Carrying Mobile Station Specific Information in the Reverse Access Channel in a Wireless Communications System

Information

  • Patent Application
  • 20080080432
  • Publication Number
    20080080432
  • Date Filed
    September 04, 2007
    17 years ago
  • Date Published
    April 03, 2008
    16 years ago
Abstract
Two types of access probe messages are defined: a first when a mobile station has not yet been assigned a media access code index (MAC ID), and a second when a mobile station already has a MAC ID assigned by the base stations in the active set. Base stations can differentiate between the first and second types of access probes according to the scrambling sequence used. In the second type, while different MAC IDs are used by each of the mobile stations in the sector, they are all scrambled according to a similar scrambling sequence defined specifically for these second types of access probes. The rake receivers used in such networks are configured to repeat the rake finger processing after CP removal, DFT, de-channelizing, and IDFT, thereby reducing their complexity.
Description

BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 illustrates an exemplary channel structure of the regular access channel for LBC mode in 3GPP2;



FIG. 2 illustrates a flow diagram of the typical access-based hand-off process;



FIG. 3 illustrates a block diagram of a transmitting and receiving process for an OFDMA-based communications system;



FIG. 4 illustrates a flow diagram of an access-based hand-off configured according to one embodiment of the present invention;



FIG. 5 illustrates a block diagram of a DFT-OFDMA demodulation module with an improved rake receiver structure configured according to one embodiment of the present invention;



FIG. 6 illustrates an example access sequence ID configured according to one embodiment of the present invention;



FIG. 7 illustrates an exemplary channel structure of a forward shared control channel;



FIG. 8 is a flowchart illustrating example steps executed to implement one embodiment of the present invention;



FIG. 9 is a flowchart illustrating example steps executed to implement one embodiment of the present invention; and



FIG. 10 illustrates an example computer system configured to operate a system according to one embodiment of the present invention.





DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

The making and using of the presently preferred embodiments are discussed in detail below. It should be appreciated, however, that the present invention provides many applicable inventive concepts that can be embodied in a wide variety of specific contexts. The present invention provides a unique method and system for carrying mobile station specific information on the reverse access channel in a wireless communications system. Specific examples of components, signals, messages, protocols, and arrangements are described below to simplify the present disclosure. These are, of course, merely examples and are not intended to limit the scope of the invention from that scope defined in the claims. Well known elements are presented without detailed description in order not to obscure the present invention in unnecessary detail. For the most part, details unnecessary to obtain a complete understanding of the present invention have been omitted inasmuch as such details are within the skills of persons of ordinary skill in the relevant art. Details regarding control circuitry described herein are omitted, as such control circuits are within the skills of persons of ordinary skill in the relevant art.


Turning now to FIG. 4, a flow diagram is illustrated depicting an example of access-based hand-off process 40 configured according to one embodiment of the present invention. Link 400 represents the traffic between AT and Source AP. When a sector or base station (Target AP) is added into the active set of the access network, the hand-off MAC ID assigned to AT by Target AP is transmitted over link 401. As AT determines to conduct an access-based hand-off to Target AP, AT will send a special hand-off access probe (an access probe of the second type) to Target AP over link 402. If appropriate, Target AP will grant the hand-off by sending a special hand-off access grant message in the shared control channel (SCCH) using link 403. This hand-off access grant message includes the regular MAC ID, which has already been assigned by Target AP when Target AP is added to the active set, and the timing adjustments for uplink synchronization. Upon receiving the special hand-off access grant message, AT regards the hand-off as complete. The traffic will then flow between AT and Target AP thereafter over link 404.


It should be noted that the difference between the access-based hand-off process in FIGS. 2 and 4 revolves around the hand-off access probe transmitted by the mobile station/AT and the special hand-off grant message transmitted back to the mobile station/AT by Target AP.


