The making and using of the presently preferred embodiments are discussed in detail below. It should be appreciated, however, that the present invention provides many applicable inventive concepts that can be embodied in a wide variety of specific contexts. The present invention provides a unique method and system for carrying mobile station specific information on the reverse access channel in a wireless communications system. Specific examples of components, signals, messages, protocols, and arrangements are described below to simplify the present disclosure. These are, of course, merely examples and are not intended to limit the scope of the invention from that scope defined in the claims. Well known elements are presented without detailed description in order not to obscure the present invention in unnecessary detail. For the most part, details unnecessary to obtain a complete understanding of the present invention have been omitted inasmuch as such details are within the skills of persons of ordinary skill in the relevant art. Details regarding control circuitry described herein are omitted, as such control circuits are within the skills of persons of ordinary skill in the relevant art.
Turning now to
It should be noted that the difference between the access-based hand-off process in
According to one aspect of the present invention, the second type of access probe may be used, in general, by a mobile station that already has a MAC ID assigned by the access network. For example, if the target sector is asynchronous to the current serving sector, the AT may send the second type of access probe as the indication of a hand-off request. In another example, a synchronous base station or sector may need to determine the timing information on an uplink from a particular mobile station. The mobile station may then send the second type of access probe as a timing reference signal for the base station to measure the timing of the received signal in order to determine the timing adjustment that the mobile station should perform on its transmitter. In yet another example, a mobile station in the semi-connected state may use the second type of access probe to resume communications with the access network or in order to enter an idle state. In these scenarios, the mobile station has already been assigned a MAC ID.
The mobile station scrambles the second type of access probes using a second scrambling sequence that is different from a first scrambling sequence used when sending the first type of access probe. However, the second scrambling sequence is common for all access probes of the second type. The access network may then preferably recognize the identity of the mobile station from the received second type of access probe without going through the banding process, therefore eliminating the overhead and delay associated with the banding process, which is a communications process where a mobile station informs the access network of a more permanent identity of the mobile station, such as, for example, the 128-bit Unicast Access Terminal Identity (UATI). Because all second type access probes use one common scrambling code with different access sequences, the complexity of the receiver is reduced.
Multiple OFDM symbols may each be fed into correlator 507. Correlator 507, also known as a rake finger, corresponds to one cyclic shifted version of the signal, which comprises HPSK demodulator/descrambler 508 and Hadamard transformer 509. Here the Hadamard transformer acts like a correlator with various Walsh sequences, which are used as the access sequence. The Walsh sequences of the various embodiments of the present invention are orthogonal to one another, thus, an optimal receiver just calculates the matrix product of the received Walsh sequence and the Hadamard matrix in order to correlate the received sequence with each Walsh code. Output 510 of Hadamard transformer 509 is the correlation of the cyclic shifted signal with a variety of Walsh sequences. Energy detection module 511 collects all the correlation values (such as the energy values of each output element of the matrix product or the signal-to-noise ratio values of each output element of the matrix product) from all of the rake fingers for each Walsh sequence and makes the determination of which Walsh sequence(s) is/are detected.
Referring back to
In various circumstances that call for the second type of access probe, there is no dedicated reverse channel targeting the new sector or base station for a particular mobile station before the hand-off request. Therefore, while the regular MAC ID may be used, it is not necessary to use it. In one embodiment of the present invention, a special hand-off MAC ID associated with the new sector or base station is assigned to the AT. In this particular embodiment, the hand-off MAC ID is different from the regular MAC ID so that this AT will not consume the regular MAC ID resource before the hand-off request. This hand-off MAC ID is assigned by the new sector. However, if there is no air interface between the AT and this new sector, the assignment message may be transmitted by the current anchor sector. The communications between the current anchor sector and the new sector is typically implemented via the backhaul.
In the LBC mode of 3GPP2, the regular MAC ID is proposed as being anywhere between 9-11 bits. Because the number of hand-off users is likely to be smaller than that of the non-hand-off users, a shorter hand-off MAC ID, for example, 7 bits, may be used. In one embodiment of the present invention, a particular hand-off MAC ID is assigned by each sector in the active set that may be accessed through access-based hand-off.
The modulation scheme of the second type of access probe is similar to the regular access probe, as illustrated in
It should be noted that additional and/or alternative embodiments of the present invention may employ numerous variations and alterations in selection of the access sequence ID for the second type of access probe without departing from the spirit of the present invention. For example, the access sequence ID for the second type of access probe may also be indicated by the access network.
