WO2017120091A2 - Methods of transmitting mission critical small data using random access channel - Google Patents

Methods of transmitting mission critical small data using random access channel Download PDF

Info

Publication number
WO2017120091A2
WO2017120091A2 PCT/US2016/069113 US2016069113W WO2017120091A2 WO 2017120091 A2 WO2017120091 A2 WO 2017120091A2 US 2016069113 W US2016069113 W US 2016069113W WO 2017120091 A2 WO2017120091 A2 WO 2017120091A2
Authority
WO
WIPO (PCT)
Prior art keywords
base station
user equipment
short message
code word
codebook
Prior art date
Application number
PCT/US2016/069113
Other languages
French (fr)
Other versions
WO2017120091A3 (en
Inventor
Huaming Wu
Original Assignee
Zte Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zte Corporation filed Critical Zte Corporation
Priority to CN201680083305.0A priority Critical patent/CN108702781A/en
Priority to EP16884220.1A priority patent/EP3400747A4/en
Publication of WO2017120091A2 publication Critical patent/WO2017120091A2/en
Publication of WO2017120091A3 publication Critical patent/WO2017120091A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0001Arrangements for dividing the transmission path
    • H04L5/0014Three-dimensional division
    • H04L5/0016Time-frequency-code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0053Allocation of signaling, i.e. of overhead other than pilot signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0058Allocation criteria
    • H04L5/0064Rate requirement of the data, e.g. scalable bandwidth, data priority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W56/00Synchronisation arrangements
    • H04W56/004Synchronisation arrangements compensating for timing error of reception due to propagation delay
    • H04W56/0045Synchronisation arrangements compensating for timing error of reception due to propagation delay compensating for timing error by altering transmission time

