Uplink carrier access

ABSTRACT

One or more devices, systems, and/or methods for facilitating access to an uplink carrier are provided. For example, information corresponding to a plurality of uplink carriers may be received from a wireless node. An uplink carrier may be selected from the plurality of uplink carriers based upon the information. A request to access the uplink carrier may be transmitted to the wireless node.

CROSS REFERENCE TO RELATED APPLICATIONS

This patent document is a continuation of and claims the benefit ofpriority to U.S. patent application Ser. No. 16/685,608, entitled“UPLINK CARRIER ACCESS”, filed on Nov. 15, 2019, which is a continuationof International Patent Application No. PCT/CN2017/084706, filed on May17, 2017. The entire contents of the before-mentioned patentapplications are incorporated by reference as part of the disclosure ofthis application.

BACKGROUND

A communication link between wireless nodes, such as between a userequipment (UE) and a base station (BS), may be facilitated using one ormore uplink carriers. For example, the UE may access an uplink carrierand use the uplink to transmit data to and/or through the B S. However,the uplink carrier may not always be available, may have limited and/orchanging resources and/or may have limited and/or changing capabilities.

SUMMARY

In accordance with the present disclosure, one or more devices and/ormethods for facilitating provision of access to an uplink carrier areprovided. In an example, information corresponding to a plurality ofuplink carriers may be received from a wireless node. An uplink carriermay be selected from the plurality of uplink carriers based upon theinformation. A request to access the uplink carrier may be transmittedto the wireless node.

In an example, a first uplink carrier may be selected from amongst thefirst uplink carrier and a second uplink carrier based upon a firstpriority corresponding to the first uplink carrier and a second prioritycorresponding to the second uplink carrier. A request to access thefirst uplink carrier may be transmitted to a wireless node.

In an example, a request to access an uplink carrier may be transmittedto a wireless node. The request may comprise an indication of the uplinkcarrier.

In an example, information corresponding to a plurality of uplinkcarriers may be transmitted to a wireless node.

In an example, a request to access an uplink carrier may be receivedfrom a wireless node. The request may comprise an indication of theuplink carrier. A response may be generated based upon whether theuplink carrier is available. The response may be transmitted to thewireless node.

In an example, an indication of an uplink carrier of a plurality ofuplink carriers may be identified. A request to access the uplinkcarrier may be transmitted, based upon the indication, to a wirelessnode.

In an example, an indication of an uplink carrier may be transmitted toa wireless node.

DESCRIPTION OF THE DRAWINGS

While the techniques presented herein may be embodied in alternativeforms, the particular embodiments illustrated in the drawings are only afew examples that are supplemental of the description provided herein.These embodiments are not to be interpreted in a limiting manner, suchas limiting the claims appended hereto.

FIG. 1 is a flow chart illustrating an example method for facilitatingtransmission of a request to access an uplink carrier.

FIG. 2 is a flow chart illustrating an example method for facilitatingtransmission of a request to access an uplink carrier.

FIG. 3 is a flow chart illustrating an example method for facilitatingtransmission of a request to access an uplink carrier.

FIG. 4 is a flow chart illustrating an example method for facilitatingtransmission of information corresponding to a plurality of uplinkcarriers.

FIG. 5 is a flow chart illustrating an example method of a secondwireless node responding to a request to access an uplink carriertransmitted by a first wireless node.

FIG. 6A is a flow chart illustrating an example method for facilitatingtransmission of a request to access an uplink carrier.

FIG. 6B is a flow chart illustrating an example method for facilitatingtransmission of a request to access an uplink carrier.

FIG. 7 is a flow chart illustrating an example method for facilitatingtransmission of an indication of an uplink carrier.

FIG. 8 is a component block diagram illustrating an example system forfacilitating transmission of a request to access an uplink carrier.

FIG. 9 is a component block diagram illustrating an example system forfacilitating transmission of a request to access an uplink carrier.

FIG. 10 is a component block diagram illustrating an example system forfacilitating transmission of a request to access an uplink carrier.

FIG. 11 is a component block diagram illustrating an example system forfacilitating transmission of a request to access an uplink carrier.

FIG. 12 is a component block diagram illustrating an example system forfacilitating transmission of a request to access an uplink carrier.

FIG. 13 is a component block diagram illustrating an example system forfacilitating transmission of a request to access an uplink carrier.

FIG. 14 is a component block diagram illustrating an example system forfacilitating transmission of a request to access an uplink carrier.

FIG. 15 is a component block diagram illustrating an example system forfacilitating transmission of a request to access an uplink carrier.

FIG. 16 is a component block diagram illustrating an example system forfacilitating transmission of a request to access an uplink carrier.

FIG. 17 is a component block diagram illustrating an example system forfacilitating transmission of a request to access an uplink carrier.

FIG. 18 is a component block diagram illustrating an example system forfacilitating transmission of a request to access an uplink carrier.

FIG. 19 is a component block diagram illustrating an example system forfacilitating transmission of a request to access an uplink carrier.

FIG. 20 is a component block diagram illustrating an example system forfacilitating transmission of a request to access an uplink carrier.

FIG. 21 is an illustration of a scenario involving an exampleconfiguration of a base station (BS) that may utilize and/or implementat least a portion of the techniques presented herein.

FIG. 22 is an illustration of a scenario involving an exampleconfiguration of a user equipment (UE) that may utilize and/or implementat least a portion of the techniques presented herein.

FIG. 23 is an illustration of a scenario featuring an examplenon-transitory computer readable medium in accordance with one or moreof the provisions set forth herein.

DETAILED DESCRIPTION

Subject matter will now be described more fully hereinafter withreference to the accompanying drawings, which form a part hereof, andwhich show, by way of illustration, specific example embodiments. Thisdescription is not intended as an extensive or detailed discussion ofknown concepts. Details that are known generally to those of ordinaryskill in the relevant art may have been omitted, or may be handled insummary fashion.

The following subject matter may be embodied in a variety of differentforms, such as methods, devices, components, and/or systems.Accordingly, this subject matter is not intended to be construed aslimited to any example embodiments set forth herein. Rather, exampleembodiments are provided merely to be illustrative. Such embodimentsmay, for example, take the form of hardware, software, firmware or anycombination thereof.

One or more computing devices and/or techniques for facilitatingprovision of access to one or more uplink carriers are provided. Forexample, a user equipment (UE) may connect to a (e.g., wirelesscommunication) network via a base station (BS) of the network. The UEmay have one or more cells. For example, the one or more cells maycomprise a primary service cell and/or one or more secondary servicecells. The primary service cell may be used to receive and/or send(e.g., secure) parameters and/or non-access stratum (NAS) mobilityfeatures. The one or more secondary service cells may be used to providedata service for the UE. Each cell may comprise a downlink carrier, andone or more cells may comprise an uplink carrier, but in someimplementations, one or more cells may not comprise an uplink carrier.Thus, in such implementations, there may be more downlink carriers thanuplink carriers, and systems that may use an uplink frequency band morethan downlink frequency bands may be limited with (e.g., low) datarates, efficiency, etc. Thus, in accordance with one or more of thetechniques presented herein, the provision of access to uplink carriersmay be facilitated in a manner that allows for one or more cells of theUE to (e.g., each) have one (e.g., or more) downlink carrier and one ormore (e.g., a plurality) of uplink carriers, and thus support scenariosin which uplink carriers of the UE (e.g., and/or of a cell of the UE)outnumber downlink carriers of the UE (e.g., and/or of a cell of theUE).

An example method 100 of facilitating transmission of a request toaccess an uplink carrier from a first wireless node to a second wirelessnode is illustrated in FIG. 1 . The first wireless node may be a userequipment (UE) and the second wireless node may be a network and/or basestation (BS). The first wireless node may (e.g., be required to)transmit one or more data packets to the second wireless node using anuplink carrier. Accordingly, at 105, the first wireless node receivesinformation corresponding to a plurality of uplink carriers (e.g., fromthe second wireless node). An uplink carrier from the plurality ofuplink carriers may be selected to be used for data transmission. Thus,at 110, the first wireless node may select the uplink carrier, from theplurality of uplink carriers, based upon the information received.

The information corresponding to the plurality of uplink carriers mayallow the first wireless node to determine which uplink carrier of theplurality of uplink carriers, which the first wireless node can support,should be selected to be used for data transmission. The information(e.g., used to determine which uplink carrier to select) may comprise anindication of a frequency of the uplink carrier. Alternatively and/oradditionally, the information may comprise a bandwidth of the uplinkcarrier. Alternatively and/or additionally, the information may comprisean extra-spectrum leakage of the uplink carrier. Alternatively and/oradditionally, the information may comprise a priority of the uplinkcarrier. Alternatively and/or additionally, the information may comprisea maximum transmission power. The information may comprise one or moreconfigurations, such as a random access channel (RACH) commonconfiguration, a physical random access channel (PRACH) commonconfiguration, a physical control channel (PUCCH) configuration, aphysical shared channel (PUSCH) configuration, a sounding referencesignal (SRS) common configuration, an upstream loop lengthconfiguration, a time alignment (TA) timer common configuration, and/orother information.

The first wireless node may (e.g., then) request to access the uplinkcarrier. Thus, at 115, the first wireless node may transmit a request toaccess the uplink carrier to the second wireless node. The firstwireless node may transmit the request (e.g., to the second wirelessnode) using an (e.g., previously) accessed uplink carrier which thefirst wireless node may have already accessed. The first wireless nodemay transmit (e.g., to the second wireless node) a data packetcomprising the request.

The request may comprise an indication of the uplink carrier. Theindication of the uplink carrier may comprise the frequency of theuplink carrier. Alternatively and/or additionally, the indication of theuplink carrier may comprise an identification of the uplink carrier.

The second wireless node may (e.g., then) determine whether the uplinkcarrier is available (e.g., for the first wireless node to access). Inresponse to determining that the uplink carrier is available (e.g., forthe first wireless node to access), the second wireless node maytransmit a confirmation message (e.g., to the first wireless node),corresponding to the request, indicating that the uplink carrier isavailable (e.g., for the first wireless node to access). Theconfirmation message may comprise a second indication of the uplinkcarrier. The second indication may comprise the frequency of the uplinkcarrier. Alternatively and/or additionally, the second indication maycomprise a second identification of the uplink carrier. Alternativelyand/or additionally, the confirmation message may comprise theconfiguration of the first wireless node on the uplink carrier (e.g.,such as a RACH resource, PUSCH information, a PUCCH configuration, anSRS configuration, an uplink power exclusive configuration, a channelquality indicator (CQI) configuration, a scheduling request (SR)configuration, a TA timer common configuration and/or other information.

