AU2013206029B2 - Method for random access in wireless communication system, wireless communication system, wireless terminal and base station unit - Google Patents
Method for random access in wireless communication system, wireless communication system, wireless terminal and base station unit Download PDFInfo
- Publication number
- AU2013206029B2 AU2013206029B2 AU2013206029A AU2013206029A AU2013206029B2 AU 2013206029 B2 AU2013206029 B2 AU 2013206029B2 AU 2013206029 A AU2013206029 A AU 2013206029A AU 2013206029 A AU2013206029 A AU 2013206029A AU 2013206029 B2 AU2013206029 B2 AU 2013206029B2
- Authority
- AU
- Australia
- Prior art keywords
- random access
- information
- base station
- wireless terminal
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
METHOD FOR RANDOM ACCESS IN WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION SYSTEM, WIRELESS TERMINAL, AND BASE STATION UNIT A method for random access in a wireless communication system including a base station and a wireless terminal, the method comprising: at the wireless terminal, selecting first information used for first random access or second information used for second random access; and transmitting, during or after the completion of random access using selected information, third information with a response message to be transmitted to the base station during random access which is different from the random access using information which has been selected.
Description
METHOD FOR RANDOM ACCESS IN WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION SYSTEM, WIRELESS TERMINAL, AND BASE STATION UNIT 5 [Technical Field] [00011 The present invention relates to a method for random access in a wireless communication system, a wireless terminal, and a base station unit. The present invention 10 is preferably used in the next-generation mobile communication system. [Background] [0002] 15 For a mobile communication system such as mobile telephones, the third-generation scheme has started providing service through the use of CDMA scheme- The 3GPP (3rd Generation Partnership Project) (R) has been discussed over the next-generation mobile communication system (LTE: 20 Long Term Evolution) which makes communication at a higher speed possible (see Non-Patent Document 1 below) In the project, reduction of delay in transmission is being discussed in addition to enhancement in transmission rate. [00031 25 In the event of initiation of communication between a base station unit (evolved Node B: eNB) and a mobile station unit (User Equipment: UE) serving as a wireless terminal -1prepares in a mobile communication system, a channel is. prepared through which the UE first transmits data. The 3GPP calls this channel a random access channel (RACH) and calls communication starting procedure using a RACH random 5 access (see Non-Patent Document 2 below). [0004] A RACH includes minimum information that causes the eNB to recognize transmission from the UE. A RACH is used at the initiation of the communication and the subsequent 10 communication uses an individual channel (or common channel) A RACH can be shared by a number of UEs unless two or more UEs concurrently use the RACH. For the above, a RACH uses an identifier called a signature with which the eNB can identify UEs concurrently transmitting data 15 through the RACH. [0005] Random access is carried out in the following four cases of: (1) transmission of first data; (2) establishment uplink synchronization when downlink data arrive; (3) 20 requestofuplinkdata transmissionwhenuplink dataarrive; and (4) establishment of synchronization withadestination base station when handover occurs. The direction from the eNB to the UE is defined as "downlink (DL)", and the reverse direction is defined as "uplink (UL)". 25 [0006] Here, when (1) transmission of first data or when (3) transmission of uplink data, the UE randomly selects one -2signature from available signatures (preambles) and uses the selected signature (Contention Based Random Access Procedure). Accordingly, there is a possibility, however being low, of two or more UEs concurrently transmit data 5 using the same signature. [0007] Conversely, the eNB allocates a dedicated signature to the UE in advance when (2) transmission of downlink data. A possible collision of a signature may cause an 10 instantaneous interruption of the connection or communication disconnection of the communication when (4) handover occurs- Therefore, a dedicated signature is allocated to the UE that is the subject of the handover (Non-contention Based Random Access Procedure). 15 [00081 (a)Contention Based Random Access Procedure: Fig. 20 illustrates an example of a random access procedure used in the above cases (1) and (3) disclosed in the non-Patent Document 2. 20 [0009] Upon uplink data arrival, the UE transmits a message (RandomAccess Preamble) #1-1 (uplink transmission request) containing a signature randomly selected to the eNB through the RACH (step S101) . At that time, there is a possibility 25 of occurrence of a contention because two or more UEs concurrently start transmission through the use of the same signature. However, even when a contention occurs, the eNB
-
3cannot recognize the effective ID of each UE and cannot therefore grasp that the contention occurs between which UEs. [0010] 5 Upon receipt of the message #1-1 (the signature) , the eNBreply with the responsemessage (RandomAccess Response) #1-2 to the received message #1-1 (step 3102) along with a timing advanced as synchronization signals for uplink communication, an uplink grant for transmission permission, 10 and others. If a number of UEs 20 concurrently transmit requests through the RACH, the eNB 10 returns the response message #1-2 to the UEs 20. [0011] Next, the UE, whichreceives the responsemessage#1-2, 15 transmits the ID of the UE itself via a message (Scheduled Transmission) #1-3 to request the eNE 10 to schedule UL communication to the eNB (step S103). [0012] Upon receipt of the message #1-3, the eNB recognizes 20 the ef f ective ID of the UE (hereinafter also called a terminal ID) andtherebycangrasp thatthe contentionof the signature occurs between which UEs. If a contention occurs, the eNB transmits message (Contention Resolution) #1-4 to the UEs in question to resolve the contention (step S104). 25 (0013] (b)Non-contention Based Random Access Procedure Fig. 21 illustrates an example of a random access -4procedure (Non-contention Based Random Access Procedure) used in the above cases (2) and (4) disclosed in the Non-Patent Document 2. [0014] 5 The eNB allocates a dedicated signature to each UE under the control of the eNB via a message (Random Access Preamble assignment) #2-1 in advance (step S20). [0015] 10 The UE issues UL synchronization request to the eNB using the dedicated signature allocated by the eNB via the message #2-1. In other words, the UE transmits a message #2-2 containing a dedicated signature to the eNB 15 through the RACH (step S202). [0016] Upon receipt of the message #2-2, the eNB replies with the response message #2-3 to the received message (step S203) along with a 20 timing advanced as synchronization signal, an uplink grant for transmission permission, and others. [non-Patent Document 1] 3GPP,"Requirements for Evolved UTRA (E-UTRA) and Evolved UTRAN(E 25 UTRAN)",TR25.913 V7.3.0,Release 7,March 2006 [non-Patent Document 2] 3GPP,"Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN)",TS36.300,Release 8,V8.1.0, 30 June 2007 7467504_1 5 [00171 As described above, since the non-Patent Document 2 examines two kinds of procedure of random access, different procedures concurrently 5 proceed in, for example, cases of (2) establishment uplink synchronization when downlink data arrive and (3) request of uplink data transmission when uplink data arrive. [0018] 10 Since different procedures concurrently proceeding as the above requires respective resources (such as signature), two kinds of signature are allocated while the procedures are proceeding so that the signatures are wasted. 15 [0019] A need exists to selectively perform one among a number of kinds of random access. [00201 Another need exists to efficiently use 20 resources such as signatures to be used for random access. [Summary] [00211 25 An aspect of the present invention provides a method for random access in a wireless communication system including a base station and a wireless terminal, the method comprising: at the wireless terminal, selecting first 30 information used for first random access or second information used for second random access; and transmitting, during or after the 10168378 (IRN: 937783D4) 6 completion of random access using selected information, third information with a response message to be transmitted to the base station during random access which is different from 5 the random access using information which has been selected, wherein the third information indicates that a buffer of the wireless terminal has uplink data. [00221 10 Another aspect of the present invention provides a wireless communication system comprising: a base station; and a wireless terminal communicating with the base station, wherein the wireless terminal: selects first is information used for first random access or second information used for second random access; and transmits, during or after the completion of random access using selected information, third information with a response 20 message to be transmitted to the base station during random access which is different from the random access using information which has been selected; and the base station performs a data communication with the wireless terminal, 25 wherein the third information indicates that a buffer of the wireless terminal has uplink data. [0023] Another aspect of the present invention 30 provides a wireless terminal comprising: a selector that selects first information used for first random access or second information 10168378 (IRN: 937783D4) 7 used for second random access; and a transmitter that transmits, during or