According to one aspect of the present invention, the second type of access probe may be used, in general, by a mobile station that already has a MAC ID assigned by the access network. For example, if the target sector is asynchronous to the current serving sector, the AT may send the second type of access probe as the indication of a hand-off request. In another example, a synchronous base station or sector may need to determine the timing information on an uplink from a particular mobile station. The mobile station may then send the second type of access probe as a timing reference signal for the base station to measure the timing of the received signal in order to determine the timing adjustment that the mobile station should perform on its transmitter. In yet another example, a mobile station in the semi-connected state may use the second type of access probe to resume communications with the access network or in order to enter an idle state. In these scenarios, the mobile station has already been assigned a MAC ID.


The mobile station scrambles the second type of access probes using a second scrambling sequence that is different from a first scrambling sequence used when sending the first type of access probe. However, the second scrambling sequence is common for all access probes of the second type. The access network may then preferably recognize the identity of the mobile station from the received second type of access probe without going through the banding process, therefore eliminating the overhead and delay associated with the banding process, which is a communications process where a mobile station informs the access network of a more permanent identity of the mobile station, such as, for example, the 128-bit Unicast Access Terminal Identity (UATI). Because all second type access probes use one common scrambling code with different access sequences, the complexity of the receiver is reduced.



FIG. 5 is a block diagram illustrating DFT-OFDMA rake receiver 50 configured according to one embodiment of the present invention. The incoming baseband signal is first converted to frequency domain by a DFT operation by DFT module 500. The data and control channel de-channelization element 501 separates the signals for the data channel and the control channel in the frequency domain. The output for the control channel, which is transmitted based on the DFT-OFDMA technique, is transformed into the time domain by inverse discrete Fourier Transformation (IDFT) element 502. Cyclic shift rotator 503 produces multiple cyclic shifted versions of the transformed control signal. Each process length comprises one OFDM symbol. The delay offset between the first version (processed through path 504) and the last version (processed through path 506) is also known as the searching window size.


Multiple OFDM symbols may each be fed into correlator 507. Correlator 507, also known as a rake finger, corresponds to one cyclic shifted version of the signal, which comprises HPSK demodulator/descrambler 508 and Hadamard transformer 509. Here the Hadamard transformer acts like a correlator with various Walsh sequences, which are used as the access sequence. The Walsh sequences of the various embodiments of the present invention are orthogonal to one another, thus, an optimal receiver just calculates the matrix product of the received Walsh sequence and the Hadamard matrix in order to correlate the received sequence with each Walsh code. Output 510 of Hadamard transformer 509 is the correlation of the cyclic shifted signal with a variety of Walsh sequences. Energy detection module 511 collects all the correlation values (such as the energy values of each output element of the matrix product or the signal-to-noise ratio values of each output element of the matrix product) from all of the rake fingers for each Walsh sequence and makes the determination of which Walsh sequence(s) is/are detected.


Referring back to FIG. 3, a traditional rake receiver would generate multiple delayed versions of a received signal before CP removal and S/P module 308. For each of the multiple delayed versions, the processing of CP removal and S/P module 308 through demodulating and decoding module 313-N are to be performed before the outputs can be combined. In contrast, in operation of the various embodiments of the present invention, the multiple delayed versions of a received signal are generated after IDFT module 312 by cyclic rotator 503 (FIG. 5). Therefore, the processing performed between CP removal and S/P module 308 through IDFT module 312 (FIG. 3) are performed only once for all delayed versions while descrambling/demodulating 508 and transforming 509 are performed for each of the multiple delayed versions before the outputs are combined. Therefore, the improved rake receiver dramatically reduces the complexity of DFT-OFDMA rake receivers while maintaining the benefit of traditional rake receivers.


In various circumstances that call for the second type of access probe, there is no dedicated reverse channel targeting the new sector or base station for a particular mobile station before the hand-off request. Therefore, while the regular MAC ID may be used, it is not necessary to use it. In one embodiment of the present invention, a special hand-off MAC ID associated with the new sector or base station is assigned to the AT. In this particular embodiment, the hand-off MAC ID is different from the regular MAC ID so that this AT will not consume the regular MAC ID resource before the hand-off request. This hand-off MAC ID is assigned by the new sector. However, if there is no air interface between the AT and this new sector, the assignment message may be transmitted by the current anchor sector. The communications between the current anchor sector and the new sector is typically implemented via the backhaul.