Definitions

  • This application generally relates to wireless telecommunication and particularly relates to methods of transmitting mission critical small data in a wireless network using a random access channel.
  • a user equipment communicates voice and/or data signals with one or more service networks via base stations (also referred to as “evolved Node-Bs" (eNBs)).
  • eNBs evolved Node-Bs
  • a UE may initiate a random access procedure to
  • the random access procedure can be performed in a contention-based or non-contention-based manner depending on whether a Random Access Channel (RACH) resource used by the UE is randomly selected by the UE itself or assigned by the network.
  • RACH Random Access Channel
  • MTC machine-type communications
  • M2M machine-to-machine
  • MTC communication has some different features than current human-to- human (H2H) communications.
  • a MTC device such as a smart meter may generate a very small data transmission during its report time interval and then go to sleep for a long time interval.
  • a MTC device e.g., a fire alarm
  • An object of the present application is to provide a method for transmitting mission- critical small data between UE and base station using a random access channel with reduced overhead and time delay.
  • a method for a user equipment to transmit a short message to a base station includes the following operations: generating a short message; choosing, among a plurality of codebooks, a codebook corresponding to the short message; identifying, in the codebook, a code word corresponding to a radio network temporary identity (RNTI) of the user equipment; dividing the code word into one or more binary sequences; mapping the one or more binary sequences to one or more random access channel (RACH) preambles; and transmitting the one or more RACH preambles to the base station using a random access channel.
  • RNTI radio network temporary identity
  • a method for a base station to decode a short message transmitted from a user equipment within coverage of the base station includes the following operations: receiving one or more random access channel (RACH) preambles from the user equipment via a random access channel; determining one or more binary sequences by decoding the one or more RACH preambles; combining the one or more binary sequences into a code word; determining a short message by decoding the code word; choosing, among a plurality of codebooks, a codebook corresponding to the short message; and identify, in the chosen codebook, an RNTI of the user equipment, wherein the RNTI corresponds to the code word.
  • RACH random access channel
  • a base station includes one or more processors, memory and a plurality of instructions stored in the memory that, when executed by the one or more processors, perform a plurality of operations as described above in connection with the base station.
  • FIG. 1 A is a block diagram of an exemplary wireless communication system in which embodiments of the present application may be practiced.
  • FIG. IB is a block diagram illustrating a contention-based random access procedure that includes multiple steps.
  • FIG. 2A is a block diagram illustrating the UE-side operations for transmitting a short, mission-critical message to a base station according to some embodiments of the present application.
  • FIG. 2B is a block diagram illustrating the base station-side operations for receiving a short, mission-critical message from a UE according to some embodiments of the present application.
  • FIG. 3 is a flowchart illustrating one embodiment of a method for transmitting a short, mission-critical message from a UE to a base station according to some embodiments of the present application.
  • FIG. 4 is a flowchart illustrating one embodiment of a method for receiving a short, mission-critical message from a UE according to some embodiments of the present application.
  • FIG. 1 A is a block diagram of an exemplary wireless communication system 100 in which embodiments of the present application may be practiced.
  • a base station 102 is in wireless communication with a plurality of user equipments 104 (which may also be referred to as user devices, mobile stations, subscriber units, access terminals, etc.).
  • a first user equipment (UE) 104-A, a second user equipment (UE) 104-B, and an n-th user equipment 104-N are shown in FIG. 1 A.
  • the base station 102 transmits data to and receives data from the UEs 104 over a radio frequency (RF) communication channel 106.
  • RF radio frequency
  • the term "transmitter” refers to any component or device that transmits signals.
  • a transmitter may be implemented in a base station 102 that transmits signals to one or more user equipments 104.
  • a transmitter may be implemented in a user equipment 104 that transmits signals to one or more base stations 102.
  • the term “receiver” refers to any component or device that receives signals.
  • a receiver may be implemented in a user equipment 104 that receives signals from one or more base stations 102.
  • a receiver may be implemented in a base station 102 that receives signals from one or more user equipments 104.
  • the communications system 100 may comply with various wireless communication technologies, such as the Global System for Mobile communications (GSM) technology, Wideband Code Division Multiple Access (WCDMA) technology, Time Division-Synchronous Code Division Multiple Access (TD-SCDMA) technology, Long Term Evolution (LTE) technology, and others.
  • GSM Global System for Mobile communications
  • WCDMA Wideband Code Division Multiple Access
  • TD-SCDMA Time Division-Synchronous Code Division Multiple Access
  • LTE Long Term Evolution
  • FIG. IB is a block diagram illustrating a contention-based random access procedure that includes the following four steps: (1) random access preamble step on Physical Random Access Channel (PRACH); (2) random access response step on Physical Downlink Shared Channel (PDSCH) with UE addressing using Random Access Radio Network Temporary Identity (RA-RNTI) on Physical Downlink Control Channel (PDCCH); (3) scheduled transmission step on Physical Uplink Shared Channel (PUSCH); and (4) contention resolution step on Physical Downlink Shared Channel (PDSCH).
  • PRACH Physical Random Access Channel
  • PDSCH Physical Downlink Shared Channel
  • RA-RNTI Random Access Radio Network Temporary Identity
  • PUSCH Physical Uplink Shared Channel
  • PDSCH Physical Downlink Shared Channel
  • UE 104 selects one of the 64 available RACH preambles. In other words, only 6-bit random access preamble ID information is conveyed in the random access preamble step.
  • the random access response message replied from the base station 102 includes the following information: (i) the 6-bit random access preamble ID, (ii) a timing alignment value for the UE 104 to change its timing, (iii) an initial uplink grant resource so that the UE 104 can use the PUSCH in the subsequent step and (iv) Cell Radio Network Temporary Identity (C RNTI) for further communication.
  • C RNTI Cell Radio Network Temporary Identity
  • the base station 102 uses this optional contention resolution step to end the random access procedure.
  • the aforementioned random access procedure has to be completed to enable data transmission between an UE and a base station regardless of the size of the data to be transmitted whenever a data transmission is to be performed in the current LTE wireless communication system.
  • This requires a large amount of signaling overhead and may result in an unpredictable transmission delay.
  • the unpredictable transmission delay makes it unfit for those mission-critical applications (e.g., a firm alarm); and (ii) the allocated PUSCH resource may not be efficiently utilized because messages from a MTC device are much smaller than the allocated PUSCH resource.
  • the present application proposes a solution to the aforementioned problem by embedding small-size but mission-critical data (e.g., an alarm message of multiple bits long and generated by a fire alarm sensor) in the initial random access preamble transmission step from the UE to the base station.
  • small-size but mission-critical data e.g., an alarm message of multiple bits long and generated by a fire alarm sensor
  • the other information required by the base station is the originator of the data, i.e., the UE ID.
  • the base station needs to know at least the alarm message itself and the fire alarm sensor that generates the alarm message before taking any further actions, e.g., sending a report message to a remote device (e.g., a server or a mobile terminal such as a
  • UEs e.g., MTC devices
  • a mission-critical message generated by one of the UEs is a 2-bit long alarm message with four possible values.
  • the current 16-bit RNTI is long enough as an UE ID to differentiate these MTC devices within a base station's coverage. Note that when the number of UEs within a base station's coverage exceeds 65536, a new UE ID whose length is longer than 16 bits is required to uniquely identify individual UEs with the base station's coverage.
  • the UE's 16-bit RNTI is encoded into one of a plurality of code words that is 24-bit or longer within a codebook.
  • the codebook is uniquely associated with the mission-critical message such that each code word within the codebook corresponds to the same mission-critical message from a particular UE.
  • the code word is then divided into one or more 6-bit binary sequences, which are then mapped to one or more random access preambles and transmitted to the base station in the initial random access preamble transmission step.
  • FIG. 2A is a block diagram illustrating the UE-side operations for transmitting a 2- bit, mission-critical alarm message to a base station according to some embodiments of the present application.
  • the UE first selects, among multiple RNTI codebooks 200, a particular one 201 corresponding to the 2-bit alarm message.
  • a particular code word X within the selected codebook 201 is then identified as being mapped to the RNTI.
  • every 2 bits of the codeword X are grouped together as a binary sequence having a sequential order. For example, '00' are label as 'A' symbol, ⁇ as 'B' symbol, ⁇ as 'C symbol and ' 10' as 'D' symbol, respectively.
  • the output code word X of the corresponding RNTI is configured to contain more 'A' symbols than any other symbols.
  • the output codeword X has 6 'A' symbols, 2 'B' symbols, '2' C symbols and '2' D symbols.
  • the total number of possible code words within a codebook corresponding to a particular alarm message with a predefined symbol distribution is determined by the different orderings of A, B, C and D symbols.
  • Table 1 shows an exemplary RNTI codebook when the alarm message is "00".
  • Table 1. Exemplary RNTI codebook when the alarm message is "00"
  • an RNTI codebook can be generated when the alarm message is "01", “11" or “10", respectively, by having more ' ⁇ ', 'C or 'D' symbols in a code word X.
  • the RNTI of the same UE is mapped to different code words within different codebooks for different alarm messages. But for a particular codebook, the RNTI corresponds to one and only one code word (e.g., code word X shown in FIG. 2 A).
  • Table 2 shows exemplary symbol distributions of a code word X for different alarm message.
  • the symbol distribution can be chosen to meet different error quality targets for the RNTI and the alarm message.
  • the length of the code word X can be chosen to meet different error quality targets for the RNTI and the alarm message.
  • a 30-bit codeword of X can be chosen to have 9 A symbols, 2 B symbols, 2 C symbols and 2 D symbols for the alarm message of "00" for a much larger possible code word space for the RNTI codebook.
  • C(15,9)*C(6,2)*C(4,2)*C(2,2) 450450.
  • the UE After identifying the code word X, the UE converts the code word X into one or more RACH preambles so that they can be transmitted by the PRACH procedure. In this step, the code word X is divided into one or more groups of 6-bit sequences, which are then mapped to one or more RACH preambles to be transmitted by the UE. As shown in FIG. 2A, let xk denotes the k-th bit of the code word X where k is from ⁇ 1, ...
  • the value of the binary sequence of ⁇ xl, x2, x3, x4, x5, x6 ⁇ defines a first RACH preamble configuration index PI; the value of the binary sequence of ⁇ x7, x8, x9, xlO, xl 1, xl2 ⁇ defines the second RACH preamble configuration index P2; the value of the binary sequence of ⁇ xl3, xl4, xl5, xl6, xl7, xl8 ⁇ defines the third RACH preamble configuration index P3; the value of the binary sequence of ⁇ xl9, x20, x21, x22, x23, x24 ⁇ defines the fourth RACH preamble configuration index P4.
  • the UE transmits the above-determined RACH preambles in an order of PI, P2, P3 and P4.
  • there is a time interval between each RACH preamble transmission can be pre-defined or configured by the
  • FIG. 2B is a block diagram illustrating the base station-side operations for recovering a short, mission-critical message from a UE according to some embodiments of the present application.
  • the base station After the base station receives these random access preamble messages from the UE, the base station first re-generates the code word X and then decodes the alarm message by checking the distribution of the received symbols within the re-generated code word X.
  • NA, N B , NC and N D denote the corresponding number of A, B, C and D symbols in the reconstructed code word X.
  • Table 3 shows an exemplary predefined rule of decoding the alarm message. Table 3.
  • the base station selects the same RNTI codebook 201 that has been used by the UE as described above.
  • both the base station and the UE have the same set of RNTI codebooks 200 in order for the UE to transmit the short mission- critical message to the base station.
  • the code word X is found and the corresponding RNTI is identified accordingly as the UE ID.
  • FIG. 3 is a flowchart illustrating one embodiment of a method for transmitting a short, mission-critical message from a UE to a base station according to some embodiments of the present application.
  • the UE generates (310) a short alarm message.
  • the UE is communicatively coupled to a third-party device adjacent to the user equipment (e.g., a firm alarm sensor or a smart meter) and the UE generates a short alarm message in response to an alarm signal from the firm alarm sensor.
  • a third-party device adjacent to the user equipment
  • the UE generates a short alarm message in response to an alarm signal from the firm alarm sensor.
  • the other device is a smart meter and the UE receives a parameter (e.g., power usage) provided by the smart meter on a regular basis and then generates one or more short messages including the value of the parameter.
  • the UE chooses (320) a codebook corresponding to the alarm message.
  • the codebook is configured such that it corresponds to a unique short message generated by the user equipment.
  • the UE then identifies (330) a code word within the codebook corresponding to the UE's identifier (e.g., RNTI).
  • RNTI e.g., RNTI
  • the base station can recover the RNTI when it receives the code word.
  • the UE divides (340) the code word into one or more binary sequences and maps (350) the one or more binary sequences to one or more RACH preambles. For example, each binary sequence is mapped to one RACH preamble as described above in connection with FIG. 2A.
  • the UE transmits (360) the one or more RACH preambles to a base station using a corresponding random access channel between the UE and the base station.
  • FIG. 4 is a flowchart illustrating one embodiment of a method for receiving a short, mission-critical message from a UE according to some embodiments of the present application.
  • the base station receives (410) one or more random access preambles from a UE via a random access channel (e.g., PRACH).
  • a random access channel e.g., PRACH
  • the base station decodes (420) the random access preambles to determine one or more binary sequences.
  • the base station combines (430) the binary sequences to re-generate the code word as described above in connection with FIG. 2B, which then is used to determine (440) a short message corresponding to the code word.
  • the base station chooses (450), among a plurality of codebooks, a codebook that corresponds to the short message.
  • the base station identifies (460), in the chosen code book, an RNTI of the user equipment based on, e.g., a mapping relationship between the RNTI and the corresponding to the code word.
  • the plurality of codebooks are generated by a server and then given to the base station, which then shares them with a plurality of user equipments within coverage of the base station. Whenever there is any update to the codebooks, the base station transmits updated codebooks to the plurality of user equipments within coverage of the base station.
  • first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another.
  • a first port could be termed a second port, and, similarly, a second port could be termed a first port, without departing from the scope of the embodiments.
  • the first port and the second port are both ports, but they are not the same port.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method for a user equipment to transmit a short message to a base station includes the following operations: generating a short message; choosing, among a plurality of codebooks, a codebook corresponding to the short message; identifying, in the codebook, a code word corresponding to a radio network temporary identity (RNTI) of the user equipment; dividing the code word into one or more binary sequences; mapping the one or more binary sequences to one or more random access channel (RACH) preambles; and transmitting the one or more RACH preambles to the base station using a random access channel.

Description

METHODS OF TRANSMITTING MISSION CRITICAL SMALL DATA USING RANDOM ACCESS CHANNEL
TECHNICAL FIELD
[0001] This application generally relates to wireless telecommunication and particularly relates to methods of transmitting mission critical small data in a wireless network using a random access channel.
BACKGROUND
[0002] In a typical wireless communications environment (e.g., Long Term Evolution (LTE)), a user equipment (UE) communicates voice and/or data signals with one or more service networks via base stations (also referred to as "evolved Node-Bs" (eNBs)). In such wireless communication system, a UE may initiate a random access procedure to
communicate with a base station for many events. The random access procedure can be performed in a contention-based or non-contention-based manner depending on whether a Random Access Channel (RACH) resource used by the UE is randomly selected by the UE itself or assigned by the network.
[0003] Recently, an emerging technology (e.g., the Internet of Things) has received a lot of attention because it empowers full mechanical automation of operating many devices by enabling them to communicate with each other. Such communications among those machine- type communications (MTC) devices are known as machine-to-machine (M2M)
communications. MTC communication has some different features than current human-to- human (H2H) communications. For example, a MTC device such as a smart meter may generate a very small data transmission during its report time interval and then go to sleep for a long time interval. In another example, a MTC device (e.g., a fire alarm) may only transmit a small-size but mission-critical alarm message.
[0004] Currently, the aforementioned random access procedure has to be performed to enable the data transmission regardless of the size and importance of the data to be transmitted each time, resulting significant overhead. In addition, it is difficult to transmit the mission-critical but small-size data over any uplink channel other than the scheduled PUSCH in the current LTE specification. But the limited number of PUSCH resource block (RB) may not be able to support a large number of MTC devices within a specific area, resulting in unpredictable transmission delays.
SUMMARY
[0005] An object of the present application is to provide a method for transmitting mission- critical small data between UE and base station using a random access channel with reduced overhead and time delay.
[0006] According to a first aspect of the present application, a method for a user equipment to transmit a short message to a base station includes the following operations: generating a short message; choosing, among a plurality of codebooks, a codebook corresponding to the short message; identifying, in the codebook, a code word corresponding to a radio network temporary identity (RNTI) of the user equipment; dividing the code word into one or more binary sequences; mapping the one or more binary sequences to one or more random access channel (RACH) preambles; and transmitting the one or more RACH preambles to the base station using a random access channel.
[0007] According to a second aspect of the present application, a method for a base station to decode a short message transmitted from a user equipment within coverage of the base station includes the following operations: receiving one or more random access channel (RACH) preambles from the user equipment via a random access channel; determining one or more binary sequences by decoding the one or more RACH preambles; combining the one or more binary sequences into a code word; determining a short message by decoding the code word; choosing, among a plurality of codebooks, a codebook corresponding to the short message; and identify, in the chosen codebook, an RNTI of the user equipment, wherein the RNTI corresponds to the code word..
[0008] According to a third aspect of the present application, a base station includes one or more processors, memory and a plurality of instructions stored in the memory that, when executed by the one or more processors, perform a plurality of operations as described above in connection with the base station.
BRIEF DESCRIPTION OF DRAWINGS
[0009] The accompanying drawings, which are included to provide a further understanding of the embodiments and are incorporated herein and constitute a part of the specification, illustrate the described embodiments and together with the description serve to explain the underlying principles. Like reference numerals refer to corresponding parts.
[0010] FIG. 1 A is a block diagram of an exemplary wireless communication system in which embodiments of the present application may be practiced.
[0011] FIG. IB is a block diagram illustrating a contention-based random access procedure that includes multiple steps.
[0012] FIG. 2A is a block diagram illustrating the UE-side operations for transmitting a short, mission-critical message to a base station according to some embodiments of the present application.
[0013] FIG. 2B is a block diagram illustrating the base station-side operations for receiving a short, mission-critical message from a UE according to some embodiments of the present application.
[0014] FIG. 3 is a flowchart illustrating one embodiment of a method for transmitting a short, mission-critical message from a UE to a base station according to some embodiments of the present application.
[0015] FIG. 4 is a flowchart illustrating one embodiment of a method for receiving a short, mission-critical message from a UE according to some embodiments of the present application.
DETAIL DESCRIPTIONS
[0016] Reference will now be made in detail to embodiments, examples of which are illustrated in the accompanying drawings. In the following detailed description, numerous non-limiting specific details are set forth in order to assist in understanding the subject matter presented herein. But it will be apparent to one of ordinary skill in the art that various alternatives may be used without departing from the scope of claims and the subject matter may be practiced without these specific details. With reference now to the figures, exemplary block diagrams of data processing environments are provided in which illustrative embodiments may be implemented. It should be appreciated that these figures are only exemplary and are not intended to assert or imply any limitation with regard to the environments in which different embodiments may be implemented. Many modifications to the depicted environments may be made.
[0017] FIG. 1 A is a block diagram of an exemplary wireless communication system 100 in which embodiments of the present application may be practiced. A base station 102 is in wireless communication with a plurality of user equipments 104 (which may also be referred to as user devices, mobile stations, subscriber units, access terminals, etc.). A first user equipment (UE) 104-A, a second user equipment (UE) 104-B, and an n-th user equipment 104-N are shown in FIG. 1 A. The base station 102 transmits data to and receives data from the UEs 104 over a radio frequency (RF) communication channel 106.
[0018] As used herein, the term "transmitter" refers to any component or device that transmits signals. A transmitter may be implemented in a base station 102 that transmits signals to one or more user equipments 104. Alternatively, a transmitter may be implemented in a user equipment 104 that transmits signals to one or more base stations 102. The term "receiver" refers to any component or device that receives signals. A receiver may be implemented in a user equipment 104 that receives signals from one or more base stations 102. Alternatively, a receiver may be implemented in a base station 102 that receives signals from one or more user equipments 104. The communications system 100 may comply with various wireless communication technologies, such as the Global System for Mobile communications (GSM) technology, Wideband Code Division Multiple Access (WCDMA) technology, Time Division-Synchronous Code Division Multiple Access (TD-SCDMA) technology, Long Term Evolution (LTE) technology, and others.
[0019] FIG. IB is a block diagram illustrating a contention-based random access procedure that includes the following four steps: (1) random access preamble step on Physical Random Access Channel (PRACH); (2) random access response step on Physical Downlink Shared Channel (PDSCH) with UE addressing using Random Access Radio Network Temporary Identity (RA-RNTI) on Physical Downlink Control Channel (PDCCH); (3) scheduled transmission step on Physical Uplink Shared Channel (PUSCH); and (4) contention resolution step on Physical Downlink Shared Channel (PDSCH).
[0020] In the random access preamble step, UE 104 selects one of the 64 available RACH preambles. In other words, only 6-bit random access preamble ID information is conveyed in the random access preamble step. The random access response message replied from the base station 102 includes the following information: (i) the 6-bit random access preamble ID, (ii) a timing alignment value for the UE 104 to change its timing, (iii) an initial uplink grant resource so that the UE 104 can use the PUSCH in the subsequent step and (iv) Cell Radio Network Temporary Identity (C RNTI) for further communication. After receiving the valid random access response message from the base station 102, the UE 104 allocates the resources according to the initial uplink grant resource and transmits a scheduled
transmission with C RNTI on PUSCH. Note that, in the current LTE specification, the size of the transport blocks is at least 80 bits. Finally, the base station 102 uses this optional contention resolution step to end the random access procedure.
[0021] As noted above, the aforementioned random access procedure has to be completed to enable data transmission between an UE and a base station regardless of the size of the data to be transmitted whenever a data transmission is to be performed in the current LTE wireless communication system. This requires a large amount of signaling overhead and may result in an unpredictable transmission delay. There are at least two problems for this approach to be adopted for the machine-to-machine communications: (i) the unpredictable transmission delay makes it unfit for those mission-critical applications (e.g., a firm alarm); and (ii) the allocated PUSCH resource may not be efficiently utilized because messages from a MTC device are much smaller than the allocated PUSCH resource.
[0022] The present application proposes a solution to the aforementioned problem by embedding small-size but mission-critical data (e.g., an alarm message of multiple bits long and generated by a fire alarm sensor) in the initial random access preamble transmission step from the UE to the base station. In addition to the small-size but mission-critical data, the other information required by the base station is the originator of the data, i.e., the UE ID. In other words, the base station needs to know at least the alarm message itself and the fire alarm sensor that generates the alarm message before taking any further actions, e.g., sending a report message to a remote device (e.g., a server or a mobile terminal such as a
smartphone).
[0023] For illustrative purposes, it is assumed in the following example that there are less than or equal to 65536 UEs (e.g., MTC devices) within a base station's coverage and a mission-critical message generated by one of the UEs is a 2-bit long alarm message with four possible values. Thus, the current 16-bit RNTI is long enough as an UE ID to differentiate these MTC devices within a base station's coverage. Note that when the number of UEs within a base station's coverage exceeds 65536, a new UE ID whose length is longer than 16 bits is required to uniquely identify individual UEs with the base station's coverage. In order for a UE to transmit a mission-critical message, the UE's 16-bit RNTI is encoded into one of a plurality of code words that is 24-bit or longer within a codebook. The codebook is uniquely associated with the mission-critical message such that each code word within the codebook corresponds to the same mission-critical message from a particular UE. The code word is then divided into one or more 6-bit binary sequences, which are then mapped to one or more random access preambles and transmitted to the base station in the initial random access preamble transmission step.
[0024] FIG. 2A is a block diagram illustrating the UE-side operations for transmitting a 2- bit, mission-critical alarm message to a base station according to some embodiments of the present application. As shown in FIG. 2A, the UE first selects, among multiple RNTI codebooks 200, a particular one 201 corresponding to the 2-bit alarm message. Given the UE's RNTI, a particular code word X within the selected codebook 201 is then identified as being mapped to the RNTI. For ease of description, every 2 bits of the codeword X are grouped together as a binary sequence having a sequential order. For example, '00' are label as 'A' symbol, Ό as 'B' symbol, Ί as 'C symbol and ' 10' as 'D' symbol, respectively.
[0025] For example, if the alarm message is "00", the output code word X of the corresponding RNTI is configured to contain more 'A' symbols than any other symbols. In one embodiment, the output codeword X has 6 'A' symbols, 2 'B' symbols, '2' C symbols and '2' D symbols. Thus the total number of possible code words within a codebook corresponding to a particular alarm message with a predefined symbol distribution is determined by the different orderings of A, B, C and D symbols. In this example, the total number is C(12, 6)*C(6, 2)*C(4, 2)*C(2, 2)=83160, which is larger than 65536, i.e., the total number of all possible 16-bit RNTI information sequences. Consequently, we can randomly choose 65536 code words among the possible 83160 code words to populate an RNTI codebook for a corresponding alarm message. Table 1 shows an exemplary RNTI codebook when the alarm message is "00". Table 1. Exemplary RNTI codebook when the alarm message is "00"
Figure imgf000008_0001
[0026] Similarly, an RNTI codebook can be generated when the alarm message is "01", "11" or "10", respectively, by having more 'Β', 'C or 'D' symbols in a code word X. In other words, the RNTI of the same UE is mapped to different code words within different codebooks for different alarm messages. But for a particular codebook, the RNTI corresponds to one and only one code word (e.g., code word X shown in FIG. 2 A).
[0027] Table 2 shows exemplary symbol distributions of a code word X for different alarm message.
Table 2. Exemplary symbol distribution of the code word X for different alarm messages
Figure imgf000008_0002
[0028] Note that other distributions of symbols in the code word X is also feasible as long as the occurrence of Ά', 'Β', 'C and 'D' symbols are not equal within a code word and the number of different orderings of that symbol distribution is larger than the number of all possible RNTIs assuming that RNTI is used as the UE ID for the MTC devices within a base station's coverage. For example, having 5 A, 2B, 3C and 2D in the code word X is another possible symbol distribution because the total number of possible code words for the RNTI codebook C(12, 5)*C(7, 2)*C(5, 3)*C(2, 2)=166320, which is greater than 65536. The symbol distribution can be chosen to meet different error quality targets for the RNTI and the alarm message. Also note that the length of the code word X can be chosen to meet different error quality targets for the RNTI and the alarm message. For example, a 30-bit codeword of X can be chosen to have 9 A symbols, 2 B symbols, 2 C symbols and 2 D symbols for the alarm message of "00" for a much larger possible code word space for the RNTI codebook. In this example, C(15,9)*C(6,2)*C(4,2)*C(2,2)=450450.
[0029] After identifying the code word X, the UE converts the code word X into one or more RACH preambles so that they can be transmitted by the PRACH procedure. In this step, the code word X is divided into one or more groups of 6-bit sequences, which are then mapped to one or more RACH preambles to be transmitted by the UE. As shown in FIG. 2A, let xk denotes the k-th bit of the code word X where k is from { 1, ... , 24}, the value of the binary sequence of {xl, x2, x3, x4, x5, x6} defines a first RACH preamble configuration index PI; the value of the binary sequence of {x7, x8, x9, xlO, xl 1, xl2} defines the second RACH preamble configuration index P2; the value of the binary sequence of {xl3, xl4, xl5, xl6, xl7, xl8} defines the third RACH preamble configuration index P3; the value of the binary sequence of {xl9, x20, x21, x22, x23, x24} defines the fourth RACH preamble configuration index P4.
[0030] Next, the UE transmits the above-determined RACH preambles in an order of PI, P2, P3 and P4. In some embodiments, there is a time interval between each RACH preamble transmission. Such time interval can be pre-defined or configured by the
system/network/eNB and broadcast to UEs using high-layer signaling.
[0031] FIG. 2B is a block diagram illustrating the base station-side operations for recovering a short, mission-critical message from a UE according to some embodiments of the present application. As shown in the figure, after the base station receives these random access preamble messages from the UE, the base station first re-generates the code word X and then decodes the alarm message by checking the distribution of the received symbols within the re-generated code word X. Let NA, NB, NC and ND denote the corresponding number of A, B, C and D symbols in the reconstructed code word X. Table 3 shows an exemplary predefined rule of decoding the alarm message. Table 3. Exemplary rule of decoding the alarm message
Figure imgf000010_0001
[0032] Using the alarm message, the base station selects the same RNTI codebook 201 that has been used by the UE as described above. In other words, both the base station and the UE have the same set of RNTI codebooks 200 in order for the UE to transmit the short mission- critical message to the base station. Within the RNTI codebook 201, the code word X is found and the corresponding RNTI is identified accordingly as the UE ID.
[0033] FIG. 3 is a flowchart illustrating one embodiment of a method for transmitting a short, mission-critical message from a UE to a base station according to some embodiments of the present application. First, the UE generates (310) a short alarm message. In some embodiments, the UE is communicatively coupled to a third-party device adjacent to the user equipment (e.g., a firm alarm sensor or a smart meter) and the UE generates a short alarm message in response to an alarm signal from the firm alarm sensor. In some other embodiments, the other device is a smart meter and the UE receives a parameter (e.g., power usage) provided by the smart meter on a regular basis and then generates one or more short messages including the value of the parameter. Next, the UE chooses (320) a codebook corresponding to the alarm message. As noted above, the codebook is configured such that it corresponds to a unique short message generated by the user equipment. The UE then identifies (330) a code word within the codebook corresponding to the UE's identifier (e.g., RNTI). In other words, each entry within a codebook defines a unique mapping relationship between a code word and an RNTI of a user equipment within coverage of the base station. By doing so, the base station can recover the RNTI when it receives the code word. Next, the UE divides (340) the code word into one or more binary sequences and maps (350) the one or more binary sequences to one or more RACH preambles. For example, each binary sequence is mapped to one RACH preamble as described above in connection with FIG. 2A. Finally, the UE transmits (360) the one or more RACH preambles to a base station using a corresponding random access channel between the UE and the base station.
[0034] FIG. 4 is a flowchart illustrating one embodiment of a method for receiving a short, mission-critical message from a UE according to some embodiments of the present application. First, the base station receives (410) one or more random access preambles from a UE via a random access channel (e.g., PRACH). As described above, the base station decodes (420) the random access preambles to determine one or more binary sequences. Next, the base station combines (430) the binary sequences to re-generate the code word as described above in connection with FIG. 2B, which then is used to determine (440) a short message corresponding to the code word. Next, the base station chooses (450), among a plurality of codebooks, a codebook that corresponds to the short message. Finally, the base station identifies (460), in the chosen code book, an RNTI of the user equipment based on, e.g., a mapping relationship between the RNTI and the corresponding to the code word.
[0035] In some embodiments, the plurality of codebooks are generated by a server and then given to the base station, which then shares them with a plurality of user equipments within coverage of the base station. Whenever there is any update to the codebooks, the base station transmits updated codebooks to the plurality of user equipments within coverage of the base station.
[0036] The description of the present application has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention, the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
[0037] The terminology used in the description of the embodiments herein is for the purpose of describing particular embodiments only and is not intended to limit the scope of claims. As used in the description of the embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
[0038] It will also be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first port could be termed a second port, and, similarly, a second port could be termed a first port, without departing from the scope of the embodiments. The first port and the second port are both ports, but they are not the same port.
[0039] Many modifications and alternative embodiments of the embodiments described herein will come to mind to one skilled in the art having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the scope of claims are not to be limited to the specific examples of the embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
[0040] The embodiments were chosen and described in order to best explain the underlying principles and their practical applications, to thereby enable others skilled in the art to best utilize the underlying principles and various embodiments with various modifications as are suited to the particular use contemplated.