after the completion of random access using selected information, third information with a response 5 message to be transmitted to a base station during random access which is different from the random access using information which has been selected, wherein the third information indicates that a buffer of the wireless 10 terminal has uplink data. [00241 Another aspect of the present invention provides a base station comprising: a communication unit that performs a data 15 communication with a wireless terminal which selects first information used for first random access or second information used for second random access and transmits, during or after the completion of random access using selected 20 information, third information with a response message to be transmitted to the base station during random access which is different from the random access using information which has been selected, wherein the third information 25 indicates that a buffer of the wireless terminal has uplink data. [0025] Another aspect of the present invention 30 provides a method for random access in a wireless communication system including a base station and a wireless terminal, the method 10168378 (IRN: 937783D4) 8 comprising: at the wireless terminal, selecting a random access preamble among a first random access preamble used for first random access and a second random access preamble used for 5 second random access in case of receiving a request requesting for new random access among the first random access and the second random access while another random access among the first random access and the second random 10 access is already ongoing, to continue with the ongoing random access or start with the new random access; and transmitting, during or after completion of the random access using the selected random access preamble from the 15 selecting, among the first random access and the second random access, information with a response message to be transmitted to the base station during third random access. [00261 20 Another aspect of the present invention provides a wireless communication system comprising: a base station; and a wireless terminal communicating with the base station, wherein the wireless terminal selects a random 25 access preamble among a first random access preamble used for first random access and a second random access preamble used for second random access in case of receiving a request requesting for new random access among the 30 first random access and the second random access while another random access among the first random access and the second random 10168378 (IRN: 937783D4) 9 access is already ongoing, to continue with the ongoing random access or start with the new random access; and transmits, during or after completion of the random access using the 5 selected random access preamble as selected by the wireless terminal, among the first random access and the second random access, information with a response message to be transmitted to the base station during third 10 random access; and the base station performs a data communication with the wireless terminal. [00271 Another aspect of the present invention provides a wireless terminal comprising: a 15 selector that selects a random access preamble among a first random access preamble used for first random access and a second random access preamble used for second random access in case of receiving a request requesting for new 20 random access among the first random access and the second random access while another random access among the first random access and the second random access is already ongoing, to continue with the ongoing random access or 25 start with the new random access; and a transmitter that transmits, during or after completion of the random access using the selected random access preamble as selected, among the first random access and the second 30 random access, information with a response message to be transmitted to a base station during third random access. 10168378 (IRN: 937783D4) 10 [00281 Another aspect of the present invention provides a base station comprising: a signature managing unit that manages a random access 5 preamble used for random access and allocates the random access preamble for a wireless terminal; and a transmitting-and-receiving unit that receives information selected by the wireless terminal which selects the random 10 access preamble among a first random access preamble used for first random access and a second random access preamble used for second random access in case of receiving a request requesting for new random access among the is first random access and the second random access while another random access among the first random access and the second random access is already ongoing, to continue with the ongoing random access or start with the new 20 random access and transmits, during or after completion of the random access using the selected random access preamble as selected, among the first random access and the second random access, information with a response 25 message to be transmitted to the base station during third random access. [0029]-[0042] Deleted [Effects of Embodiments of the Present 30 Invention] [0043] 10168378 (IRN: 937783D4) 11 Embodiments of the present invention can selectively perform one among a number of kinds of random access. 5 [0044] In addition, resources such as signatures to be used for the random access can be efficiently used. In addition, the interference of the random access channel (RACH) can be 10 inhibited. [Incorporation by reference] [0044a] 15 This application is a divisional application of Australian Patent Application No. 2007357770, filed 10 August 2007, the entire contents of which are incorporated herein by reference as if expressly set forth. 20 [Brief description of drawings] [0045] 25 [THE NEXT PAGE IS PAGE 13] 10168378 (IRN: 937783D4) 12 [Fig. 11 A functional block diagram illustrating a base station (eNB) according to a first embodiment of the present invention; [Fig. 2] A functional block diagram illustrating a 5 mobile station (UE) according to the first embodiment of the present invention; [Fig. 3] A sequence diagram explaining a procedure (method) of random access according to the first embodiment of the present invention; 10 [Fig. 4] A flow diagram explaining the operation of the eNB when carrying out the random access procedure of Fig. 3; [Fig. 5] A flow diagram explaining the operation of the UE when carrying out the random access procedure of 15 Fig. 3; [Fig. 6] A sequence diagram explaining a case in which different random access procedures are concurrently proceeding; [Fig. 7] A sequence diagram explaining a procedure 20 (method) of random access according to a second embodiment of the present invention; [Fig. 8] A flow diagram explaining the operation of the eNB when carrying out the random access procedure of Fig. 7; 25 [Fig. 9] A flow diagram explaining the operation of the UE when carrying out the random access procedure of Fig. 7; - 13 - [Fig. 10] A sequence diagram explaining a first modification to the second embodiment; [Fig. 11] A sequence diagram explaining a second modification to the second embodiment; 5 [Fig. 12] A sequence diagram explaining a procedure (method) of random access according to a third embodiment of the present invention; [Fig. 13] A flow diagram explaining the operation of the eNB when carrying out the random access procedure of 10 Fig. 10; [Fig. 14] A flow diagram explaining the operation of the UE when carrying out the random access procedure of Fig. 10; [Fig. 15] A sequence explaining a procedure (method) 15 of random access according to a fourth embodiment of the present invention; [Fig. 16] A flow diagram explaining the operation of the eNB when carrying out the random access procedure of Fig. 13; 20 [Fig. 17] A flow diagram explaining the operation of the UE when carrying out the random access procedure of Fig. 13; [Fig. 18] A sequence diagram explaining a procedure (method) of random access according to a fifth embodiment 25 of the present invention; - [Fig. 191 A sequence explaining a procedure (method) of random access according to a sixth embodiment of the -14present invention; [jFig. 20] A sequence diagram explaining a conventional procedure of random access (contention based random access) ; and 5 [Fig. 21] A sequence diagram explaining a conventional procedure of random access (non-contention based random access). [Description of symbols] 10 [0046] .10 base station (eNB) 11 antenna 12 transmitting/receiving unit 13 buffering unit 15 14 judging unit 15 signature managing unit 16 wireless resource managing unit 20 mobile station (UE) 21 antenna 20 22 transmitting/receiving unit 23 buffering unit 24 signature managing unit 25 access judging unit 26 identifier providing unit 25 [Best Modes to Carry Out the Invention] [0047] - 15 - Hereinafter, an embodiment of the present invention will now be described with reference to the drawings. However, the present invention is not limited to the embodiments to be detailed below and, needless to say, can 5 be variously modified without departing from the gist of the present invention. [0048] (1) first embodiment: Fig. 1 is a functional block diagram of a base station 10 unit (eNB) according to the first embodiment of the present invention; and Fig. 2 is a functional block diagram of a mobile station unit (UE) according to the first embodiment of the present invention. The eNB 10 and the UE 20 form a wireless communication system. The wireless 15 communication system can include a number of eNBs 10 and a number of UEs 20. The configurations illustrated in Figs 1 and 2 are also common to second through fourth embodiments detailed below unless otherwise specified. In addition, the base station unit 10 of the first embodiment assumes 20 to be an LTE eNB which possesses a part of or the entire function of a radio network controller (RNC), but may be a base station of a former generation of the LET (i.e-, without the function