In the LBC mode of 3GPP2, the regular MAC ID is proposed as being anywhere between 9-11 bits. Because the number of hand-off users is likely to be smaller than that of the non-hand-off users, a shorter hand-off MAC ID, for example, 7 bits, may be used. In one embodiment of the present invention, a particular hand-off MAC ID is assigned by each sector in the active set that may be accessed through access-based hand-off.


The modulation scheme of the second type of access probe is similar to the regular access probe, as illustrated in FIGS. 1 and 3. In various embodiments of the present invention, the AT chooses the access sequence ID based on the MAC ID, as well as the target sector forward link strength, the request level, and the like.



FIG. 6 is a block diagram illustrating example access sequence ID 60 configured according to one embodiment of the present invention. Access sequence ID 60 comprises 7-bit MAC ID 600, 2-bit target sector forward link strength 601, and 1-bit request level 602. Target sector forward link strength 601 may comprise the forward pilot level strength as measured by the mobile station. Request level 602 may be used to indicate the buffer level, priority level, quality of service (QoS) of the application of the mobile station, or in the case of exiting the semi-connected state, this bit may be used to indicate a request to enter the active state or to enter the idle state.


It should be noted that additional and/or alternative embodiments of the present invention may employ numerous variations and alterations in selection of the access sequence ID for the second type of access probe without departing from the spirit of the present invention. For example, the access sequence ID for the second type of access probe may also be indicated by the access network.


It should further be noted that in various additional and/or alternative embodiments of the present invention, the MAC ID used for the second type of access probe in hand-off or other circumstances may comprise the regular MAC ID, a shortened version of the regular MAC ID, the special hand-off MAC ID defined above, some kind of derivative of the regular MAC ID, and the like. The present invention is not limited to any one method for representing the MAC ID.


The scrambling code used for the scrambling process, e.g., by hybrid phase shift keying (HPSK) modulation of the hand-off access probe, as well as the other access probes of the second type, should be distinguishable from the other reverse channels including the regular access channel for the first type of access probe so that the access network may know the purpose of hand-off. The seed of the scrambling code may be determined by the pilot phase of the target sector, which represents the identity of the sector in the network, the timing information, such as the frame offset in the superframe, and the access probe type.


In the currently proposed AIE LBC system, when the access network detects an access probe, the access network sends an access grant message on the forward shared control channel (F-SCCH) to assign a MAC ID to the mobile station and to provide reverse timing information for the accessing mobile station to adjust its reverse link transmission timing. The access network then sends a reverse link assignment message to provide a dedicated reverse link resource for the accessing mobile station to indicate its identity in the binding process and to indicate intention of the access attempt in the connection setup process.



FIG. 7 is a block diagram illustrating channel structure 70 of the F-SCCH. Cyclic Redundant Check (CRC) bits are first added to information bits of the message 700 by CRC element 701. Forward error correction (FEC) encoder 702 adds FEC coding to the output sequence of CRC element 701. Rate matching element 703 repeats and/or punctures the encoded bits from FEC encoder 702 in order to match the rate on the F-SSCH to a certain fixed rate. Scrambler 704 then scrambles the output sequence from rate matching element 703 with a scrambling sequence that is generated by scrambling sequence generator 706 with the input of scrambling seed 705. The scrambled sequence is interleaved by channel interleaver 707 and then modulated by modulator 708. The in-phase (I) and quadrature (Q) outputs of modulator 708 are gain-controlled by channel gain elements 709 and 710, respectively. The output complex signal is then multiplexed with other channels 712 by channel multiplexer (i.e., channelizer) 711. Additional functionality after channel multiplexer 711 of channel structure 70, such as those functions represented in elements 304, 305, and the like, of FIG. 3, are not repeated in FIG. 7.


In the currently proposed AIE LBC system, because the access network does not know the identity of the accessing mobile station from the received access probe, the access network addresses the accessing mobile station in the access grant message by scrambling the encoded sequence of this message with a scrambling sequence that is generated from the access sequence ID detected from the access probe.


