Nothing Special   »   [go: up one dir, main page]

WO2007091841A1 - Method for avoiding collision using identifier in mobile network - Google Patents

Method for avoiding collision using identifier in mobile network Download PDF

Info

Publication number
WO2007091841A1
WO2007091841A1 PCT/KR2007/000667 KR2007000667W WO2007091841A1 WO 2007091841 A1 WO2007091841 A1 WO 2007091841A1 KR 2007000667 W KR2007000667 W KR 2007000667W WO 2007091841 A1 WO2007091841 A1 WO 2007091841A1
Authority
WO
WIPO (PCT)
Prior art keywords
identifier
data
indicator
response
preamble
Prior art date
Application number
PCT/KR2007/000667
Other languages
French (fr)
Inventor
Sung-Jun Park
Young-Dae Lee
Sung Duck Chun
Myung-Cheul Jung
Original Assignee
Lg Electronics Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from KR1020060087372A external-priority patent/KR101216751B1/en
Application filed by Lg Electronics Inc. filed Critical Lg Electronics Inc.
Priority to US12/159,574 priority Critical patent/US8493854B2/en
Priority to EP07708817.7A priority patent/EP1982438B1/en
Publication of WO2007091841A1 publication Critical patent/WO2007091841A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/006Transmission of channel access control information in the downlink, i.e. towards the terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0866Non-scheduled access, e.g. ALOHA using a dedicated channel for access