of RNC) . In addition, the base station may comply with any system as long as adopting both the 25 contention based random access procedure and the non-contention based random access procedure. [0049] - 16 - (description of eNB) Focusing on the major functions, the eNB 10 illustrated in Fig. 1 includes, for example, an antenna 11, a transmitting/receiving unit, a buffering unit 1 3 , a judging 5 unit 1 4 , a signature managing unit 15, and a wireless resource managing unit 16. [0050] Here, the antenna 1 1 receives an uplink wireless signal from the UE 20 while transmits downlink wireless signal 10 to the UE 20. The antenna 11 is commonly used for transmitting and receiving, but alternatively an antenna for transmitting may be separated from an antenna for receiving. [0051] 15 The transmitting/receiving unit (transmitting means, receiving means) 12 performs predetermined receiving processing on an uplink wireless signal received by the antenna 11 while performs predetermined transmitting processing on data (downlink data) from the buffering unit 20 13. [0052] The receiving processing includes, for example, low-noise amplification, frequency conversion (down-conversion) to the baseband frequency, gain 25 adjustment, demodulation by a predetermined demodulating scheme, and decoding by a predetermined decoding scheme. The transmitting processing includes encoding of the uplink - 17 transmission data by a predetermined encoding scheme, modulating of the encoded data by a predeterminedmodulating scheme (such as QPSK or 16QAM) , creating of a predetermined wireless frame, frequency conversion (up-conversion) to 5 the radio frequency, and electricpower amplification. The above wireless frame is exemplified by one conforming to OFDMA, OFDMA, or others. [0053] The buffering unit 13 temporarily stores downlink data 10 destined for the UE 20 under the control of the signature managing unit 15. The judging unit (determining means) 14 has a function of determining which signature was selected between a random signature and a dedicated signature through judging, on the basis of uplink data (message) 15 subjected to receiving processing in the transmitting/receiving unit 12, whether or not an UL synchronization request or an UL scheduling request is issued from the UE 20. [0054] 20 In the first embodiment, random signature represents a signature (first information) that the UE 20 randomly creates and a dedicated signature represents a signature (second information) that the eNB 10 allocates (sends) to the UE 20. The detailed method for the judgment will be 25 described below [0055] The signature managing unit (managing means) 15 - 18 manages a signature (Random Access Preamble, hereinafter also called a preamble) used for random access (procedure), creates a downlink message destined for the UE 20 and used for random access, and has a function of allocating and 5 releasing a signature for the UE 20. The release is based on the result of the judgment by the judging unit 14. [10056] The wireless resource managing unit 16 manages UL and DL wireless resources (e.g. channel frequency and time 10 (transmitting/receiving timings) ) to be used for communication (including communication when random accessing) with the UE 20 and allocation of the resources. For example, when OFDMA is adopted, the wireless resource managing unit 16 has a function to manage the mapping of 15 a two-dimensional transmitting/receiving region (called a burst) defined in terms of the sub-channel frequency and the symbol time. [0057] In addition, the wireless resource managing unit 16 20 has a function as controlling means that carries out control based on an uplink message (third information) which is received from the UE.20 during random access corresponding to the signature that is not selected by the UE 20. [0058] 25 (description of UE) Focusing on the major functions, the UE 20 illustrated in Fig. 2 includes, for example, an antenna 21, a -19transmitting/receiving unit 22, a buffering unit 23, a signature managing unit 24, an access judging unit 25, and an identifier providing unit 26. [0059] 5 Here, the antenna 21 receives a downlink wireless signal from the eNB 10 while transmits an uplink wireless signal to the eNB 10. Also the antenna 21 is commonly used for transmitting and receiving, but alternatively, an antenna for transmitting may be separated from an antenna 10 for receiving. [0060] The transmitting/ receivingunit (transmitting means, receiving means) 22 performs predetermined receiving processing on a downlink wireless signal received by the 15 antenna 21 while performs predetermined transmitting processing on data (uplink data) from the buffering unit 23 and on an uplink message (e.g., a Random Access Preamble and a Scheduled Transmission message) destined for an eNB via the identifier providing unit 26. 20 [0061] The receiving processing by the UE 20 also includes, for example, low-noise amplification, frequency conversion (down-conversion) to the baseband frequency, gain adjustment, demodulation by a predetermined demodulating 25 scheme, and decoding by a predetermined decoding scheme. The transmitting processing includes encoding of the uplink transmission data by a predetermined encoding scheme, -20modulating of the encoded data by a predetermined modulating scheme (such as QPSK or 16QAM) , multiplexing (mapping) of uplink data to a predetermined wireless frame, frequency conversion (up-conversion) to the radio frequency, and 5 electric power amplification. [0062] The buffering unit 23 temporarily stores uplink data destined for the eNB 10 under the control of the signature managing unit 24, which manages a signature (Random Access 10 Preamble) used for random access processing (procedure) [0063] The access judging unit 25 generates a predetermined message to be used for the random access procedure in cooperation with the signature managing unit 24, In this 15 example, the access judging unit 25 has a function of monitoring (confirming) whether or not multiple allocation of signatures occurs, that is, whether or not a dedicated signature allocated by the eNB 10 and a random signature randomly created by the UE 20 itself (by the signature 20 managing unit 24) exist and in the event of occurrence multiple allocation, determining which signature is made to be effective. [0064] The identifier providing unit 26 has a function of 25 providing an uplink message (e.g., a message informing of the terminal ID) which is destined for the eNB 10 and which is generated by the access judging unit 25 with information -21- (an identifier, a flag, or the like) indicating that the uplink message also serves as a message that requests to transmit an uplink data (UL scheduling) because also uplink data is being generated at the UE 20 or that the uplink 5 message serves as UL synchronization confirmation responsive an UL synchronization requests required for receiving downlink data because downlink data arrives at the eNB 10. The UL synchronization confirmation is a notification (confirmation response) to the eNB 10 that 10 the UE 20 secures UL synchronization due to correct receiving UL timing information from the eNB 10. [00651 (description of a random access procedure) Hereinafter, detailed description will now be made 15 in relation to an operation (a random access procedure) in a wireless communication system of the first embodiment having the above configuration with reference to Figs. 3 through 5. Fig. 3 is a sequence diagram explaining the random access procedure (method) of the first embodiment; 20 Fig. 4 is a flow diagram explaining the operation of the eNB 10 when the random access procedure of the first embodiment is being carried out; and Fig. 5 is a flow diagram explaining the operation of the UE 20 when the random access procedure of the first embodiment is being carried out. 25 [0066] Hereinafter, similarly to the description of Figs. 20 and 21, the messages with the reference numbers #1-1 - 22through #1-4 represents messages originally used for the contention based random access procedure (first random access) andmessages with the reference numbers #2-1through #2-3 originally used for the non-contention based random 5 access procedure (second random access). [0067] First of all, when the UE 20 generates uplink data and the buffering unit 23 stores the uplink data (step B1 in Fig. 5), the UE20 generates and stores a randomsignature 10 (Random Access Preamble) at the signature managing unit 24 (step B2 in Fig. 5) . Namely, the signature managing unit 24 has a function as creating means that creates a signature to be used for the contention based random access, which is executed when uplink data destined for the eNB 10 is 15 generated. [0068] After that, the UE 20 creates a random access preamble message (uplink transmission request) #1-1 containing the created signature at the access judging unit 25 andtransmits 20 the created message to the eNB 10 from the antenna 21 via the transmitting/receiving unit 22 (step Sla of Fig. 3 and step B3 in Fig. 5). [0069] Upon receipt of the uplink transmission request 25 message #1-1, the eNB 10 replies with a response message (Random Access Response) #1-2 responsive to the received uplink transmission request message #1-1 (step S2 in Fig. -23- 3) along with a timing advanced as synchronization message for uplink communication, an uplink grant for transmission permission, and others. If a number of UEs 20 concurrently transmit requests through the RACH, the eNB 10 returns the 5 response message #1-2 to the UEs 20. [00701 Here, presuming that the eNB 10 could not recognize the uplink transmission request message #1-1 that the UE 20 transmits because downlink data destined for the UE 20 10 arrived at the eNB 10 from the upper apparatus (i.e., the buffering unit 13 stores downlink data) before the transmission of the response message #1-2 (step Al in Fig. 4) and the eNB 10 does not complete the receiving process on the downlink data. 15 [0071] In this case, the signature managing unit 15 of the eNB 10 creates and stores a signature (dedicated signature, the second information) that the UE 20 that is the destination of the downlink data uses for random access (UL 20 synchronization request) (step A2 in Fig. 4), and transmits the dedicated signature to the UE 20 through the use of a signature allocation message (RA Preamble Assignment) #2-1 (step Slb in Fig. 3 and step A3 in Fig. 4). [0072] 25 When transmission of the uplink transmission request message #1-1 (step Sla in Fig. 3 ) andthe signature allocation message #2-1 (step Slb in Fig. 3) is completed, the eNB -24- 10 cannot recognize "which UE 20 uses which signature". In other words, the eNB 10 cannot recognize that the two signatures (Random Preamble and Dedicated Preamble) are issued for which UE 20 because according to Non-Patent 5 Document 2, either message does not contain information (terminal ID) to identify the UE 20. [0073] According to Non-Patent Document 2, since the terminal ID can be contained in a message (Scheduled Transmission) 10 #1-3, the eNB 10 grasps which UE 20 uses which signature after the receipt of the message #1-3 from the UE 20 (step S3 in Fig. 3). [100741 Conversely, regardless of whether or not the UE 20 15 notifies the terminal ID of the UE 20 itself to the eNB 10, when transmission of the uplink transmission request message#1- 2 (stepSlainFig. 3) and the signature allocation message #2-1 (step Sib in Fig. 3) is completed, both the random signature created by the UE 20 itself and the dedicated 20 signature (Dedicated Preamble) allocated by the eNB 10 exist in the UE 20, in other words, the UE 20 can recognize (detect) occurrence of the two kinds of random access. [0075] If a number of signatures are issued for a single UE 25 20 as the above case, the UE 20 determines which signature is to be used. Specifically, when the UE 20 receives (allocation of) a dedicated signature from the eNB 10 from -25the step S2 (step B4 in Fig. 5) , the access judging unit 25 confirms, in cooperation with the signature managing unit 24, whether or not multiple allocation of two signatures (preambles) occurs (step B5 in Fig. 5) . 5 [0076] The confirmation concluded occurrence of multiple allocation (yes route in step B5), the UE 20 (the access j-udging unit 25) ignores the dedicated signature allocated by the eNB 10 (step Slc in Fig. 3 and step B6 in Fig. 5), 10 and selects the random signature created by the UE 20 itself as an effective signature. In other words, the access judging unit 25 has a function of selecting means which selects one between the two signatures. In addition, when no multiple allocation occurs, the UE 20 determines the 15 random signature created by the UE 20 itself to be effective (no route in step B5) [00771 Thereby, the random access procedure (contention based random access procedure) using the random signature created 20 by the UE 20 becomes ef fective, so that the UE 20 continues the contention based random access procedure. [0078] In other words, the UE 20 creates a message #1-3 and transmits the message to the eNB 10 (step 33 in Fig. 3 and 25 step B7 in Fig. 5) . At that time, the UE 20 grasps, through receiving the signature allocation message #2-1, that the downlink data destined for the UE 20 itself arrives at the -26eNB 10, and therefore transmits the message #1-3 to the eNB 10 preferably after providing the message with information (such as an identifier or a flag) indicating that "the message #1-3 also serves as UL synchronization 5 confirmation required for receiving downlink data". UL synchronization confirmation is a confirmation response that UL synchronization is secured because the UE 20 correctly receives UL timing information contained in the message (Random access Response) #1-2. 10 [0079] In other words, UL synchronization request (third information) , which is transmitted to the eNB 10 during the non-contention random access which is however not selected, is a message to receive UL timing information 15 from the eNB 10 for UL synchronization, but the UE 20 already obtains the timing information during the contention based random access (#1-2) . For the above, the UE 20 provides UL synchronization confirmation informing eNB 10 of securing of UL synchronization to the message #1-3 to be 20 transmitted and then transmits the message #1-3. [0080] However, as described above, since the eNB 10 recognizes the UE 20 to which two signatures are allocated at the time of receiving the message #1-3, the eNB 10 can 25 implicitly judge that the message #1-3 also serves as a UL synchronization request even when the identifier or a flag is not explicitly provided. -27- (0081] Upon recognition of receiving the message (also serving as UL synchronization confirmation) #1-3 (yes route of step A4 in Fig. 4) , the eNB 10 judges in the judging 5 unit 14 that the dedicated signature allocated to the UE 20 is ignored in the same UE 20 (that is, the random signature created by the UE 20 is preferentially selected) and consequently releases the dedicated signature allocated to the same UE 20 in the signature managing unit 15 (step 10 S3-1 in Fig. 3 and step A5 in Fig. 4) [0082] Accordingly, the random access procedure (the non-contention based random access procedure) using the dedicated signature allocated by the eNB 10 is halted, so 15 that the dedicated signature allocated to the UE 20 can be released during the random access procedure (at an early stage), which makes it possible to efficiently use signatures. Here, if the message #1-3 is determined not to also serve as UL synchronization confirmation (no route 20 in step S4), the downlink data does not arrive and only normal uplink communication occurs, so that the eNB 10 transmits a message #1-4 (step A7) [00831 The eNB 10 starts processing (control), such as 25 scheduling of downlink data, based on the UL synchronization confirmation (third information) in the wireless resource managing unit 16 (step A6 in Fig- 4) -28- [00841 By receiving of the message (also serving as UL synchronization confirmation) #1-3, the eNB 10 can recognize that the response (Random Access Preamble) to 5 the signature allocation message #2-1 from the UE 20 can be omitted, so that unnecessary retransmission of the signature allocationmessage#2-lcanbe avoided. Further, reception of the message #1-3 used for the contention based random access procedure, despite allocation of the 10 dedicated signature, makes the eNB 10 possible to recognize generation of uplink data at the UE 20. [00851 Since the eNB 10 grasps the effective ID of the UE 20 through receiving the message (also serving as UL 15 synchronization confirmation) #1-3, so that the eNB 10 can recognize that the contention occurred between which UEs. The contention can be resolved by transmitting a Contention Resolution message #1-4 to the UEs 20 in question (step S4 in Fig. 3). 20 [00861 As described above, in the method of random access of the first embodiment, even when uplink data and downlink data arrive in the sameUE20, theUE20selects the signature the UE 20 itself created and thereby the contention based 25 random access is continued. Consequently, the two kinds of random access procedure do not concurrently proceed for a single UE 20 until the last stage as denoted in Fig. 6. - 29- Accordingly, the control plane of the random access can be simplified and signatures used for random access can be ef ficiently used- In addition, the interference of the random access channel can be inhibited. 5 [ 00871 However, the two kind of random access procedure can be concurrently proceeded. Accordingly, for example, in the event that the message (UL synchronization confirmation) #1-3 is contend with another UE, the UE 20 10 recognizes occurrence of the contention with reference to the Contention Resolution message #1-4 notified from the eNB 10. In this case, since continuation of the non-contention based random access may require a time to secure UL synchronization, the contention based random 15 access can be concurrently executed through the use of a dedicated signature allocated in the message #2-1 by eNB 10. However, theexpirationperiodofadedicatedsignature for the UE 20 needs to be set to be long in that case. [0088] 20 Since the information (UL synchronization confirmation) which is transmitted to the eNB 10 during the non-contention based random access that is not selected is transmitted to eNB 10 during the contention based random access, the reception processing of downlink data can be 25 surely carried out along with the transmitting processing on uplink data. [0089] -30- Further, since the UL synchronization confirmation can be common to the uplink message #1-3 that is originally determined to be transmitted to the eNB 10 during the contention based random access that is selected, there is 5 no need to prepare (define) an unlink message dedicated to UL synchronization confirmation, so that the wireless resource can be efficiently used. [0090] Further, since the first embodiment can reduce the 10 number of messages that are communicated between the eNB 10 and the UE 20 as compared with a second embodiment to be detailed below, it is possible to efficiently use the wireless resource and to shorten error recovery with the use of retransmission control (HARQ: Hybrid Automatic 15 Repeat reQuest) . [0091] (2) second embodiment: Fig. 7 is a sequence diagram illustrating a random access procedure according to the second embodiment; Fig. 20 8 is a flow diagram explaining the operation of eNB 10 during the random access procedure of the second embodiment; and Fig. 9 is a flow diagram explaining the operation of UE 20 during the random access procedure of the second embodiment. 25 [0092] In the second embodiment, in the event of occurrence of multiple allocation of the preambles, the UE 20 ignores -31the signature (firstinformation) createdby the UE20itself and selects the dedicated signature (second information) allocated by the eNB 10. Thereby, the non-contention based random access procedure continues. 5 [0093] First of all, when uplink data arrive in the UE 20 and is stored in the buffering unit 23 (step B11 in Fig. 9) , the UE 20 creates and stores a random signature (Random Access Preamble) at the signature managing unit 24 (step 10 B12 in Fig. 9), creates an uplink transmission request (Random Access Preamble) message #1-1 containing the signature at the access judging unit 25, and transmits the message #1-1 from the antenna 21 via the transmitting/receiving unit 22 (step Sla in Fig. 7 and step 15 B13 in Fig- 9). [0094] Upon receipt of the uplink transmission request message #1-1, the eNB 10 replies with a response message (Random Access Response) #1-2 to the received uplink 20 transmission request message (step S2 in Fig. 7) along with a timing advanced for synchronization signal for uplink communication, anuplink grant for transmissionpermission, and others. If a number of UEs 20 concurrently transmit requests through the RACH, the eNB 10 returns the response 25 message #1-2 to the UEs 20. [0095] Here, also in the second embodiment presumes that the -32eNB 10 could not recognize the uplink transmission request message #1-1 transmitted by the UE 20 because downlink data destined for the UE 20 arrived at the eNB 10 from the upper apparatus (i.e., thebuf fearing unit 13 stores downlinkdata) 5 before the transmission of the response message #1-2 (step All in Fig. 8) and the eNB 10 does not complete the receiving process on the downlink data. [0096] In this case, the signature managing unit 15 of the 10 eNB 10 creates and stores a signature (dedicated signature) that the UE 20 that is the destination of the downlink data uses for random access (UL synchronization request) (step A12 in Fig. 8) , and transmits the dedicated signature to the UE 20 through the use of a signature allocation message 15 (RA Preamble Assignment) #2-1 (step Slb in Fig. 7 and step A13 in Fig. 8). [0097] The UE 20, which receives the signature allocation message #2-1, transmits, to the eNB 10 through the RACH, 20 a message (Random Access Preamble) #2-2 containing the dedicated signature allocated by the eNB 10. (step S2a in Fig. 7). [00981 Here, when transmission of the uplink transmission 25 request message #1-1(step Sla in Fig. 7) and signature allocation message #2-1 (step Slb in Fig. 2) is completed, the UE 20 can recognizes the presence of both the random -33signature created by the UE 20 itself and the dedicated signature allocated by the eNB 10. [ 0099] Therefore, the UE 20 judges which signature is to be 5 used. In other words, when the eNB10 allocates a signature from step S2 (step B14 in Fig. 9), the UE 20 of the second embodiment confirms, in cooperation with the signature managing unit 24, whether or not multiple allocation of two signatures (preambles) is occurring (step B15 in Fig. 10 9). [01001 As a result, when multiple allocation is occurring (yes route in step B15) , the UE 20 ignores the random access signature created by the UE 20 itself (the signature 15 transmitted to the eNB 10) (step Sld in Fig. 7 and step B16 in Fig. 9) , and selects the dedicated signature allocated by the eNB 10 as an effective signature. When multiple allocation is not occurring, the dedicated signature is made effective (no route in step B15). 20 [01011 Consequently, the random access procedure (the non-contention based random access procedure) through the use of the dedicated signature allocated by the eNB 10 continues. 25 [0102] After that, the UE 20 creates the message #1-3 and transmits the created message to the eNB 10 (step S3 in -34- Fig. 7 and step B12 in Fig. 9) Concurrently, since also uplink data arrive, the UE 20 provides the message #1-3 with information (an identifier or a flag) indicating that the message #1-3 also "serves as a message (UL scheduling 5 request) to request transmission (scheduling) of unlink data" by the identifier providing unit 26 and transmits the message #1-3 to the eNB 10. [01031 In other words, UL scheduling request (third 10 information) , which is transmitted to the eNB 10 during the contention random access, which is not selected, is provided to the message #1-3 destined for the eNB 10 and is transmitted to the eNB 10. [ 0 10 4] 15 However, as described above, since the eNB 10 recognizes a UE 20 to which two signatures are allocated at the time of receiving the message #1-3, the eNB 10 can implicitly judge that the message #1-3 from the UE 20 also serves as a UL scheduling request even when the identifier 20 or a flag is not explicitly provided. [0105] Upon recognition of receiving the message (also serving as UL scheduling request) #1-3 (yes route of step A14 in Fig. 8) , the eNB 10 judges that the UE 20 makes the 25 dedicated signature allocated by the eNB 10 to the UE 20 effective, and releases the random signature which the eNB 10 manages and which is received from the UE 20 in the -35signature managing unit 15 (step S3-2 in Fig. 7 and step A15 in Fig. 8). [01061 Consequently, the random access procedure (the 5 contentionbasedrandomaccess) throughtheuseof therandom signature created by the UE 20 becomes ineffective (halts) , so that the dedicated signature can be released during the random access procedure (at an early stage), which makes it possible to efficiently use signatures. 10 [0107] In the eNB 10, the wireless resource managing unit 16 carries out processing (control) of allocation of UL wireless resource in response to the UL scheduling request (step A16 in Fig. 8) . Since the second embodiment makes 15 the dedicated signature effective, there is no need to transmit Contention Resolution message #1-4 used for the contention based random access procedure to the UE 20 in question and therefore the transmission can behalted (step S4 in Fig. 7 and step A17 in Fig. 8) In addition, if the 20 eNB 10 judges that the message #1-3 does not serve as the UL scheduling request, the eNB 10 terminates the processing (no route in step A14 in Fig. 8). [0108] As describe above, according to the method of random 25 access of the second embodiment, even when uplink data and downlink data concurrently arrive in the same UE 20, the UE 20 selects the signature allocated by the eNB 10 and -36thereby the non-contention based random access is continued. Consequently, the two kinds of random access procedure do not concurrently proceed until the last- Accordingly, the control plane of the random access can be simplified and 5 signatures used for random access can be efficiently used. In addition, the interference of the RACH can be inhibited. [0109] Since the information (UL scheduling request) which is transmitted to the eNB 10 during the contention based 10 random access that is not selected is transmitted to eNB 10 during the contention based random access, the reception processing of downlink data can be surely carried out along with the transmitting processing on uplink data. [01101 15 Further, when the UL scheduling request to the eNB 10 is common to the uplink message #1-3, there is no need to prepare (define) an unlink message dedicated to UL scheduling request, so that the wireless resource can be efficiently used. 20 [0111] The first and the second embodiments assume that the eNB 10 transmits the signature allocation request message #2-1 to the UE 20 after the UE 20 transmits the uplink transmission request message #1-1. However, even when 25 these messages #1-1 and #2-1 are transmitted in the reverse order, multiple allocation also occurs so that it is sufficient that either one of the signatures is made -37effective. [01121 (2.1) first modification: The above message also serving as UL scheduling request 5 to the eNB 10 may be a message (Random Access Preamble) #2-2 transmitted in step S2a in Fig. 7 as denoted in the example Fig. 10. [01131 In this case, the UE 20 needs not transmit the message 10 #1-3 and can consequently halt the transmission of the message #1-3 (step S3) . Accordingly, unnecessary transmission of uplink messages can be avoided so that efficiently use of uplink wireless resource (band) can be ensured. 15 [0114] Since the eNB 10 cannot recognize (i.e., cannot manage) that which UE 20 uses which preamble unless receives the message #1-3, there is no need to release the preamble (no need to carry out step S3-2 in Fig 7) . Consequently, it 20 is possible to reduce the processing load of the preamble management on the eNB 10. [0115] (2.2) second embodiment: Further, alternative to transmitting the UL scheduling 25 request to the eNB 10 during the non-contention based random access procedure, the UL scheduling request may be, as denoted in Fig. 11, transmitted along with the response -38- (ACK/NACK signal) responsive to the message #2-3 upon completion of the procedure (step S5 in Fig. 11) - Further alternatively, the request may be transmitted in the form of an independent uplink message after the transmission 5 of the message #2-3. [0116] (3) third embodiment: Fig. 12 is a sequence diagram illustrating a random access procedure according to the third embodiment; Fig. 10 13 is a flow diagram explaining the operation of eNB 10 during the random access procedure of the third embodiment; and Fig. 14 is a flow diagram explaining the operation of UE 20 during the random access procedure of the third embodiment. 15 [01171 Differently fromthe first and the second embodiments, description of the third embodiment presumes that uplink data arrive in the UE 20 under a state where a dedicated signature is allocated to the UE 20. 20 [0118] In other words, when downlink data which is destined for the UE 20 and which is transmitted from the upper apparatus arrives at the eNB 10 (i.e., the buffering unit 13 stores downlink data) (step A21 in Fig- 13), the eNB 25 10 creates and stores a signature (dedicated signature) (step A22 in Fig. 13) that is to be used for random access (UL synchronization request) by the UE 20, the destination -39of the downlink data (stepA2 in Fig. 13), and then transmits the created signature by means of a signature allocation message #2-1 (RA Preamble Assignment) to the destination UE 20 through the transmitting/receiving unit 12 (step All 5 in Fig. 12 and step A23 in Fig. 13). [0119] Upon receipt of the signature allocation message #2-1, the UE 20 stores and manages the dedicated signature allocated by the received message in the signature managing 10 unit 24 (step B21 in Fig. 14). [0120] After that, when UE 20 generates uplink data and the buffering unit 23 stores the uplink data (step B22 in Fig. 14), the UE 20 (the signature managing unit 24) does not 15 generates a random signature (step S12 in Fig. 12 and step B23 in Fig. 14) differently from the first and the second embodiments. [0121] As the substitute, the UE 20 creates, in the access 20 judging unit 25, an UL synchronization request (Random Access Preamble) message #2-2 containing the dedicated signature allocated by eNB10 and transmits the created message to the eNB 10 through the transmitting/receiving unit 22 from the antenna 21. 25 [0122] At that time, because of the generation of the uplink message, the UE 20 provides information (an identifier or -40a flag) indicating that "the message also serves as an UL scheduling request" to the message #2-2 in the identifier providing unit 26 and transmits the message to the eNB 10 (step S13 in Fig. 12 and step B24 in Fig. 14) 5 [0123] In other words, the UE 20 additionally transmits the UL scheduling request to the eNB 19 (sic, correctly 10) in the event of executing random access through the use of a signature for obtaining (establishing) the uplink 10 synchronization when downlink data is generated. [01241 Upon confirmation of the reception of the message #2-2 (also serving as UL scheduling request) (yes route in step A24 in Fig. 13) , the eNB 10 causes the wireless resource 15 managing unit 16 to control allocation of the UL resource corresponding to the UL scheduling request (step A25 in Fig. 13) and creates the signature managing unit 15 to create a response message #2-3 to the message #2-2 and transmit the created message to the UE 20 (step S14 in Fig. 12). 20 Conversely, since an UL synchronization request message #2-2 not containing the UL scheduling request (no route in step A24 in Fig. 13) represents a case in which a normal uplink data communication is arriving, the eNE 10 transmits the message #2-3 without allocation of an UL resource (step 25 A26 in Fig. 13). [01251 As described above, according to the method of random -41access of the third embodiment, after downlinkdata destined for a UE 20 arrive at eNB 10 and responsively allocates a signature to the same UE 20, the UE 20 does not generate a signature used for the contention based random access, 5 but does continue the non-contention based random access using the signature allocated by the eNB 10. Consequently, the two kinds of random access do not concurrently proceed. [01261 Accordingly, the control plane of the random access 10 can be simplified and signatures used for random access can be efficiently used. In addition, both the UE 20 and the eNB 10 do not have to always manage the two kinds of signature. [0127] 15 Further, since, during the non-contention based random access, information (UL scheduling request), which is transmitted to the eNB 10 during the contention based random access, is transmitted to the eNB 10, the transmitting processing of the uplink data can be surely carried out 20 along with the receiving processing of the downlink data. [0128] Still further, the random access preamble message #2-2 also serves as an UL scheduling request, delay until the start of transmitting uplink data can be reduced as compared 25 with the following fourth embodiment (in which a confirmationresponsemessage totherandomaccessresponse message #2-3 also serves as the UL scheduling request) - 42- [01291 (4) fourth embodiment: Fig. 15 is a sequence diagram illustrating a random access procedure according to the fourth embodiment; Fig. 5 16 is a flow diagram explaining the operation of eNB 10 during the randomaccess procedureof the fourtheembodiment; and Fig. 17 is a flow diagram explaining the operation of UE 20 during the random access procedure of the fourth embodiment. 10 [0130] Similarly to the third embodiment, the fourth embodiment presumes that the UE 20 generates uplink data under a state where a dedicated signature is previously allocated to the UE 20. 15 [0131] In other words, when downlink data which is destined for the UE 20 and which is transmitted from the upper apparatus arrives at the eNB 10 (i.e., the buffering unit 13 stores downlink data) (step A31 in Fig. 16), the eNB 20 10 creates and stores at the signature managing unit 15 a signature (dedicated signature) (step A32 in Fig. 16) that is to be used for random access (UL synchronization request) by the UE 20, the destination of the downlink data, and then transmits the created signature by means of a 25 signature allocation message #2-1 (RA Preamble Assignment) to the UE 20 through the transmitting/receiving unit 12 (step Sl in Fig. 15 and step A33 in Fig. 16). -43- [01321 Upon receipt of the signature allocation message #2-1, the UE 20 stores and manages the dedicated signature allocated by the receivedmessage in the signature managing 5 unit 24 (step B31 in Fig. 17). [0133] After that, UE 20 generates uplink data and the buffering unit 23 stores the uplink data (step B32 in Fig. 17), the UE 20 (the signature managing unit 24) does not 10 generate a random signature (step 512 in Fig. 15 and step B33 in Fig. 17) differently from the first and the second embodiments. [0134] As the substitute, the UE 20 creates a message #2-2 15 (RandomAccess Preamble) containing the dedicated signature allocated by eNB10 in the access judging unit 25, and transmits the message to the eNB 10 through the transmitting/receiving unit 22 from the antenna 21 (step S13 in Fig. 15 and step B34 in Fig. 17). 20 [0135] Upon recognizing reception of the message #2-2 (yes route in step A34 in-Fig. 16) , the eNB 10 causes the wireless resource managing unit 16 to allocate the UL wireless resource (step A35 in Fig. 16) and causes the signature 25 managing unit 15 to create a response message #2-3 to the message #2-2 and transmit the created message to the UE 20 (step S14 in Fig. 15) . Conversely, if the eNB 10 cannot -44recognize the reception of the message #2-2 (also serving as the UL scheduling request), the eNB 10 terminates the process (no route in step A34 in Fig. 16). [0136] 5 On the otherhand, upon receipt of the response message #2-3 from the eNB 10 (step B34 in Fig- 17) , the UE 20 creates a confirmation response (ACK/NACK) message #3 to the response message #2-3 in the access judging unit 25 and transmits the created message to the eNB 10. At that time, 10 the UE 20 provides information (an identifier or a flag) indicating that "the message #3 also serves as an UL scheduling request" to the confirmation response message #3 in the identifier providing unit 26 and transmits the message to the eNB 10 (step 35 in Fig. 17) . The provided 15 informationmaybe transmitted by a dedicated uplink message alternatively to being transmitted concurrently with the confirmation response message #3. [0137]' In other words, when executing random access through 20 the use of a signature for obtaining (establishing) the uplink synchronization, the UE 20 additionally transmits the UL scheduling request to the eNB 10 when the random access terminates. [0138] 25 As described above, according to the method of random access of the fourth embodiment, when uplink data is generated in a UE 20 after the eNB 10 generates downlink -45data destined for the UE 20 and responsively allocates a signature to the same UE 20, the UE 20 does not create a signature used for the contention based random access but does continue the non-contention based random access using 5 the signature allocated by the eNB 10, which thereby brings the same effects and advantages as the third embodiment. [0139] In addition, since the confirmation response message #3 to the random access response message #2-3 also serves 10 as an UL scheduling request, at least transmission of downlink data can be normally started even if the eNB 10 cannot correctly receive or recognize the confirmation response message #3 due to the propagation environment. [0140] 15 The uplink message also serving as an UL scheduling request may be, for example, one for reporting the CQI to the eNB 10. [01411 (5) fifth embodiment: 20 Fig. 18 is a sequence diagram explaining a random access procedure of the fifth embodiment. This embodiment is an example of transmitting the signature allocation message (RA preamble Assignment) #2-1 after the transmission of Response message (Random Access Response) #1-2 to the UE 25 20 from the eNB 10. [0142] In other words, the UE 20 generates uplink data, the -46- UE 20 creates a random signature at the signature managing unit 24 and transmits a random access preamble message (uplink transmission request) #1-1 containing the created random signature to the eNB 10 (step Sla). 5 [0143] Upon receipt of the message #1-1, the eNB 10 replay with the response message (Random Access Response) #1-2 to the received uplink transmission request message #1-1 (step S2) along with a timing advanced as synchronization 10 signal for uplink communication, an uplink grant for transmission permission, and others. If a number of UEs 20 concurrently transmit requests through the RACH, the eNB 10 returns the response message #1-2 to the UEs 20. [01441 15 At this stage, when downlink data which is destined for the UE 20 and which is from the upper apparatus arrives at the eNB 10, the eNB 10 creates a dedicated signature in the signature managing unit 15, and transmits the signature to the UE 20 via the signature allocation message 20 (RA Preamble Assignment) #2-1 (step S2b). [0145] Upon receipt of the signature allocation message (RA Preamble Assignment) #2-1, multiple allocation occurs due to the presence both the random signature and the dedicated 25 signature at the UE 20. When detecting the multiple allocation, the UE 20 selects one signature and continues the execution of the random access corresponding to the - 47 selected signature (Fig. 18 assumes the contention based random access is selected) in the same manner as the first and the second embodiments. [01461 5 Tn this case, the uplink message #1-3 that is to be transmitted in the later step S3 can also serve as UL synchronization confirmation the same as the first embodiment. Alternatively, the uplink message #1-3 can also serve as the UL scheduling request the same as the 10 second embodiment. Further, the uplink message (Random Access Preamble) #2-2 can also serve as the UL scheduling request, which may be transmitted by means of an ACK/NACK signal responsive to the response message #2-3 or may be transmitted by means of a dedicated uplink message. 