Claims

WHAT IS CLAIMED IS:
1. A method for a user equipment to transmit a short message to a base station, comprising:
generating a short message;
choosing, among a plurality of codebooks, a codebook corresponding to the short message;
identifying, in the codebook, a code word corresponding to a radio network temporary identity (RNTI) of the user equipment;
dividing the code word into one or more binary sequences;
mapping the one or more binary sequences to one or more random access channel (RACH) preambles; and
transmitting the one or more RACH preambles to the base station using a random access channel.
2. The method of claim 1, wherein the user equipment is communicatively coupled to a third-party device adjacent to the user equipment and the short message is related to the third- party device.
3. The method of claim 2, wherein the user equipment is configured to automatically generate the short message according to a predefined schedule, the short message including a parameter provided by the third-party device.
4. The method of claim 2, wherein the user equipment is configured to automatically generate the short message in response to an alarm signal provided by the third-party device.
5. The method of claim 1, wherein each of the plurality of codebooks corresponds to a unique short message generated by the user equipment.
6. The method of claim 1, wherein each entry within a codebook defines a unique mapping relationship between a code word and an RNTI of a user equipment within coverage of the base station.
7. The method of claim 1, wherein the base station is configured to:
receive the one or more RACH preambles from the user equipment; determine the one or more binary sequences by decoding the one or more RACH preambles;
combining the one or more determined binary sequences into a code word;
determine the short message by decoding the code word;
choose, among a plurality of codebooks, a codebook corresponding to the determined short message;
identify, in the chosen codebook, the RNTI corresponding to the code word; and submitting a report message to a remote server, the report message including the determined short message and the RNTI.
8. The method of claim 1, wherein the base station is configured to share the plurality of codebooks with a plurality of user equipments within coverage of the base station.
9. The method of claim 8, wherein the base station is configured to update the plurality of codebooks according to a predefined schedule and transmit the updated codebooks to the plurality of user equipments within coverage of the base station.
10. The method of claim 1, wherein a total number of code words within a respective codebook is no less than a total number of user equipments within coverage of the base station.
11. A method for a base station to decode a short message transmitted from a user equipment within coverage of the base station, comprising:
receiving one or more random access channel (RACH) preambles from the user equipment via a random access channel;
determining one or more binary sequences by decoding the one or more RACH preambles;
combining the one or more binary sequences into a code word;
determining a short message by decoding the code word;
choosing, among a plurality of codebooks, a codebook corresponding to the short message; and
identify, in the chosen codebook, an RNTI of the user equipment, wherein the RNTI corresponds to the code word.
12. The method of claim 11, wherein the user equipment is communicatively coupled to a third-party device adjacent to the user equipment.
13. The method of claim 11, wherein each of the plurality of codebooks corresponds to a unique short message generated by the user equipment.
14. The method of claim 11, wherein each entry within a codebook defines a unique mapping relationship between a code word and an RNTI of a use equipment within coverage of the base station.
15. The method of claim 11, wherein the user equipment is configured to:
generate a short message;
choose, among a plurality of codebooks, a codebook corresponding to the generated short message;
identify, in the chosen codebook, a code word corresponding to the RNTI of the user equipment;
dividing the code word into the one or more binary sequences;
mapping the one or more binary sequences into the one or more RACH preambles; and
transmitting the one or more RACH preambles to the base station using the random access channel.
16. The method of claim 11, wherein the base station is configured to share the plurality of codebooks with a plurality of user equipments within coverage of the base station.
17. The method of claim 16, wherein the base station is configured to update the plurality of codebooks according to a predefined schedule and transmit the updated codebooks to the plurality of user equipments within coverage of the base station.
18. The method of claim 11, wherein a total number of code words within a respective codebook is no less than a total number of user equipments within coverage of the base station.
19. A base station configured to decode a short message transmitted from a user equipment within coverage of the base station, comprising:
one or more processors;
memory in electronic communication with the one or more processors; and a plurality of instructions stored in the memory and to be executed by the one or more processors, the plurality of instructions further including: receiving one or more random access channel (RACH) preambles from the user equipment via a random access channel;
determining one or more binary sequences by decoding the one or more RACH preambles accordingly;
combining the one or more binary sequences into a code word; determining a short message by decoding the code word;
choosing, among a plurality of codebooks, a codebook corresponding to the short message;
identifying, in the chosen codebook, an RNTI of the user equipment, wherein the RNTI corresponds to the code word.
20. The base station of claim 19, wherein each of the plurality of codebooks corresponds to a unique short message generated by the user equipment.
21. The base station of claim 19, wherein each entry within a codebook defines a unique mapping relationship between a code word and an RNTI of a use equipment within coverage of the base station.
22. The base station of claim 19, wherein a total number of code words within a respective codebook is no less than a total number of user equipments within coverage of the base station.
PCT/US2016/069113 2016-01-08 2016-12-29 Methods of transmitting mission critical small data using random access channel WO2017120091A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201680083305.0A CN108702781A (en) 2016-01-08 2016-12-29 The method for sending key task small data using random access channel
EP16884220.1A EP3400747A4 (en) 2016-01-08 2016-12-29 Methods of transmitting mission critical small data using random access channel

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201662276670P 2016-01-08 2016-01-08
US62/276,670 2016-01-08

Publications (2)

Publication Number Publication Date
WO2017120091A2 true WO2017120091A2 (en) 2017-07-13
WO2017120091A3 WO2017120091A3 (en) 2018-02-22

Family

ID=59274169

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2016/069113 WO2017120091A2 (en) 2016-01-08 2016-12-29 Methods of transmitting mission critical small data using random access channel

Country Status (3)

Country Link
EP (1) EP3400747A4 (en)
CN (1) CN108702781A (en)
WO (1) WO2017120091A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021135941A1 (en) * 2019-12-31 2021-07-08 FG Innovation Company Limited Method and user equipment for small data transmission

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220104279A1 (en) * 2019-02-14 2022-03-31 Panasonic Intellectual Property Corporation Of America Terminal and communication method
WO2020198980A1 (en) * 2019-03-29 2020-10-08 Qualcomm Incorporated Preamble to demodulation reference signal mapping for random access procedures
CN111586592B (en) * 2020-05-27 2021-11-16 浙江云蛛科技有限公司 Vehicle running state short information transmission method and system based on Internet of vehicles

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7804428B2 (en) * 2008-11-10 2010-09-28 Apple Inc. System and method for compressing a stream of integer-valued data
KR20120044198A (en) * 2010-10-27 2012-05-07 한국전자통신연구원 Method for random access procedure
KR20120071229A (en) * 2010-12-22 2012-07-02 한국전자통신연구원 Method for transmitting data for mobile communication systems
GB2489690B (en) * 2011-04-01 2013-03-20 Renesas Mobile Corp Small data transmission for detached mobile devices
US9143984B2 (en) * 2012-04-13 2015-09-22 Intel Corporation Mapping of enhanced physical downlink control channels in a wireless communication network
CN103841603B (en) * 2012-11-20 2019-05-31 北京三星通信技术研究有限公司 The method and apparatus of ascending grouping scheduling
JP6522522B2 (en) * 2013-02-28 2019-05-29 ▲ホア▼▲ウェイ▼技術有限公司Huawei Technologies Co.,Ltd. Data transmission and reception method and device
CN104469953B (en) * 2014-11-17 2018-09-11 大唐移动通信设备有限公司 A kind of method and apparatus that user data is transmitted by secondary carrier
CN104955162A (en) * 2015-06-23 2015-09-30 中国联合网络通信集团有限公司 Packet random access method and system for IoT (Internet of Things) equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021135941A1 (en) * 2019-12-31 2021-07-08 FG Innovation Company Limited Method and user equipment for small data transmission

Also Published As

Publication number Publication date
CN108702781A (en) 2018-10-23
EP3400747A4 (en) 2019-01-16
EP3400747A2 (en) 2018-11-14
WO2017120091A3 (en) 2018-02-22

Similar Documents

Publication Publication Date Title
AU2018408880B2 (en) Methods providing RACH occasion indication for random access procedure initiated by PDCCH order and related wireless terminals and base stations
US11218272B2 (en) Information transmission method and apparatus
EP3917248B1 (en) Methods providing ul grants including time domain configuration
US20170280483A1 (en) Method for configuring random access response, base station and user equipment
CN106455095B (en) A kind of data transmission method and device
WO2017120091A2 (en) Methods of transmitting mission critical small data using random access channel
CN104349333B (en) Enhance the method and apparatus of the wireless coverage of MTC UE
US8837352B2 (en) Method for allocating resources in a broadband wireless access system
CN109196930B (en) Method for transmitting reference signal, network equipment and terminal equipment
US9113285B2 (en) Method for transmitting/receiving control information for an M2M device, and device for same
US9544124B2 (en) Method and apparatus for performing ranging at M2M device in a wireless communication system
Abebe et al. Compressive sensing-based random access with multiple-sequence spreading for MTC
EP3332589B1 (en) System information block enhancements
CN102450077B (en) The method and apparatus of transmission/receiving resource allocation information in a wireless communication system
CN108029105B (en) Method and device for allocating wireless resources
US20240040633A1 (en) Generating random access signals with bearer information
CN105850211B (en) Method and apparatus for simultaneous downlink transmission
KR20220005506A (en) Wireless communication schemes using extended identifiers
EP3001744A1 (en) Coverage enhancement for MBSFN transmission
US20140029566A1 (en) Method and apparatus for performing ranging at m2m device in a wireless communication system
CN106576361B (en) Indication method, device and equipment of DCI length based on NB M2M
CN117751657A (en) Information feedback method, information receiving method and device
KR20160141160A (en) Random access response receiving device for machine type communication
KR20160141086A (en) Random access response receiving device for machine type communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16884220

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase in:

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2016884220

Country of ref document: EP

ENP Entry into the national phase in:

Ref document number: 2016884220

Country of ref document: EP

Effective date: 20180808