Definitions

  • the present invention is directed to a mobile network and, specifically, to a method for avoiding collision among transmissions in a mobile network.
  • a third generation partnership project (3GPP) mobile system based on a wideband code division multiple access (WCDMA) radio access technology has been widely developed all over the world.
  • a high-speed downlink packet access (HSDPA) which is a first step in the evolution of the WCDMA, provides the 3GPP with a radio access technology having high competitiveness.
  • HSDPA high-speed downlink packet access
  • radio access technology has been continuously developed in view of requirements and expectations of users and providers, evolution of a new technology in the 3GPP is required to increase competitiveness.
  • Evolved UTRA and UTRAN has been studied for the purpose of developing a wireless transmission technology that can significantly reduce cost while providing a high-quality service.
  • the 3G long-term evolution (LTE) aims to reduce cost of a user and a provider and improve service quality as well as expanded coverage and system capacity improvement.
  • the 3G LTE requires reduced cost per bit, increased service availability, flexible use of a frequency band, a simple structure and an open interface, and adequate power consumption of a terminal as an upper-level requirement.
  • one Node-B is deployed in one cell.
  • a plurality of user equipment (UE) may be located in one cell.
  • the user equipment must perform a random access process for access to a network.
  • FIG. 1 is a block diagram illustrating a communication network, such as a network structure of an evolved universal mobile telecommunication system (E-UMTS).
  • E-UMTS evolved universal mobile telecommunication system
  • the E- UMTS may be also referred to as an LTE system.
  • the communication network is widely deployed so as to provide a variety of communication services such as sound and packet data.
  • the E-UMTS network includes an evolved UMTS terrestrial radio access network (E-UTRAN) and a core network (CN).
  • the E-UTRAN may include one or more evolved Node-B (eNode-B) 20.
  • the CN may include a node for registering a user of a user equipment (UE) 10 and one or more E-UTRAN access gateway (AG) 30 positioned at the end of the network and connected to an external network.
  • UE user equipment
  • AG E-UTRAN access gateway
  • downlink refers to communication from an eNode-B 20 to the UE
  • the UE 10 and "uplink" refers to communication from the UE to an eNode-B.
  • the UE 10 refers to communication equipment carried by a user and may be also be referred to as a mobile station (MS), a user terminal (UT), a subscriber station (SS) or a wireless device.
  • MS mobile station
  • UT user terminal
  • SS subscriber station
  • An eNode-B 20 provides end points of a user plane and a control plane to the UE
  • An AG 30 provides an end point of a session and mobility management function for the UE 10.
  • An eNode-B 20 and an AG 30 may be connected via an Sl interface.
  • An eNode-B 20 is generally a fixed station that communicates with a UE 10 and may also be referred to as a base station (BS) or an access point.
  • BS base station
  • One eNode-B 20 may be deployed per cell.
  • An interface for transmitting user traffic or control traffic may be used between eNode-Bs 20.
  • An AG 30 is also referred to as a mobility management entity/user plane entity
  • An AG 30 may be classified into a portion for performing a user traffic process and a portion for performing a control traffic process. New communication may be performed between an AG 30 for performing the user traffic process and an AG for performing the control traffic process using a new interface.
  • An interface for distinguishing between the E-UTRAN and the CN may be used.
  • a plurality of nodes may be connected between an eNode-B 20 and an AG 30 via the Sl interface.
  • the eNode-B s 20 may be connected to each other via an X2 interface and neighboring eNode-B s 20 may always have a meshed network structure that has the X2 interface.
  • Layers of radio interface protocol between the UE 10 and the network may be classified into a first layer Ll, a second layer L2 and a third layer L3 based on three lower-level layers of an open system interconnection (OSI) reference model that is widely known in communication networks.
  • a physical layer belonging to the first layer provides an information transfer service using a physical channel.
  • a radio resource control (RRC) layer belonging to the third layer serves to control radio resources between the UE 10 and the network. The UE and the network exchange an RRC message via the RRC layer.
  • RRC radio resource control
  • the RRC layer may be located in a network node of an eNode-B 20 or AG 30. Alternatively, the RRC layer may be located at an eNode-B 20 or AG 30.
  • the radio interface protocol horizontally includes a physical layer, a data link layer and a network layer and vertically a user plane for transmitting data information and a control plane for transmitting a control signal.
  • FIG. 2 is a block diagram illustrating the control plane of the radio interface protocol.
  • FIG. 3 is a block diagram illustrating the user plane of the radio interface protocol.
  • FIGS. 2 and 3 illustrate the structure of the radio interface protocol between the UE 10 and the E-UTRAN based on a radio access network standard.
  • the physical layer provides an information transfer service to an upper-level layer using a physical channel.
  • the physical layer is connected to a medium access control (MAC) layer, which is an upper-level layer, via a transport channel.
  • MAC medium access control
  • Data is transferred between the MAC layer and the physical layer via the transport channel.
  • Data is transferred between different physical layers, such as, a physical layer for a transmitter and a physical layer for a receiver, via a physical channel.
  • the MAC layer which belongs to the second layer, provides a service to a radio link control (RLC) layer, which is an upper-level layer, via a logical channel.
  • RLC radio link control
  • the RLC layer which belongs to the second layer, supports reliable data transmission. It should be noted that the RLC layer is depicted in dotted lines, because if the RLC functions are implemented in and performed by the MAC layer, the RLC layer itself may not need to exist.
  • a packet data convergence protocol (PDCP) layer which belongs to the second layer, performs a header compression function to reduce the size of an Internet Protocol (IP) packet header that includes unnecessary control information and has a relatively large size. In this way, efficient transmission of packets in a radio section having a narrow bandwidth may be facilitated when transmitting an IP packet, such as an IPv4 packet or an IPv6 packet.
  • IP Internet Protocol
  • the Radio Resource Control (RRC) layer which belongs to the third layer, is defined in only the control plane.
  • the RRC layer serves to control the logical channel, the transport channel and the physical channels in association with configuration, reconfiguration and release of radio bearers.
  • a radio bearer is a service provided by the second layer for data transmission between the UE 10 and E-UTRAN.
  • a downlink transport channel for transmitting data from the network to the UE 10 includes a broadcast channel (BCH) for transmitting system information and a downlink shared channel (SCH) and shared control channel (SCCH) for transmitting the user traffic or a control message.
  • BCH broadcast channel
  • SCCH shared control channel
  • the traffic or the control message of a downlink multicast service or broadcast service may be transmitted via the downlink SCH or a additional multicast channel (MCH).
  • An uplink transport channel for transmitting data from the UE 10 to the network includes a random access channel (RACH) for transmitting an initial control message and an uplink shared channel (SCH) and shared control channel (SCCH) for transmitting the user traffic or the control message.
  • RACH random access channel
  • SCH uplink shared channel
  • SCCH shared control channel
  • the random access process is performed via a random access channel (RACH) that is an uplink transport channel.
  • RACH random access channel
  • the user equipment transmits an initial control message to the network via the RACH.
  • the RACH is used to synchronize the user equipment with the network and to acquire radio resources when the user equipment needs to transmit data but has no uplink radio resources for transmitting the data.
  • More than one user equipment may try to acquire the same radio resources via the
  • RACH Radio Access