It should further be noted that in various additional and/or alternative embodiments of the present invention, the MAC ID used for the second type of access probe in hand-off or other circumstances may comprise the regular MAC ID, a shortened version of the regular MAC ID, the special hand-off MAC ID defined above, some kind of derivative of the regular MAC ID, and the like. The present invention is not limited to any one method for representing the MAC ID.
The scrambling code used for the scrambling process, e.g., by hybrid phase shift keying (HPSK) modulation of the hand-off access probe, as well as the other access probes of the second type, should be distinguishable from the other reverse channels including the regular access channel for the first type of access probe so that the access network may know the purpose of hand-off. The seed of the scrambling code may be determined by the pilot phase of the target sector, which represents the identity of the sector in the network, the timing information, such as the frame offset in the superframe, and the access probe type.
In the currently proposed AIE LBC system, when the access network detects an access probe, the access network sends an access grant message on the forward shared control channel (F-SCCH) to assign a MAC ID to the mobile station and to provide reverse timing information for the accessing mobile station to adjust its reverse link transmission timing. The access network then sends a reverse link assignment message to provide a dedicated reverse link resource for the accessing mobile station to indicate its identity in the binding process and to indicate intention of the access attempt in the connection setup process.
In the currently proposed AIE LBC system, because the access network does not know the identity of the accessing mobile station from the received access probe, the access network addresses the accessing mobile station in the access grant message by scrambling the encoded sequence of this message with a scrambling sequence that is generated from the access sequence ID detected from the access probe.
In the previous sections, a method is described for the access network to obtain the identity of the accessing mobile station that sends the second type of access probe, for example, to indicate the request to hand-off to an asynchronous sector, to exit the semi-connected state, to provide timing information to a synchronous sector, and the like. In this case, the access network still needs to send the access grant message, at least to provide the reverse link timing information as the mobile station needs this information to adjust its reverse link transmission timing. If the access network scrambles this access grant message with the scrambling sequence that is generated from the access sequence ID detected from a second type of access probe sent by a first accessing mobile station, this access grant message may be mistakenly received by a second mobile station that is initiating a call and randomly selects an access sequence (from the pool of access sequences) that happens to correspond to the same access sequence ID used by the first mobile station. This second mobile station will interpret this access grant message as if the message is directed to it, thereby mistakenly accepting the MAC ID and reverse link timing information in the access grant message.
To avoid this erroneous behavior, according to yet another aspect of the present invention, the access network scrambles an access grant message that is in response to the first type of access probe with a scrambling sequence that is generated from the access sequence ID detected from the first type of access probe. Meanwhile, the access network scrambles an access grant message that is in response to a second type of access probe with a special scrambling sequence that is different from any scrambling sequence used on the access grant message in response to a first type of access grant.
Furthermore, the access network places the regular MAC ID, which is detected from the second type of access probe, into the MAC ID field in the access grant message that is in response to the corresponding second type of access probe. This special scrambling sequence for the access grant message can be generated from a special access sequence ID, no matter what access sequence ID is detected from this second type of access probe. In this case, the special access sequence ID and the corresponding access sequence are reserved and cannot be used by any mobile station for sending the first type of access probe. Alternatively, this special scrambling sequence for the access grant message can be generated from a special scrambling sequence generation formula. In either case, this special scrambling sequence for the access grant message is known to both the access network and the mobile stations by standard default or by an explicit signaling message broadcasted by the access network. The access network differentiates the type of access probe by the scrambling sequence applied on the access probe.
The various illustrative logical blocks, modules, and circuits described in connection with the embodiment disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein.
Bus 1002 is also coupled to input/output (I/O) adapter 1005, communications adapter 1011, user interface adapter 1008, and display adapter 1009. I/O adapter 1005 connects storage devices 1006, such as one or more of a hard drive, a CD drive, a floppy disk drive, and a tape drive, to computer system 1000. I/O adapter 1005 is also connected to a printer (not shown), which would allow the system to print paper copies of information such as documents, photographs, articles, and the like. Note that the printer may be a printer (e.g., dot matrix, laser, and the like), a fax machine, a scanner, or a copier machine.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be implemented or performed directly in hardware, in a software module executed by a processor, or in combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, or any other form of storage medium in the art.
The previous description of the disclosed embodiments is provided to enable those skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art and generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed, that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.
This application claims the benefit of U.S. Provisional Application No. 60/827,850, filed on Oct. 2, 2006, entitled “Method and Apparatus for Access Based Handoff in a Wireless Communications System,” and of U.S. Provisional Application No. 60/867,790, filed on Nov. 29, 2006, entitled “A Method for Carrying Mobile Station Specific Information in the Reverse Access Channel in a Wireless Communications System,” which applications are hereby incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60827850 | Oct 2006 | US | |
60867790 | Nov 2006 | US |