On Multiple PRACH Preambles and Random Access Responses

ABSTRACT

A method including, detecting, by a base station in a wireless communication system, within an RAR window, at least one of multiple first messages from a plurality of user equipments, wherein the plurality of user equipments is permitted to transmit multiple first messages within the RAR window, and wherein each first message includes a PRACH preamble; in response to receiving at least one PRACH preamble in the at least one of multiple first messages, transmitting at least one second message including an RAR downlink channel for each preamble received; receiving at least one third message, from at least one user equipment of the plurality of user equipments, including a beam connection request and transmitting at least one fourth message to the at least one user equipment on the requested beam.

TECHNICAL FIELD

This invention relates generally to 3GPP New Radio (NR) physical layerdesign and, in particular, to Random Access Procedure.

BACKGROUND

This section is intended to provide a background or context to theinvention disclosed below. The description herein may include conceptsthat could be pursued, but are not necessarily ones that have beenpreviously conceived, implemented or described. Therefore, unlessotherwise explicitly indicated herein, what is described in this sectionis not prior art to the description in this application and is notadmitted to be prior art by inclusion in this section.

In LTE, there is a four step RACH procedure. In Step 1, MSG1 is sent bya UE to its base station, where the UE selects one of the 64 availableRACH preambles. The UE also needs to give its own identity to thenetwork so that network can address it in next step. The identity thatUE will use is the RA-RNTI, which is determined from the time slotnumber in which the preamble is sent. If UE does not receive anyresponse from the network, it increases its power in fixed step andsends RACH preamble again

In Step 2, MSG2 is sent by the base station with a RAR to the UE onDL-SCH addressed to RA-RNTI calculated from the timeslot in whichpreamble was sent. The message carries following information: TemporaryC-RNTI for further communication; Timing Advance Value where the basestation also informs the UE to change its timing so it can compensatefor the round trip delay caused by UE distance from the base station;and an Uplink Grant Resource where the network (through the basestation) will assign an initial resource to the UE so that it can useUL-SCH.

In Step 3, using UL-SCH, the UE sends “RRC connection request message”to the base station, where the UE is identified by the temporary C-RNTIassigned in the previous step by base station. The message containsfollowing: a connection establishment cause showing the reason why UEneeds to connect to network; and a UE identity using a TMSI or RandomValue (because there is possibility that Temp-CRNTI has been assigned tomore than one UE in the previous step, due to multiple requests comingat same time), where TMSI is used if the UE has previously connected tothe same network since with TMSI value the UE is identified in the corenetwork, and where a random value is used if UE is connecting for thevery first time to network.

In Step 4: the base station responds with MSG4 which is a contentionresolution message to the UE whose message was successfully received instep 3. This message is addressed towards TMSI value or Random number(from previous steps) but contains the new C-RNTI which will be used forthe further communication.

First release of NR will support 4-step RACH procedure, similar to LTE,comprising four messages between gNB/TRP and UE.

In NR, multiple/repeated RACH preambles in a RACH resource are supportedwhere a CP is inserted at the beginning of the consecutivemultiple/repeated RACH OFDM symbols, CP/GT between RACH symbols isomitted, and GT is reserved at the end of the consecutivemultiple/repeated RACH symbols.

In case the UE has Tx/Rx beam correspondence, the UE candeterministically determine the UL Tx beam used for RACH message 1 (RACHpreamble) based on the best DL Rx beam used to receive thesynchronization channels or downlink RSs, like CSI-RS or MRS, that areassociated with RACH resources. Subsequently, this beam is used toreceive the RACH MSG2 (Random Access Response), and transmit RACH MSG3.

In case the UE does not have Tx/Rx correspondence, the UE is not able todetermine the best Tx beam to use for RACH message 1 based on the DL Rxbeam used to receive the synchronization channels. Instead, the UErandomly or otherwise selects a beam to transmit RACH message 1 and thenwaits for the RAR to determine if the gNB is able to receive this beamor not. If RAR is not received, then the UE tries a different beam,until it receives the RAR. It can be observed that ACK of Tx/Rxcorrespondence at the UE, increases access latency.

Baseline procedure in NR is as in LTE where the UE performs one Message1 transmission and thus there can be only one RAR for UE at a time. Thecurrent invention moves beyond the current techniques and/or materials

Acronyms or abbreviations that may be found in the specification and/orthe drawing figures are defined within the context of this disclosure oras follows below 3GPP Third Generation Partnership Project ACKAcknowledgement CP Cyclic Prefix CRC Cyclic Redundancy Check C-RNTI CellRadio Network Temporary Identity CSI - RS Channel StateInformation-Reference Signals DL Downlink DL-SCH Downlink Shared ChanneleNB or eNodeB base station, evolved Node B gNB NR/5G Node B GT GuardTime HARQ Hybrid Automatic Repeat Request LTE Long Term Evolution LTE-ALong Term Evolution - Advanced MME Mobility Management Entity MRSMobility Reference Signal MSG Message NACK Negative Acknowledgement NCENetwork Control Entity NR New Radio OFDM Orthogonal Frequency DivisionMultiplexing PBCH Physical Broadcast Channel PDCCH Physical DownlinkControl Channel PDSCH Physical Downlink Shared Channel PRACH PhysicalRandom Channel PRB Physical Resource Block PUCCH Physical Uplink ControlChannel PUSCH Physical Uplink Shared Channel RACH Random Access ChannelRAR Random Access Response RA-RNTI Random Access RNTI used for PRACHResponse Rel Release RE Resource Element RNTI Radio Network TemporaryIdentifier RS Reference Signal RRC Radio Resource Control Rx Receive,Reception, or Receiver TS Technical Specification TRP Transmissionreception point Tx Transmit, Transmission, or Transmitter UCI UplinkControl Information UE User Equipment UL Uplink UL-SCH Uplink SharedChannel

BRIEF DESCRIPTION OF THE DRAWINGS

In the attached Drawing Figures:

FIG. 1 is a block diagram of an exemplary system in which the exemplaryembodiments may be practiced; and

FIG. 2 depicts RACH procedure with no Tx/Rx beam correspondence at theUE.

DETAILED DESCRIPTION OF THE DRAWINGS

The word “exemplary” is used herein to mean “serving as an example,instance, or illustration.” Any embodiment described herein as“exemplary” is not necessarily to be construed as preferred oradvantageous over other embodiments. All of the embodiments described inthis Detailed Description are exemplary embodiments provided to enablepersons skilled in the art to make or use the invention and not to limitthe scope of the invention which is defined by the claims.

The exemplary embodiments herein describe techniques for Random AccessResponses in regard to multiple PRACH preambles. The present inventionproposes that that a UE, signaling in random access procedure within agiven RAR window, is allowed to transmit multiple PRACH preambles untilthe end of that RAR window and, upon reception of multiple RARs whichthe UE successfully received or omitted, responding to all received RARsby the UE signaling in MSG3 which RARs belong to that same UE.Additional description of these techniques is presented after a systeminto which the exemplary embodiments may be used is described.

Turning to FIG. 1 , this figure shows a block diagram of one possibleand non-limiting exemplary system in which the exemplary embodiments maybe practiced. In FIG. 1 , a user equipment (UE) 110 is in wirelesscommunication with a wireless network 100. A UE is a wireless, typicallymobile device that can access a wireless network. The UE 110 includesone or more processors 120, one or more memories 125, and one or moretransceivers 130 interconnected through one or more buses 127. Each ofthe one or more transceivers 130 includes a receiver, Rx, 132 and atransmitter, Tx, 133. The one or more buses 127 may be address, data, orcontrol buses, and may include any interconnection mechanism, such as aseries of lines on a motherboard or integrated circuit, fiber optics orother optical communication equipment, and the like. The one or moretransceivers 130 are connected to one or more antennas 128. The one ormore memories 125 include computer program code 123. The UE 110 includesa YYY module 140, comprising one of or both parts 140-1 and/or 140-2,which may be implemented in a number of ways. The YYY module 140 may beimplemented in hardware as YYY module 140-1, such as being implementedas part of the one or more processors 120. The YYY module 140-1 may beimplemented also as an integrated circuit or through other hardware suchas a programmable gate array. In another example, the YYY module 140 maybe implemented as YYY module 140-2, which is implemented as computerprogram code 123 and is executed by the one or more processors 120. Forinstance, the one or more memories 125 and the computer program code 123may be configured to, with the one or more processors 120, cause theuser equipment 110 to perform one or more of the operations as describedherein. The UE 110 communicates with eNB 170 via a wireless link 111.

The gNB (NR/5G Node B but possibly an evolved NodeB) 170 is a basestation (e.g., for LTE, long term evolution) that provides access bywireless devices such as the UE 110 to the wireless network 100. The gNB170 includes one or more processors 152, one or more memories 155, oneor more network interfaces (N/W I/F(s)) 161, and one or moretransceivers 160 interconnected through one or more buses 157. Each ofthe one or more transceivers 160 includes a receiver, Rx, 162 and atransmitter, Tx, 163. The one or more transceivers 160 are connected toone or more antennas 158. The one or more memories 155 include computerprogram code 153. The gNB 170 includes a ZZZ module 150, comprising oneof or both parts 150-1 and/or 150-2, which may be implemented in anumber of ways. The ZZZ module 150 may be implemented in hardware as ZZZmodule 150-1, such as being implemented as part of the one or moreprocessors 152. The ZZZ module 150-1 may be implemented also as anintegrated circuit or through other hardware such as a programmable gatearray. In another example, the ZZZ module 150 may be implemented as ZZZmodule 150-2, which is implemented as computer program code 153 and isexecuted by the one or more processors 152. For instance, the one ormore memories 155 and the computer program code 153 are configured to,with the one or more processors 152, cause the gNB 170 to perform one ormore of the operations as described herein. The one or more networkinterfaces 161 communicate over a network such as via the links 176 and131. Two or more gNBs 170 communicate using, e.g., link 176. The link176 may be wired or wireless or both and may implement, e.g., an X2interface.

The one or more buses 157 may be address, data, or control buses, andmay include any interconnection mechanism, such as a series of lines ona motherboard or integrated circuit, fiber optics or other opticalcommunication equipment, wireless channels, and the like. For example,the one or more transceivers 160 may be implemented as a remote radiohead (RRH) 195, with the other elements of the gNB 170 being physicallyin a different location from the RRH, and the one or more buses 157could be implemented in part as fiber optic cable to connect the otherelements of the gNB 170 to the RRH 195.

It is noted that description herein indicates that “cells” performfunctions, but it should be clear that the gNB that forms the cell willperform the functions. The cell makes up part of a gNB. That is, therecan be multiple cells per gNB.

The wireless network 100 may include a network control element (NCE) 190that may include MME (Mobility Management Entity)/SGW (Serving Gateway)functionality, and which provides connectivity with a further network,such as a telephone network and/or a data communications network (e.g.,the Internet). The gNB 170 is coupled via a link 131 to the NCE 190. Thelink 131 may be implemented as, e.g., an S1 interface. The NCE 190includes one or more processors 175, one or more memories 171, and oneor more network interfaces (N/W I/F(s)) 180, interconnected through oneor more buses 185. The one or more memories 171 include computer programcode 173. The one or more memories 171 and the computer program code 173are configured to, with the one or more processors 175, cause the NCE190 to perform one or more operations.

The wireless network 100 may implement network virtualization, which isthe process of combining hardware and software network resources andnetwork functionality into a single, software-based administrativeentity, a virtual network. Network virtualization involves platformvirtualization, often combined with resource virtualization. Networkvirtualization is categorized as either external, combining manynetworks, or parts of networks, into a virtual unit, or internal,providing network-like functionality to software containers on a singlesystem. Note that the virtualized entities that result from the networkvirtualization are still implemented, at some level, using hardware suchas processors 152 or 175 and memories 155 and 171, and also suchvirtualized entities create technical effects.

The computer readable memories 125, 155, and 171 may be of any typesuitable to the local technical environment and may be implemented usingany suitable data storage technology, such as semiconductor based memorydevices, flash memory, magnetic memory devices and systems, opticalmemory devices and systems, fixed memory and removable memory. Thecomputer readable memories 125, 155, and 171 may be means for performingstorage functions. The processors 120, 152, and 175 may be of any typesuitable to the local technical environment, and may include one or moreof general purpose computers, special purpose computers,microprocessors, digital signal processors (DSPs) and processors basedon a multi-core processor architecture, as non-limiting examples. Theprocessors 120, 152, and 175 may be means for performing functions, suchas controlling the UE 110, gNB 170, and other functions as describedherein.

In general, the various embodiments of the user equipment 110 caninclude, but are not limited to, cellular telephones such as smartphones, tablets, personal digital assistants (PDAs) having wirelesscommunication capabilities, portable computers having wirelesscommunication capabilities, image capture devices such as digitalcameras having wireless communication capabilities, gaming deviceshaving wireless communication capabilities, music storage and playbackappliances having wireless communication capabilities, Internetappliances permitting wireless Internet access and browsing, tabletswith wireless communication capabilities, as well as portable units orterminals that incorporate combinations of such functions.

Embodiments herein may be implemented in software (executed by one ormore processors), hardware (e.g., an application specific integratedcircuit), or a combination of software and hardware. In an example of anembodiment, the software (e.g., application logic, an instruction set)is maintained on any one of various conventional computer-readablemedia. In the context of this document, a “computer-readable medium” maybe any media or means that can contain, store, communicate, propagate ortransport the instructions for use by or in connection with aninstruction execution system, apparatus, or device, such as a computer,with one example of a computer described and depicted, e.g., in FIG. 1 .A computer-readable medium may comprise a computer-readable storagemedium or other device that may be any media or means that can containor store the instructions for use by or in connection with aninstruction execution system, apparatus, or device, such as a computer.

The current architecture in LTE networks is fully distributed in theradio and fully centralized in the core network. The low latencyrequires bringing the content close to the radio which leads to localbreak out and multi-access edge computing (MEC). 5G may use edge cloudand local cloud architecture. Edge computing covers a wide range oftechnologies such as wireless sensor networks, mobile data acquisition,mobile signature analysis, cooperative distributed peer-to-peer ad hocnetworking and processing also classifiable as local cloud/fog computingand grid/mesh computing, dew computing, mobile edge computing, cloudlet,distributed data storage and retrieval, autonomic self-healing networks,remote cloud services and augmented reality. In radio communications,using edge cloud may mean node operations to be carried out, at leastpartly, in a server, host or node operationally coupled to a remoteradio head or base station comprising radio parts. It is also possiblethat node operations will be distributed among a plurality of servers,nodes or hosts. It should also be understood that the distribution oflabor between core network operations and base station operations maydiffer from that of the LTE or even be non-existent. Some othertechnology advancements probably to be used are Software-DefinedNetworking (SDN), Big Data, and all-IP, which may change the waynetworks are being constructed and managed.

One possible manner to carry out embodiments described herein is with anedge cloud using a distributed computing system. An exemplary embodimentcomprises a radio node connected to a server. Exemplary embodimentsimplementing the system allow the edge cloud server and the radio nodeas stand-alone apparatuses communicating with each other via a radiopath or via a wired connection or they may be located in a same entitycommunicating via a wired connection.

FIG. 2 illustrates RACH procedure with no Tx/Rx beam correspondence atthe UE. As can be seen from the”)” on the right hand side of thediagram, the UE repeats this operation until it receives RAR. The gNBuses the same Tx beam for each PRACH transmission during one full RACHsweep. The received RAR implicitly indicates the best Tx beam to use.

To improve in the access latency, the UE could be allowed to transmitmultiple MSG1s within a given RAR window as configured by the networkvia system information. Agreements from RAN1#AH1_NR which states “NR4-step RACH procedure design should not preclude multiple MSG1transmissions until the end of RAR window if need arises” and RAN1#88which states “NR random access design should not preclude UE receptionof multiple RAR within a given RAR window, if need arises” reflect thispossibility.

A current problem overcome by the present invention is if a UE cantransmit multiple MSG1 transmissions, then the gNB cannot determinewhether multiple received preambles are from one UE or from multipleUEs. Therefore, the gNB transmits MSG2 (RAR) corresponding to eachreceived PRACH preamble. Subsequently, the UE may receive multiple RARs.Each RAR message may include information about reception quality ofdetected preamble to aid TX beam selection of the UE. The UE could thenselect one of the received RARs and transmit MSG3 according to receivedUL grant carried in the selected RAR.

Another current problem overcome by the present invention is where gNBimplementations rely on received MSG3 transmissions when adjustingparameters for RAR message (PDCCH+PDSCH). If the UE drops certain RARsnot because of low reception quality but because of what was justdiscussed above, then the gNB may adjust RAR transmission parameters tobe more pessimistic that they should be (e.g., higher aggregation levelfor the PDCCH and lower coding rate for PDSCH) in the cell.

An even more problematic issue overcome by the present invention existswith the HARQ procedure that is likely applied for RACH MSG3. If a UEdrops certain RAR(s) and omits transmitting the corresponding UL PUSCHtransmission, then the gNB will nonetheless try to demodulate and decodeUL PUSCH according to UL grant it provided in MSG2. Upon unsuccessfuldecoding (because of no actual transmission) the gNB transmits NACK andUL grant for the retransmission. This procedure may last until themaximum number of retransmissions has taken place. Thus, droppingreceived RAR and omitting obtained UL grant would lead to unnecessaryHARQ feedback and UL grants in downlink thus decreasing the systemefficiency. Furthermore, the gNB may wrongly adjust its transmissionparameters of RAR (PDCCH + PDSCH) and UL grant parameters in case the UEdoesn’t use the uplink resources granted by the gNB.

The present invention proposes that a UE, signaling in random accessprocedure within a given RAR window, is allowed to transmit multiplePRACH preambles until the end of that RAR window and, upon reception ofmultiple RARs which the UE successfully received or omitted, respondingto all received RARs by the UE signaling in MSG3 which RARs belong tothat same UE. Based on information received, the gNB synchronizes withUE which RACH procedure to continue and which procedure(s) can beswitched off.

The following implementation options are considered in case the gNB hasconfigured UE to be able to transmit multiple MSG1 transmissions untilthe end of RAR window where one MSG1 transmission means one RACHoccasion/preamble index for which the UE uses a single TX beam (multipleMSG1 transmissions in this context would mean multiple RACH occasionsfor which UE uses different TX beams).

An option would be that MSG3 transmission from a UE includes informationabout transmitted preambles and/or received RARs.

In one aspect of this option, there could be information explicitlypointing to received RARs that are identified by time-frequency-preambleindex triple of the PRACH preamble to which RAR is associated (RARcarries triple information). Via this information, the gNB getsinformation about which given UL grants can be omitted. To reduce thesignaling overhead, there could be a shortened identity corresponding toPRACH preamble time-frequency-preamble index triple. This identity couldbe a temporary identifier that can point to transmitted PRACH preambleof certain time window.

In another aspect of this option, there could be information indicatinghow many RARs the UE has dropped. For instance, a 2-bit indication wouldallow 4 RARs (and PRACH preamble transmissions) within RAR window. Assuch, MSG3 would indicate that UE has dropped either 0, 1, 2 or 3 RARs.However, this method has significant drawback that the gNB might notknow which RARs were omitted if it sent RARs to other UEs that weremissed.

An option would be that PRACH preambles/occasions are grouped so thatthere is one RAR per multiple PRACH preamble/occasions detections atgNB. In an aspect of this option, RAR content would then indicate whichof the detected preambles was received with highest power, by using forexample a simple n-bit index among the number of PRACH occasions. Inanother aspect of this option, a UE would determine only one RA-RNTI tolisten for RAR, for example, based on the first or last PRACH occasionused. In other words, the gNB would determine RA-RNTI used for NR-PDCCHCRC masking based on certain time-frequency resource of the set of PRACHpreambles/occasions belonging to the same group. However, this optionhas a drawback that preamble capacity is decreased.

An option would be that the UE transmits MSG3s according to all receivedRARs. In each MSG3 the UE indicates all of its MSG3 transmissions byhaving including, for example, RAR IDs according to which it transmittedMSG3s

An option would be that the UE includes in each MSG3 the same temporaryidentifier using which the gNB may determine that there are multipleMSG3s from the same UE and in addition the UE indicates the preferredRAR to indicate the preferred downlink beam for MSG4. The gNB would thencontinue transmitting one MSG4 to UE from which it received multipleMSG3s using the indicated preferred downlink beam.

gNB Procedures

A gNB configures in system information whether or not a UE is allowed totransmit multiple MSG1 transmissions. If the UEs are allowed to transmitmultiple MSG1 transmissions, then the system information also indicatesthat how many messages the UE may send until the end of the RAR window.The gNB receives PRACH preambles and transmits RAR on each detectedpreamble. If the PRACH preambles are grouped, then the gNB prepares andtransmits one RAR per detected PRACH preamble group.

A gNB that receives MSG3 transmission from UE determines, based on themessage, which RARs have been omitted and takes that information intoaccount if there are pending HARQ processes corresponding to omittedRARs, for example, internal algorithms adjusting parameters for NR-PDCCHand NR-PDSCH used to transmit RAR. If the UE transmits MSG3corresponding to each received RAR, then the gNB determines from MSG3the preferred downlink beam for MSG4 and transmits only one MSG4 to theUE.

UE Procedures

A UE determines from system information whether it can transmit multipleMSG1 transmissions until the end of RAR window.

If the UE is allowed to transmit multiple MSG1 transmissions usingdifferent Tx beams until the end of RAR window, then the RACH resourceselection will indicate preferred downlink beam which has beendetermined based on downlink measurements from SS blocks orcell-specific CSI-RSs before RACH transmissions take place. The UE mayreceive multiple RARs and act with the following alternatives:

-   1. The UE generates one MSG3 based on one received RAR and omits    other RARs. The UE includes in MSG3 which RARs it has omitted or    only the amount of RARs it has omitted-   2. The UE generates MSG3 corresponding to each received RAR and    includes in each MSG3 the same identifier (such as a temporary UE    identifier) and information which RAR beam was preferable for MSG4.    From this information, the gNB is able to shut down other pending    RACH procedures that were running with the UE.

If desired, the different functions discussed herein may be performed ina different order and/or concurrently with each other. Furthermore, ifdesired, one or more of the above-described functions may be optional ormay be combined.

Although various aspects are set out above, other aspects comprise othercombinations of features from the described embodiments, and not solelythe combinations described above. If desired, the different functionsdiscussed herein may be performed in a different order and/orconcurrently with each other. Furthermore, if desired, one or more ofthe above-described functions may be optional or may be combined.

Although various aspects of the invention are set out in the independentclaims, other aspects of the invention comprise other combinations offeatures from the described embodiments and/or the dependent claims withthe features of the independent claims, and not solely the combinationsexplicitly set out in the claims.

Without in any way limiting the scope, interpretation, or application ofthe claims appearing below, an advantage or technical effect of one ormore of the exemplary embodiments disclosed herein is the addedfunctionality.

It is also noted herein that while the above describes exampleembodiments of the invention, these descriptions should not be viewed ina limiting sense. Rather, there are several variations and modificationswhich may be made without departing from the scope of the presentinvention.

What is claimed is:
 1. A method comprising: detecting, by a base stationin a wireless communication system, within a random access responsewindow, at least one of multiple first messages from a plurality of userequipments, wherein the plurality of user equipments is permitted totransmit multiple first messages within the random access responsewindow, and wherein each first message comprises a physical randomaccess channel preamble; in response to receiving at least one physicalrandom access channel preamble in the at least one of multiple firstmessages, transmitting at least one second message comprising a randomaccess response downlink channel for each preamble received; receivingat least one third message, from at least one user equipment of theplurality of user equipments, comprising a beam connection request andtransmitting at least one fourth message to the at least one userequipment on the requested beam.
 2. The method of claim 1, furthercomprising: after receiving the at least one third message, determininga preferred downlink beam for each user equipment of the plurality ofuser equipments; and instead of transmitting the at least one fourthmessage to the at least one user equipment on the requested beam,transmitting only one fourth message to each user equipment on thepreferred beam.
 3. The method of claim 2, wherein the determining isbased on a difference between a number of second messages sent and anumber of third messages received.
 4. The method of claim 2, wherein thedetermining is based on the at least one third message indicating thepreferred beam.
 5. The method of claim 2, further comprising: based onthe determining, shutting down other pending random access channel(RACH) procedures with each user equipment on non-preferred beams. 6.The method of claim 1, wherein, in response to each at least one firstmessage comprising physical random access channel (PRACH) preamblesbeing grouped instead of comprising a PRACH preamble, the at least onesecond message comprises a random access response (RAR) for each PRACHpreamble group.
 7. A method comprising: obtaining, by a user equipmentin a wireless communications network, permission to transmit multiplefirst messages within a random access response window; transmitting to abase station multiple first messages within the random access responsewindow wherein each of the multiple first messages comprises a physicalrandom access channel preamble; receiving from the base station at leastone second message, wherein each of the at least one second messagecomprises an RAR for each preamble; and transmitting at least one thirdmessage comprising a beam connection request.
 8. The method of claim 7,wherein the at least one third message is only one message based on onereceived random access response (RAR) and omitting other random accessresponses (RARs) with an indication of the omitted RARs.
 9. The methodof claim 7, wherein the at least one third message comprises a messagecorresponding to each received random access response (RAR), andidentifying a preferred RAR for downlink. 10-20. (canceled)
 21. Acomputer program product comprising a computer-readable medium bearingcomputer program code embodied therein for use with a computer, thecomputer program code comprising code for controlling or performing themethod of claim
 1. 22. A computer program product comprising acomputer-readable medium bearing computer program code embodied thereinfor use with a computer, the computer program code comprising code forcontrolling or performing the method of claim 7.