15 [0147] Then, the eNB 10 confirms the effective ID of the UE 20 by, for example, receiving the message #1-3 and can release one of the signatures in the state of the multiple allocation. Namely, from the first and the fifth embodiment, the 20 signature allocation message (RA Preamble Assignment) #2-1 may be transmitted at any timing as long as before the eNB 10 receives the message #1-3. [01481 (6) sixth embodiment: 25 Fig. 1 9 is a sequence diagram explaining a random access procedure of the sixth embodiment. This embodiment is an example of transmitting the signature allocation message -48- (RA preamble Assignment) #2-1 after the transmission of a message (Scheduled Transmission) #1-3 to the eNB 10 from the UE 20. [01491 5 Specifically, when the UE 20 generates uplink data, the UE 20 transmits the random access preamble message (uplink transmission request) #1-1 containing the random signature to the eNB 10 (step Sla) , receives a response message #1-2 to this message (step S2), and transmits the 10 message #1-3 (step S3). [0150] Upon receipt of the message #1-3, the eNB 10 starts the detection of the effective ID (terminal ID) of the UE 20. Successful detection of the effective ID makes it 15 possible to recognize that the contention of signatures occurs between which UEs 20. If a contention occurs, the eNB 10 transmits the contention resolution message (Contention Resolution) #1-4 to the UEs 20 in question to solve the contention (step S4) 20 [0151] Here, presuming that the eNB 10 could not recognize the message #1-3 due to the reason that during processing themessage#1- 3 , downlink data destined for the UE 20 arrives at the eNB 10 from the upper apparatus (the buffering unit 25 13 stores downlink data) and therefore the receiving of the message #1-3 could not be completed. [0152] -49- In this case, the eNB 10 causes the signature managing unit15 to create andstore signature (dedicatedsignature: the second information) that is to be used for random access (UL synchronization request) by UE 20, and transmits the 5 dedicated signature via the signature allocation message (RA preamble Assignment) #2-1 to the UE 20 through the transmitting/receiving unit 12 (step S3a). [0153] Upon completion of transmitting and receiving 10 processing on these messages #1-3 and #2-1 the eNB 10 can recognize "which UE 20 uses which signature", that is, can recognize "two signatures (i.e., Random Preamble and Dedicated Preamble) are issued to which UE 20. [0154] 15 Here, when the UE 20 and another UE (hereinafter called the second UE) do not establish contention, the UE 20 can be judged to have multiple allocation, so that the eNB 10 (the signature managing unit 15) immediately releases the dedicated signature allocated to the UE 20, and normally 20 transmits a Contention Resolution message #1-4 (step S4) At this time, the uplink synchronization can correctly secured, so that the transmission of downlink data can be started. [0155] 25 Conversely, when the UE 20 and the second UE establish contention, there is a possibility of collision between messages #1-3 that the UE 20 and the second UE transmit. -50- At this stage, the UE 20 cannot be judged to have multiple allocation, and the dedicated signature allocated to the UE 20 cannot be immediately released. In the event of contention, the eNB 10 notifies the UE 20 of the contention 5 through the Contention Resolution message #1-4 - This case preferably maintains the dedicated signature until an UE 20 having multiple signatures is detected. [0156] In the meantime, regardless of whether or not the UE 10 20 notifies the eNB 10 the terminal ID of the UE 20 itself to the eNB 10, the UE 20 can recognize (detect) the presence of both the random signature (Random Preamble) created in the UE 20 itself and the dedicated signature allocated by the eNB 10, that is, occurrence of two kinds of randomaccess, 15 when the transmission of the message #1-3 and the signature allocation message #2-1 is completed. [0157] At that time, when the messages #1-3 transmitted from the UE 20 and the second UE do not collide with each other, 20 the UE 20 grasps that no contention is established with reference to the Contention Resolution message #1-4 notified from the eNB 10. Consequently, the UE 20, for example, releases the dedicated preamble, and maintains UL synchronization in the contention based random access 25 procedure because the UE 20 correctly receives UL timing information via the message #1-2. [0158) - 51 - Conversely, when the messages #1-3 transmitted from the UE 20 and the second UE collide with each other, the UE 20 grasps that contention is established with reference to the Contention Resolution message #1-4 notified from 5 the eNB 10. Consequently, the UE 20 releases the dedicated preamble and can concurrently perform both the UL synchronization request and the UL scheduling request in the contention based random access the same as the first embodiment. Alternatively, the UE 20 can perform both the 10 UL synchronization request and the UL scheduling request in the non-contention based random access the same as the second through the fourth embodiments. [01591 Further, as described in the first embodiment, both 15 random access procedures can be concurrently proceed. In other words, upon detection that the contention is established, the non-contention based random access can also be carried out at the same time through the use of the dedicated signature notified in the message #2-1. 20 [0160] The sixth embodiment describes the case where the message #2-1 is transmitted during the message #1-3 is being processed. Needless to say, this embodiment results the same if the message #2-1 is transmitted between the messages 25 #1-2 and #1-3. [Industrial Applicability] - 52 - [0161] As detailed above, since the present invention can selectively carry out one among a number of random access procedures and can efficiently use resource such as 5 signatures used for the random access procedures, the present invention seems to be extremely useful for the technical field of the wireless communication. -53-
Claims (14)
1. A method for random access in a wireless communication system including a base station and a wireless terminal, the method comprising: at the wireless terminal, selecting first information used for first random access or second information used for second random access; and transmitting, during or after the completion of random access using selected information, third information with a response message to be transmitted to the base station during random access which is different from the random access using information which has been selected, wherein the third information indicates that a buffer of the wireless terminal has uplink data.
2. The method for random access according to claim 1, wherein the first information is a first random access preamble and the second information is a second random access preamble.
3. The method for random access according to claim 1 or 2, wherein the wireless terminal receives the first information used for the first random access from the base station.
4. The method for random access according to claim 1 or 2, wherein the wireless terminal receives the second information used for the second random access from the base station.
5. A wireless communication system comprising: a base station; and a wireless terminal communicating with the base station, 10168274 (IRN: 937783D4) 54 wherein the wireless terminal: selects first information used for first random access or second information used for second random access; and transmits, during or after the completion of random access using selected information, third information with a response message to be transmitted to the base station during random access which is different from the random access using information which has been selected; and the base station performs a data communication with the wireless terminal, wherein the third information indicates that a buffer of the wireless terminal has uplink data.
6. A wireless terminal comprising: a selector that selects first information used for first random access or second information used for second random access; and a transmitter that transmits, during or after the completion of random access using selected information, third information with a response message to be transmitted to a base station during random access which is different from the random access using information which has been selected, wherein the third information indicates that a buffer of the wireless terminal has uplink data.
7. A base station comprising: a communication unit that performs a data communication with a wireless terminal which selects first information used for first random access or second information used for second random access and transmits, during or after the completion of random access using selected information, third information with a response message to be transmitted to the base station during random access which is different from the random access using information which has been selected, wherein the third 10168274 (IRN: 937783D4) 55 information indicates that a buffer of the wireless terminal has uplink data.