Upon the first wireless node receiving the confirmation message (e.g.,from the second wireless node), the first wireless node may access theuplink carrier. Various scenarios wherein the first wireless nodeaccesses the uplink carrier are contemplated. For example, if the secondwireless node configures an exclusive RACH resource for the firstwireless node, the first wireless node may initiate a (e.g.,non-competitive) random access to the uplink carrier. Alternativelyand/or additionally, if the second wireless node does not configure theexclusive RACH resource for the first wireless node, the first wirelessnode may initiate random access to the uplink carrier. Alternativelyand/or additionally, if the second wireless node directly configures thefirst wireless node for the uplink carrier, the first wireless node maydirectly access the uplink carrier.

Upon the first wireless node accessing the uplink carrier, the firstwireless node may transmit a completion message (e.g., to the secondwireless node). The first wireless node may transmit the completionmessage via the uplink carrier. Upon the first wireless nodetransmitting the completion message, the first wireless node may use theuplink carrier for transmission of (e.g., further) data (e.g., to thesecond wireless node).

In response to determining that the uplink carrier is not available(e.g., for the first wireless node to access), the second wireless nodemay transmit a rejection message (e.g., to the first wireless node),corresponding to the request, indicating that the uplink carrier is notavailable (e.g., for the first wireless node to access). The rejectionmessage may comprise the frequency of the uplink carrier and/or a causeof the rejection. In response to receiving the rejection message, thefirst wireless node may use the (e.g., previously) accessed uplinkcarrier for transmission of data (e.g., to the second wireless node).

In some examples, rather than transmitting the request (e.g., to thesecond wireless node) prior to accessing the uplink carrier, the firstwireless node may access the uplink carrier in response to selecting theuplink carrier, and/or prior to transmitting the request. The firstwireless node may (e.g., then) transmit the request to the secondwireless node via the uplink carrier. The second wireless node may(e.g., then) determine whether the uplink carrier is available (e.g.,for the first wireless node to access).

In some examples, the first wireless node may have a transmissionproblem. For example, the first wireless node may be unable to transmitdata, at a desired rate, using the uplink carrier. When the transmissionproblem occurs and/or is detected (e.g., by the first wireless nodeand/or the second wireless node), the second wireless node may (e.g.,directly) indicate a second (e.g., alternative) uplink carrier to thefirst wireless node by transmitting uplink carrier indicationinformation (e.g., associated with the second uplink carrier) to thefirst wireless node.

The second wireless node may transmit the uplink carrier indicationinformation in a radio resource control (RRC) message. Alternativelyand/or additionally, the second wireless node may transmit the uplinkcarrier indication information in a physical downlink control channel(PDCCH) message. Alternatively and/or additionally, the second wirelessnode may transmit the uplink carrier indication information in a mediumaccess control (MAC) control element (CE) message.

The uplink carrier indication information may comprise a frequency ofthe second uplink carrier and/or a configuration of the second uplinkcarrier. Upon receiving the uplink carrier indication information, thefirst wireless node may access the second uplink carrier. Variousscenarios wherein the first wireless node accesses the second uplinkcarrier are contemplated. For example, if the second wireless nodeconfigures an exclusive RACH resource for the first wireless node, thefirst wireless node may initiate a (e.g., non-competitive) random accessto the second uplink carrier. Alternatively and/or additionally, if thesecond wireless node directly configures the first wireless node for thesecond uplink carrier, the first wireless node may directly access thesecond uplink carrier.

Alternatively and/or additionally, when the transmission problem occurs,the first wireless node may select the second uplink carrier. Variousscenarios wherein the transmission problem occurs and the first wirelessnode selects the second uplink carrier are contemplated. For example,when a determination is made that the first wireless node transmits arandom access preamble (e.g., from MAC layer) to the uplink carrier athreshold (e.g., maximum) number of times, the first wireless node maytransmit a second request (e.g., from RRC layer) to access the seconduplink carrier to the second wireless node. Alternatively and/oradditionally, when a determination is made that the first wireless nodetransmits a data packet (e.g., from radio link control (RLC) layer) tothe uplink carrier a threshold (e.g., maximum) number of times, thefirst wireless node may transmit the second request (e.g., from RRClayer) to access the second uplink carrier to the second wireless node.Alternatively and/or additionally, when a determination is made that theuplink carrier is out of step (e.g., in association with a TA timertimeout), the first wireless node may transmit the second request (e.g.,from RRC layer) to access the second uplink carrier to the secondwireless node.

An example method 200 of facilitating transmission of a request toaccess an uplink carrier from a first wireless node to a second wirelessnode is illustrated in FIG. 2 . The first wireless node may be a UE andthe second wireless node may be a network and/or BS. The first wirelessnode may (e.g., be required to) transmit one or more data packets to thesecond wireless node using an uplink carrier. Accordingly, the firstwireless node may receive information corresponding to a plurality ofuplink carriers (e.g., from the second wireless node) comprising a firstuplink carrier and a second uplink carrier. The information may comprisefirst information corresponding to the first uplink carrier and/orsecond information corresponding to the second uplink carrier.

The first wireless node may determine a first priority of the firstuplink carrier based on the first information. The first information(e.g., used to determine the first priority) may comprise an indicationof a frequency of the first uplink carrier. Alternatively and/oradditionally, the first information may comprise a bandwidth of thefirst uplink carrier. Alternatively and/or additionally, the firstinformation may comprise an extra-spectrum leakage of the first uplinkcarrier. Alternatively and/or additionally, the first information maycomprise a maximum transmission power of the first uplink carrier.Alternatively and/or additionally, the first information may comprisethe first priority of the first uplink carrier. The first informationmay comprise one or more configurations, such as a RACH commonconfiguration, a PRACH common configuration, a PUCCH configuration, aPUSCH configuration, an SRS common configuration, an upstream looplength configuration, a TA timer common configuration and/or otherinformation.

The first wireless node may determine a second priority of the seconduplink carrier based on the second information. The second information(e.g., used to determine the second priority) may comprise an indicationof a frequency of the second uplink carrier. Alternatively and/oradditionally, the second information may comprise a bandwidth of thesecond uplink carrier. Alternatively and/or additionally, the secondinformation may comprise an extra-spectrum leakage of the second uplinkcarrier. Alternatively and/or additionally, the second information maycomprise a maximum transmission power of the second uplink carrier.Alternatively and/or additionally, the second information may comprisethe second priority of the second uplink carrier. The second informationmay comprise one or more configurations, such as a RACH commonconfiguration, a PRACH common configuration, a PUCCH configuration, aPUSCH configuration, an SRS common configuration, an upstream looplength configuration, a TA timer common configuration and/or otherinformation).

The first priority may be determined based upon the frequency of thefirst uplink carrier and/or the second priority may be determined basedupon the frequency of the second uplink carrier. Alternatively and/oradditionally, the first priority may be determined based upon a load ofthe first uplink carrier and/or the second priority may be determinedbased upon a load of the second uplink carrier.

At 205, the first wireless node may select the first uplink carrier fromamongst the first uplink carrier and the second uplink carrier, basedupon the first priority and the second priority. The first wireless nodemay select the first uplink carrier based upon an application of thefirst priority and/or the second priority to one or more (e.g., defined)rules (e.g., stored on the first wireless node). For example, the firstwireless node may select the first uplink carrier based upon acomparison of the first priority to the second priority.

Various scenarios wherein the first wireless node selects the firstuplink carrier based upon a comparison of the first priority to thesecond priority are contemplated. For example, the first wireless nodemay select the first uplink carrier based upon a comparison of the firstpriority and the second priority, wherein the first priority is basedupon the frequency of the first uplink carrier and the second priorityis based upon the frequency of the second uplink carrier. Here, thefrequency of the first uplink carrier may be lower than the frequency ofthe second uplink carrier. Alternatively and/or additionally, the firstwireless node may select the first uplink carrier based upon acomparison of the first priority and the second priority, wherein thefirst priority is based upon the load of the first uplink carrier andthe second priority is based upon the load of the second uplink carrier.Here, the load of the first uplink carrier may be lighter than the loadof the second uplink carrier.

The first wireless node may (e.g., then) request to access the firstuplink carrier. Thus, at 210, the first wireless node may transmit arequest to access the first uplink carrier to the second wireless node.The first wireless node may transmit the request (e.g., to the secondwireless node) using an (e.g., previously) accessed uplink carrier whichthe first wireless node may have already accessed. The first wirelessnode may transmit (e.g., to the second wireless node) a data packetcomprising the request.

The request may comprise an indication of the first uplink carrier. Theindication of the first uplink carrier may comprise the frequency of thefirst uplink carrier. Alternatively and/or additionally, the indicationof the first uplink carrier may comprise an identification of the firstuplink carrier.

The second wireless node may (e.g., then) determine whether the firstuplink carrier is available (e.g., for the first wireless node toaccess). In response to determining that the first uplink carrier isavailable (e.g., for the first wireless node to access), the secondwireless node may transmit a confirmation message (e.g., to the firstwireless node), corresponding to the request, indicating that the firstuplink carrier is available (e.g., for the first wireless node toaccess). The confirmation message may comprise a second indication ofthe first uplink carrier. The second indication may comprise thefrequency of the first uplink carrier. Alternatively and/oradditionally, the second indication may comprise a second identificationof the first uplink carrier. Alternatively and/or additionally, theconfirmation message may comprise the configuration of the firstwireless node on the first uplink carrier (e.g., such as a RACHresource, PUSCH information, a PUCCH configuration, an SRSconfiguration, an uplink power exclusive configuration, a CQIconfiguration, a SR configuration, a TA timer common configurationand/or other information).

Upon the first wireless node receiving the confirmation message (e.g.,from the second wireless node), the first wireless node may access thefirst uplink carrier. Various scenarios wherein the first wireless nodeaccesses the first uplink carrier are contemplated. For example, if thesecond wireless node configures an exclusive RACH resource for the firstwireless node, the first wireless node may initiate a (e.g.,non-competitive) random access to the first uplink carrier.Alternatively and/or additionally, if the second wireless node does notconfigure the exclusive RACH resource for the first wireless node, thefirst wireless node may initiate random access to the first uplinkcarrier. Alternatively and/or additionally, if the second wireless nodedirectly configures the first wireless node for the first uplinkcarrier, the first wireless node may directly access the first uplinkcarrier.

Upon the first wireless node accessing the first uplink carrier, thefirst wireless node may transmit a completion message (e.g., to thesecond wireless node). The first wireless node may transmit thecompletion message via the first uplink carrier. Upon the first wirelessnode transmitting the completion message, the first wireless node mayuse the first uplink carrier for transmission of (e.g., further) data(e.g., to the second wireless node).

In response to determining that the first uplink carrier is notavailable (e.g., for the first wireless node to access), the secondwireless node may transmit a rejection message (e.g., to the firstwireless node), corresponding to the request, indicating that the firstuplink carrier is not available (e.g., for the first wireless node toaccess). The rejection message may comprise the frequency of the firstuplink carrier and/or a cause of the rejection. In response to receivingthe rejection message, the first wireless node may use the (e.g.,previously) accessed uplink carrier for transmission of data (e.g., tothe second wireless node).

In some examples, rather than transmitting the request (e.g., to thesecond wireless node) prior to accessing the first uplink carrier, thefirst wireless node may access the first uplink carrier in response toselecting the first uplink carrier, and/or prior to transmitting therequest. The first wireless node may (e.g., then) transmit the requestto the second wireless node via the first uplink carrier. The secondwireless node may (e.g., then) determine whether the first uplinkcarrier is available (e.g., for the first wireless node to access).

In some examples, a change of the load of the first uplink carrierand/or a change of the frequency of the first uplink carrier may causethe first priority to change. For example, the first priority may bechanged (e.g., by the first wireless node and/or the second wirelessnode) in response to receiving an indication of a change of thefrequency of the first uplink carrier (e.g., from the second wirelessnode and/or the first wireless node). Alternatively and/or additionally,the first priority may be changed (e.g., by the first wireless nodeand/or the second wireless node) in response to receiving an indicationof a change of the load of the first uplink carrier (e.g., from thesecond wireless node and/or the first wireless node). When a change ofthe first priority occurs and/or is determined (e.g., detected) (e.g.,by the first wireless node and/or the second wireless node), the secondwireless node may transmit third information corresponding to aplurality of uplink carriers (e.g., to the first wireless node). Uponreceiving the third information, a third uplink carrier from theplurality of uplink carriers may be selected (e.g., by the firstwireless node) to be used for data transmission. In some examples, thethird information may comprise a selection threshold used in selectingthe third uplink carrier.

Various scenarios wherein the selection threshold is used in selectingthe third uplink carrier are contemplated. For example, if a receivedsignal quality (e.g., Reference Signal Received Power (RSRP)) measuredby the first wireless node (e.g., and/or associated with a downlinkcarrier) is below the selection threshold, the first wireless node mayselect an uplink carrier with a low frequency. Alternatively and/oradditionally, if the received signal quality (e.g., RSRP) measured bythe first wireless node is above the selection threshold, the firstwireless node may select an uplink carrier with a high frequency. Insome examples, the selection threshold is based upon a load of the thirduplink carrier and/or the received signal quality (e.g., RSRP). Theselection threshold may alternatively and/or additionally be based uponan offset value (e.g., received from the second wireless node), wherethe offset value may be modified (e.g., by the first wireless nodeand/or the second wireless node) to modify the selection threshold. Insome examples, the selection threshold is based upon a combination, suchas a sum, of the received signal quality (e.g., RSRP) and/or the offsetvalue.

In some examples, the first wireless node may have a transmissionproblem. For example, the first wireless node may be unable to transmitdata, at a desired rate, using the first uplink carrier. When thetransmission problem occurs and/or is detected (e.g., by the firstwireless node and/or the second wireless node), the second wireless nodemay (e.g., directly) indicate a fourth (e.g., alternative) uplinkcarrier to the first wireless node by transmitting uplink carrierindication information (e.g., associated with the second uplink carrier)to the first wireless node.

The second wireless node may transmit the uplink carrier indicationinformation in an RRC message. Alternatively and/or additionally, thesecond wireless node may transmit the uplink carrier indicationinformation in a PDCCH message. Alternatively and/or additionally, thesecond wireless node may transmit the uplink carrier indicationinformation in a MAC CE message.

The uplink carrier indication information may comprise a frequency ofthe fourth uplink carrier and/or a configuration of the fourth uplinkcarrier. Upon receiving the uplink carrier indication information, thefirst wireless node may access the fourth uplink carrier. Variousscenarios wherein the first wireless node accesses the fourth uplinkcarrier are contemplated. For example, if the second wireless nodeconfigures an exclusive RACH resource for the first wireless node, thefirst wireless node may initiate a (e.g., non-competitive) random accessto the fourth uplink carrier. Alternatively and/or additionally, if thesecond wireless node directly configures the first wireless node for thefourth uplink carrier, the first wireless node may directly access thefourth uplink carrier.

Alternatively and/or additionally, when the transmission problem occurs,the first wireless node may select the fourth uplink carrier. Variousscenarios wherein the transmission problem occurs and the first wirelessnode selects the fourth uplink carrier are contemplated. For example,when a determination is made that the first wireless node transmits arandom access preamble (e.g., from MAC layer) to the uplink carrier athreshold (e.g., maximum) number of times, the first wireless node maytransmit a second request (e.g., from RRC layer) to access the fourthuplink carrier to the second wireless node and/or may lower the priorityof the uplink carrier. Alternatively and/or additionally, the offsetvalue may be lowered by (e.g., at least) one step (e.g., by the firstwireless node and/or the second wireless node), where the step may beconfigured (e.g., by the first wireless node and/or the second wirelessnode). Alternatively and/or additionally, when a determination is madethat the first wireless node transmits a data packet (e.g., from RLClayer) to the uplink carrier a threshold (e.g., maximum) number oftimes, the first wireless node may transmit the second request (e.g.,from RRC layer) to access the fourth uplink carrier to the secondwireless node. Alternatively and/or additionally, when a determinationis made that the fourth uplink carrier is out of step (e.g., inassociation with a TA timer timeout), the first wireless node maytransmit the second request (e.g., from RRC layer) to access the seconduplink carrier to the second wireless node.

An example method 300 of facilitating transmission of a request toaccess an uplink carrier from a first wireless node to a second wirelessnode is illustrated in FIG. 3 . The first wireless node may be a UE andthe second wireless node may be a network and/or BS. The first wirelessnode may (e.g., be required to) transmit one or more data packets to thesecond wireless node using an uplink carrier. Accordingly, the firstwireless node receives information corresponding to a plurality ofuplink carriers (e.g., from the second wireless node). An uplink carrierfrom the plurality of uplink carriers may be selected to be used fordata transmission. Thus, the first wireless node may select the uplinkcarrier, from the plurality of uplink carriers, based upon theinformation received.

The first wireless node may (e.g., then) request to access the uplinkcarrier. Thus, at 305, the first wireless node may transmit a request toaccess the uplink carrier to the second wireless node, wherein therequest comprises an indication of the uplink carrier. The indication ofthe uplink carrier may comprise the frequency of the uplink carrier.Alternatively and/or additionally, the indication of the uplink carriermay comprise an identification of the uplink carrier.

An example method 400 of facilitating transmission of informationcorresponding to a plurality of uplink carriers from a second wirelessnode to a first wireless node is illustrated in FIG. 4 . The firstwireless node may be a UE and the second wireless node may be a networkand/or BS. The second wireless node may (e.g., be required to) receiveone or more data packets from the first wireless node using an uplinkcarrier. Accordingly, at 405, the second wireless node transmitsinformation corresponding to a plurality of uplink carriers (e.g., tothe first wireless node). The first wireless node may select the uplinkcarrier, from the plurality of uplink carriers, based upon theinformation transmitted.

The information corresponding to the plurality of uplink carriers mayallow the first wireless node to determine which uplink carrier of theplurality of uplink carriers, which the first wireless node can support,should be selected to be used for data transmission. The information(e.g., used to determine which uplink carrier to select) may comprise anindication of a frequency of the uplink carrier. Alternatively and/oradditionally, the information may comprise a bandwidth of the uplinkcarrier. Alternatively and/or additionally, the information may comprisean extra-spectrum leakage of the uplink carrier. Alternatively and/oradditionally, the information may comprise a priority of the uplinkcarrier. Alternatively and/or additionally, the information may comprisea maximum transmission power. The information may comprise one or moreconfigurations, such as a RACH common configuration, a PRACH commonconfiguration, a PUCCH configuration, a PUSCH configuration, an SRScommon configuration, an upstream loop length configuration, a TA timercommon configuration and/or other information.

An example method 500 of a second wireless node responding to a requestto access an uplink carrier transmitted by a first wireless node isillustrated in FIG. 5 . The first wireless node may be a UE and thesecond wireless node may be a network and/or BS. The second wirelessnode may (e.g., be required to) receive one or more data packets fromthe first wireless node using an uplink carrier. Accordingly the secondwireless node transmits information corresponding to a plurality ofuplink carriers (e.g., to the first wireless node). The first wirelessnode may select the uplink carrier, from the plurality of uplinkcarriers, based upon the information transmitted.

The second wireless node may, at 505, receive a request to access theuplink carrier, wherein the request comprises an indication of theuplink carrier. The indication of the uplink carrier may comprise thefrequency of the uplink carrier. Alternatively and/or additionally, theindication of the uplink carrier may comprise an identification of theuplink carrier.

The second wireless node may receive the request (e.g., from the firstwireless node) using an (e.g., previously) accessed uplink carrier whichthe first wireless node may have already accessed. The second wirelessnode may receive (e.g., from the first wireless node) a data packetcomprising the request.

The second wireless node may (e.g., then) determine whether the uplinkcarrier is available (e.g., for the first wireless node to access). At510, the second wireless node may generate a response based upon whetherthe uplink carrier is available. For example, in response to determiningthat the uplink carrier is available (e.g., for the first wireless nodeto access), the second wireless node may generate a confirmationmessage, corresponding to the request.

At 515, the second wireless node may transmit the response to the firstwireless node. For example, the second wireless node may transmit theconfirmation message (e.g., to the first wireless node) indicating thatthe uplink carrier is available (e.g., for the first wireless node toaccess). The confirmation message may comprise a second indication ofthe uplink carrier. The second indication may comprise the frequency ofthe uplink carrier. Alternatively and/or additionally, the secondindication may comprise a second identification of the uplink carrier.Alternatively and/or additionally, the confirmation message may comprisethe configuration of the first wireless node on the uplink carrier(e.g., such as a RACH resource, PUSCH information, a PUCCHconfiguration, an SRS configuration, an uplink power exclusiveconfiguration, a CQI configuration, a SR configuration, a TA timercommon configuration and/or other information).

Upon the second wireless node transmitting the confirmation message(e.g., to the first wireless node), the first wireless node may accessthe uplink carrier. Various scenarios wherein the first wireless nodeaccesses the uplink carrier are contemplated. For example, if the secondwireless node configures an exclusive RACH resource for the firstwireless node, the first wireless node may initiate a (e.g.,non-competitive) random access to the uplink carrier. Alternativelyand/or additionally, if the second wireless node does not configure theexclusive RACH resource for the first wireless node, the first wirelessnode may initiate random access to the uplink carrier. Alternativelyand/or additionally, if the second wireless node directly configures thefirst wireless node for the uplink carrier, the first wireless node maydirectly access the uplink carrier.

Upon the first wireless node accessing the uplink carrier, the firstwireless node may transmit a completion message (e.g., to the secondwireless node). The first wireless node may transmit the completionmessage via the uplink carrier. Upon the first wireless nodetransmitting the completion message, the first wireless node may use theuplink carrier for transmission of (e.g., further) data (e.g., to thesecond wireless node).

In response to determining that the uplink carrier is not available(e.g., for the first wireless node to access), the second wireless nodemay generate a rejection message, corresponding to the request. Thesecond wireless node may (e.g., then) transmit the rejection message(e.g., to the first wireless node) indicating that the uplink carrier isnot available (e.g., for the first wireless node to access). Therejection message may comprise the frequency of the uplink carrierand/or a cause of the rejection. In response to receiving the rejectionmessage, the first wireless node may use the (e.g., previously) accesseduplink carrier for transmission of data (e.g., to the second wirelessnode).

In some examples, rather than transmitting the request (e.g., to thesecond wireless node) prior to accessing the uplink carrier, the firstwireless node may access the uplink carrier in response to selecting theuplink carrier, and/or prior to transmitting the request. The firstwireless node may (e.g., then) transmit the request to the secondwireless node via the uplink carrier. The second wireless node may(e.g., then) determine whether the uplink carrier is available (e.g.,for the first wireless node to access).

In some examples, the first wireless node may have a transmissionproblem. For example, the first wireless node may be unable to transmitdata, at a desired rate, using the uplink carrier. When the transmissionproblem occurs and/or is detected (e.g., by the first wireless nodeand/or the second wireless node), the second wireless node may (e.g.,directly) indicate a second (e.g., alternative) uplink carrier to thefirst wireless node by transmitting uplink carrier indicationinformation (e.g., associated with the second uplink carrier) to thefirst wireless node.

The second wireless node may transmit the uplink carrier indicationinformation in an RRC message. Alternatively and/or additionally, thesecond wireless node may transmit the uplink carrier indicationinformation in a PDCCH message. Alternatively and/or additionally, thesecond wireless node may transmit the uplink carrier indicationinformation in a MAC CE message.

The uplink carrier indication information may comprise a frequency ofthe second uplink carrier and/or a configuration of the second uplinkcarrier. Upon receiving the uplink carrier indication information, thefirst wireless node may access the second uplink carrier. Variousscenarios wherein the first wireless node accesses the second uplinkcarrier are contemplated. For example, if the second wireless nodeconfigures an exclusive RACH resource for the first wireless node, thefirst wireless node may initiate a (e.g., non-competitive) random accessto the second uplink carrier. Alternatively and/or additionally, if thesecond wireless node directly configures the first wireless node for thesecond uplink carrier, the first wireless node may directly access thesecond uplink carrier.

Alternatively and/or additionally, when the transmission problem occurs,the first wireless node may select the second uplink carrier. Variousscenarios wherein the transmission problem occurs and the first wirelessnode selects the second uplink carrier are contemplated. For example,when a determination is made that the first wireless node transmits arandom access preamble (e.g., from MAC layer) to the uplink carrier athreshold (e.g., maximum) number of times, the first wireless node maytransmit a second request (e.g., from RRC layer) to access the seconduplink carrier to the second wireless node. Alternatively and/oradditionally, when a determination is made that the first wireless nodetransmits a data packet (e.g., from RLC layer) to the uplink carrier athreshold (e.g., maximum) number of times, the first wireless node maytransmit the second request (e.g., from RRC layer) to access the seconduplink carrier to the second wireless node. Alternatively and/oradditionally, when a determination is made (e.g., by the first wirelessnode and/or the second wireless node) that the uplink carrier is out ofstep (e.g., in association with a TA timer timeout), the first wirelessnode may transmit the second request (e.g., from RRC layer) to accessthe second uplink carrier to the second wireless node.

An example method 600 of facilitating transmission of a request toaccess an uplink carrier from a first wireless node to a second wirelessnode is illustrated in FIG. 6A. The first wireless node may be a UE andthe second wireless node may be a network and/or BS. The first wirelessnode may (e.g., be required to) transmit one or more data packets to thesecond wireless node using an uplink carrier. Accordingly, the firstwireless node receives information corresponding to a plurality ofuplink carriers (e.g., from the second wireless node). An uplink carrierfrom the plurality of uplink carriers may be selected to be used fordata transmission. Thus, the first wireless node may select the uplinkcarrier, from the plurality of uplink carriers, based upon theinformation received.

The information corresponding to the plurality of uplink carriers mayallow the first wireless node to determine which uplink carrier of theplurality of uplink carriers, which the first wireless node can support,should be selected to be used for data transmission. The information(e.g., used to determine which uplink carrier to select) may comprise anindication of the uplink carrier. Thus, when the first wireless nodereceives the information, at 605, the first wireless node may identifythe indication of the uplink carrier. The indication of the uplinkcarrier may comprise a frequency of the uplink carrier and/or anidentification of the uplink carrier. Alternatively and/or additionally,the information may comprise a bandwidth of the uplink carrier.Alternatively and/or additionally, the information may comprise anextra-spectrum leakage of the uplink carrier. Alternatively and/oradditionally, the information may comprise a priority of the uplinkcarrier. Alternatively and/or additionally, the information may comprisea maximum transmission power. The information may comprise a RACHresource, PUSCH information, a PUCCH configuration, an SRSconfiguration, uplink power exclusive configuration, a CQIconfiguration, a SR configuration, a TA timer common configurationand/or other information.

The first wireless node may (e.g., then) request to access the uplinkcarrier. Thus, at 610, the first wireless node may transmit a request toaccess the uplink carrier, based upon the indication of the uplinkcarrier, to the second wireless node. The request may comprise a secondindication of the uplink carrier. The second indication may comprise thefrequency of the uplink carrier. Alternatively and/or additionally, thesecond indication may comprise an identification of the uplink carrier.

The first wireless node may transmit the request (e.g., to the secondwireless node) using an (e.g., previously) accessed uplink carrier whichthe first wireless node may have already accessed. The first wirelessnode may transmit (e.g., to the second wireless node) a data packetcomprising the request.

An example method 650 of facilitating transmission of a request toaccess an uplink carrier from a first wireless node to a second wirelessnode is illustrated in FIG. 6B. The first wireless node may be a UE andthe second wireless node may be a network and/or BS. The first wirelessnode may (e.g., be required to) transmit one or more data packets to thesecond wireless node using an uplink carrier. Accordingly, the firstwireless node receives information corresponding to a plurality ofuplink carriers (e.g., from the second wireless node). An uplink carrierfrom the plurality of uplink carriers may be selected to be used fordata transmission. Thus, the first wireless node may select the uplinkcarrier, from the plurality of uplink carriers, based upon theinformation received.

The information corresponding to the plurality of uplink carriers mayallow the first wireless node to determine which uplink carrier of theplurality of uplink carriers, which the first wireless node can support,should be selected to be used for data transmission. The information(e.g., used to determine which uplink carrier to select) may comprise anindication of the uplink carrier. Thus, when the first wireless nodereceives the information, at 615, the first wireless node may identifythe indication of the uplink carrier. The indication of the uplinkcarrier may comprise a frequency of the uplink carrier and/or anidentification of the uplink carrier. Alternatively and/or additionally,the information may comprise a bandwidth of the uplink carrier.Alternatively and/or additionally, the information may comprise anextra-spectrum leakage of the uplink carrier. Alternatively and/oradditionally, the information may comprise a priority of the uplinkcarrier. Alternatively and/or additionally, the information may comprisea maximum transmission power. The information may comprise a RACHresource, PUSCH information, a PUCCH configuration, an SRSconfiguration, uplink power exclusive configuration, a CQIconfiguration, a SR configuration, a TA timer common configurationand/or other information.

At 620, the first wireless node may access the uplink carrier inresponse to identifying the indication of the uplink carrier, and/orprior to transmitting a request to access the uplink carrier.

The first wireless node may (e.g., then) transmit the request to thesecond wireless node via the uplink carrier. The request may comprise asecond indication of the uplink carrier. The second indication maycomprise the frequency of the uplink carrier. Alternatively and/oradditionally, the second indication may comprise an identification ofthe uplink carrier.

The second wireless node may (e.g., then) determine whether the uplinkcarrier is available (e.g., for the first wireless node to access). Inresponse to determining that the uplink carrier is available (e.g., forthe first wireless node to access), the second wireless node maytransmit a confirmation message (e.g., to the first wireless node). Uponthe first wireless node receiving the confirmation message, the firstwireless node may transmit a completion message (e.g., to the secondwireless node).

In response to determining that the uplink carrier is not available(e.g., for the first wireless node to access), the second wireless nodemay transmit a rejection message (e.g., to the first wireless node). Inresponse to receiving the rejection message, the first wireless node may(e.g., cease accessing the uplink carrier and/or) use an initial uplinkcarrier which the first wireless node may have already (e.g.,previously) accessed, for transmission of data (e.g., to the secondwireless node).

An example method 700 of facilitating transmission of an indication ofan uplink carrier from a second wireless node to a first wireless nodeis illustrated in FIG. 7 . The first wireless node may be a UE and thesecond wireless node may be a network and/or BS. The second wirelessnode may (e.g., be required to) receive one or more data packets fromthe first wireless node using an uplink carrier. Accordingly the secondwireless node transmits information corresponding to a plurality ofuplink carriers (e.g., to the first wireless node). The first wirelessnode may select the uplink carrier, from the plurality of uplinkcarriers, based upon the information transmitted.

In some examples, the first wireless node may have a transmissionproblem. For example, the first wireless node may be unable to transmitdata, at a desired rate, using the uplink carrier. At 705, the secondwireless node may transmit an indication of a second uplink carrier tothe first wireless node. For example, when the transmission problemoccurs and/or is determined (e.g., detected) (e.g., by the firstwireless node and/or the second wireless node), the second wireless nodemay (e.g., directly) indicate the second (e.g., alternative) uplinkcarrier to the first wireless node by transmitting uplink carrierindication information (e.g., associated with the second uplink carrier)to the first wireless node.

The second wireless node may transmit the uplink carrier indicationinformation in an RRC message. Alternatively and/or additionally, thesecond wireless node may transmit the uplink carrier indicationinformation in a PDCCH message. Alternatively and/or additionally, thesecond wireless node may transmit the uplink carrier indicationinformation in a MAC CE message.

The uplink carrier indication information may comprise a frequency ofthe second uplink carrier and/or a configuration of the second uplinkcarrier. Upon receiving the uplink carrier indication information, thefirst wireless node may access the second uplink carrier. Variousscenarios wherein the first wireless node accesses the second uplinkcarrier are contemplated. For example, if the second wireless nodeconfigures an exclusive RACH resource for the first wireless node, thefirst wireless node may initiate a (e.g., non-competitive) random accessto the second uplink carrier. Alternatively and/or additionally, if thesecond wireless node directly configures the first wireless node for thesecond uplink carrier, the first wireless node may directly access thesecond uplink carrier.

FIG. 8 illustrates an example of a system 800 for facilitatingtransmission of a request to access an uplink carrier from a firstwireless node 805 (e.g., UE) to a second wireless node 810 (e.g.,network and/or BS). The first wireless node 805 may (e.g., be requiredto) transmit one or more data packets to the second wireless node 810using an uplink carrier. Accordingly, the first wireless node 805receives information corresponding to a plurality of uplink carriers(e.g., from the second wireless node 810). The information may comprisefirst information 815 corresponding to a first uplink carrier, secondinformation 820 corresponding to a second uplink carrier and/or thirdinformation 825 corresponding to a third uplink carrier, wherein thefirst uplink carrier, the second uplink carrier and/or the third uplinkcarrier are comprised within the plurality of uplink carriers. An uplinkcarrier from the plurality of uplink carriers may be selected to be usedfor data transmission. Thus, the first wireless node 805 may select theuplink carrier, from the plurality of uplink carriers, based upon theinformation received.

The information corresponding to the plurality of uplink carriers mayallow the first wireless node 805 to determine which uplink carrier ofthe plurality of uplink carriers, which the first wireless node 805 cansupport, should be selected to be used for data transmission.Accordingly, the first information 815, the second information 820and/or the third information 825 may comprise an indication of afrequency, a bandwidth, an extra-spectrum leakage, a priority, a maximumtransmission power and/or one or more configurations. The first wirelessnode 805 may then select the uplink carrier based upon the firstinformation 815, the second information 820 and/or the third information825.

The first wireless node 805 may (e.g., then) request to access theuplink carrier. Thus, the first wireless node 805 may transmit a request830 to access the uplink carrier to the second wireless node 810,wherein the request 830 comprises an indication of the uplink carrier.The indication of the uplink carrier may comprise the frequency of theuplink carrier. Alternatively and/or additionally, the indication of theuplink carrier may comprise an identification of the uplink carrier.

The first wireless node 805 may transmit the request 830 (e.g., to thesecond wireless node 810) using an initial uplink carrier which thefirst wireless node 805 may have already (e.g, previously) accessed. Thefirst wireless node 805 may transmit (e.g., to the second wireless node810) a data packet comprising the request 830. The second wireless node810 may (e.g., then) determine whether the uplink carrier is available(e.g., for the first wireless node 805 to access).

FIG. 9 illustrates an example of a system 900 for facilitatingtransmission of a request to access an uplink carrier from the firstwireless node 805 to the second wireless node 810. The first wirelessnode 805 may (e.g., be required to) transmit one or more data packets tothe second wireless node 810 using an uplink carrier. Accordingly, thefirst wireless node 805 receives information corresponding to aplurality of uplink carriers (e.g., from the second wireless node 810).The information may comprise first information 905 corresponding to afirst uplink carrier, second information 910 corresponding to a seconduplink carrier and/or third information 915 corresponding to a thirduplink carrier, wherein the first uplink carrier, the second uplinkcarrier and/or the third uplink carrier are comprised within theplurality of uplink carriers. An uplink carrier from amongst the firstuplink carrier, the second uplink carrier and/or the third uplinkcarrier may be selected to be used for data transmission. Thus, thefirst wireless node 805 may select the uplink carrier, from theplurality of uplink carriers, based upon the information received.

The information corresponding to the plurality of uplink carriers mayallow the first wireless node 805 to determine which uplink carrier ofthe plurality of uplink carriers, which the first wireless node 805 cansupport, should be selected to be used for data transmission.Accordingly, the first information 905, the second information 910and/or the third information 915 may comprise an indication of afrequency, a bandwidth, an extra-spectrum leakage, a priority, a maximumtransmission power and/or one or more configurations.

The first wireless node 805 may determine a first priority of the firstuplink carrier based on the first information 905. The first wirelessnode 805 may determine a second priority of the second uplink carrierbased on the second information 910. The first wireless node 805 maydetermine a third priority of the third uplink carrier based on thethird information 915. Accordingly, the first wireless node 805 maydetermine that the third uplink carrier has a higher priority than thefirst uplink carrier and/or the first uplink carrier has a higherpriority than the second uplink carrier. The first wireless node 805 may(e.g., then) select the third uplink carrier.

The first wireless node 805 may (e.g., then) request to access the thirduplink carrier. Thus, the first wireless node 805 may transmit a request920 to access the third uplink carrier to the second wireless node 810,wherein the request 920 comprises an indication of the third uplinkcarrier. The indication of the third uplink carrier may comprise thefrequency of the third uplink carrier. Alternatively and/oradditionally, the indication of the third uplink carrier may comprise anidentification of the third uplink carrier.

The first wireless node 805 may transmit the request 920 (e.g., to thesecond wireless node 810) using an initial uplink carrier which thefirst wireless node 805 may have already (e.g, previously) accessed. Thefirst wireless node 805 may transmit (e.g., to the second wireless node810) a data packet comprising the request 920. The second wireless node810 may (e.g., then) determine whether the uplink carrier is available(e.g., for the first wireless node 805 to access).

FIG. 10 illustrates an example of a system 1000 for facilitatingtransmission of a request to access an uplink carrier from the firstwireless node 805 to the second wireless node 810. The first wirelessnode 805 may (e.g., be required to) transmit one or more data packets tothe second wireless node 810 using an uplink carrier. Accordingly, thefirst wireless node 805 may select the uplink carrier from a pluralityof uplink carriers. The first wireless node 805 may (e.g., then) requestto access the uplink carrier. Thus, the first wireless node 805 maytransmit a request 1005 to access the uplink carrier to the secondwireless node 810, wherein the request 1005 comprises an indication ofthe uplink carrier. The indication of the uplink carrier may comprisethe frequency of the uplink carrier. Alternatively and/or additionally,the indication of the uplink carrier may comprise an identification ofthe uplink carrier.

The first wireless node 805 may transmit the request 1005 (e.g., to thesecond wireless node 810) using an initial uplink carrier which thefirst wireless node 805 may have already (e.g., previously) accessed.The first wireless node 805 may transmit (e.g., to the second wirelessnode 810) a data packet comprising the request 1005. The second wirelessnode 810 may (e.g., then) determine whether the uplink carrier isavailable (e.g., for the first wireless node 805 to access).

In response to determining that the uplink carrier is available (e.g.,for the first wireless node 805 to access), the second wireless node 810may transmit a confirmation message 1010 (e.g., to the first wirelessnode 805), corresponding to the request 1005, indicating that the uplinkcarrier is available (e.g., for the first wireless node 805 to access).The confirmation message 1010 may comprise a second indication of theuplink carrier. The second indication may comprise the frequency of theuplink carrier. Alternatively and/or additionally, the second indicationmay comprise a second identification of the uplink carrier.Alternatively and/or additionally, the confirmation message 1010 maycomprise the configuration of the first wireless node 805 on the uplinkcarrier.

Upon the first wireless node 805 receiving the confirmation message 1010(e.g., from the second wireless node 810), the first wireless node 805may access the uplink carrier.

FIG. 11 illustrates an example of a system 1100 for facilitatingtransmission of a request to access an uplink carrier from the firstwireless node 805 to the second wireless node 810. The first wirelessnode 805 may transmit a request 1105 to access an uplink carrier to thesecond wireless node 810. In response to determining that the uplinkcarrier is available (e.g., for the first wireless node 805 to access),the second wireless node 810 may transmit a confirmation message 1110(e.g., to the first wireless node 805), corresponding to the request1105, indicating that the uplink carrier is available (e.g., for thefirst wireless node 805 to access).

Upon the first wireless node 805 receiving the confirmation message 1110(e.g., from the second wireless node 810), the first wireless node 805may access 1115 the uplink carrier. Upon accessing 1115 the uplinkcarrier, the first wireless node 805 may transmit a completion message1120 (e.g., to the second wireless node 810). Upon the first wirelessnode 805 transmitting the completion message 1120, the first wirelessnode 805 may use the uplink carrier for transmission of (e.g., further)data (e.g., to the second wireless node 810).

In some examples, when the first wireless node 805 is using the uplinkcarrier for transmission of data, the second wireless node 810 maytransmit information corresponding to a plurality of uplink carriers(e.g., to the first wireless node 805). The information may comprisefirst information 1125 corresponding to a first uplink carrier, secondinformation 1130 corresponding to a second uplink carrier and/or thirdinformation 1135 corresponding to a third uplink carrier, wherein thefirst uplink carrier, the second uplink carrier and/or the third uplinkcarrier are comprised within the plurality of uplink carriers. A seconduplink carrier from the plurality of uplink carriers may be selected tobe used for data transmission. Thus, the first wireless node 805 mayselect the second uplink carrier, from the plurality of uplink carriers,based upon the information received.

The first wireless node 805 may (e.g., then) request to access thesecond uplink carrier. Thus, the first wireless node 805 may transmit arequest 1140 to access the second uplink carrier to the second wirelessnode 810, wherein the request 1140 comprises an indication of the seconduplink carrier.

FIG. 12 illustrates an example of a system 1200 for facilitatingtransmission of a request to access an uplink carrier from the firstwireless node 805 to the second wireless node 810. The first wirelessnode 805 may transmit a request 1205 to access an uplink carrier to thesecond wireless node 810. In response to determining that the uplinkcarrier is available (e.g., for the first wireless node 805 to access),the second wireless node 810 may transmit a confirmation message 1210(e.g., to the first wireless node 805).

Upon the first wireless node 805 receiving the confirmation message 1210(e.g., from the second wireless node 810), the first wireless node 805may access 1215 the uplink carrier. Upon accessing 1215 the uplinkcarrier, the first wireless node 805 may transmit a completion message1220 (e.g., to the second wireless node 810). Upon the first wirelessnode 805 transmitting the completion message 1220, the first wirelessnode 805 may use the uplink carrier for transmission of (e.g., further)data (e.g., to the second wireless node 810).

In some examples, when the first wireless node 805 is using the uplinkcarrier for transmission of data, a load change 1225 occurs (e.g., inassociation with the uplink carrier). The load change 1225 may cause achange in a priority of the uplink carrier. When a change of thepriority occurs and/or is determined (e.g., detected) (e.g., by thefirst wireless node 805 and/or the second wireless node 810), the secondwireless node 810 may transmit information corresponding to a pluralityof uplink carriers (e.g., to the first wireless node 805).

The information may comprise first information 1230 corresponding to afirst uplink carrier, second information 1235 corresponding to a seconduplink carrier and/or third information 1240 corresponding to a thirduplink carrier, wherein the first uplink carrier, the second uplinkcarrier and/or the third uplink carrier are comprised within theplurality of uplink carriers. A fourth uplink carrier from the pluralityof uplink carriers may be selected to be used for data transmission.

The first wireless node 805 may (e.g., then) request to access thefourth uplink carrier. Thus, the first wireless node 805 may transmit arequest 1245 to access the fourth uplink carrier to the second wirelessnode 810.

FIG. 13 illustrates an example of a system 1300 for facilitatingtransmission of a request to access an uplink carrier from the firstwireless node 805 to the second wireless node 810. The first wirelessnode 805 may transmit a request 1305 to access an uplink carrier to thesecond wireless node 810. In response to determining that the uplinkcarrier is available (e.g., for the first wireless node 805 to access),the second wireless node 810 may transmit a confirmation message 1310(e.g., to the first wireless node 805).

Upon the first wireless node 805 receiving the confirmation message 1310(e.g., from the second wireless node 810), the first wireless node 805may access 1315 the uplink carrier. Upon accessing 1315 the uplinkcarrier, the first wireless node 805 may transmit a completion message1320 (e.g., to the second wireless node 810).

In some examples, when the first wireless node 805 is using the uplinkcarrier for transmission of data, the second wireless node 810 maytransmit information corresponding to a plurality of uplink carriers(e.g., to the first wireless node 805). The information may comprisefirst information 1330, second information 1335 and/or third information1340 corresponding to the plurality of uplink carriers. A second uplinkcarrier from the plurality of uplink carriers may be selected to be usedfor data transmission. Thus, the first wireless node 805 may select thesecond uplink carrier, from the plurality of uplink carriers, based uponthe information received.

The first wireless node 805 may (e.g., then) transmit a second request1345 to access the second uplink carrier to the second wireless node810. In response to determining that the second uplink carrier isavailable (e.g., for the first wireless node 805 to access), the secondwireless node 810 may transmit a confirmation message 1350 (e.g., to thefirst wireless node 805). Upon the first wireless node 805 receiving theconfirmation message 1350 (e.g., from the second wireless node 810), thefirst wireless node 805 may access 1355 the uplink carrier. Uponaccessing 1355 the uplink carrier, the first wireless node 805 maytransmit a completion message 1360 (e.g., to the second wireless node810).

FIG. 14 illustrates an example of a system 1400 for facilitatingtransmission of a request to access an uplink carrier from the firstwireless node 805 to the second wireless node 810. In some examples, thesecond wireless node 810 may transmit information corresponding to aplurality of uplink carriers (e.g., to the first wireless node 805). Theinformation may comprise first information 1405, second information 1410and/or third information 1415 corresponding to the plurality of uplinkcarriers. An uplink carrier from the plurality of uplink carriers may beselected to be used for data transmission. Thus, the first wireless node805 may select the uplink carrier, from the plurality of uplinkcarriers, based upon the information received.

The first wireless node 805 may (e.g., then) access 1420 the uplinkcarrier. In some examples, the accessing 1420 comprises initiatingrandom access to the uplink carrier. The first wireless node 805 maythen transmit a request 1425 to the second wireless node 810. Inresponse to determining that the uplink carrier is available (e.g., forthe first wireless node 805 to access), the second wireless node 810 maytransmit a confirmation message 1430 (e.g., to the first wireless node805). Upon the first wireless node 805 receiving the confirmationmessage 1430, the first wireless node 805 may transmit a completionmessage 1435 (e.g., to the second wireless node 810).

FIG. 15 illustrates an example of a system 1500 for facilitatingtransmission of a request to access an uplink carrier from the firstwireless node 805 to the second wireless node 810. In some examples, thesecond wireless node 810 may transmit information corresponding to aplurality of uplink carriers (e.g., to the first wireless node 805). Theinformation may comprise first information 1505, second information 1510and/or third information 1515 corresponding to the plurality of uplinkcarriers. An uplink carrier from the plurality of uplink carriers may beselected to be used for data transmission. Thus, the first wireless node805 may select the uplink carrier, from the plurality of uplinkcarriers, based upon the information received.

The first wireless node 805 may (e.g., then) access 1520 the uplinkcarrier. In some examples, the accessing 1520 comprises initiatingrandom access to the uplink carrier. The first wireless node 805 maythen transmit a request 1525 to the second wireless node 810. Inresponse to determining that the uplink carrier is not available (e.g.,for the first wireless node 805 to access), the second wireless node 810may transmit a rejection message 1530 (e.g., to the first wireless node805). In response to receiving the rejection message 1530, the firstwireless node 805 may (e.g., cease accessing the uplink carrier and/or)use an initial uplink carrier which the first wireless node 805 may havealready (e.g., previously) accessed, for transmission of data 1535(e.g., to the second wireless node).

FIG. 16 illustrates an example of a system 1600 for facilitatingtransmission of a request to access an uplink carrier from the firstwireless node 805 to the second wireless node 810. The first wirelessnode 805 may transmit a request 1605 to access an uplink carrier to thesecond wireless node 810. In response to determining that the uplinkcarrier is available (e.g., for the first wireless node 805 to access),the second wireless node 810 may transmit a confirmation message 1610(e.g., to the first wireless node 805).

Upon the first wireless node 805 receiving the confirmation message 1610(e.g., from the second wireless node 810), the first wireless node 805may access 1615 the uplink carrier. Upon accessing 1615 the uplinkcarrier, the first wireless node 805 may transmit a completion message1620 (e.g., to the second wireless node 810).

In some examples, the first wireless node 805 may have a transmissionproblem 1625. For example, the first wireless node 805 may be unable totransmit data, at a desired rate, using the uplink carrier. The secondwireless node 810 may (e.g., then) (e.g., directly) indicate a second(e.g., alternative) uplink carrier to the first wireless node bytransmitting uplink carrier indication information 1630 (e.g.,associated with the second uplink carrier) to the first wireless node.

The first wireless node 805 may (e.g., then) (e.g., directly) access1635 the second uplink carrier. In some examples, the accessing 1635comprises initiating random access to the second uplink carrier.Alternatively and/or additionally, the accessing 1635 comprisesinitiating non-competitive random access to the second uplink carrier.The first wireless node 805 may (e.g., then) transmit a secondcompletion message 1640.

FIG. 17 illustrates an example of a system 1700 for facilitatingtransmission of a request to access an uplink carrier from the firstwireless node 805 to the second wireless node 810. In some examples, thefirst wireless node 805 may (e.g., be determined to) have a transmissionproblem 1705. For example, the first wireless node 805 may be unable totransmit data, at a desired rate, using an uplink carrier. In someexamples, the transmission problem 1705 occurs when the first wirelessnode 805 transmits a random access preamble to the uplink carrier athreshold (e.g., maximum) number of times. Alternatively and/oradditionally, the transmission problem 1705 occurs when the firstwireless node 805 transmits a data packet to the uplink carrier athreshold (e.g., maximum) number of times. Alternatively and/oradditionally, the transmission problem 1705 occurs when the uplinkcarrier is out of step (e.g., in association with a TA timer timeout).In response to determining the transmission problem 1705, the firstwireless node 805 may transmit a request 1710 to access a second uplinkcarrier to the second wireless node 810.

FIG. 18 illustrates an example of a system 1800 for facilitatingtransmission of a request to access an uplink carrier from the firstwireless node 805 to the second wireless node 810. The second wirelessnode 810 may transmit information corresponding to a plurality of uplinkcarriers (e.g., to the first wireless node 805). The information may betransmitted using a downlink carrier. The information may comprise firstinformation 1805, second information 1810 and/or third information 1815corresponding to the plurality of uplink carriers. An uplink carrierfrom the plurality of uplink carriers may be selected to be used fordata transmission. Thus, the first wireless node 805 may select theuplink carrier, from the plurality of uplink carriers, based upon theinformation received.

The first wireless node 805 may (e.g., then) transmit a request 1820 toaccess the uplink carrier to the second wireless node 810. The request1820 may be transmitted using an initial uplink carrier that was (e.g.,previously) accessed. In response to determining that the uplink carrieris available (e.g., for the first wireless node 805 to access), thesecond wireless node 810 may transmit a confirmation message 1825 (e.g.,to the first wireless node 805). The confirmation message 1825 may betransmitted using the downlink carrier. Upon the first wireless node 805receiving the confirmation message 1825 (e.g., from the second wirelessnode 810), the first wireless node 805 may access 1830 the uplinkcarrier. The accessing 1830 may be associated with the downlink carrier,the initial uplink carrier and/or the uplink carrier. Upon accessing1830 the uplink carrier, the first wireless node 805 may transmit acompletion message 1835 (e.g., to the second wireless node 810). Thecompletion message 1835 may be transmitted using the uplink carrier.

FIG. 19 illustrates an example of a system 1900 for facilitatingtransmission of a request to access an uplink carrier from the firstwireless node 805 to the second wireless node 810. The second wirelessnode 810 may transmit information corresponding to a plurality of uplinkcarriers (e.g., to the first wireless node 805). The information may betransmitted using a downlink carrier. The information may comprise firstinformation 1905, second information 1910 and/or third information 1915corresponding to the plurality of uplink carriers. An uplink carrierfrom the plurality of uplink carriers may be selected to be used fordata transmission. Thus, the first wireless node 805 may select theuplink carrier, from the plurality of uplink carriers, based upon theinformation received.

The first wireless node 805 may (e.g., then) access 1920 the uplinkcarrier. In some examples, the accessing 1920 comprises initiatingrandom access to the uplink carrier. The accessing 1920 may beassociated with the downlink carrier and/or the uplink carrier. Thefirst wireless node 805 may then transmit a request 1925 to the secondwireless node 810. The request 1925 may be transmitted using the uplinkcarrier. In response to determining that the uplink carrier is available(e.g., for the first wireless node 805 to access), the second wirelessnode 810 may transmit a confirmation message 1930 (e.g., to the firstwireless node 805). The confirmation message 1930 may be transmittedusing the downlink carrier. Upon the first wireless node 805 receivingthe confirmation message 1930, the first wireless node 805 may transmita completion message 1935 (e.g., to the second wireless node 810). Thecompletion message 1935 may be transmitted using the uplink carrier.

FIG. 20 illustrates an example of a system 2000 for facilitatingtransmission of a request to access an uplink carrier from the firstwireless node 805 to the second wireless node 810. The first wirelessnode 805 may (e.g., be determined to) have a transmission problem 2005associated with an initial uplink carrier that was (e.g., previously)accessed. For example, the first wireless node 805 may be unable totransmit data, at a desired rate, using the initial uplink carrier. Thesecond wireless node 810 may (e.g., then) (e.g., directly) indicate an(e.g., alternative) uplink carrier to the first wireless node 805 bytransmitting uplink carrier indication information 2010 (e.g.,associated with the second uplink carrier) to the first wireless node805. The uplink carrier indication information 2010 may be transmittedusing a downlink carrier.

The first wireless node 805 may (e.g., then) (e.g., directly) access2015 the second uplink carrier. The accessing 2015 may be associatedwith the downlink carrier, the initial uplink carrier and/or the uplinkcarrier. In some examples, the accessing 2015 comprises initiatingrandom access to the uplink carrier. Alternatively and/or additionally,the accessing 2015 comprises initiating non-competitive random access tothe uplink carrier. The first wireless node 805 may (e.g., then)transmit a completion message 2020 to the second wireless node 810. Thecompletion message 2020 may be transmitted using the uplink carrier.

FIG. 21 presents a schematic architecture diagram 2100 of a base station2150 (e.g., a node) that may utilize at least a portion of thetechniques provided herein. Such a base station 2150 may vary widely inconfiguration and/or capabilities, alone or in conjunction with otherbase stations, nodes, end units and/or servers, etc. in order to providea service, such as at least some of one or more of the other disclosedtechniques, scenarios, etc. For example, the base station 2150 mayconnect one or more user equipment (UE) to a (e.g., wireless) network(e.g., which may be connected and/or include one or more other basestations), such as Code Division Multiple Access (CDMA) networks, TimeDivision Multiple Access (TDMA) networks, Frequency Division MultipleAccess (FDMA) networks, Orthogonal FDMA (OFDMA) networks, Single-CarrierFDMA (SC-FDMA) networks, etc. The network may implement a radiotechnology, such as Universal Terrestrial Radio Access (UTRA),CDMA13000, Global System for Mobile Communications (GSM), Evolved UTRA(E-UTRA), IEEE 802.11, IEEE 802.16, IEEE 802.20, Flash-OFDM, etc. Thebase station 2150 and/or the network may communicate using a standard,such as Long-Term Evolution (LTE).

The base station 2150 may comprise one or more (e.g., hardware)processors 2110 that process instructions. The one or more processors2110 may optionally include a plurality of cores; one or morecoprocessors, such as a mathematics coprocessor or an integratedgraphical processing unit (GPU); and/or one or more layers of localcache memory. The base station 2150 may comprise memory 2102 storingvarious forms of applications, such as an operating system 2104; one ormore base station applications 2106; and/or various forms of data, suchas a database 2108 and/or a file system, etc. The base station 2150 maycomprise a variety of peripheral components, such as a wired and/orwireless network adapter 2114 connectible to a local area network and/orwide area network; one or more storage components 2116, such as a harddisk drive, a solid-state storage device (SSD), a flash memory device,and/or a magnetic and/or optical disk reader; and/or other peripheralcomponents.

The base station 2150 may comprise a mainboard featuring one or morecommunication buses 2112 that interconnect the processor 2110, thememory 2102, and/or various peripherals, using a variety of bustechnologies, such as a variant of a serial or parallel AT Attachment(ATA) bus protocol; a Uniform Serial Bus (USB) protocol; and/or SmallComputer System Interface (SCI) bus protocol. In a multibus scenario, acommunication bus 2112 may interconnect the base station 2150 with atleast one other server. Other components that may optionally be includedwith the base station 2150 (though not shown in the schematic diagram2100 of FIG. 21 ) include a display; a display adapter, such as agraphical processing unit (GPU); input peripherals, such as a keyboardand/or mouse; and/or a flash memory device that may store a basicinput/output system (BIOS) routine that facilitates booting the basestation 2150 to a state of readiness, etc.

The base station 2150 may operate in various physical enclosures, suchas a desktop or tower, and/or may be integrated with a display as an“all-in-one” device. The base station 2150 may be mounted horizontallyand/or in a cabinet or rack, and/or may simply comprise aninterconnected set of components. The base station 2150 may comprise adedicated and/or shared power supply 2118 that supplies and/or regulatespower for the other components. The base station 2150 may provide powerto and/or receive power from another base station and/or server and/orother devices. The base station 2150 may comprise a shared and/ordedicated climate control unit 2120 that regulates climate properties,such as temperature, humidity, and/or airflow. Many such base stations2150 may be configured and/or adapted to utilize at least a portion ofthe techniques presented herein.

FIG. 22 presents a schematic architecture diagram 2200 of a userequipment (UE) 2250 (e.g., a node) whereupon at least a portion of thetechniques presented herein may be implemented. Such a UE 2250 may varywidely in configuration and/or capabilities, in order to provide avariety of functionality to a user. The UE 2250 may be provided in avariety of form factors, such as a mobile phone (e.g., a smartphone); adesktop or tower workstation; an “all-in-one” device integrated with adisplay 2208; a laptop, tablet, convertible tablet, or palmtop device; awearable device, such as mountable in a headset, eyeglass, earpiece,and/or wristwatch, and/or integrated with an article of clothing; and/ora component of a piece of furniture, such as a tabletop, and/or ofanother device, such as a vehicle or residence. The UE 2250 may servethe user in a variety of roles, such as a telephone, a workstation,kiosk, media player, gaming device, and/or appliance.

The UE 2250 may comprise one or more (e.g., hardware) processors 2210that process instructions. The one or more processors 2210 mayoptionally include a plurality of cores; one or more coprocessors, suchas a mathematics coprocessor or an integrated graphical processing unit(GPU); and/or one or more layers of local cache memory. The UE 2250 maycomprise memory 2201 storing various forms of applications, such as anoperating system 2203; one or more user applications 2202, such asdocument applications, media applications, file and/or data accessapplications, communication applications, such as web browsers and/oremail clients, utilities, and/or games; and/or drivers for variousperipherals. The UE 2250 may comprise a variety of peripheralcomponents, such as a wired and/or wireless network adapter 2206connectible to a local area network and/or wide area network; one ormore output components, such as a display 2208 coupled with a displayadapter (optionally including a graphical processing unit (GPU)), asound adapter coupled with a speaker, and/or a printer; input devicesfor receiving input from the user, such as a keyboard 2211, a mouse, amicrophone, a camera, and/or a touch-sensitive component of the display2208; and/or environmental sensors, such as a GPS receiver 2219 thatdetects the location, velocity, and/or acceleration of the UE 2250, acompass, accelerometer, and/or gyroscope that detects a physicalorientation of the UE 2250. Other components that may optionally beincluded with the UE 2250 (though not shown in the schematicarchitecture diagram 2200 of FIG. 22 ) include one or more storagecomponents, such as a hard disk drive, a solid-state storage device(SSD), a flash memory device, and/or a magnetic and/or optical diskreader; a flash memory device that may store a basic input/output system(BIOS) routine that facilitates booting the UE 2250 to a state ofreadiness; and/or a climate control unit that regulates climateproperties, such as temperature, humidity, and airflow, etc.

The UE 2250 may comprise a mainboard featuring one or more communicationbuses 2212 that interconnect the processor 2210, the memory 2201, and/orvarious peripherals, using a variety of bus technologies, such as avariant of a serial or parallel AT Attachment (ATA) bus protocol; theUniform Serial Bus (USB) protocol; and/or the Small Computer SystemInterface (SCI) bus protocol. The UE 2250 may comprise a dedicatedand/or shared power supply 2218 that supplies and/or regulates power forother components, and/or a battery 2204 that stores power for use whilethe UE 2250 is not connected to a power source via the power supply2218. The UE 2250 may provide power to and/or receive power from otherclient devices.

FIG. 23 is an illustration of a scenario 2300 involving an examplenon-transitory computer readable medium 2302. The non-transitorycomputer readable medium 2302 may comprise processor-executableinstructions 2312 that when executed by a processor 2316 causeperformance (e.g., by the processor 2316) of at least some of theprovisions herein. The non-transitory computer readable medium 2302 maycomprise a memory semiconductor (e.g., a semiconductor utilizing staticrandom access memory (SRAM), dynamic random access memory (DRAM), and/orsynchronous dynamic random access memory (SDRAM) technologies), aplatter of a hard disk drives, a flash memory device, or a magnetic oroptical disc (such as a compact disc (CD), digital versatile disc (DVD),and/or floppy disk). The example non-transitory computer readable medium2302 stores computer-readable data 2304 that, when subjected to reading2306 by a reader 2310 of a device 2308 (e.g., a read head of a hard diskdrive, or a read operation invoked on a solid-state storage device),express the processor-executable instructions 2312. In some embodiments,the processor-executable instructions 2312, when executed, causeperformance of operations, such as at least some of the example method100 of FIG. 1 , the example method 200 of FIG. 2 , the example method300 of FIG. 3 , the example method 400 of FIG. 4 , the example method500 of FIG. 5 , the example method 600 of FIG. 6A, the example method650 of FIG. 6B and/or the example method 700 of FIG. 7 , for example. Insome embodiments, the processor-executable instructions 2312 areconfigured to cause implementation of a system and/or scenario, such asat least some of the example system 800 of FIG. 8 , the example system900 of FIG. 9 , the example system 1000 of FIG. 10 , the example system1100 of FIG. 11 , the example system 1200 of FIG. 12 , the examplesystem 1300 of FIG. 13 , the example system 1400 of FIG. 14 , theexample system 1500 of FIG. 15 , the example system 1600 of FIG. 16 ,the example system 1700 of FIG. 17 , the example system 1800 of FIG. 18, the example system 1900 of FIG. 19 and/or the example system 2000 ofFIG. 20 , for example.

As used in this application, “component,” “module,” “system”,“interface”, and/or the like are generally intended to refer to acomputer-related entity, either hardware, a combination of hardware andsoftware, software, or software in execution. For example, a componentmay be, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution, a program,and/or a computer. By way of illustration, both an application runningon a controller and the controller can be a component. One or morecomponents may reside within a process and/or thread of execution and acomponent may be localized on one computer and/or distributed betweentwo or more computers (e.g., nodes(s)).

Unless specified otherwise, “first,” “second,” and/or the like are notintended to imply a temporal aspect, a spatial aspect, an ordering, etc.Rather, such terms are merely used as identifiers, names, etc. forfeatures, elements, items, etc. For example, a first object and a secondobject generally correspond to object A and object B or two different ortwo identical objects or the same object.

Moreover, “example” is used herein to mean serving as an instance,illustration, etc., and not necessarily as advantageous. As used herein,“or” is intended to mean an inclusive “or” rather than an exclusive“or”. In addition, “a” and “an” as used in this application aregenerally be construed to mean “one or more” unless specified otherwiseor clear from context to be directed to a singular form. Also, at leastone of A and B and/or the like generally means A or B or both A and B.Furthermore, to the extent that “includes”, “having”, “has”, “with”,and/or variants thereof are used in either the detailed description orthe claims, such terms are intended to be inclusive in a manner similarto the term “comprising”.

Although the subject matter has been described in language specific tostructural features and/or methodological acts, it is to be understoodthat the subject matter defined in the appended claims is notnecessarily limited to the specific features or acts described above.Rather, the specific features and acts described above are disclosed asexample forms of implementing at least some of the claims.

Furthermore, the claimed subject matter may be implemented as a method,apparatus, or article of manufacture using standard programming and/orengineering techniques to produce software, firmware, hardware, or anycombination thereof to control a computer (e.g., node) to implement thedisclosed subject matter. The term “article of manufacture” as usedherein is intended to encompass a computer program accessible from anycomputer-readable device, carrier, or media. Of course, manymodifications may be made to this configuration without departing fromthe scope or spirit of the claimed subject matter.

Various operations of embodiments and/or examples are provided herein.The order in which some or all of the operations are described hereinshould not be construed as to imply that these operations arenecessarily order dependent. Alternative ordering will be appreciated byone skilled in the art having the benefit of this description. Further,it will be understood that not all operations are necessarily present ineach embodiment and/or example provided herein. Also, it will beunderstood that not all operations are necessary in some embodimentsand/or examples.

Also, although the disclosure has been shown and described with respectto one or more implementations, equivalent alterations and modificationswill occur to others skilled in the art based upon a reading andunderstanding of this specification and the annexed drawings. Thedisclosure includes all such modifications and alterations and islimited only by the scope of the following claims. In particular regardto the various functions performed by the above described components(e.g., elements, resources, etc.), the terms used to describe suchcomponents are intended to correspond, unless otherwise indicated, toany component which performs the specified function of the describedcomponent (e.g., that is functionally equivalent), even though notstructurally equivalent to the disclosed structure. In addition, while aparticular feature of the disclosure may have been disclosed withrespect to only one of several implementations, such feature may becombined with one or more other features of the other implementations asmay be desired and advantageous for any given or particular application.

What is claimed is:
 1. A method comprising: receiving informationcorresponding to a plurality of uplink carriers, wherein the informationcomprises an indication of a frequency of an uplink carrier, a randomaccess channel (RACH) common configuration, and a time alignment (TA)timer common configuration; selecting one uplink carrier from theplurality of uplink carriers based upon the information, wherein theselection is based on comparing a Reference Signal Received Power (RSRP)of a downlink carrier to a threshold, wherein the one uplink carrier hasa first frequency in response to the RSRP being below the threshold,wherein the one uplink carrier has a second frequency in response to theRSRP being above the threshold, wherein the first frequency is lowerthan the second frequency, wherein the one uplink carrier is selected inresponse to determining a transmission problem with the uplink carrierof the plurality of uplink carriers, and wherein the determining thetransmission problem includes determining that a random access preambleis transmitted using the uplink carrier up to a threshold number oftimes; and performing random access using the one uplink carrier.
 2. Themethod of claim 1, wherein the determining the transmission problemincludes determining that a data packet is transmitted using the uplinkcarrier up to a threshold number of times.
 3. The method of claim 1,wherein a priority of the uplink carrier is lowered in response to thedetermining that the random access preamble is transmitted using theuplink carrier up to the threshold number of times.
 4. The method ofclaim 1, further comprising: transmitting a request using the one uplinkcarrier after the random access is performed; receiving a confirmationmessage that indicates that the one uplink carrier is available; andtransmitting, using the one uplink carrier, a completion message inresponse to the receiving the confirmation message.
 5. The method ofclaim 1, further comprising: receiving a rejection message thatindicates that the one uplink carrier is not available for access;transmitting data using a previously accessed uplink carrier in responseto the receiving the rejection message.
 6. An apparatus comprising aprocessor configured to: receive information corresponding to aplurality of uplink carriers, wherein the information comprises anindication of a frequency of an uplink carrier, a random access channel(RACH) common configuration, and a time alignment (TA) timer commonconfiguration; select one uplink carrier from the plurality of uplinkcarriers based upon the information, wherein the selection is based oncomparing a Reference Signal Received Power (RSRP) of a downlink carrierto a threshold, wherein the one uplink carrier has a first frequency inresponse to the RSRP being below the threshold, wherein the one uplinkcarrier has a second frequency in response to the RSRP being above thethreshold, wherein the first frequency is lower than the secondfrequency, wherein the one uplink carrier is selected in response to theprocessor being configured to determine a transmission problem with theuplink carrier of the plurality of uplink carriers, and wherein thedetermined transmission problem includes the processor being configuredto determine that a random access preamble is transmitted using theuplink carrier up to a threshold number of times; and perform randomaccess using the one uplink carrier.
 7. The apparatus of claim 6,wherein the determined the transmission problem includes the processorbeing configured to determine that a data packet is transmitted usingthe uplink carrier up to a threshold number of times.
 8. The apparatusof claim 6, wherein the processor is configured to lower a priority ofthe uplink carrier in response to the determine that the random accesspreamble is transmitted using the uplink carrier up to the thresholdnumber of times.
 9. The apparatus of claim 6, wherein the processor isfurther configured to: transmit a request using the one uplink carrierafter the random access is performed; receive a confirmation messagethat indicates that the one uplink carrier is available; and transmit,using the one uplink carrier, a completion message in response to thereceive the confirmation message.
 10. The apparatus of claim 6, whereinthe processor is further configured to: receive a rejection message thatindicates that the one uplink carrier is not available for access;transmit data using a previously accessed uplink carrier in response tothe receive the rejection message.
 11. A non-transitory computerreadable medium comprising processor executable instructions that whenexecuted by a processor configures the processor to perform a methodcomprising: receiving information corresponding to a plurality of uplinkcarriers, wherein the information comprises an indication of a frequencyof an uplink carrier, a random access channel (RACH) commonconfiguration, and a time alignment (TA) timer common configuration;selecting one uplink carrier from the plurality of uplink carriers basedupon the information, wherein the selection is based on comparing aReference Signal Received Power (RSRP) of a downlink carrier to athreshold, wherein the one uplink carrier has a first frequency inresponse to the RSRP being below the threshold, wherein the one uplinkcarrier has a second frequency in response to the RSRP being above thethreshold, wherein the first frequency is lower than the secondfrequency, wherein the one uplink carrier is selected in response todetermining a transmission problem with the uplink carrier of theplurality of uplink carriers, and wherein the determining thetransmission problem includes determining that a random access preambleis transmitted using the uplink carrier up to a threshold number oftimes; and performing random access using the one uplink carrier. 12.The non-transitory computer readable medium of claim 11, wherein thedetermining the transmission problem includes determining that a datapacket is transmitted using the uplink carrier up to a threshold numberof times.
 13. The non-transitory computer readable medium of claim 11,wherein a priority of the uplink carrier is lowered in response to thedetermining that the random access preamble is transmitted using theuplink carrier up to the threshold number of times.
 14. Thenon-transitory computer readable medium of claim 11, wherein the methodfurther comprises: transmitting a request using the one uplink carrierafter the random access is performed; receiving a confirmation messagethat indicates that the one uplink carrier is available; andtransmitting, using the one uplink carrier, a completion message inresponse to the receiving the confirmation message.
 15. Thenon-transitory computer readable medium of claim 11, wherein the methodfurther comprises: receiving a rejection message that indicates that theone uplink carrier is not available for access; transmitting data usinga previously accessed uplink carrier in response to the receiving therejection message.
 16. A system comprising: a base station configuredto: transmit information corresponding to a plurality of uplinkcarriers, wherein the information comprises an indication of a frequencyof an uplink carrier, a random access channel (RACH) commonconfiguration, and a time alignment (TA) timer common configuration; awireless device configured to: receive the information corresponding tothe plurality of uplink carriers; select one uplink carrier from theplurality of uplink carriers based upon the information, wherein theselection is based on comparing a Reference Signal Received Power (RSRP)of a downlink carrier to a threshold, wherein the one uplink carrier hasa first frequency in response to the RSRP being below the threshold,wherein the one uplink carrier has a second frequency in response to theRSRP being above the threshold, wherein the first frequency is lowerthan the second frequency, wherein the one uplink carrier is selected inresponse to the wireless device being configured to determine atransmission problem with the uplink carrier of the plurality of uplinkcarriers, and wherein the determined the transmission problem includesthe wireless device being configured to determine that a random accesspreamble is transmitted using the uplink carrier up to a thresholdnumber of times; and perform random access using the one uplink carrier.17. The system of claim 16, wherein the determining the transmissionproblem includes the wireless device being configured to determine thata data packet is transmitted using the uplink carrier up to a thresholdnumber of times.
 18. The system of claim 16, wherein the wireless deviceis configured to lower a priority of the uplink carrier in response tothe determine that the random access preamble is transmitted using theuplink carrier up to the threshold number of times.
 19. The system ofclaim 16, wherein the wireless device is further configured to: transmita request using the one uplink carrier after the random access isperformed; receive a confirmation message that indicates that the oneuplink carrier is available; and transmit, using the one uplink carrier,a completion message in response to the receive the confirmationmessage.
 20. The system of claim 16, wherein the wireless device isfurther configured to: receive a rejection message that indicates thatthe one uplink carrier is not available for access; transmit data usinga previously accessed uplink carrier in response to the receive therejection message.