In the previous sections, a method is described for the access network to obtain the identity of the accessing mobile station that sends the second type of access probe, for example, to indicate the request to hand-off to an asynchronous sector, to exit the semi-connected state, to provide timing information to a synchronous sector, and the like. In this case, the access network still needs to send the access grant message, at least to provide the reverse link timing information as the mobile station needs this information to adjust its reverse link transmission timing. If the access network scrambles this access grant message with the scrambling sequence that is generated from the access sequence ID detected from a second type of access probe sent by a first accessing mobile station, this access grant message may be mistakenly received by a second mobile station that is initiating a call and randomly selects an access sequence (from the pool of access sequences) that happens to correspond to the same access sequence ID used by the first mobile station. This second mobile station will interpret this access grant message as if the message is directed to it, thereby mistakenly accepting the MAC ID and reverse link timing information in the access grant message.


To avoid this erroneous behavior, according to yet another aspect of the present invention, the access network scrambles an access grant message that is in response to the first type of access probe with a scrambling sequence that is generated from the access sequence ID detected from the first type of access probe. Meanwhile, the access network scrambles an access grant message that is in response to a second type of access probe with a special scrambling sequence that is different from any scrambling sequence used on the access grant message in response to a first type of access grant.


Furthermore, the access network places the regular MAC ID, which is detected from the second type of access probe, into the MAC ID field in the access grant message that is in response to the corresponding second type of access probe. This special scrambling sequence for the access grant message can be generated from a special access sequence ID, no matter what access sequence ID is detected from this second type of access probe. In this case, the special access sequence ID and the corresponding access sequence are reserved and cannot be used by any mobile station for sending the first type of access probe. Alternatively, this special scrambling sequence for the access grant message can be generated from a special scrambling sequence generation formula. In either case, this special scrambling sequence for the access grant message is known to both the access network and the mobile stations by standard default or by an explicit signaling message broadcasted by the access network. The access network differentiates the type of access probe by the scrambling sequence applied on the access probe.



FIG. 8 is a flowchart illustrating example steps executed to implement one embodiment of the present invention. In step 800, a first type of access probe is scrambled using a first scrambling sequence, the first type of access probe generated without a MAC ID assigned to the mobile station by a base station. A second type of access probe is generated, in step 801, using elements such as a mobile station ID (for example, a MAC ID, a portion of a MAC ID, a special MAC ID, a derivative of a MAC ID, or the like), a target sector pilot strength, a request level, or the like. The second type of access probe is scrambled, in step 802, using a second scrambling sequence, where the second scrambling sequence is different from the first scrambling sequence, and where the second scrambling sequence is assigned by the wireless network to be associated with the second type of access probe. In step 803, the scrambled second type of access probe is transmitted to the base station via a reverse access channel. An access grant message is received from the base station, in step 804, in response to the second type of access probe. In step 805, a second access grant scrambling sequence is detected scrambling the access grant message, where the second access grant scrambling sequence is different from a first access grant scrambling sequence, which is used to scramble the access grant message that is sent in response to a first type of access probe, and may be an actual predetermined sequence or created using a special scrambling formula.



FIG. 9 is a flowchart illustrating example steps executed to implement one embodiment of the present invention. In step 900, an access probe is received via a reverse access channel from one or more mobile stations. A scrambling sequence of the access probe is analyzed in step 901. In step 902, a determination is made, responsive to the analysis, that the access probe is a first type from an unknown mobile station based on the scrambling sequence being associated with a first type of access probe. An access grant message is then scrambled, in step 903, with the first access grant scrambling sequence based on an access sequence identification (ID) of the access probe of the first type. Responsive to the analysis, a determination is made, in step 904, that the access probe is a second type from a known one of the one or more mobile stations based on the scrambling sequence being associated with the second type by the wireless network. An access grant message is generated, in step 905, responding to the second type of access probe. The access grant message is then scrambled, in step 906, with the second access grant scrambling sequence designated by the wireless network for the second type of access probe, where the second access grant scrambling sequence is always distinguishable from the first access grant scrambling sequence.


The various illustrative logical blocks, modules, and circuits described in connection with the embodiment disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein.



FIG. 10 illustrates computer system 1000 adapted to use embodiments of the present invention, e.g., storing and/or executing software associated with the embodiments. Central processing unit (CPU) 1001 is coupled to system bus 1002. CPU 1001 may be any general purpose CPU. However, embodiments of the present invention are not restricted by the architecture of CPU 1001 as long as CPU 1001 supports the inventive operations as described herein. Bus 1002 is coupled to random access memory (RAM) 1003, which may be SRAM, DRAM, or SDRAM. ROM 1004 is also coupled to bus 1002, which may be PROM, EPROM, or EEPROM. RAM 1003 and ROM 1004 hold user and system data and programs as is well known in the art.


Bus 1002 is also coupled to input/output (I/O) adapter 1005, communications adapter 1011, user interface adapter 1008, and display adapter 1009. I/O adapter 1005 connects storage devices 1006, such as one or more of a hard drive, a CD drive, a floppy disk drive, and a tape drive, to computer system 1000. I/O adapter 1005 is also connected to a printer (not shown), which would allow the system to print paper copies of information such as documents, photographs, articles, and the like. Note that the printer may be a printer (e.g., dot matrix, laser, and the like), a fax machine, a scanner, or a copier machine.


The steps of a method or algorithm described in connection with the embodiments disclosed herein may be implemented or performed directly in hardware, in a software module executed by a processor, or in combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, or any other form of storage medium in the art.


The previous description of the disclosed embodiments is provided to enable those skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art and generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.


Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed, that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.