8. A method for random access in a wireless communication system including a base station and a wireless terminal, the method comprising: at the wireless terminal, selecting a random access preamble among a first random access preamble used for first random access and a second random access preamble used for second random access in case of receiving a request requesting for new random access among the first random access and the second random access while another random access among the first random access and the second random access is already ongoing, to continue with the ongoing random access or start with the new random access; and transmitting, during or after completion of the random access using the selected random access preamble from the selecting, among the first random access and the second random access, information with a response message to be transmitted to the base station during third random access.
9. The method for random access according to claim 8, wherein the information indicates that a buffer of the wireless terminal has uplink data.
10. The method for random access according to claim 8 or 9, wherein the wireless terminal receives the first random access preamble used for the first random access from the base station.
11. The method for random access according to any one of claims 8 through 10, wherein the wireless terminal receives the second random access preamble used for the second random access from the base station. 10168274 (IRN: 937783D4) 56
12. A wireless communication system comprising: a base station; and a wireless terminal communicating with the base station, wherein the wireless terminal selects a random access preamble among a first random access preamble used for first random access and a second random access preamble used for second random access in case of receiving a request requesting for new random access among the first random access and the second random access while another random access among the first random access and the second random access is already ongoing, to continue with the ongoing random access or start with the new random access; and transmits, during or after completion of the random access using the selected random access preamble as selected by the wireless terminal, among the first random access and the second random access, information with a response message to be transmitted to the base station during third random access; and the base station performs a data communication with the wireless terminal.
13. A wireless terminal comprising: a selector that selects a random access preamble among a first random access preamble used for first random access and a second random access preamble used for second random access in case of receiving a request requesting for new random access among the first random access and the second random access while another random access among the first random access and the second random access is already ongoing, to continue with the ongoing random access or start with the new random access; and a transmitter that transmits, during or after completion 10168274 (IRN: 937783D4) 57 of the random access using the selected random access preamble as selected, among the first random access and the second random access, information with a response message to be transmitted to a base station during third random access.
14. A base station comprising: a signature managing unit that manages a random access preamble used for random access and allocates the random access preamble for a wireless terminal; and a transmitting-and-receiving unit that receives information selected by the wireless terminal which selects the random access preamble among a first random access preamble used for first random access and a second random access preamble used for second random access in case of receiving a request requesting for new random access among the first random access and the second random access while another random access among the first random access and the second random access is already ongoing, to continue with the ongoing random access or start with the new random access and transmits, during or after completion of the random access using the selected random access preamble as selected, among the first random access and the second random access, information with a response message to be transmitted to the base station during third random access. Fujitsu Limited Patent Attorneys for the Applicant/Nominated Person SPRUSON & FERGUSON 10168274 (IRN: 937783D4) 58
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2013206029A AU2013206029B2 (en) | 2007-08-10 | 2013-05-27 | Method for random access in wireless communication system, wireless communication system, wireless terminal and base station unit |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2007357770A AU2007357770B2 (en) | 2007-08-10 | 2007-08-10 | Method of random access in radio communication system, radio communication system, radio terminal and base station apparatus |
AU2007357770 | 2007-08-10 | ||
AU2013206029A AU2013206029B2 (en) | 2007-08-10 | 2013-05-27 | Method for random access in wireless communication system, wireless communication system, wireless terminal and base station unit |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2007357770A Division AU2007357770B2 (en) | 2007-08-10 | 2007-08-10 | Method of random access in radio communication system, radio communication system, radio terminal and base station apparatus |
Publications (2)
Publication Number | Publication Date |
---|---|
AU2013206029A1 AU2013206029A1 (en) | 2013-06-13 |
AU2013206029B2 true AU2013206029B2 (en) | 2015-08-06 |
Family
ID=48607410
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2013206029A Active AU2013206029B2 (en) | 2007-08-10 | 2013-05-27 | Method for random access in wireless communication system, wireless communication system, wireless terminal and base station unit |
AU2013206027A Active AU2013206027C1 (en) | 2007-08-10 | 2013-05-27 | Method for random access in wireless communication system, wireless communication system, wireless terminal, and base station unit |
AU2013206028A Active AU2013206028C1 (en) | 2007-08-10 | 2013-05-27 | Method for random access in wireless communication system, wireless communication system, wireless terminal and base station unit |
AU2013206035A Active AU2013206035B2 (en) | 2007-08-10 | 2013-05-27 | Method for random access in wireless communication system, wireless communication system, wireless terminal, and base station unit |
AU2013206031A Active AU2013206031C1 (en) | 2007-08-10 | 2013-05-27 | Method for random access in wireless communication system, wireless communication system, wireless terminal, and base station unit |
Family Applications After (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2013206027A Active AU2013206027C1 (en) | 2007-08-10 | 2013-05-27 | Method for random access in wireless communication system, wireless communication system, wireless terminal, and base station unit |
AU2013206028A Active AU2013206028C1 (en) | 2007-08-10 | 2013-05-27 | Method for random access in wireless communication system, wireless communication system, wireless terminal and base station unit |
AU2013206035A Active AU2013206035B2 (en) | 2007-08-10 | 2013-05-27 | Method for random access in wireless communication system, wireless communication system, wireless terminal, and base station unit |
AU2013206031A Active AU2013206031C1 (en) | 2007-08-10 | 2013-05-27 | Method for random access in wireless communication system, wireless communication system, wireless terminal, and base station unit |
Country Status (1)
Country | Link |
---|---|
AU (5) | AU2013206029B2 (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008114983A2 (en) * | 2007-03-19 | 2008-09-25 | Lg Electronics Inc. | Methods and procedures to allocate ue dedicated signatures |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2306662B1 (en) * | 1998-10-05 | 2014-08-27 | Sony Deutschland Gmbh | Random access channel prioritization scheme |
CN101395862B (en) * | 2006-01-20 | 2011-12-07 | 诺基亚公司 | Random access procedure with enhanced coverage |
-
2013
- 2013-05-27 AU AU2013206029A patent/AU2013206029B2/en active Active
- 2013-05-27 AU AU2013206027A patent/AU2013206027C1/en active Active
- 2013-05-27 AU AU2013206028A patent/AU2013206028C1/en active Active
- 2013-05-27 AU AU2013206035A patent/AU2013206035B2/en active Active
- 2013-05-27 AU AU2013206031A patent/AU2013206031C1/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008114983A2 (en) * | 2007-03-19 | 2008-09-25 | Lg Electronics Inc. | Methods and procedures to allocate ue dedicated signatures |
Also Published As
Publication number | Publication date |
---|---|
AU2013206035B2 (en) | 2015-07-16 |
AU2013206027B2 (en) | 2015-07-16 |
AU2013206028B2 (en) | 2015-06-11 |
AU2013206029A1 (en) | 2013-06-13 |
AU2013206028A1 (en) | 2013-06-13 |
AU2013206031A1 (en) | 2013-06-13 |
AU2013206035A1 (en) | 2013-06-13 |
AU2013206027C1 (en) | 2015-11-26 |
AU2013206031C1 (en) | 2015-12-17 |
AU2013206028C1 (en) | 2015-10-29 |
AU2013206027A1 (en) | 2013-06-13 |
AU2013206031B2 (en) | 2015-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2007357770B2 (en) | Method of random access in radio communication system, radio communication system, radio terminal and base station apparatus | |
AU2013206029B2 (en) | Method for random access in wireless communication system, wireless communication system, wireless terminal and base station unit | |
JP5778631B2 (en) | Random access method, radio communication system, radio terminal and base station apparatus in radio communication system | |
JP5778613B2 (en) | Random access method, radio communication system, radio terminal and base station apparatus in radio communication system | |
JP5778629B2 (en) | Random access method, radio communication system, radio terminal and base station apparatus in radio communication system | |
JP5778632B2 (en) | Random access method, radio communication system, radio terminal and base station apparatus in radio communication system | |
JP5778628B2 (en) | Random access method, radio communication system, radio terminal and base station apparatus in radio communication system | |
JP2012200013A (en) | Random access method in wireless communication system, wireless communication system, wireless terminal, and base station device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGA | Letters patent sealed or granted (standard patent) |