WO2017120091A2 - Methods of transmitting mission critical small data using random access channel - Google Patents
Methods of transmitting mission critical small data using random access channel Download PDFInfo
- Publication number
- WO2017120091A2 WO2017120091A2 PCT/US2016/069113 US2016069113W WO2017120091A2 WO 2017120091 A2 WO2017120091 A2 WO 2017120091A2 US 2016069113 W US2016069113 W US 2016069113W WO 2017120091 A2 WO2017120091 A2 WO 2017120091A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- base station
- user equipment
- short message
- code word
- codebook
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000013507 mapping Methods 0.000 claims abstract description 9
- 238000004891 communication Methods 0.000 claims description 17
- 230000004044 response Effects 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 9
- 238000009826 distribution Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 6
- 238000012986 modification Methods 0.000 description 6
- 230000004048 modification Effects 0.000 description 6
- 230000007774 longterm Effects 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/0001—Arrangements for dividing the transmission path
- H04L5/0014—Three-dimensional division
- H04L5/0016—Time-frequency-code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0053—Allocation of signaling, i.e. of overhead other than pilot signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0058—Allocation criteria
- H04L5/0064—Rate requirement of the data, e.g. scalable bandwidth, data priority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W56/00—Synchronisation arrangements
- H04W56/004—Synchronisation arrangements compensating for timing error of reception due to propagation delay
- H04W56/0045—Synchronisation arrangements compensating for timing error of reception due to propagation delay compensating for timing error by altering transmission time
Definitions
- This application generally relates to wireless telecommunication and particularly relates to methods of transmitting mission critical small data in a wireless network using a random access channel.
- a user equipment communicates voice and/or data signals with one or more service networks via base stations (also referred to as “evolved Node-Bs" (eNBs)).
- eNBs evolved Node-Bs
- a UE may initiate a random access procedure to
- the random access procedure can be performed in a contention-based or non-contention-based manner depending on whether a Random Access Channel (RACH) resource used by the UE is randomly selected by the UE itself or assigned by the network.
- RACH Random Access Channel
- MTC machine-type communications
- M2M machine-to-machine
- MTC communication has some different features than current human-to- human (H2H) communications.
- a MTC device such as a smart meter may generate a very small data transmission during its report time interval and then go to sleep for a long time interval.
- a MTC device e.g., a fire alarm
- An object of the present application is to provide a method for transmitting mission- critical small data between UE and base station using a random access channel with reduced overhead and time delay.
- a method for a user equipment to transmit a short message to a base station includes the following operations: generating a short message; choosing, among a plurality of codebooks, a codebook corresponding to the short message; identifying, in the codebook, a code word corresponding to a radio network temporary identity (RNTI) of the user equipment; dividing the code word into one or more binary sequences; mapping the one or more binary sequences to one or more random access channel (RACH) preambles; and transmitting the one or more RACH preambles to the base station using a random access channel.
- RNTI radio network temporary identity
- a method for a base station to decode a short message transmitted from a user equipment within coverage of the base station includes the following operations: receiving one or more random access channel (RACH) preambles from the user equipment via a random access channel; determining one or more binary sequences by decoding the one or more RACH preambles; combining the one or more binary sequences into a code word; determining a short message by decoding the code word; choosing, among a plurality of codebooks, a codebook corresponding to the short message; and identify, in the chosen codebook, an RNTI of the user equipment, wherein the RNTI corresponds to the code word.
- RACH random access channel
- a base station includes one or more processors, memory and a plurality of instructions stored in the memory that, when executed by the one or more processors, perform a plurality of operations as described above in connection with the base station.
- FIG. 1 A is a block diagram of an exemplary wireless communication system in which embodiments of the present application may be practiced.
- FIG. IB is a block diagram illustrating a contention-based random access procedure that includes multiple steps.
- FIG. 2A is a block diagram illustrating the UE-side operations for transmitting a short, mission-critical message to a base station according to some embodiments of the present application.
- FIG. 2B is a block diagram illustrating the base station-side operations for receiving a short, mission-critical message from a UE according to some embodiments of the present application.
- FIG. 3 is a flowchart illustrating one embodiment of a method for transmitting a short, mission-critical message from a UE to a base station according to some embodiments of the present application.
- FIG. 4 is a flowchart illustrating one embodiment of a method for receiving a short, mission-critical message from a UE according to some embodiments of the present application.
- FIG. 1 A is a block diagram of an exemplary wireless communication system 100 in which embodiments of the present application may be practiced.
- a base station 102 is in wireless communication with a plurality of user equipments 104 (which may also be referred to as user devices, mobile stations, subscriber units, access terminals, etc.).
- a first user equipment (UE) 104-A, a second user equipment (UE) 104-B, and an n-th user equipment 104-N are shown in FIG. 1 A.
- the base station 102 transmits data to and receives data from the UEs 104 over a radio frequency (RF) communication channel 106.
- RF radio frequency
- the term "transmitter” refers to any component or device that transmits signals.
- a transmitter may be implemented in a base station 102 that transmits signals to one or more user equipments 104.
- a transmitter may be implemented in a user equipment 104 that transmits signals to one or more base stations 102.
- the term “receiver” refers to any component or device that receives signals.
- a receiver may be implemented in a user equipment 104 that receives signals from one or more base stations 102.
- a receiver may be implemented in a base station 102 that receives signals from one or more user equipments 104.
- the communications system 100 may comply with various wireless communication technologies, such as the Global System for Mobile communications (GSM) technology, Wideband Code Division Multiple Access (WCDMA) technology, Time Division-Synchronous Code Division Multiple Access (TD-SCDMA) technology, Long Term Evolution (LTE) technology, and others.