Claims
  • 1. A method executed by a mobile station in a wireless network, said method comprising: scrambling a first type of access probe using a first scrambling sequence, said first type of access probe generated without a media access code index (MAC ID) assigned to said mobile station by a base station;scrambling a second type of access probe using a second scrambling sequence, wherein said second scrambling sequence is different from said first scrambling sequence, and wherein said second scrambling sequence is assigned by said wireless network to be associated with said second type of access probe; andtransmitting said scrambled second type of access probe to said base station via a reverse access channel.
  • 2. The method of claim 1, further comprising: generating said second type of access probe, said generating including: inserting a mobile station identifier into said second type of access probe;measuring a strength level of a target sector pilot; andinserting said strength level into said second type of access probe.
  • 3. The method of claim 2 wherein said generating further comprises: inserting a request level into said second type of access probe.
  • 4. The method of claim 2 wherein said mobile station identifier comprises one of: said MAC ID;a portion of said MAC ID;a special MAC ID; ora derivative of said MAC ID.
  • 5. The method of claim 1 further comprising: receiving an access grant message from said base station in response to said second type of access probe;detecting a second access grant scrambling sequence scrambling said access grant message, wherein said second access grant scrambling sequence is different from a first access grant scrambling sequence, said first access grant scrambling sequence for scrambling a first type of access grant message that is sent in response to said first type of access probe; andresponsive to said detecting, determining said access grant message is in response to said transmitting.
  • 6. The method of claim 5 wherein said second access grant scrambling sequence is generated by said base station using a special scrambling formula that is different from a scrambling formula used to generate said first access grant scrambling sequence.
  • 7. A method executed by one or more base stations in a wireless network, said method comprising: receiving an access probe via a reverse access channel from one or more mobile stations;analyzing a scrambling sequence of said access probe;responsive to said analyzing, determining said access probe is a second type from a known one of said one or more mobile stations based on said scrambling sequence being associated with said second type by said wireless network;generating an access grant message responding to said access probe; andscrambling said access grant message with a second access grant scrambling sequence designated by said wireless network for said second type of access probe.
  • 8. The method of claim 7 further comprising: responsive to said analyzing, determining said access probe is a first type from an unknown mobile station based on said scrambling sequence being associated with a first type of access probe.
  • 9. The method of claim 8 further comprising: scrambling said access grant message with a first access grant scrambling sequence based on an access sequence identification (ID) of said access probe of a first type, wherein said second access grant scrambling sequence is always distinguishable from said first access grant scrambling sequence.
  • 10. A wireless network comprising: one or more base stations;a plurality of mobile stations connected to said one or more base stations;a reverse access channel facilitating communication initiated by ones of said plurality of mobile stations and one of said one or more base stations;a second type access probe generated by one of said plurality of mobile stations to communicate with one of an active set of said one or more base stations, wherein each base station of said active set has already assigned a media access control index (MAC ID) to said one of said plurality of mobile stations;a second type scrambling sequence assigned by said wireless network to scramble said second type access probe; anda second type access grant message generated by one of said one or more base stations, wherein said second type access grant message responds to said second type access probe, and wherein said second type access grant message is scrambled according to a second access grant scrambling sequence.
  • 11. The wireless network of claim 10 further comprising: a first type access probe message generated by others of said plurality of mobile stations, wherein said others of said plurality of mobile stations have not been assigned a MAC ID by said one or more base stations; anda first type scrambling sequence to scramble said first type access probe message, wherein said first type scrambling sequence is distinguishable by said one or more base stations from said second type scrambling sequence.
  • 12. The wireless network of claim 10 wherein said second type access probe comprises one or more of: a wireless station identifier;a target sector pilot strength; anda request level.
  • 13. The wireless network of claim 12 wherein said wireless station identifier comprises one of: said MAC ID;a portion of said MAC ID;a special MAC ID that is different from said MAC ID; anda derivative of said MAC ID.
  • 14. A computer program product having a computer readable medium with computer program logic recorded thereon, said computer program product comprising: code for scrambling a first type of access probe using a first scrambling sequence, said first type of access probe generated without a media access code index (MAC ID) assigned to a mobile station by a base station in a wireless network;code for scrambling a second type of access probe using a second scrambling sequence, wherein said second scrambling sequence is different from said first scrambling sequence, and wherein said second scrambling sequence is assigned by said wireless network to be associated with said second type of access probe; andcode for transmitting said scrambled second type of access probe to said base station via a reverse access channel.
  • 15. The computer program product of claim 14, further comprising: code for generating said second type of access probe, said code for generating including: code for inserting a mobile station identifier into said second type of access probe;code for initiating measurement of a strength level of a target sector pilot by said mobile station; andcode for inserting said strength level into said second type of access probe.
  • 16. The computer program product of claim 15 wherein said code for generating further comprises: code for inserting a request level into said second type of access probe.
  • 17. The computer program product of claim 15 wherein said mobile station identifier comprises one of: said MAC ID;a portion of said MAC ID;a special MAC ID; ora derivative of said MAC ID.
  • 18. The computer program product of claim 14 further comprising: code for receiving an access grant message from said base station;code for detecting a second access grant scrambling sequence scrambling said access grant message that is sent in response to said second type of access probe, wherein said second access grant scrambling sequence is different from a first access grant scrambling sequence, said first access grant scrambling sequence used to scramble a first type of access grant message that is sent in response to said first type of access probe; andresponsive to results of said code for detecting, code for determining said access grant message is in response to results of said code for transmitting.
