throbber

`R2-060905
`
` R2-060905
`
`3GPP RAN1/RAN2 joint meeting on LTE
`Athens, Greece, 27th–31th March, 2006
`
`
`Agenda Item:
`Source:
`
`Title:
`
`Document for:
`
`3.2
`CATT, RITT
`Access procedure for TDD
`Discussion and decision
`
`
`
`Introduction
`
` 1
`
`Currently, the access process and the UE id have been presented in the RAN2 meeting. In this document the
`access procedure is analyzed under different application scenes and the information carried on RACH is
`discussed.
`
` 2
`
` Discussion
`2.1 Access Procedure
`The access procedure performed in the uplink is not synchronised in most scenes. It is usually a contention-based
`random procedure. Firstly, UE listens to system broadcast, reads the system information, from which the UE can
`get necessary information for random access.
`
`To reduce the collision probability and detect possible collisions fast, a number of sequences, namely signatures
`are needed. By correlating with different signatures, the eNB can detect one particular UE or collisions. The UE is
`assumed to identify itself in a random access procedure autonomously by choosing a signature randomly from a
`set of signatures. The randomly selected signature by UE’s physical layer is referred to as Signature ID. In one
`cell of 1.25 MHz, the number of signatures may be more than ten (e.g. 4bits). During the random access procedure,
`UE selects a signature (preamble) randomly, estimates the transmission timing advance due to the
`non-synchronization of uplink and transmits it. Then the UE listens to the preamble response.
`
`If UE doesn’t receive the preamble response within the pre-defined period, it will select a new signature randomly
`and transmit it again after a random time until the UE has received a expected response or the maximal number of
`retransmit has been reached.
`
`When eNodeB received the preamble signal, its physical layer deals with the signal by correlation, gets the uplink
`timing advance and uplink transmit power precisely, reads the signature id of UE, and report to MAC. The MAC
`of eNodeB allocates a C-RNTI, selects a response channel of preamble and transfers the C-RNTI to physical layer.
`The physical layer transmits the C-RNTI, timing and power information to the UE on response channel of
`preamble corresponding to the Signature ID. When two or more UEs transmit preamble signal at the same time
`with different signature ID, eNodeB should have the capability to distinguish different UE’s preamble, and gives
`different UE different C-RNTI and other information on different preamble response channels.
`
`When two or more UEs transmit preamble signal at the same time with same signature ID, the collision will
`happen. In this case, eNodeB may detect collision, and doesn't give the response of preamble. If eNodeB doesn’t
`detect the collision(namely only one signature is obtained ), it thinks only one UE sent the access request. Then
`eNodeB provides one C-RNTI and other information on the preamble response channel. The undetected collision
`
`
`
`1
`
`Ericsson v. IV II LLC
`Ex. 1007 / Page 1 of 4
`
`

`

`
`R2-060905
`
`will happen since multiple UEs will get and utilise the same response information. Of course, the probability of
`such collision is usually very low and it can be found during the following operation, as described below.
`
`After UE received the C-RNTI together with timing and power information, it can transmit the L2 control
`message on the physical random access channel (e.g. PRACH) corresponding to preamble response channel. The
`relationship of PRACH with preamble response channel is broadcasted in the system information. To reduce the
`delay of access request, the data on RACH will be limited. The data should be transmitted within a sub-frame
`(FDD) or timeslot(TDD). The RACH may include Random ID, C-RNTI, access cause etc. The Random ID is
`selected randomly by UE. Due to the RACH includes a Random ID that can be designed long enough (e.g. 8bits),
`the residual possible collisions can be resolved in this step.
`
`UE listens to a downlink share control channel (DL-SCCH) corresponding to preamble response channel or
`PRACH. The relationship of the DL-SCCH with preamble response channel or PRACH is broadcasted in the
`system information. Scheduling information for the access UE (signed by the C-RNTI) is carried on the
`DL-SCCH.
`
`The system can predefine some types of radio resource configurations for access causes. When eNodeB received
`the UE’s RACH data, it will check the random ID to see if two or more UEs using same C-RNTI. If yes, the
`eNodeB will not schedule this C-RNTI. If these UEs do not find the scheduling information on the related
`DL-SCCH after a period of time, they will consider that the access procedure is failure and reinitiate the access
`requests according to their requirements respectively. If eNodeB receives RACH successfully, it will select a type
`of configuration of radio resource on UL-SCH according to the access cause, and notify the UE on the DL-SCCH.
`The Random ID can be transferred to UE on DL-SCCH or a RACH response channel or a L3 message. Which
`channel transfers the Random ID to UE is FFS. Using the Random ID, the UE can know the schedule information
`for the C-RNTI is for which UE within collision UEs in first access step.
`
`Then, the UE can communicate with NW on UL-SCH/DL-SCH normally. It will transfer IMSI or TMSI in the L3
`message on UL-SCH to setup RRC connection and other message. The random access procedure can be seen as in
`figure 1.
`
`Figure 1: The general random access procedure
`2.2 Access scenarios and UE ID
`The initial access is used in the fellow scenes:
`
`1) When UE in power on, the UE would access NW to take registration;
`2) The UE moves to a new trace area, it will access NW to update location;
`3) The UE requires the NW to provide service, it will access NW;
`
`
`
`2
`
`
`
`Ex. 1007 / Page 2 of 4
`
`

`

`
`R2-060905
`
`4) After UE is paged by NW, it will access NW;
`5) The UE has connected with eNodeB, but uplink is non-synchronized and UE having data to transmit;
`6) During handover, but the uplink is non-synchronized, UE will random access in new cell or in old cell.
`7) The UE has connected with eNodeB, in the DRX state, the uplink is synchronized, but it needs radio
`resource immediately;
`
`In scene 1), the NW hasn’t any information about the UE. The UE has static ID of IMSI or IMEI only. The access
`procedure is same as figure1 in the step 1 to step 5. But in the step 6, the L3 message will carry the IMSI to
`eNodeB. Then the NW will setup RRC connection and do authentication and encrypt, give the UE a TMSI, and
`encrypt key. After the UE has registered on the NW, the RRC connection will be released together with C-RNTI.
`The UE will enter the LTE-IDLE state.
`
`In scene 2), 3), 4), the UE has the temporary identity (TMSI) and the last encrypt key. The NW has the UE’s
`capability information, encrypt information and so on. The access procedure is same as figure1 in the step 1 to
`step 5. But in the step 6, the L3 message will carry the TMSI to eNodeB. The eNodeB transfers the information to
`aGW. The aGW gets information above, it can give the UE new encrypt key. In addition, in scene 4), the
`necessary information should be carried on the PCH when the NW paging UE to speed up access procedure.
`
`In scene 5), 6), the NW has all information about the UE, and UE can initiate access on RACH with its C-RNTI
`after preamble and ignores allocated new C-RNTI. Then UE transmits user data on the UL-SCH/DL-SCH
`according to the scheduling information on the DL-SCCH corresponding to PRACH. The eNodeB could know
`that the UE has a RRC connection already via the C-RNTI, it will ignore the random ID. After a period of time,
`eNodeB doesn’t receive the PRACH of new allocated C-RNTI, it will see that access is failure, and frees the
`C-RNTI. The random access procedure can be seen as in figure 2.
`
`Error! Objects cannot be created from editing field codes.
`Figure 2: The random access procedure in case 5) and 6)
`
`In scene 7), the NW has all information about the UE, and UE is synchronized in uplink. The UE can initiate
`access on RACH with C-RNTI directly. The eNodeB could know that the UE has a RRC connection already via
`the C-RNTI, it will ignore the random ID. Then UE transmits user data on the UL-SCH/DL-SCH according to the
`scheduling information on the DL-SCCH corresponding to PRACH. The random access procedure can be seen as
`in figure 3.
`
`Sum up the above depicted, the data on the RACH should be include following types:
`
`Figure 3: The random access procedure in case 7)
`
`Random ID(e.g.8bits) C-RNTI (xbits) Access Cause(xbits) Resource Indicator(xbits)
`The resource indicator is used for UE to request radio resource or report the buffer information.
`
`
`
`
`
`
`
`3
`
`Ex. 1007 / Page 3 of 4
`
`

`

`
`R2-060905
`
`3 Conclusion
`In this document we have discussed the random access procedure and the use of RACH in every scene. The access
`procedure is put forward that firstly UE transmits a preamble to synchronize with eNodeB, reduce the probability
`of collision, and fast detection in eNodeB; and then transmits RACH with Random ID, C-RNTI, access cause and
`Resource Indicator. Since active UE is synchronized in uplink, it can initiate access procedure using C-RNTI
`directly.
`4 References
`[1]
`TR25.813 “Radio interface protocol aspects”, 2005.
`[2]
`
`TR25.814 “Physical Layer Aspects for Evolved UTRA”, 2005.
`
`[3] R1-060520, EUTRA TDD Random Access Procedure, CATT, RITT, TD-Tech
`
`
`
`
`
`4
`
`Ex. 1007 / Page 4 of 4
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket