzes the downlink transmission delay t in the random access response belonging to it. 2 .
[0048] Step S204, judge t 1 And t 2 Relationship, not satisfied |t 1 -t 2 |≤Δ 1 .
[0049] Step S205: After the user retreats, re-select the random access time to perform random access.
specific Embodiment 3
[0050] Step S301, the user uses the downlink synchronization signal to estimate the downlink transmission delay t 1 .
[0051] Step S302, the user does not perform time offset compensation, and sends a random access preamble.
[0052] Step S303: The user receives the random access response, and analyzes the downlink transmission delay t in the random access response belonging to it. 2 .
[0053] Step S304, judge t 1 And t 2 Relationship, satisfy|2×t 1 -t 2 |≤Δ 2 .
[0054] Step S305: The user sends message 3 according to the authorization information of the random access response.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 