  • 19. The computer program product of claim 18 wherein said second access grant scrambling sequence is generated by said base station using a special scrambling formula that is different from a scrambling formula used to generate said first access grant scrambling sequence.
  • 20. A computer program product having a computer readable medium with computer program logic recorded thereon, said computer program product comprising: code for receiving an access probe by one or more base stations via a reverse access channel from one or more mobile stations;code for analyzing a scrambling sequence of said access probe;responsive to results of said code for analyzing, code for determining said access probe is a second type from a known one of said one or more mobile stations based on said scrambling sequence being associated with said second type by a wireless network;code for generating an access grant message responding to said access probe; andcode for scrambling said access grant message with a second access grant scrambling sequence designated by said wireless network for said second type of access probe.
  • 21. The computer program product of claim 20 further comprising: responsive to results of said code for analyzing, code for determining said access probe is a first type from an unknown mobile station based on said scrambling sequence being associated with a first type of access probe.
  • 22. The computer program product of claim 21 further comprising: code for scrambling said access grant message with a first access grant scrambling sequence based on an access sequence identification (ID) of said access probe of a first type, wherein said first access grant scrambling sequence is always distinguishable from said second access grant scrambling sequence.
  • 23. A method for a rake receiver comprising: removing one or more cyclic prefixes (CPs) from an incoming baseband signal;converting said CP-removed baseband signal from serial to parallel format;performing discrete Fourier transform (DFT) to convert said parallel formatted signal from time domain to frequency domain;de-channelizing said converted signal into an input signal;separating data channel signals and control channel signals from said input signal;performing inverse DFT (IDFT) to reconvert said control channel signals from frequency domain to time domain;generating a plurality of cyclic shifted versions of said reconverted control channel signals after said removing, said converting, said de-channelizing, and said performing IDFT;correlating each of said plurality of cyclic shifted versions to a plurality of Walsh codes; anddetermining one or more Walsh code indexes to represent transmitted information bits based on results of said correlating.
  • 24. The method of claim 23 wherein said correlating includes: demodulating each of said plurality of cyclic shifted versions; anddescrambling each of said demodulated plurality of cyclic shifted versions.
  • 25. The method of claim 24 wherein said correlating further includes: applying a Hadamard transform to each of said descrambled plurality of cyclic shifted versions.
  • 26. The method of claim 23 wherein said determining includes: combining said results of said correlating between each of said plurality of cyclic shifted versions with a same Walsh code for each of said plurality of Walsh codes.
  • 27. The method of claim 26, wherein said results of correlating comprise correlation energies.
  • 28. A rake receiver comprising: a discrete Fourier transform (DFT) module at an input to said rake receiver;a channel separator connected to said DFT module to separate data channel signals and control channel signals from an incoming signal;an inverse DFT (IDFT) module connected to an output of said channel separator;a cyclic shift rotator connected to said IDFT module for generating a plurality of cyclic shifted versions of said control channel signals;a plurality of correlators connected to said cyclic shift rotator, wherein each of said plurality of cyclic shifted versions is processed through a corresponding one of said plurality of correlators; andan energy detector connected to each of said plurality of correlators, wherein said energy detector combines correlation energies between said plurality of cyclic shifted versions after correlation with a same code for each of a plurality of codes.
  • 29. The rake receiver of claim 28 wherein said plurality of codes comprises a plurality of Walsh codes.
  • 30. The rake receiver of claim 29 wherein each of said plurality of correlators comprises: a demodulator;a descrambler; anda Hadamard transform module.
  • 31. A computer program product having a computer readable medium with computer program logic recorded thereon, said computer program product comprising: code for removing one or more cyclic prefixes (CPs) from an incoming baseband signal;code for converting said CP-removed baseband signal from serial to parallel format;code for performing discrete Fourier transform (DFT) to convert the parallel formatted signal from time domain to frequency domain;code for de-channelizing said converted signal into an input signal;code for separating data channel signals and control channel signals from said input signal;code for performing inverse DFT (IDFT) to reconvert said control channel signals from frequency domain to time domain;code for generating a plurality of cyclic shifted versions of said reconverted control channel signals after execution of said code for removing, said code for converting, said code for de-channelizing, and said code for performing IDFT;code for correlating each of said plurality of cyclic shifted versions to a plurality of Walsh codes; andcode for determining one or more Walsh code indexes to represent transmitted information bits based on results of said correlating.
  • 32. The computer program product of claim 31 wherein said code for correlating includes: code for demodulating each of said plurality of cyclic shifted versions; andcode for descrambling each of said demodulated plurality of cyclic shifted versions.
  • 33. The computer program product of claim 32 wherein said code for correlating further includes: code for applying a Hadamard transform to each of said descrambled plurality of cyclic shifted versions.
  • 34. The computer program product of claim 33 wherein said code for determining further includes: code for combining correlation energies of said plurality of cyclic shifted versions with a same Walsh code for each of said plurality of Walsh codes.
Parent Case Info

This application claims the benefit of U.S. Provisional Application No. 60/827,850, filed on Oct. 2, 2006, entitled “Method and Apparatus for Access Based Handoff in a Wireless Communications System,” and of U.S. Provisional Application No. 60/867,790, filed on Nov. 29, 2006, entitled “A Method for Carrying Mobile Station Specific Information in the Reverse Access Channel in a Wireless Communications System,” which applications are hereby incorporated herein by reference.

Provisional Applications (2)
Number Date Country
60827850 Oct 2006 US
60867790 Nov 2006 US