- GSM Global System for Mobile communications
- WCDMA Wideband Code Division Multiple Access
- TD-SCDMA Time Division-Synchronous Code Division Multiple Access
- LTE Long Term Evolution
- FIG. IB is a block diagram illustrating a contention-based random access procedure that includes the following four steps: (1) random access preamble step on Physical Random Access Channel (PRACH); (2) random access response step on Physical Downlink Shared Channel (PDSCH) with UE addressing using Random Access Radio Network Temporary Identity (RA-RNTI) on Physical Downlink Control Channel (PDCCH); (3) scheduled transmission step on Physical Uplink Shared Channel (PUSCH); and (4) contention resolution step on Physical Downlink Shared Channel (PDSCH).
- PRACH Physical Random Access Channel
- PDSCH Physical Downlink Shared Channel
- RA-RNTI Random Access Radio Network Temporary Identity
- PUSCH Physical Uplink Shared Channel
- PDSCH Physical Downlink Shared Channel
- UE 104 selects one of the 64 available RACH preambles. In other words, only 6-bit random access preamble ID information is conveyed in the random access preamble step.
- the random access response message replied from the base station 102 includes the following information: (i) the 6-bit random access preamble ID, (ii) a timing alignment value for the UE 104 to change its timing, (iii) an initial uplink grant resource so that the UE 104 can use the PUSCH in the subsequent step and (iv) Cell Radio Network Temporary Identity (C RNTI) for further communication.
- C RNTI Cell Radio Network Temporary Identity
- the base station 102 uses this optional contention resolution step to end the random access procedure.
- the aforementioned random access procedure has to be completed to enable data transmission between an UE and a base station regardless of the size of the data to be transmitted whenever a data transmission is to be performed in the current LTE wireless communication system.
- This requires a large amount of signaling overhead and may result in an unpredictable transmission delay.
- the unpredictable transmission delay makes it unfit for those mission-critical applications (e.g., a firm alarm); and (ii) the allocated PUSCH resource may not be efficiently utilized because messages from a MTC device are much smaller than the allocated PUSCH resource.
- the present application proposes a solution to the aforementioned problem by embedding small-size but mission-critical data (e.g., an alarm message of multiple bits long and generated by a fire alarm sensor) in the initial random access preamble transmission step from the UE to the base station.
- small-size but mission-critical data e.g., an alarm message of multiple bits long and generated by a fire alarm sensor
- the other information required by the base station is the originator of the data, i.e., the UE ID.
- the base station needs to know at least the alarm message itself and the fire alarm sensor that generates the alarm message before taking any further actions, e.g., sending a report message to a remote device (e.g., a server or a mobile terminal such as a
- UEs e.g., MTC devices
- a mission-critical message generated by one of the UEs is a 2-bit long alarm message with four possible values.
- the current 16-bit RNTI is long enough as an UE ID to differentiate these MTC devices within a base station's coverage. Note that when the number of UEs within a base station's coverage exceeds 65536, a new UE ID whose length is longer than 16 bits is required to uniquely identify individual UEs with the base station's coverage.
- the UE's 16-bit RNTI is encoded into one of a plurality of code words that is 24-bit or longer within a codebook.
- the codebook is uniquely associated with the mission-critical message such that each code word within the codebook corresponds to the same mission-critical message from a particular UE.
- the code word is then divided into one or more 6-bit binary sequences, which are then mapped to one or more random access preambles and transmitted to the base station in the initial random access preamble transmission step.
- FIG. 2A is a block diagram illustrating the UE-side operations for transmitting a 2- bit, mission-critical alarm message to a base station according to some embodiments of the present application.
- the UE first selects, among multiple RNTI codebooks 200, a particular one 201 corresponding to the 2-bit alarm message.
- a particular code word X within the selected codebook 201 is then identified as being mapped to the RNTI.
- every 2 bits of the codeword X are grouped together as a binary sequence having a sequential order. For example, '00' are label as 'A' symbol, ⁇ as 'B' symbol, ⁇ as 'C symbol and ' 10' as 'D' symbol, respectively.
- the output code word X of the corresponding RNTI is configured to contain more 'A' symbols than any other symbols.
- the output codeword X has 6 'A' symbols, 2 'B' symbols, '2' C symbols and '2' D symbols.
- the total number of possible code words within a codebook corresponding to a particular alarm message with a predefined symbol distribution is determined by the different orderings of A, B, C and D symbols.
- Table 1 shows an exemplary RNTI codebook when the alarm message is "00".
- Table 1. Exemplary RNTI codebook when the alarm message is "00"
- an RNTI codebook can be generated when the alarm message is "01", “11" or “10", respectively, by having more ' ⁇ ', 'C or 'D' symbols in a code word X.
- the RNTI of the same UE is mapped to different code words within different codebooks for different alarm messages. But for a particular codebook, the RNTI corresponds to one and only one code word (e.g., code word X shown in FIG. 2 A).
- Table 2 shows exemplary symbol distributions of a code word X for different alarm message.
- the symbol distribution can be chosen to meet different error quality targets for the RNTI and the alarm message.
- the length of the code word X can be chosen to meet different error quality targets for the RNTI and the alarm message.
- a 30-bit codeword of X can be chosen to have 9 A symbols, 2 B symbols, 2 C symbols and 2 D symbols for the alarm message of "00" for a much larger possible code word space for the RNTI codebook.
- C(15,9)*C(6,2)*C(4,2)*C(2,2) 450450.
- the UE After identifying the code word X, the UE converts the code word X into one or more RACH preambles so that they can be transmitted by the PRACH procedure. In this step, the code word X is divided into one or more groups of 6-bit sequences, which are then mapped to one or more RACH preambles to be transmitted by the UE. As shown in FIG. 2A, let xk denotes the k-th bit of the code word X where k is from ⁇ 1, ...
- the value of the binary sequence of ⁇ xl, x2, x3, x4, x5, x6 ⁇ defines a first RACH preamble configuration index PI; the value of the binary sequence of ⁇ x7, x8, x9, xlO, xl 1, xl2 ⁇ defines the second RACH preamble configuration index P2; the value of the binary sequence of ⁇ xl3, xl4, xl5, xl6, xl7, xl8 ⁇ defines the third RACH preamble configuration index P3; the value of the binary sequence of ⁇ xl9, x20, x21, x22, x23, x24 ⁇ defines the fourth RACH preamble configuration index P4.
- the UE transmits the above-determined RACH preambles in an order of PI, P2, P3 and P4.
- there is a time interval between each RACH preamble transmission can be pre-defined or configured by the
- FIG. 2B is a block diagram illustrating the base station-side operations for recovering a short, mission-critical message from a UE according to some embodiments of the present application.
- the base station After the base station receives these random access preamble messages from the UE, the base station first re-generates the code word X and then decodes the alarm message by checking the distribution of the received symbols within the re-generated code word X.
- NA, N B , NC and N D denote the corresponding number of A, B, C and D symbols in the reconstructed code word X.
- Table 3 shows an exemplary predefined rule of decoding the alarm message. Table 3.
- the base station selects the same RNTI codebook 201 that has been used by the UE as described above.
- both the base station and the UE have the same set of RNTI codebooks 200 in order for the UE to transmit the short mission- critical message to the base station.
- the code word X is found and the corresponding RNTI is identified accordingly as the UE ID.
- FIG. 3 is a flowchart illustrating one embodiment of a method for transmitting a short, mission-critical message from a UE to a base station according to some embodiments of the present application.
- the UE generates (310) a short alarm message.
- the UE is communicatively coupled to a third-party device adjacent to the user equipment (e.g., a firm alarm sensor or a smart meter) and the UE generates a short alarm message in response to an alarm signal from the firm alarm sensor.
- a third-party device adjacent to the user equipment
- the UE generates a short alarm message in response to an alarm signal from the firm alarm sensor.
- the other device is a smart meter and the UE receives a parameter (e.g., power usage) provided by the smart meter on a regular basis and then generates one or more short messages including the value of the parameter.
- the UE chooses (320) a codebook corresponding to the alarm message.
- the codebook is configured such that it corresponds to a unique short message generated by the user equipment.
- the UE then identifies (330) a code word within the codebook corresponding to the UE's identifier (e.g., RNTI).
- RNTI e.g., RNTI
- the base station can recover the RNTI when it receives the code word.
- the UE divides (340) the code word into one or more binary sequences and maps (350) the one or more binary sequences to one or more RACH preambles. For example, each binary sequence is mapped to one RACH preamble as described above in connection with FIG. 2A.
- the UE transmits (360) the one or more RACH preambles to a base station using a corresponding random access channel between the UE and the base station.
- FIG. 4 is a flowchart illustrating one embodiment of a method for receiving a short, mission-critical message from a UE according to some embodiments of the present application.
- the base station receives (410) one or more random access preambles from a UE via a random access channel (e.g., PRACH).
- a random access channel e.g., PRACH
- the base station decodes (420) the random access preambles to determine one or more binary sequences.
- the base station combines (430) the binary sequences to re-generate the code word as described above in connection with FIG. 2B, which then is used to determine (440) a short message corresponding to the code word.
- the base station chooses (450), among a plurality of codebooks, a codebook that corresponds to the short message.
- the base station identifies (460), in the chosen code book, an RNTI of the user equipment based on, e.g., a mapping relationship between the RNTI and the corresponding to the code word.
- the plurality of codebooks are generated by a server and then given to the base station, which then shares them with a plurality of user equipments within coverage of the base station. Whenever there is any update to the codebooks, the base station transmits updated codebooks to the plurality of user equipments within coverage of the base station.
- first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another.
- a first port could be termed a second port, and, similarly, a second port could be termed a first port, without departing from the scope of the embodiments.
- the first port and the second port are both ports, but they are not the same port.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A method for a user equipment to transmit a short message to a base station includes the following operations: generating a short message; choosing, among a plurality of codebooks, a codebook corresponding to the short message; identifying, in the codebook, a code word corresponding to a radio network temporary identity (RNTI) of the user equipment; dividing the code word into one or more binary sequences; mapping the one or more binary sequences to one or more random access channel (RACH) preambles; and transmitting the one or more RACH preambles to the base station using a random access channel.
Description
METHODS OF TRANSMITTING MISSION CRITICAL SMALL DATA USING RANDOM ACCESS CHANNEL
TECHNICAL FIELD
[0001] This application generally relates to wireless telecommunication and particularly relates to methods of transmitting mission critical small data in a wireless network using a random access channel.
BACKGROUND
[0002] In a typical wireless communications environment (e.g., Long Term Evolution (LTE)), a user equipment (UE) communicates voice and/or data signals with one or more service networks via base stations (also referred to as "evolved Node-Bs" (eNBs)). In such wireless communication system, a UE may initiate a random access procedure to
communicate with a base station for many events. The random access procedure can be performed in a contention-based or non-contention-based manner depending on whether a Random Access Channel (RACH) resource used by the UE is randomly selected by the UE itself or assigned by the network.
[0003] Recently, an emerging technology (e.g., the Internet of Things) has received a lot of attention because it empowers full mechanical automation of operating many devices by enabling them to communicate with each other. Such communications among those machine- type communications (MTC) devices are known as machine-to-machine (M2M)
communications. MTC communication has some different features than current human-to- human (H2H) communications. For example, a MTC device such as a smart meter may generate a very small data transmission during its report time interval and then go to sleep for a long time interval. In another example, a MTC device (e.g., a fire alarm) may only transmit a small-size but mission-critical alarm message.
[0004] Currently, the aforementioned random access procedure has to be performed to enable the data transmission regardless of the size and importance of the data to be transmitted each time, resulting significant overhead. In addition, it is difficult to transmit the mission-critical but small-size data over any uplink channel other than the scheduled PUSCH in the current LTE specification. But the limited number of PUSCH resource block (RB) may
not be able to support a large number of MTC devices within a specific area, resulting in unpredictable transmission delays.
SUMMARY
[0005] An object of the present application is to provide a method for transmitting mission- critical small data between UE and base station using a random access channel with reduced overhead and time delay.
[0006] According to a first aspect of the present application, a method for a user equipment to transmit a short message to a base station includes the following operations: generating a short message; choosing, among a plurality of codebooks, a codebook corresponding to the short message; identifying, in the codebook, a code word corresponding to a radio network temporary identity (RNTI) of the user equipment; dividing the code word into one or more binary sequences; mapping the one or more binary sequences to one or more random access channel (RACH) preambles; and transmitting the one or more RACH preambles to the base station using a random access channel.
[0007] According to a second aspect of the present application, a method for a base station to decode a short message transmitted from a user equipment within coverage of the base station includes the following operations: receiving one or more random access channel (RACH) preambles from the user equipment via a random access channel; determining one or more binary sequences by decoding the one or more RACH preambles; combining the one or more binary sequences into a code word; determining a short message by decoding the code word; choosing, among a plurality of codebooks, a codebook corresponding to the short message; and identify, in the chosen codebook, an RNTI of the user equipment, wherein the RNTI corresponds to the code word..
[0008] According to a third aspect of the present application, a base station includes one or more processors, memory and a plurality of instructions stored in the memory that, when executed by the one or more processors, perform a plurality of operations as described above in connection with the base station.
BRIEF DESCRIPTION OF DRAWINGS
[0009] The accompanying drawings, which are included to provide a further understanding of the embodiments and are incorporated herein and constitute a part of the specification,
illustrate the described embodiments and together with the description serve to explain the underlying principles. Like reference numerals refer to corresponding parts.
[0010] FIG. 1 A is a block diagram of an exemplary wireless communication system in which embodiments of the present application may be practiced.
[0011] FIG. IB is a block diagram illustrating a contention-based random access procedure that includes multiple steps.
[0012] FIG. 2A is a block diagram illustrating the UE-side operations for transmitting a short, mission-critical message to a base station according to some embodiments of the present application.
[0013] FIG. 2B is a block diagram illustrating the base station-side operations for receiving a short, mission-critical message from a UE according to some embodiments of the present application.
[0014] FIG. 3 is a flowchart illustrating one embodiment of a method for transmitting a short, mission-critical message from a UE to a base station according to some embodiments of the present application.
[0015] FIG. 4 is a flowchart illustrating one embodiment of a method for receiving a short, mission-critical message from a UE according to some embodiments of the present application.
DETAIL DESCRIPTIONS
[0016] Reference will now be made in detail to embodiments, examples of which are illustrated in the accompanying drawings. In the following detailed description, numerous non-limiting specific details are set forth in order to assist in understanding the subject matter presented herein. But it will be apparent to one of ordinary skill in the art that various alternatives may be used without departing from the scope of claims and the subject matter may be practiced without these specific details. With reference now to the figures, exemplary block diagrams of data processing environments are provided in which illustrative embodiments may be implemented. It should be appreciated that these figures are only exemplary and are not intended to assert or imply any limitation with regard to the
environments in which different embodiments may be implemented. Many modifications to the depicted environments may be made.
[0017] FIG. 1 A is a block diagram of an exemplary wireless communication system 100 in which embodiments of the present application may be practiced. A base station 102 is in wireless communication with a plurality of user equipments 104 (which may also be referred to as user devices, mobile stations, subscriber units, access terminals, etc.). A first user equipment (UE) 104-A, a second user equipment (UE) 104-B, and an n-th user equipment 104-N are shown in FIG. 1 A. The base station 102 transmits data to and receives data from the UEs 104 over a radio frequency (RF) communication channel 106.
[0018] As used herein, the term "transmitter" refers to any component or device that transmits signals. A transmitter may be implemented in a base station 102 that transmits signals to one or more user equipments 104. Alternatively, a transmitter may be implemented in a user equipment 104 that transmits signals to one or more base stations 102. The term "receiver" refers to any component or device that receives signals. A receiver may be implemented in a user equipment 104 that receives signals from one or more base stations 102. Alternatively, a receiver may be implemented in a base station 102 that receives signals from one or more user equipments 104. The communications system 100 may comply with various wireless communication technologies, such as the Global System for Mobile communications (GSM) technology, Wideband Code Division Multiple Access (WCDMA) technology, Time Division-Synchronous Code Division Multiple Access (TD-SCDMA) technology, Long Term Evolution (LTE) technology, and others.
[0019] FIG. IB is a block diagram illustrating a contention-based random access procedure that includes the following four steps: (1) random access preamble step on Physical Random Access Channel (PRACH); (2) random access response step on Physical Downlink Shared Channel (PDSCH) with UE addressing using Random Access Radio Network Temporary Identity (RA-RNTI) on Physical Downlink Control Channel (PDCCH); (3) scheduled transmission step on Physical Uplink Shared Channel (PUSCH); and (4) contention resolution step on Physical Downlink Shared Channel (PDSCH).
[0020] In the random access preamble step, UE 104 selects one of the 64 available RACH preambles. In other words, only 6-bit random access preamble ID information is conveyed in the random access preamble step. The random access response message replied from the base
station 102 includes the following information: (i) the 6-bit random access preamble ID, (ii) a timing alignment value for the UE 104 to change its timing, (iii) an initial uplink grant resource so that the UE 104 can use the PUSCH in the subsequent step and (iv) Cell Radio Network Temporary Identity (C RNTI) for further communication. After receiving the valid random access response message from the base station 102, the UE 104 allocates the resources according to the initial uplink grant resource and transmits a scheduled
transmission with C RNTI on PUSCH. Note that, in the current LTE specification, the size of the transport blocks is at least 80 bits. Finally, the base station 102 uses this optional contention resolution step to end the random access procedure.
[0021] As noted above, the aforementioned random access procedure has to be completed to enable data transmission between an UE and a base station regardless of the size of the data to be transmitted whenever a data transmission is to be performed in the current LTE wireless communication system. This requires a large amount of signaling overhead and may result in an unpredictable transmission delay. There are at least two problems for this approach to be adopted for the machine-to-machine communications: (i) the unpredictable transmission delay makes it unfit for those mission-critical applications (e.g., a firm alarm); and (ii) the allocated PUSCH resource may not be efficiently utilized because messages from a MTC device are much smaller than the allocated PUSCH resource.
[0022] The present application proposes a solution to the aforementioned problem by embedding small-size but mission-critical data (e.g., an alarm message of multiple bits long and generated by a fire alarm sensor) in the initial random access preamble transmission step from the UE to the base station. In addition to the small-size but mission-critical data, the other information required by the base station is the originator of the data, i.e., the UE ID. In other words, the base station needs to know at least the alarm message itself and the fire alarm sensor that generates the alarm message before taking any further actions, e.g., sending a report message to a remote device (e.g., a server or a mobile terminal such as a
smartphone).
[0023] For illustrative purposes, it is assumed in the following example that there are less than or equal to 65536 UEs (e.g., MTC devices) within a base station's coverage and a mission-critical message generated by one of the UEs is a 2-bit long alarm message with four possible values. Thus, the current 16-bit RNTI is long enough as an UE ID to differentiate these MTC devices within a base station's coverage. Note that when the number of UEs
within a base station's coverage exceeds 65536, a new UE ID whose length is longer than 16 bits is required to uniquely identify individual UEs with the base station's coverage. In order for a UE to transmit a mission-critical message, the UE's 16-bit RNTI is encoded into one of a plurality of code words that is 24-bit or longer within a codebook. The codebook is uniquely associated with the mission-critical message such that each code word within the codebook corresponds to the same mission-critical message from a particular UE. The code word is then divided into one or more 6-bit binary sequences, which are then mapped to one or more random access preambles and transmitted to the base station in the initial random access preamble transmission step.
[0024] FIG. 2A is a block diagram illustrating the UE-side operations for transmitting a 2- bit, mission-critical alarm message to a base station according to some embodiments of the present application. As shown in FIG. 2A, the UE first selects, among multiple RNTI codebooks 200, a particular one 201 corresponding to the 2-bit alarm message. Given the UE's RNTI, a particular code word X within the selected codebook 201 is then identified as being mapped to the RNTI. For ease of description, every 2 bits of the codeword X are grouped together as a binary sequence having a sequential order. For example, '00' are label as 'A' symbol, Ό as 'B' symbol, Ί as 'C symbol and ' 10' as 'D' symbol, respectively.
[0025] For example, if the alarm message is "00", the output code word X of the corresponding RNTI is configured to contain more 'A' symbols than any other symbols. In one embodiment, the output codeword X has 6 'A' symbols, 2 'B' symbols, '2' C symbols and '2' D symbols. Thus the total number of possible code words within a codebook corresponding to a particular alarm message with a predefined symbol distribution is determined by the different orderings of A, B, C and D symbols. In this example, the total number is C(12, 6)*C(6, 2)*C(4, 2)*C(2, 2)=83160, which is larger than 65536, i.e., the total number of all possible 16-bit RNTI information sequences. Consequently, we can randomly choose 65536 code words among the possible 83160 code words to populate an RNTI codebook for a corresponding alarm message. Table 1 shows an exemplary RNTI codebook when the alarm message is "00".
Table 1. Exemplary RNTI codebook when the alarm message is "00"
[0026] Similarly, an RNTI codebook can be generated when the alarm message is "01", "11" or "10", respectively, by having more 'Β', 'C or 'D' symbols in a code word X. In other words, the RNTI of the same UE is mapped to different code words within different codebooks for different alarm messages. But for a particular codebook, the RNTI corresponds to one and only one code word (e.g., code word X shown in FIG. 2 A).
[0027] Table 2 shows exemplary symbol distributions of a code word X for different alarm message.
Table 2. Exemplary symbol distribution of the code word X for different alarm messages
[0028] Note that other distributions of symbols in the code word X is also feasible as long as the occurrence of Ά', 'Β', 'C and 'D' symbols are not equal within a code word and the number of different orderings of that symbol distribution is larger than the number of all possible RNTIs assuming that RNTI is used as the UE ID for the MTC devices within a base station's coverage. For example, having 5 A, 2B, 3C and 2D in the code word X is another possible symbol distribution because the total number of possible code words for the RNTI
codebook C(12, 5)*C(7, 2)*C(5, 3)*C(2, 2)=166320, which is greater than 65536. The symbol distribution can be chosen to meet different error quality targets for the RNTI and the alarm message. Also note that the length of the code word X can be chosen to meet different error quality targets for the RNTI and the alarm message. For example, a 30-bit codeword of X can be chosen to have 9 A symbols, 2 B symbols, 2 C symbols and 2 D symbols for the alarm message of "00" for a much larger possible code word space for the RNTI codebook. In this example, C(15,9)*C(6,2)*C(4,2)*C(2,2)=450450.
[0029] After identifying the code word X, the UE converts the code word X into one or more RACH preambles so that they can be transmitted by the PRACH procedure. In this step, the code word X is divided into one or more groups of 6-bit sequences, which are then mapped to one or more RACH preambles to be transmitted by the UE. As shown in FIG. 2A, let xk denotes the k-th bit of the code word X where k is from { 1, ... , 24}, the value of the binary sequence of {xl, x2, x3, x4, x5, x6} defines a first RACH preamble configuration index PI; the value of the binary sequence of {x7, x8, x9, xlO, xl 1, xl2} defines the second RACH preamble configuration index P2; the value of the binary sequence of {xl3, xl4, xl5, xl6, xl7, xl8} defines the third RACH preamble configuration index P3; the value of the binary sequence of {xl9, x20, x21, x22, x23, x24} defines the fourth RACH preamble configuration index P4.
[0030] Next, the UE transmits the above-determined RACH preambles in an order of PI, P2, P3 and P4. In some embodiments, there is a time interval between each RACH preamble transmission. Such time interval can be pre-defined or configured by the
system/network/eNB and broadcast to UEs using high-layer signaling.
[0031] FIG. 2B is a block diagram illustrating the base station-side operations for recovering a short, mission-critical message from a UE according to some embodiments of the present application. As shown in the figure, after the base station receives these random access preamble messages from the UE, the base station first re-generates the code word X and then decodes the alarm message by checking the distribution of the received symbols within the re-generated code word X. Let NA, NB, NC and ND denote the corresponding number of A, B, C and D symbols in the reconstructed code word X. Table 3 shows an exemplary predefined rule of decoding the alarm message.
Table 3. Exemplary rule of decoding the alarm message
[0032] Using the alarm message, the base station selects the same RNTI codebook 201 that has been used by the UE as described above. In other words, both the base station and the UE have the same set of RNTI codebooks 200 in order for the UE to transmit the short mission- critical message to the base station. Within the RNTI codebook 201, the code word X is found and the corresponding RNTI is identified accordingly as the UE ID.
[0033] FIG. 3 is a flowchart illustrating one embodiment of a method for transmitting a short, mission-critical message from a UE to a base station according to some embodiments of the present application. First, the UE generates (310) a short alarm message. In some embodiments, the UE is communicatively coupled to a third-party device adjacent to the user equipment (e.g., a firm alarm sensor or a smart meter) and the UE generates a short alarm message in response to an alarm signal from the firm alarm sensor. In some other embodiments, the other device is a smart meter and the UE receives a parameter (e.g., power usage) provided by the smart meter on a regular basis and then generates one or more short messages including the value of the parameter. Next, the UE chooses (320) a codebook corresponding to the alarm message. As noted above, the codebook is configured such that it corresponds to a unique short message generated by the user equipment. The UE then identifies (330) a code word within the codebook corresponding to the UE's identifier (e.g., RNTI). In other words, each entry within a codebook defines a unique mapping relationship between a code word and an RNTI of a user equipment within coverage of the base station. By doing so, the base station can recover the RNTI when it receives the code word. Next, the UE divides (340) the code word into one or more binary sequences and maps (350) the one or more binary sequences to one or more RACH preambles. For example, each binary sequence is mapped to one RACH preamble as described above in connection with FIG. 2A. Finally,
the UE transmits (360) the one or more RACH preambles to a base station using a corresponding random access channel between the UE and the base station.
[0034] FIG. 4 is a flowchart illustrating one embodiment of a method for receiving a short, mission-critical message from a UE according to some embodiments of the present application. First, the base station receives (410) one or more random access preambles from a UE via a random access channel (e.g., PRACH). As described above, the base station decodes (420) the random access preambles to determine one or more binary sequences. Next, the base station combines (430) the binary sequences to re-generate the code word as described above in connection with FIG. 2B, which then is used to determine (440) a short message corresponding to the code word. Next, the base station chooses (450), among a plurality of codebooks, a codebook that corresponds to the short message. Finally, the base station identifies (460), in the chosen code book, an RNTI of the user equipment based on, e.g., a mapping relationship between the RNTI and the corresponding to the code word.
[0035] In some embodiments, the plurality of codebooks are generated by a server and then given to the base station, which then shares them with a plurality of user equipments within coverage of the base station. Whenever there is any update to the codebooks, the base station transmits updated codebooks to the plurality of user equipments within coverage of the base station.
[0036] The description of the present application has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention, the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
[0037] The terminology used in the description of the embodiments herein is for the purpose of describing particular embodiments only and is not intended to limit the scope of claims. As used in the description of the embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated
listed items. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
[0038] It will also be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first port could be termed a second port, and, similarly, a second port could be termed a first port, without departing from the scope of the embodiments. The first port and the second port are both ports, but they are not the same port.
[0039] Many modifications and alternative embodiments of the embodiments described herein will come to mind to one skilled in the art having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the scope of claims are not to be limited to the specific examples of the embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
[0040] The embodiments were chosen and described in order to best explain the underlying principles and their practical applications, to thereby enable others skilled in the art to best utilize the underlying principles and various embodiments with various modifications as are suited to the particular use contemplated.
Claims
1. A method for a user equipment to transmit a short message to a base station, comprising:
generating a short message;
choosing, among a plurality of codebooks, a codebook corresponding to the short message;
identifying, in the codebook, a code word corresponding to a radio network temporary identity (RNTI) of the user equipment;
dividing the code word into one or more binary sequences;
mapping the one or more binary sequences to one or more random access channel (RACH) preambles; and
transmitting the one or more RACH preambles to the base station using a random access channel.
2. The method of claim 1, wherein the user equipment is communicatively coupled to a third-party device adjacent to the user equipment and the short message is related to the third- party device.
3. The method of claim 2, wherein the user equipment is configured to automatically generate the short message according to a predefined schedule, the short message including a parameter provided by the third-party device.
4. The method of claim 2, wherein the user equipment is configured to automatically generate the short message in response to an alarm signal provided by the third-party device.
5. The method of claim 1, wherein each of the plurality of codebooks corresponds to a unique short message generated by the user equipment.
6. The method of claim 1, wherein each entry within a codebook defines a unique mapping relationship between a code word and an RNTI of a user equipment within coverage of the base station.
7. The method of claim 1, wherein the base station is configured to:
receive the one or more RACH preambles from the user equipment;
determine the one or more binary sequences by decoding the one or more RACH preambles;
combining the one or more determined binary sequences into a code word;
determine the short message by decoding the code word;
choose, among a plurality of codebooks, a codebook corresponding to the determined short message;
identify, in the chosen codebook, the RNTI corresponding to the code word; and submitting a report message to a remote server, the report message including the determined short message and the RNTI.
8. The method of claim 1, wherein the base station is configured to share the plurality of codebooks with a plurality of user equipments within coverage of the base station.
9. The method of claim 8, wherein the base station is configured to update the plurality of codebooks according to a predefined schedule and transmit the updated codebooks to the plurality of user equipments within coverage of the base station.
10. The method of claim 1, wherein a total number of code words within a respective codebook is no less than a total number of user equipments within coverage of the base station.
11. A method for a base station to decode a short message transmitted from a user equipment within coverage of the base station, comprising:
receiving one or more random access channel (RACH) preambles from the user equipment via a random access channel;
determining one or more binary sequences by decoding the one or more RACH preambles;
combining the one or more binary sequences into a code word;
determining a short message by decoding the code word;
choosing, among a plurality of codebooks, a codebook corresponding to the short message; and
identify, in the chosen codebook, an RNTI of the user equipment, wherein the RNTI corresponds to the code word.
12. The method of claim 11, wherein the user equipment is communicatively coupled to a third-party device adjacent to the user equipment.
13. The method of claim 11, wherein each of the plurality of codebooks corresponds to a unique short message generated by the user equipment.
14. The method of claim 11, wherein each entry within a codebook defines a unique mapping relationship between a code word and an RNTI of a use equipment within coverage of the base station.
15. The method of claim 11, wherein the user equipment is configured to:
generate a short message;
choose, among a plurality of codebooks, a codebook corresponding to the generated short message;
identify, in the chosen codebook, a code word corresponding to the RNTI of the user equipment;
dividing the code word into the one or more binary sequences;
mapping the one or more binary sequences into the one or more RACH preambles; and
transmitting the one or more RACH preambles to the base station using the random access channel.
16. The method of claim 11, wherein the base station is configured to share the plurality of codebooks with a plurality of user equipments within coverage of the base station.
17. The method of claim 16, wherein the base station is configured to update the plurality of codebooks according to a predefined schedule and transmit the updated codebooks to the plurality of user equipments within coverage of the base station.
18. The method of claim 11, wherein a total number of code words within a respective codebook is no less than a total number of user equipments within coverage of the base station.
19. A base station configured to decode a short message transmitted from a user equipment within coverage of the base station, comprising:
one or more processors;
memory in electronic communication with the one or more processors; and a plurality of instructions stored in the memory and to be executed by the one or more processors, the plurality of instructions further including:
receiving one or more random access channel (RACH) preambles from the user equipment via a random access channel;
determining one or more binary sequences by decoding the one or more RACH preambles accordingly;
combining the one or more binary sequences into a code word; determining a short message by decoding the code word;
choosing, among a plurality of codebooks, a codebook corresponding to the short message;
identifying, in the chosen codebook, an RNTI of the user equipment, wherein the RNTI corresponds to the code word.
20. The base station of claim 19, wherein each of the plurality of codebooks corresponds to a unique short message generated by the user equipment.
21. The base station of claim 19, wherein each entry within a codebook defines a unique mapping relationship between a code word and an RNTI of a use equipment within coverage of the base station.
22. The base station of claim 19, wherein a total number of code words within a respective codebook is no less than a total number of user equipments within coverage of the base station.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201680083305.0A CN108702781A (en) | 2016-01-08 | 2016-12-29 | The method for sending key task small data using random access channel |
EP16884220.1A EP3400747A4 (en) | 2016-01-08 | 2016-12-29 | Methods of transmitting mission critical small data using random access channel |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662276670P | 2016-01-08 | 2016-01-08 | |
US62/276,670 | 2016-01-08 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2017120091A2 true WO2017120091A2 (en) | 2017-07-13 |
WO2017120091A3 WO2017120091A3 (en) | 2018-02-22 |
Family
ID=59274169
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2016/069113 WO2017120091A2 (en) | 2016-01-08 | 2016-12-29 | Methods of transmitting mission critical small data using random access channel |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3400747A4 (en) |
CN (1) | CN108702781A (en) |
WO (1) | WO2017120091A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021135941A1 (en) * | 2019-12-31 | 2021-07-08 | FG Innovation Company Limited | Method and user equipment for small data transmission |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220104279A1 (en) * | 2019-02-14 | 2022-03-31 | Panasonic Intellectual Property Corporation Of America | Terminal and communication method |
WO2020198980A1 (en) * | 2019-03-29 | 2020-10-08 | Qualcomm Incorporated | Preamble to demodulation reference signal mapping for random access procedures |
CN111586592B (en) * | 2020-05-27 | 2021-11-16 | 浙江云蛛科技有限公司 | Vehicle running state short information transmission method and system based on Internet of vehicles |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7804428B2 (en) * | 2008-11-10 | 2010-09-28 | Apple Inc. | System and method for compressing a stream of integer-valued data |
KR20120044198A (en) * | 2010-10-27 | 2012-05-07 | 한국전자통신연구원 | Method for random access procedure |
KR20120071229A (en) * | 2010-12-22 | 2012-07-02 | 한국전자통신연구원 | Method for transmitting data for mobile communication systems |
GB2489690B (en) * | 2011-04-01 | 2013-03-20 | Renesas Mobile Corp | Small data transmission for detached mobile devices |
US9143984B2 (en) * | 2012-04-13 | 2015-09-22 | Intel Corporation | Mapping of enhanced physical downlink control channels in a wireless communication network |
CN103841603B (en) * | 2012-11-20 | 2019-05-31 | 北京三星通信技术研究有限公司 | The method and apparatus of ascending grouping scheduling |
JP6522522B2 (en) * | 2013-02-28 | 2019-05-29 | ▲ホア▼▲ウェイ▼技術有限公司Huawei Technologies Co.,Ltd. | Data transmission and reception method and device |
CN104469953B (en) * | 2014-11-17 | 2018-09-11 | 大唐移动通信设备有限公司 | A kind of method and apparatus that user data is transmitted by secondary carrier |
CN104955162A (en) * | 2015-06-23 | 2015-09-30 | 中国联合网络通信集团有限公司 | Packet random access method and system for IoT (Internet of Things) equipment |
-
2016
- 2016-12-29 CN CN201680083305.0A patent/CN108702781A/en active Pending
- 2016-12-29 EP EP16884220.1A patent/EP3400747A4/en not_active Withdrawn
- 2016-12-29 WO PCT/US2016/069113 patent/WO2017120091A2/en active Application Filing
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021135941A1 (en) * | 2019-12-31 | 2021-07-08 | FG Innovation Company Limited | Method and user equipment for small data transmission |
Also Published As
Publication number | Publication date |
---|---|
CN108702781A (en) | 2018-10-23 |
EP3400747A4 (en) | 2019-01-16 |
EP3400747A2 (en) | 2018-11-14 |
WO2017120091A3 (en) | 2018-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2018408880B2 (en) | Methods providing RACH occasion indication for random access procedure initiated by PDCCH order and related wireless terminals and base stations | |
US11218272B2 (en) | Information transmission method and apparatus | |
EP3917248B1 (en) | Methods providing ul grants including time domain configuration | |
US20170280483A1 (en) | Method for configuring random access response, base station and user equipment | |
CN106455095B (en) | A kind of data transmission method and device | |
WO2017120091A2 (en) | Methods of transmitting mission critical small data using random access channel | |
CN104349333B (en) | Enhance the method and apparatus of the wireless coverage of MTC UE | |
US8837352B2 (en) | Method for allocating resources in a broadband wireless access system | |
CN109196930B (en) | Method for transmitting reference signal, network equipment and terminal equipment | |
US9113285B2 (en) | Method for transmitting/receiving control information for an M2M device, and device for same | |
US9544124B2 (en) | Method and apparatus for performing ranging at M2M device in a wireless communication system | |
Abebe et al. | Compressive sensing-based random access with multiple-sequence spreading for MTC | |
EP3332589B1 (en) | System information block enhancements | |
CN102450077B (en) | The method and apparatus of transmission/receiving resource allocation information in a wireless communication system | |
CN108029105B (en) | Method and device for allocating wireless resources | |
US20240040633A1 (en) | Generating random access signals with bearer information | |
CN105850211B (en) | Method and apparatus for simultaneous downlink transmission | |
KR20220005506A (en) | Wireless communication schemes using extended identifiers | |
EP3001744A1 (en) | Coverage enhancement for MBSFN transmission | |
US20140029566A1 (en) | Method and apparatus for performing ranging at m2m device in a wireless communication system | |
CN106576361B (en) | Indication method, device and equipment of DCI length based on NB M2M | |
CN117751657A (en) | Information feedback method, information receiving method and device | |
KR20160141160A (en) | Random access response receiving device for machine type communication | |
KR20160141086A (en) | Random access response receiving device for machine type communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16884220 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase in: |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2016884220 Country of ref document: EP |
|
ENP | Entry into the national phase in: |
Ref document number: 2016884220 Country of ref document: EP Effective date: 20180808 |