  • a user equipment that fails to transmit a message uses the RACH again after a predetermined time elapses.
  • Data transmission time may significantly increase due to collisions and radio resources may be wasted due to re-access. Disclosure of Invention Technical Problem
  • An object of the invention is to provide a method for avoiding collision among transmissions from user equipment using an identifier in a mobile network.
  • a method for communicating information in a mobile communication system includes transmitting a preamble over a random access channel (RACH), receiving a response to the preamble, the response including an identifier and an indicator, the identifier generated according to the preamble and the indicator corresponding to the identifier and transmitting data using the identifier and indicator.
  • RACH random access channel
  • the identifier includes one of a random identifier (random
  • the data is transmitted in one of an RRC message, user data and uplink control information.
  • the method further includes receiving a response to the data including the identifier, the indicator and a C-RNTI. It is further contemplated that the response is one of an RRS message, user data and downlink control information.
  • a method for communicating information in a mobile communication system includes receiving a preamble over a random access channel (RACH), generating an identifier according to the preamble, generating an indicator corresponding the identifier, transmitting a response to the preamble, the response including the identifier and the indicator and receiving data transmitted using the identifier and indicator.
  • RACH random access channel
  • the identifier is generated according to at least one of a signature and a RACH occasion in the preamble. It is further contemplated that the identifier includes one of a random identifier (random Id), a MAC identifier (MAC Id), a cell-radio network temporary identity (C-RNTI) and a packet-temporary mobile subscriber identity (P-TMSI).
  • random Id random Id
  • MAC Id MAC identifier
  • C-RNTI cell-radio network temporary identity
  • P-TMSI packet-temporary mobile subscriber identity
  • the method further includes using the identifier and indicator in the received data to determine from which mobile communication terminal the data was received. It is further contemplated that the data is received in one of an RRC message, user data and uplink control information.
  • the method further includes transmitting a response to the data including the identifier, the indicator and a C-RNTI. It is further contemplated that the response is transmitted in one of an RRS message, user data and downlink control information.
  • a method for communicating information in a mobile communication system includes a mobile communication terminal transmitting a preamble over a random access channel (RACH), a network generating an identifier according to the preamble and an indicator corresponding the identifier, the network transmitting a response to the preamble, the response including the identifier and the indicator and the mobile communication terminal transmitting data using the identifier and indicator.
  • RACH random access channel
  • the network generates the identifier according to at least one of a signature and a RACH occasion in the preamble. It is further contemplated that the identifier includes one of a random identifier (random Id), a MAC identifier (MAC Id), a cell-radio network temporary identity (C-RNTI) and a packet-temporary mobile subscriber identity (P-TMSI).
  • random Id random Id
  • MAC Id MAC identifier
  • C-RNTI cell-radio network temporary identity
  • P-TMSI packet-temporary mobile subscriber identity
  • the method further includes the network using the identifier and indicator in the received data to determine that the data was received form the mobile communication terminal. It is further contemplated that the mobile communication terminal transmits the data in one of an RRC message, user data and uplink control information.
  • the method further includes the network transmitting a response to the data including the identifier, the indicator and a C-RNTI. It is further contemplated that network transmits the response in one of an RRS message, user data and downlink control information.
  • FIG. 1 is a block diagram illustrating a communication network.
  • FIG. 2 is a block diagram illustrating a control plane of a radio interface protocol.
  • FIG. 3 is a block diagram illustrating a user plane of a radio interface protocol.
  • FIG. 4 illustrates an example of a physical random access channel (PRACH).
  • PRACH physical random access channel
  • FIG. 5 illustrates downlink scheduling information.
  • FIG. 6 illustrates an uplink scheduling grant.
  • FIG. 7 is a flowchart illustrating a method for avoiding collision according to an embodiment of the present invention. Best Mode for Carrying Out the Invention
  • the UE 10 After receiving the system information, the UE 10 must transmit an access request message for RRC connection. However, the RACH is used since the UE 10 is not synchronized with the current network and uplink radio resources are not ensured. The UE 10 requests allocation of radio resources, in order to transmit the access request message to the network using the RACH.
  • the eNode-B receives the radio resources request and allocates radio resources to the UE 10. The UE then transmits the RRC access message to the network using the allocated radio resources.
  • a UE 10 When a UE 10 is RRC-connected to the network, it receives the radio resources according to the scheduling of the radio resources from the network and transmits data to the network using the radio resources. The network no longer allocates the uplink radio resources to the UE 10 when no data for transmission is left in a buffer of the UE because it is inefficient that uplink radio resources are allocated to a UE having no data for transmission.
  • the buffer state of the UE 10 is reported to the network according to periods or occurrence of an incident.
  • the UE uses the RACH because the UE has no allocated uplink radio resources.
  • the UE 10 requests allocation of the radio resources necessary for transmitting the data to the network using the RACH.
  • the RACH of the WCDMA will be described.
  • the RACH is used to transmit short- length data in the uplink direction.
  • a portion of an RRC message is transmitted via the RACH.
  • a logical channel such as a common control channel (CCCH), a dedicated control channel (DCCH), and a dedicated traffic channel (DTCH) may be mapped to RACH.
  • the RACH may be mapped to a physical channel, such as a physical random access channel (PRACH).
  • PRACH physical random access channel
  • FIG. 4 is a view showing an example of the PRACH. As illustrated in FIG. 4, the
  • PRACH which is uplink physical channel, may include a preamble portion and a message portion.
  • the preamble portion performs a power ramping function for adjusting transport power used to transmit a message and a function for avoiding collision among transmissions from several UEs 10.
  • the message portion performs a function for transmitting an MAC protocol data unit (PDU) sent from the MAC layer to the physical channel.
  • PDU MAC protocol data unit
  • the physical layer selects one access slot and one signature and transmits the preamble portion of the PRACH in the uplink direction when the MAC layer of the UE 10 indicates the physical layer to transmit the PRACH.
  • the preamble portion may be transmitted during the access slot interval having a length of 1.33 ms.
  • One signature may be selected from among 16 signatures during a certain initial interval of the access slot.
  • the eNode-B may transmit a response signal via a downlink physical channel, such as an acquisition indicator channel (AICH) when the UE 10 transmits the preamble.
  • the eNode-B transmits the response signal, which includes an acknowledgement (ACK) response or a non-acknowledgement (NACK) response, to the UE 10 via the AICH.
  • the UE 10 transmits the message portion when it receives the ACK.
  • the MAC layer of the UE 10 indicates the physical layer of the UE to transmit the PRACH after a predetermined time when it receives the NACK.
  • the UE 10 transmits a new preamble at power level that is higher than that of the previous preamble by one level after a designated access slot when it does not receive any response signal corresponding to the transmitted preamble.
  • a data transport signal or a control signal may be transmitted from the eNode-B to the UE 10 in addition to the preamble of the RACH.
  • the control signal transmitted from the eNode-B to the UE includes downlink scheduling information, uplink scheduling grant and response information on the transmission of the preamble portion of the RACH.
  • An identifier is used to avoid collision among transmissions from the UEs 10 in the uplink or downlink direction.
  • the eNode-B generates the identifier and transmits the identifier to the UE 10 and the UE transmits data using the identifier.
  • An indicator for identifying the identifiers may also be included when the UE uses the identifier in order to avoid collision between identifiers.
  • the identifier may be used by the eNode-B to distinguish between the UEs 10 when the UE transmits the data or the control signal to the eNode-B.
  • the indicator of the identifier may be used together with the identifier.
  • the eNode-B may transmit the data or the control signal to a specific UE 10 using the identifier.
  • the indicator of the identifier may be used together with the identifier.
  • the identifier may be required when the data is transmitted from the UE 10 to the eNode-B.
  • the identifier may be a random identifier (random Id), a MAC identifier (MAC Id), a cell-radio network temporary identity (C-RNTI) or a packet-temporary mobile subscriber identity (P-TMSI).
  • random Id random Id
  • MAC Id MAC identifier
  • C-RNTI cell-radio network temporary identity
  • P-TMSI packet-temporary mobile subscriber identity
  • the random Id and the MAC Id may be used when using the RACH.
  • the MAC Id or the MAC Id may have the same length as that of the C-RNTI.
  • the random Id, the MAC ID and the C-RNTI may all have a length of
  • the MAC Id and the C-RNTI may have the same length.
  • the UE 10 and the eNode-B may generate the same random Id in accordance with a transmission occasion and the signature of the preamble part selected by the UE. For example, the UE 10 and the eNode-B may acquire the same random Id from information on the signature and the transmission occasion when the UE transmits the signature of the preamble part to the eNode-B via the transmission occasion once.
  • the eNode-B informs the UE 10 of information for acquiring the random Id, such as information on the signature and the transmission occasion, via system information or a paging message.
  • the MAC Id may be an identifier used to identify the UE 10 in a specific cell before the eNode-B allocates the C-RNTI to the UE.
  • the MAC Id may be acquired from the random Id.
  • the random Id and the MAC Id may be identical when the random Id has the same length as that of the C-RNTI.
  • a Random Id may extend the MAC Id when the length of the random Id is less than that of the C-RNTI.
  • the eNode-B informs the UE 10 how to acquire the MAC Id from the random Id via the system information or the paging message.
  • the C-RNTI is the identifier for identifying the UE 10 in one cell and is allocated and/or de-allocated by the eNode-B.
  • the UE 10 may receive a new C-RNTI from the eNode-B when the UE enters a new cell.
  • the MAC Id has the same length as that of the C-RNTI.
  • the P-TMSI is an identifier for identifying the UE 10 in one CN and is allocated and/or de-allocated by the AG 30.
  • the indicator of the identifier distinguishes between the identifiers.
  • the indicator distinguishes between the identifiers used in the RACH, such as the random Id, the MAC Id and the C-RNTI.
  • the indicator is used to prevent the identifiers from colliding with each other when the length of the random Id or the MAC Id is identical to that of the C-RNTI.
  • A has a C-RNTI having 8 bits in the current cell with a value of 1111 0000
  • UE B uses the RACH to access the cell. Additionally, if the MAC Id is acquired from the random Id and the MAC Id also has a length of 8 bits and the value of 1111 0000, the eNode-B tries to transmit the response information for the preamble part to UE B using the identifier.
  • UE A may erroneously receive the information transmitted to UE B since
  • UE A also receives the information from the eNode-B using its identifier. Furthermore, since UE B uses the MAC Id before receiving the C-RNTI from the eNode-B, the eNode-B may not be able to determine whether the information is transmitted from UE A or UE B when UE B transmits specific information to the eNode-B using its identifier.
  • the indicator is used to distinguish between the random Id or MAC Id that identifies the UE 10 in the RACH and the C-RNTI or P-TMSI used for communication between the eNode-B and the CN in the cell. For example, a value of "0" may indicate the random Id or the MAC Id and a value of " 1 " may indicate the C-RNTI or the P- TMSI when the indicator has one bit.
  • FlG. 5 illustrates downlink scheduling information. As illustrated in FlG. 5, the identifier and the indicator of the identifier are included in the downlink scheduling information of a control signal transmitted from the eNode-B to the UE 10.
  • the eNode-B, the identifier and the indicator are transmitted to the UE 10 via a DL-SCCH.
  • the UE 10 may transmit data or a control signal to the eNode-B using the indicator and the identifier when transmitting a next message.
  • FlG. 6 illustrates an uplink scheduling grant. As illustrated in FlG. 6, the identifier and the indicator of the identifier are included in the uplink scheduling grant information of a control signal transmitted from the eNode-B to the UE 10.
  • the eNode-B transmits the uplink scheduling grant information to the UE 10 via a DL-SCCH or a DL-SCH.
  • the uplink scheduling grant information having different information may be transmitted through the DL-SCCH and the DL-SCH, respectively.
  • the identifier and the indicator of the identifier are transmitted to the UE 10 via the
  • the UE 10 may transmit data or a control signal to the eNode-B using the identifier and the indicator transmitting a next message.
  • FIG. 7 is a flowchart illustrating a method for avoiding collision according to an embodiment of the present invention.
  • FIG. 7 illustrates the identifier and the indicator of the identifier used when the UE 10 uses the RACH.
  • the UE 10 transmits the preamble portion to the eNode-B using the selected signature and the transmission occasion (Sl 10).
  • the eNode-B transmits response information for the preamble portion to the UE (S 120).
  • the response information may include an identifier, such as a MAC Id.
  • the response information may further include an indicator for identifying the identifier.
  • the eNode-B acquires a random Id using the preamble portion and generates the
  • the eNode-B and the UE 10 have the same MAC Id.
  • the eNode-B informs the UE 10 of generating method of the MAC Id by the system information or the paging information.
  • the UE 10 receives the response information for the preamble portion and transmits data using radio resource allocation information included in the response information and the identifier, such as the MAC Id, and the indicator (S 130).
  • the data may include the identifier, such as the MAC Id, and the indicator for identifying the identifier.
  • the transmitted data may be an RRC message, user data or uplink control information.
  • the eNode-B transmits response information for the data received from the UE 10
  • the response information may include the identifier, such as the MAC Id, the indicator for identifying the identifier, and a C-RNTI used by the UE 10 in the cell.
  • the response information may be an RRC message, user data or downlink control information.
  • the steps of a method described in connection with the embodiments disclosed herein may be implemented by hardware, software or a combination thereof.
  • the hardware may be implemented by an application specific integrated circuit (ASIC) that is designed to perform the above function, a digital signal processing (DSP), a programmable logic device (PLD), a field programmable gate array (FPGA), a processor, a controller, a microprocessor, the other electronic unit, or a combination thereof.
  • a module for performing the above function may implement the software.
  • the software may be stored in a memory unit and executed by a processor.
  • the memory unit or the processor may employ a variety of means that is well known to those skilled in the art.
  • the present invention relates to wireless telecommunication network.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method for avoiding collision among transmissions from user equipment in a mobile network is provided. The method includes transmitting a preamble to a base station via a random access channel (RACH) and transmitting a response signal including an identifier of the user equipment to the user equipment in response to the RACH. It is possible to transmit/receive reliable data while reducing collision among transmissions from user equipment by efficiently using the identifier of the user equipment when the user equipment uses the RACH.

Description

Description
METHOD FOR AVOIDING COLLISION USING IDENTIFIER IN
MOBILE NETWORK
Technical Field
[1] The present invention is directed to a mobile network and, specifically, to a method for avoiding collision among transmissions in a mobile network.
Background Art
[2] A third generation partnership project (3GPP) mobile system based on a wideband code division multiple access (WCDMA) radio access technology has been widely developed all over the world. A high-speed downlink packet access (HSDPA), which is a first step in the evolution of the WCDMA, provides the 3GPP with a radio access technology having high competitiveness. However, since radio access technology has been continuously developed in view of requirements and expectations of users and providers, evolution of a new technology in the 3GPP is required to increase competitiveness.
[3] Accordingly, "Evolved UTRA and UTRAN" has been studied for the purpose of developing a wireless transmission technology that can significantly reduce cost while providing a high-quality service. The 3G long-term evolution (LTE) aims to reduce cost of a user and a provider and improve service quality as well as expanded coverage and system capacity improvement. The 3G LTE requires reduced cost per bit, increased service availability, flexible use of a frequency band, a simple structure and an open interface, and adequate power consumption of a terminal as an upper-level requirement.
[4] Generally, one Node-B is deployed in one cell. A plurality of user equipment (UE) may be located in one cell. The user equipment must perform a random access process for access to a network.
[5] FIG. 1 is a block diagram illustrating a communication network, such as a network structure of an evolved universal mobile telecommunication system (E-UMTS). The E- UMTS may be also referred to as an LTE system. The communication network is widely deployed so as to provide a variety of communication services such as sound and packet data.
[6] As illustrated in HG. 1 , the E-UMTS network includes an evolved UMTS terrestrial radio access network (E-UTRAN) and a core network (CN). The E-UTRAN may include one or more evolved Node-B (eNode-B) 20. The CN may include a node for registering a user of a user equipment (UE) 10 and one or more E-UTRAN access gateway (AG) 30 positioned at the end of the network and connected to an external network.
[7] As used herein, "downlink" refers to communication from an eNode-B 20 to the UE
10 and "uplink" refers to communication from the UE to an eNode-B. The UE 10 refers to communication equipment carried by a user and may be also be referred to as a mobile station (MS), a user terminal (UT), a subscriber station (SS) or a wireless device.
[8] An eNode-B 20 provides end points of a user plane and a control plane to the UE
10. An AG 30 provides an end point of a session and mobility management function for the UE 10. An eNode-B 20 and an AG 30 may be connected via an Sl interface.
[9] An eNode-B 20 is generally a fixed station that communicates with a UE 10 and may also be referred to as a base station (BS) or an access point. One eNode-B 20 may be deployed per cell. An interface for transmitting user traffic or control traffic may be used between eNode-Bs 20.
[10] An AG 30 is also referred to as a mobility management entity/user plane entity
(MMEAJPE). An AG 30 may be classified into a portion for performing a user traffic process and a portion for performing a control traffic process. New communication may be performed between an AG 30 for performing the user traffic process and an AG for performing the control traffic process using a new interface.
[11] An interface for distinguishing between the E-UTRAN and the CN may be used. A plurality of nodes may be connected between an eNode-B 20 and an AG 30 via the Sl interface. The eNode-B s 20 may be connected to each other via an X2 interface and neighboring eNode-B s 20 may always have a meshed network structure that has the X2 interface.
[12] Layers of radio interface protocol between the UE 10 and the network may be classified into a first layer Ll, a second layer L2 and a third layer L3 based on three lower-level layers of an open system interconnection (OSI) reference model that is widely known in communication networks. A physical layer belonging to the first layer provides an information transfer service using a physical channel. A radio resource control (RRC) layer belonging to the third layer serves to control radio resources between the UE 10 and the network. The UE and the network exchange an RRC message via the RRC layer.
[13] The RRC layer may be located in a network node of an eNode-B 20 or AG 30. Alternatively, the RRC layer may be located at an eNode-B 20 or AG 30.
[14] The radio interface protocol horizontally includes a physical layer, a data link layer and a network layer and vertically a user plane for transmitting data information and a control plane for transmitting a control signal. FIG. 2 is a block diagram illustrating the control plane of the radio interface protocol. FIG. 3 is a block diagram illustrating the user plane of the radio interface protocol. FIGS. 2 and 3 illustrate the structure of the radio interface protocol between the UE 10 and the E-UTRAN based on a radio access network standard.
[15] As illustrated in FIGS. 2 and 3, the physical layer provides an information transfer service to an upper-level layer using a physical channel. The physical layer is connected to a medium access control (MAC) layer, which is an upper-level layer, via a transport channel.
[16] Data is transferred between the MAC layer and the physical layer via the transport channel. Data is transferred between different physical layers, such as, a physical layer for a transmitter and a physical layer for a receiver, via a physical channel.
[17] The MAC layer, which belongs to the second layer, provides a service to a radio link control (RLC) layer, which is an upper-level layer, via a logical channel. The RLC layer, which belongs to the second layer, supports reliable data transmission. It should be noted that the RLC layer is depicted in dotted lines, because if the RLC functions are implemented in and performed by the MAC layer, the RLC layer itself may not need to exist.
[18] A packet data convergence protocol (PDCP) layer, which belongs to the second layer, performs a header compression function to reduce the size of an Internet Protocol (IP) packet header that includes unnecessary control information and has a relatively large size. In this way, efficient transmission of packets in a radio section having a narrow bandwidth may be facilitated when transmitting an IP packet, such as an IPv4 packet or an IPv6 packet.
[19] The Radio Resource Control (RRC) layer, which belongs to the third layer, is defined in only the control plane. The RRC layer serves to control the logical channel, the transport channel and the physical channels in association with configuration, reconfiguration and release of radio bearers. A radio bearer is a service provided by the second layer for data transmission between the UE 10 and E-UTRAN.
[20] A downlink transport channel for transmitting data from the network to the UE 10 includes a broadcast channel (BCH) for transmitting system information and a downlink shared channel (SCH) and shared control channel (SCCH) for transmitting the user traffic or a control message. The traffic or the control message of a downlink multicast service or broadcast service may be transmitted via the downlink SCH or a additional multicast channel (MCH).
[21] An uplink transport channel for transmitting data from the UE 10 to the network includes a random access channel (RACH) for transmitting an initial control message and an uplink shared channel (SCH) and shared control channel (SCCH) for transmitting the user traffic or the control message. The RACH for transmitting the initial control message from the UE 10 to the network will now be described.
[22] The random access process is performed via a random access channel (RACH) that is an uplink transport channel. The user equipment transmits an initial control message to the network via the RACH. The RACH is used to synchronize the user equipment with the network and to acquire radio resources when the user equipment needs to transmit data but has no uplink radio resources for transmitting the data.
[23] More than one user equipment may try to acquire the same radio resources via the
RACH. When this occurs, more than one user equipment may simultaneously transmit messages using the same radio resources. The messages may collide with each other and their transmission may fail.
[24] A user equipment that fails to transmit a message uses the RACH again after a predetermined time elapses. Data transmission time may significantly increase due to collisions and radio resources may be wasted due to re-access. Disclosure of Invention Technical Problem
[25] An object of the invention is to provide a method for avoiding collision among transmissions from user equipment using an identifier in a mobile network.
Technical Solution
[26] In one aspect of the present invention, a method for communicating information in a mobile communication system is provided. The method includes transmitting a preamble over a random access channel (RACH), receiving a response to the preamble, the response including an identifier and an indicator, the identifier generated according to the preamble and the indicator corresponding to the identifier and transmitting data using the identifier and indicator.
[27] It is contemplated that the identifier includes one of a random identifier (random
Id), a MAC identifier (MAC Id), a cell-radio network temporary identity (C-RNTI) and a packet-temporary mobile subscriber identity (P-TMSI). It is further contemplated that the data is transmitted in one of an RRC message, user data and uplink control information.
[28] It is contemplated that the method further includes receiving a response to the data including the identifier, the indicator and a C-RNTI. It is further contemplated that the response is one of an RRS message, user data and downlink control information.
[29] In another aspect of the present invention, a method for communicating information in a mobile communication system is provided. The method includes receiving a preamble over a random access channel (RACH), generating an identifier according to the preamble, generating an indicator corresponding the identifier, transmitting a response to the preamble, the response including the identifier and the indicator and receiving data transmitted using the identifier and indicator.
[30] It is contemplated that the identifier is generated according to at least one of a signature and a RACH occasion in the preamble. It is further contemplated that the identifier includes one of a random identifier (random Id), a MAC identifier (MAC Id), a cell-radio network temporary identity (C-RNTI) and a packet-temporary mobile subscriber identity (P-TMSI).
[31] It is contemplated that the method further includes using the identifier and indicator in the received data to determine from which mobile communication terminal the data was received. It is further contemplated that the data is received in one of an RRC message, user data and uplink control information.
[32] It is contemplated that the method further includes transmitting a response to the data including the identifier, the indicator and a C-RNTI. It is further contemplated that the response is transmitted in one of an RRS message, user data and downlink control information.
[33] In another aspect of the present invention, a method for communicating information in a mobile communication system is provided. The method includes a mobile communication terminal transmitting a preamble over a random access channel (RACH), a network generating an identifier according to the preamble and an indicator corresponding the identifier, the network transmitting a response to the preamble, the response including the identifier and the indicator and the mobile communication terminal transmitting data using the identifier and indicator.
[34] It is contemplated that the network generates the identifier according to at least one of a signature and a RACH occasion in the preamble. It is further contemplated that the identifier includes one of a random identifier (random Id), a MAC identifier (MAC Id), a cell-radio network temporary identity (C-RNTI) and a packet-temporary mobile subscriber identity (P-TMSI).
[35] It is contemplated that the method further includes the network using the identifier and indicator in the received data to determine that the data was received form the mobile communication terminal. It is further contemplated that the mobile communication terminal transmits the data in one of an RRC message, user data and uplink control information.
[36] It is contemplated that the method further includes the network transmitting a response to the data including the identifier, the indicator and a C-RNTI. It is further contemplated that network transmits the response in one of an RRS message, user data and downlink control information.
[37] Additional features and advantages of the invention will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the invention. It is to be understood that both the foregoing general description and the following detailed description of the present invention are exemplary and explanatory and are intended to provide further explanation of the invention as claimed.
[38] These and other embodiments will also become readily apparent to those skilled in the art from the following detailed description of the embodiments having reference to the attached figures, the invention not being limited to any particular embodiments disclosed. Advantageous Effects
[39] According to the present invention, it is possible to transmit/receive reliable data while reducing collision among transmissions from UEs by providing a method for efficiently using an identifier of an UE when the UE uses a RACH and a method for using an indicator when using the identifier. Brief Description of the Drawings
[40] The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention. Features, elements, and aspects of the invention that are referenced by the same numerals in different figures represent the same, equivalent, or similar features, elements, or aspects in accordance with one or more embodiments.
[41] FIG. 1 is a block diagram illustrating a communication network.
[42] FIG. 2 is a block diagram illustrating a control plane of a radio interface protocol.
[43] FIG. 3 is a block diagram illustrating a user plane of a radio interface protocol.
[44] FIG. 4 illustrates an example of a physical random access channel (PRACH).
[45] FIG. 5 illustrates downlink scheduling information.
[46] FIG. 6 illustrates an uplink scheduling grant.
[47] FIG. 7 is a flowchart illustrating a method for avoiding collision according to an embodiment of the present invention. Best Mode for Carrying Out the Invention
[48] Hereinafter, exemplary embodiments of the present invention will be described with reference to the attached drawings. Like reference numerals in the drawings denote like elements throughout the whole specification.
[49] When a UE 10 is turned on, it attempts to access a new cell via the RACH. The UE
10 receives the system information from the cell in synchronization with a downlink channel.
[50] After receiving the system information, the UE 10 must transmit an access request message for RRC connection. However, the RACH is used since the UE 10 is not synchronized with the current network and uplink radio resources are not ensured. The UE 10 requests allocation of radio resources, in order to transmit the access request message to the network using the RACH.
[51] The eNode-B receives the radio resources request and allocates radio resources to the UE 10. The UE then transmits the RRC access message to the network using the allocated radio resources.
[52] When a UE 10 is RRC-connected to the network, it receives the radio resources according to the scheduling of the radio resources from the network and transmits data to the network using the radio resources. The network no longer allocates the uplink radio resources to the UE 10 when no data for transmission is left in a buffer of the UE because it is inefficient that uplink radio resources are allocated to a UE having no data for transmission.
[53] The buffer state of the UE 10 is reported to the network according to periods or occurrence of an incident. When new data is received in the buffer of a UE 10 having no radio resources, the UE uses the RACH because the UE has no allocated uplink radio resources. The UE 10 requests allocation of the radio resources necessary for transmitting the data to the network using the RACH.
[54] The RACH of the WCDMA will be described. The RACH is used to transmit short- length data in the uplink direction.
[55] A portion of an RRC message, such as an RRC connection request message, a cell update message, and an URA update message, is transmitted via the RACH. A logical channel, such as a common control channel (CCCH), a dedicated control channel (DCCH), and a dedicated traffic channel (DTCH) may be mapped to RACH. The RACH may be mapped to a physical channel, such as a physical random access channel (PRACH).
[56] FIG. 4 is a view showing an example of the PRACH. As illustrated in FIG. 4, the
PRACH, which is uplink physical channel, may include a preamble portion and a message portion.
[57] The preamble portion performs a power ramping function for adjusting transport power used to transmit a message and a function for avoiding collision among transmissions from several UEs 10. The message portion performs a function for transmitting an MAC protocol data unit (PDU) sent from the MAC layer to the physical channel.
[58] The physical layer selects one access slot and one signature and transmits the preamble portion of the PRACH in the uplink direction when the MAC layer of the UE 10 indicates the physical layer to transmit the PRACH. The preamble portion may be transmitted during the access slot interval having a length of 1.33 ms. One signature may be selected from among 16 signatures during a certain initial interval of the access slot.
[59] The eNode-B may transmit a response signal via a downlink physical channel, such as an acquisition indicator channel (AICH) when the UE 10 transmits the preamble. The eNode-B transmits the response signal, which includes an acknowledgement (ACK) response or a non-acknowledgement (NACK) response, to the UE 10 via the AICH. The UE 10 transmits the message portion when it receives the ACK. The MAC layer of the UE 10 indicates the physical layer of the UE to transmit the PRACH after a predetermined time when it receives the NACK.
[60] The UE 10 transmits a new preamble at power level that is higher than that of the previous preamble by one level after a designated access slot when it does not receive any response signal corresponding to the transmitted preamble.
[61] A data transport signal or a control signal may be transmitted from the eNode-B to the UE 10 in addition to the preamble of the RACH. The control signal transmitted from the eNode-B to the UE includes downlink scheduling information, uplink scheduling grant and response information on the transmission of the preamble portion of the RACH.
[62] An identifier is used to avoid collision among transmissions from the UEs 10 in the uplink or downlink direction. The eNode-B generates the identifier and transmits the identifier to the UE 10 and the UE transmits data using the identifier.
[63] An indicator for identifying the identifiers may also be included when the UE uses the identifier in order to avoid collision between identifiers. The identifier may be used by the eNode-B to distinguish between the UEs 10 when the UE transmits the data or the control signal to the eNode-B. The indicator of the identifier may be used together with the identifier.
[64] The eNode-B may transmit the data or the control signal to a specific UE 10 using the identifier. The indicator of the identifier may be used together with the identifier. The identifier may be required when the data is transmitted from the UE 10 to the eNode-B.
[65] Hereinafter, the identifier and the indicator will be described. The identifier may be a random identifier (random Id), a MAC identifier (MAC Id), a cell-radio network temporary identity (C-RNTI) or a packet-temporary mobile subscriber identity (P-TMSI).
[66] The random Id and the MAC Id may be used when using the RACH. The random
Id or the MAC Id may have the same length as that of the C-RNTI.
[67] For example, the random Id, the MAC ID and the C-RNTI may all have a length of
10 bits. Alternatively, only the MAC Id and the C-RNTI may have the same length.
[68] The UE 10 and the eNode-B may generate the same random Id in accordance with a transmission occasion and the signature of the preamble part selected by the UE. For example, the UE 10 and the eNode-B may acquire the same random Id from information on the signature and the transmission occasion when the UE transmits the signature of the preamble part to the eNode-B via the transmission occasion once. The eNode-B informs the UE 10 of information for acquiring the random Id, such as information on the signature and the transmission occasion, via system information or a paging message.
[69] The MAC Id may be an identifier used to identify the UE 10 in a specific cell before the eNode-B allocates the C-RNTI to the UE. The MAC Id may be acquired from the random Id.
[70] The random Id and the MAC Id may be identical when the random Id has the same length as that of the C-RNTI. A Random Id may extend the MAC Id when the length of the random Id is less than that of the C-RNTI. The eNode-B informs the UE 10 how to acquire the MAC Id from the random Id via the system information or the paging message.
[71] The C-RNTI is the identifier for identifying the UE 10 in one cell and is allocated and/or de-allocated by the eNode-B. The UE 10 may receive a new C-RNTI from the eNode-B when the UE enters a new cell. The MAC Id has the same length as that of the C-RNTI. The P-TMSI is an identifier for identifying the UE 10 in one CN and is allocated and/or de-allocated by the AG 30.
[72] The indicator of the identifier distinguishes between the identifiers. The indicator distinguishes between the identifiers used in the RACH, such as the random Id, the MAC Id and the C-RNTI. The indicator is used to prevent the identifiers from colliding with each other when the length of the random Id or the MAC Id is identical to that of the C-RNTI.
[73] For example, if the length of the MAC Id is identical to that of the C-RNTI and UE
A has a C-RNTI having 8 bits in the current cell with a value of 1111 0000, UE B uses the RACH to access the cell. Additionally, if the MAC Id is acquired from the random Id and the MAC Id also has a length of 8 bits and the value of 1111 0000, the eNode-B tries to transmit the response information for the preamble part to UE B using the identifier.
[74] However, UE A may erroneously receive the information transmitted to UE B since
UE A also receives the information from the eNode-B using its identifier. Furthermore, since UE B uses the MAC Id before receiving the C-RNTI from the eNode-B, the eNode-B may not be able to determine whether the information is transmitted from UE A or UE B when UE B transmits specific information to the eNode-B using its identifier.
[75] The indicator is used to distinguish between the random Id or MAC Id that identifies the UE 10 in the RACH and the C-RNTI or P-TMSI used for communication between the eNode-B and the CN in the cell. For example, a value of "0" may indicate the random Id or the MAC Id and a value of " 1 " may indicate the C-RNTI or the P- TMSI when the indicator has one bit.
[76] Hereinafter, the transmitted identifier and indicator will be described. FlG. 5 illustrates downlink scheduling information. As illustrated in FlG. 5, the identifier and the indicator of the identifier are included in the downlink scheduling information of a control signal transmitted from the eNode-B to the UE 10.
[77] As illustrated in FIG. 5, the eNode-B, the identifier and the indicator are transmitted to the UE 10 via a DL-SCCH. The UE 10 may transmit data or a control signal to the eNode-B using the indicator and the identifier when transmitting a next message.
[78] FlG. 6 illustrates an uplink scheduling grant. As illustrated in FlG. 6, the identifier and the indicator of the identifier are included in the uplink scheduling grant information of a control signal transmitted from the eNode-B to the UE 10.
[79] As illustrated in FIG. 6, the eNode-B transmits the uplink scheduling grant information to the UE 10 via a DL-SCCH or a DL-SCH. The uplink scheduling grant information having different information may be transmitted through the DL-SCCH and the DL-SCH, respectively.
[80] The identifier and the indicator of the identifier are transmitted to the UE 10 via the
DL-SCCH or the DL-SCH. The UE 10 may transmit data or a control signal to the eNode-B using the identifier and the indicator transmitting a next message.
[81] FIG. 7 is a flowchart illustrating a method for avoiding collision according to an embodiment of the present invention. FIG. 7 illustrates the identifier and the indicator of the identifier used when the UE 10 uses the RACH.
[82] As illustrated in FIG. 7, the UE 10 transmits the preamble portion to the eNode-B using the selected signature and the transmission occasion (Sl 10). The eNode-B transmits response information for the preamble portion to the UE (S 120).
[83] The response information may include an identifier, such as a MAC Id. The response information may further include an indicator for identifying the identifier.
[84] The eNode-B acquires a random Id using the preamble portion and generates the
MAC Id. The eNode-B and the UE 10 have the same MAC Id. The eNode-B informs the UE 10 of generating method of the MAC Id by the system information or the paging information.
[85] The UE 10 receives the response information for the preamble portion and transmits data using radio resource allocation information included in the response information and the identifier, such as the MAC Id, and the indicator (S 130). The data may include the identifier, such as the MAC Id, and the indicator for identifying the identifier. The transmitted data may be an RRC message, user data or uplink control information.
[86] The eNode-B transmits response information for the data received from the UE 10
(S 140). The response information may include the identifier, such as the MAC Id, the indicator for identifying the identifier, and a C-RNTI used by the UE 10 in the cell. The response information may be an RRC message, user data or downlink control information.
[87] The steps of a method described in connection with the embodiments disclosed herein may be implemented by hardware, software or a combination thereof. The hardware may be implemented by an application specific integrated circuit (ASIC) that is designed to perform the above function, a digital signal processing (DSP), a programmable logic device (PLD), a field programmable gate array (FPGA), a processor, a controller, a microprocessor, the other electronic unit, or a combination thereof. A module for performing the above function may implement the software. The software may be stored in a memory unit and executed by a processor. The memory unit or the processor may employ a variety of means that is well known to those skilled in the art.
[88] As described above, according to the present invention, it is possible to transmit/ receive reliable data while reducing collision among transmissions from UEs by providing a method for efficiently using an identifier of an UE when the UE uses a RACH and a method for using an indicator when using the identifier.
[89] As the present invention may be embodied in several forms without departing from the spirit or essential characteristics thereof, it should also be understood that the above-described embodiments are not limited by any of the details of the foregoing description, unless otherwise specified, but rather should be construed broadly within its spirit and scope as defined in the appended claims. Therefore, all changes and modifications that fall within the metes and bounds of the claims, or equivalence of such metes and bounds are intended to be embraced by the appended claims.
[90] The foregoing embodiments and advantages are merely exemplary and are not to be construed as limiting the present invention. The present teaching can be readily applied to other types of apparatuses. The description of the present invention is intended to be illustrative, and not to limit the scope of the claims.
[91] Many alternatives, modifications, and variations will be apparent to those skilled in the art. In the claims, means-plus-function clauses are intended to cover the structure described herein as performing the recited function and not only structural equivalents but also equivalent structures. Industrial Applicability
[92] The present invention relates to wireless telecommunication network.

Claims

Claims
[1] A method for communicating information in a mobile communication system, the method comprising: transmitting a preamble over a random access channel (RACH); receiving a response to the preamble, the response comprising an identifier and an indicator, the identifier generated according to the preamble and the indicator corresponding to the identifier; and transmitting data using the identifier and indicator. [2] The method of claim 1, wherein the identifier comprises one of a random identifier (random Id), a MAC identifier (MAC Id), a cell-radio network temporary identity (C-RNTI) and a packet-temporary mobile subscriber identity
(P-TMSI). [3] The method of claim 1, wherein the data is transmitted in one of an RRC message, user data and uplink control information. [4] The method according to claim 1, further comprising receiving a response to the data comprising the identifier, the indicator and a C-RNTI. [5] The method of claim 4, wherein the response is one of an RRS message, user data and downlink control information. [6] A method for communicating information in a mobile communication system, the method comprising: receiving a preamble over a random access channel (RACH); generating an identifier according to the preamble; generating an indicator corresponding the identifier; transmitting a response to the preamble, the response comprising the identifier and the indicator; and receiving data transmitted using the identifier and indicator. [7] The method of claim 6, wherein the identifier is generated according to at least one of a signature and a RACH occasion in the preamble. [8] The method of claim 6, wherein the identifier comprises one of a random identifier (random Id), a MAC identifier (MAC Id), a cell-radio network temporary identity (C-RNTI) and a packet-temporary mobile subscriber identity(P-TMSI). [9] The method of claim 6, further comprising: using the identifier and indicator in the received data to determine from which mobile communication terminal the data was received. [10] The method of claim 6, wherein the data is received in one of an RRC message, user data and uplink control information. [11] The method of claim 6, further comprising transmitting a response to the data comprising the identifier, the indicator and a C-RNTI. [12] The method of claim 11, wherein the response is transmitted in one of an RRS message, user data and downlink control information. [13] A method for communicating information in a mobile communication system, the method comprising: a mobile communication terminal transmitting a preamble over a random access channel (RACH); a network generating an identifier according to the preamble and an indicator corresponding the identifier; the network transmitting a response to the preamble, the response comprising the identifier and the indicator; and the mobile communication terminal transmitting data using the identifier and indicator. [14] The method of claim 13, wherein the network generates the identifier according to at least one of a signature and a RACH occasion in the preamble. [15] The method of claim 13, wherein the identifier comprises one of a random identifier (random Id), a MAC identifier (MAC Id), a cell-radio network temporary identity (C-RNTI) and a packet-temporary mobile subscriber identity (P-TMSI). [ 16] The method of claim 13 , further comprising : the network using the identifier and indicator in the received data to determine that the data was received form the mobile communication terminal. [17] The method of claim 13, wherein the mobile communication terminal transmits the data in one of an RRC message, user data and uplink control information. [18] The method of claim 13, further comprising the network transmitting a response to the data comprising the identifier, the indicator and a C-RNTI. [19] The method of claim 18, wherein network transmits the response in one of an
RRS message, user data and downlink control information.
PCT/KR2007/000667 2006-02-07 2007-02-07 Method for avoiding collision using identifier in mobile network WO2007091841A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/159,574 US8493854B2 (en) 2006-02-07 2007-02-07 Method for avoiding collision using identifier in mobile network
EP07708817.7A EP1982438B1 (en) 2006-02-07 2007-02-07 Method for avoiding collision using identifier in mobile network

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US77130506P 2006-02-07 2006-02-07
US60/771,305 2006-02-07
KR10-2006-0087372 2006-09-11
KR1020060087372A KR101216751B1 (en) 2006-02-07 2006-09-11 Method for avoiding collision using identifier in mobile network

Publications (1)

Publication Number Publication Date
WO2007091841A1 true WO2007091841A1 (en) 2007-08-16

Family

ID=38345392

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2007/000667 WO2007091841A1 (en) 2006-02-07 2007-02-07 Method for avoiding collision using identifier in mobile network

Country Status (1)

Country Link
WO (1) WO2007091841A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8867454B2 (en) 2008-03-20 2014-10-21 Motorola Mobility Llc Method for allocating non-dedicated resource as a dedicated resource

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0617875B1 (en) * 1992-10-19 1997-12-17 Nokia Telecommunications Oy A random access method in a radio system
US6597675B1 (en) * 1997-04-30 2003-07-22 Telefonaktiebolaget Lm Ericsson (Publ) Random access in a mobile telecommunications system
WO2004100598A1 (en) 2003-05-12 2004-11-18 Telefonaktiebolaget Lm Ericsson (Publ) Fast setup of physical communication channels
US20050041573A1 (en) * 2003-07-30 2005-02-24 Samsung Electronics Co., Ltd. Ranging method in a broadband wireless access communication system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0617875B1 (en) * 1992-10-19 1997-12-17 Nokia Telecommunications Oy A random access method in a radio system
US6597675B1 (en) * 1997-04-30 2003-07-22 Telefonaktiebolaget Lm Ericsson (Publ) Random access in a mobile telecommunications system
WO2004100598A1 (en) 2003-05-12 2004-11-18 Telefonaktiebolaget Lm Ericsson (Publ) Fast setup of physical communication channels
US20050041573A1 (en) * 2003-07-30 2005-02-24 Samsung Electronics Co., Ltd. Ranging method in a broadband wireless access communication system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1982438A4

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8867454B2 (en) 2008-03-20 2014-10-21 Motorola Mobility Llc Method for allocating non-dedicated resource as a dedicated resource

Similar Documents

Publication Publication Date Title
EP1982438B1 (en) Method for avoiding collision using identifier in mobile network
USRE49739E1 (en) Method for signaling back-off information in random access
USRE48836E1 (en) Method for signaling back-off information in random access
US8576780B2 (en) Random access response processing
JP4523072B2 (en) Redirection method for uplink connection
EP2084928B1 (en) Method of performing random access in a wireless communication system
KR101384865B1 (en) Random access method for enhancing contention resolution
KR101260079B1 (en) Random access method in wireless communication system
US8175052B2 (en) Method for transmitting response information in mobile communications system
EP2145493B1 (en) Enhancement of lte random access procedure
KR101319870B1 (en) Method for handover in mobile communication system
US8825050B2 (en) Random access channel preamble detection
US20100014468A1 (en) Method of transmitting and receiving wireless resource information
US20110310857A1 (en) Random access procedure
US8493854B2 (en) Method for avoiding collision using identifier in mobile network
EP2052471A1 (en) Method for performing handover
WO2007091841A1 (en) Method for avoiding collision using identifier in mobile network
WO2013073746A1 (en) Random access to the tp selected based on reception timing

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2007708817

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 12159574

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE