Method and apparatus for random access in an orthogonal multiple-access communication system

ABSTRACT

Techniques for accessing a wireless communication system are described. A user equipment (UE) sends a random access preamble for system access. The random access preamble may include a random identifier (ID), a channel quality indicator (CQI), etc. The UE may randomly select the random ID or may be assigned this random ID. The UE receives a random access response from a base station. The random access response may include control channel resources (e.g., CQI and PC resources), uplink resources, and/or control information (e.g., timing advance and PC correction) for the UE. The random access response may be sent in two parts using two messages. A first message may be sent on a control channel and may include identification information and possibly other information. A second message may be sent on a shared data channel and may include remaining information for the random access response.

This Application is a continuation of U.S. application Ser. No.13/622,990, entitled “METHOD AND APPARATUS FOR RANDOM ACCESS IN ANORTHOGONAL MULTIPLE-ACCESS COMMUNICATION SYSTEM,” filed Sep. 19, 2012,which is a continuation of U.S. application Ser. No. 11/841,609,entitled “METHOD AND APPARATUS FOR RANDOM ACCESS IN AN ORTHOGONALMULTIPLE-ACCESS COMMUNICATION SYSTEM,” filed Aug. 20, 2007, now granted,U.S. Pat. No. 8,295,243, issued on Oct. 23, 2012, which claims priorityto provisional U.S. application Ser. No. 60/839,220, entitled “A METHODAND APPARATUS FOR ACCESS PROCEDURE FOR ORTHOGONAL MULTIPLE ACCESSSYSTEMS,” filed Aug. 21, 2006, U.S. Application Ser. No. 60/828,058,entitled “A METHOD AND APPARATUS FOR ACCESS PROCEDURE,” filed Oct. 3,2006, and U.S. Application Ser. No. 60/863,610, entitled “A METHOD ANDAPPARATUS FOR ACCESS PROCEDURE FOR ORTHOGONAL MULTIPLE ACCESS SYSTEMS,”filed Oct. 31, 2006, all of which are assigned to the assignee hereofand incorporated herein by reference.

BACKGROUND

I. Field

The present disclosure relates generally to communication, and morespecifically to techniques for accessing a wireless communicationsystem.

II. Background

Wireless communication systems are widely deployed to provide variouscommunication content such as voice, video, packet data, messaging,broadcast, etc. These wireless systems may be multiple-access systemscapable of supporting multiple users by sharing the available systemresources. Examples of such multiple-access systems include CodeDivision Multiple Access (CDMA) systems, Time Division Multiple Access(TDMA) systems, Frequency Division Multiple Access (FDMA) systems,Orthogonal FDMA (OFDMA) systems, and Single-Carrier FDMA (SC-FDMA)systems.

A wireless communication system may include any number of base stationsthat can support communication for any number of user equipments (UEs).Each UE may communicate with one or more base stations via transmissionson the downlink and uplink. The downlink (or forward link) refers to thecommunication link from the base stations to the UEs, and the uplink (orreverse link) refers to the communication link from the UEs to the basestations.

A UE may send an access probe on the uplink when the UE desires to gainaccess to the system. A base station may receive the access probe andrespond with an access grant that may contain pertinent information forthe UE. Uplink resources are consumed to send access probes, anddownlink resources are consumed to send access grants. There istherefore a need in the art for techniques to support system access withas little overhead as possible in order to improve system capacity.

SUMMARY

Techniques for efficiently accessing a wireless communication system aredescribed herein. In one design, a UE may send a random access preamble(or access probe) for system access. The random access preamble mayinclude a random identifier (ID), a downlink channel quality indicator(CQI), etc. The UE may randomly select the random ID or may be assignedthe random ID directly or indirectly (in an assigned random accesspreamble/access sequence), e.g., during handover. The random ID may beused as identification information for the random access preamble andmay allow a base station to asynchronously respond to the random accesspreamble.

The UE may receive a random access response (or access grant) from thebase station. The random access response may include control channelresources, uplink resources, control information, an assigned ID, etc.,for the UE. The control channel resources may include CQI resources usedto send CQI on the uplink by the UE, power control (PC) resources usedto send PC corrections on the downlink to the UE, etc. The controlinformation may include timing advance used to adjust transmit timing ofthe UE, PC correction used to adjust transmit power of the UE, etc. Therandom access response may be sent in two parts using two messages. Afirst message may be sent on a control channel (e.g., a PDCCH) for ashared data channel (e.g., a PDSCH). A second message may be sent on theshared data channel. The first message may include the identificationinformation for the random access preamble or a random access channelused to send the random access preamble, downlink resources for theshared data channel, and possibly other information. The second messagemay include remaining information for the random access response. The UEmay exchange control information using the assigned control channelresources and may send data using the assigned uplink resources.

Various aspects and features of the disclosure are described in furtherdetail below.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a wireless multiple-access communication system.

FIG. 2 shows a block diagram of a base station and a UE.

FIGS. 3 through 9 show message flows for various random accessprocedures.

FIGS. 10 through 25 show various processes and apparatuses for the UEand the base station for system access by the UE.

DETAILED DESCRIPTION

The techniques described herein may be used for various wirelesscommunication systems such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA and othersystems. The terms “system” and “network” are often usedinterchangeably. A CDMA system may implement a radio technology such asUniversal Terrestrial Radio Access (UTRA), cdma2000, etc. UTRA includesWideband-CDMA (W-CDMA) and Low Chip Rate (LCR). cdma2000 covers IS-2000,IS-95 and IS-856 standards. A TDMA system may implement a radiotechnology such as Global System for Mobile Communications (GSM). AnOFDMA system may implement a radio technology such as Evolved UTRA(E-UTRA), Ultra Mobile Broadband (UMB), IEEE 802.11 (Wi-Fi), IEEE 802.16(WiMAX), IEEE 802.20, Flash-OFDM®, etc. UTRA, E-UTRA and GSM are part ofUniversal Mobile Telecommunication System (UMTS). 3GPP Long TermEvolution (LTE) is an upcoming release of UMTS that uses E-UTRA, whichemploys OFDMA on the downlink and SC-FDMA on the uplink. UTRA, E-UTRA,GSM, UMTS and LTE are described in documents from an organization named“3rd Generation Partnership Project” (3GPP). cdma2000 and UMB aredescribed in documents from an organization named “3rd GenerationPartnership Project 2” (3GPP2). These various radio technologies andstandards are known in the art. For clarity, certain aspects of thetechniques are described below for system access in LTE, and LTEterminology is used in much of the description below.

FIG. 1 shows a wireless multiple-access communication system accordingto one design. For simplicity, FIG. 1 shows only two evolved Node B(eNB) 100 and 102. eNB 100 includes multiple antenna groups, one groupincluding antennas 104 and 106, another group including antennas 108 and110, and an additional group including antennas 112 and 114. In FIG. 1,only two antennas are shown for each antenna group. However, more orfewer antennas may also be utilized for each antenna group. In general,an eNB may be a fixed station used for communicating with the UEs andmay also be referred to as a Node B, a base station, an access point,etc.

A UE 116 is in communication with antennas 112 and 114, where antennas112 and 114 transmit information to UE 116 via downlink 120 and receiveinformation from UE 116 via uplink 118. A UE 122 is in communicationwith antennas 106 and 108, where antennas 106 and 108 transmitinformation to UE 122 via downlink 126 and receive information from UE122 via uplink 124. In general, a UE may be stationary or mobile and mayalso be referred to as a mobile station, a terminal, an access terminal,a subscriber unit, a station, etc. A UE may be a cellular phone, apersonal digital assistant (PDA), a wireless communication device, ahandheld device, a wireless modem, a laptop computer, etc. In afrequency division duplex (FDD) system, communication links 118, 120,124 and 126 may use different frequencies for communication. Forexample, downlink 120 and 126 may use one frequency, and uplink 118 and124 may use another frequency.

The overall coverage area of eNB 100 may be partitioned into multiple(e.g., three) smaller areas. These smaller areas may be served bydifferent groups of antennas of eNB 100. In 3GPP, the term “cell” canrefer to the smallest coverage area of an eNB and/or an eNB subsystemserving this coverage area. In other systems, the term “sector” canrefer to the smallest coverage area and/or the subsystem serving thiscoverage area. For clarity, 3GPP concept of cell is used in thedescription below. In one design, the three antenna groups of eNB 100support communication for UEs in three cells of eNB 100.

FIG. 2 shows a block diagram of a design of eNB 100 and UE 116. In thisdesign, eNB 100 is equipped with T antennas 224 a through 224 t, and UE116 is equipped with R antennas 252 a through 252 r, where in generalT≧1 and R≧1.

At eNB 100, a transmit (TX) data processor 214 may receive traffic datafor one or more UEs from a data source 212. TX data processor 214 mayprocess (e.g., format, encode, and interleave) the traffic data for eachUE based on one or more coding schemes selected for that UE to obtaincoded data. TX data processor 214 may then modulate (or symbol map) thecoded data for each UE based on one or more modulation schemes (e.g.,BPSK, QSPK, M-PSK or M-QAM) selected for that UE to obtain modulationsymbols.

A TX MIMO processor 220 may multiplex the modulation symbols for all UEswith pilot symbols using any multiplexing scheme. Pilot is typicallyknown data that is processed in a known manner and may be used by areceiver for channel estimation and other purposes. TX MIMO processor220 may process (e.g., precode) the multiplexed modulation symbols andpilot symbols and provide T output symbol streams to T transmitters(TMTR) 222 a through 222 t. In certain designs, TX MIMO processor 220may apply beamforming weights to the modulation symbols to spatiallysteer these symbols. Each transmitter 222 may process a respectiveoutput symbol stream, e.g., for orthogonal frequency divisionmultiplexing (OFDM), to obtain an output chip stream. Each transmitter222 may further process (e.g., convert to analog, amplify, filter, andupconvert) the output chip stream to obtain a downlink signal. Tdownlink signals from transmitters 222 a through 222 t may betransmitted via T antennas 224 a through 224 t, respectively.

At UE 116, antennas 252 a through 252 r may receive the downlink signalsfrom eNB 100 and provide received signals to receivers (RCVR) 254 athrough 254 r, respectively. Each receiver 254 may condition (e.g.,filter, amplify, downconvert, and digitize) a respective received signalto obtain samples and may further process the samples (e.g., for OFDM)to obtain received symbols. A MIMO detector 260 may receive and processthe received symbols from all R receivers 254 a through 254 r based on aMIMO receiver processing technique to obtain detected symbols, which areestimates of the modulation symbols transmitted by eNB 100. A receive(RX) data processor 262 may then process (e.g., demodulate,deinterleave, and decode) the detected symbols and provide decoded datafor UE 116 to a data sink 264. In general, the processing by MIMOdetector 260 and RX data processor 262 is complementary to theprocessing by TX MIMO processor 220 and TX data processor 214 at eNB100.

On the uplink, at UE 116, traffic data from a data source 276 andsignaling messages may be processed by a TX data processor 278, furtherprocessed by a modulator 280, conditioned by transmitters 254 a through254 r, and transmitted to eNB 100. At eNB 100, the uplink signals fromUE 116 may be received by antennas 224, conditioned by receivers 222,demodulated by a demodulator 240, and processed by an RX data processor242 to obtain the traffic data and messages transmitted by UE 116.

Controllers/processors 230 and 270 may direct the operation at eNB 100and UE 116, respectively. Memories 232 and 272 may store data andprogram codes for eNB 100 and UE 116, respectively. A scheduler 234 mayschedule UEs for downlink and/or uplink transmission and may provideassignments of resources for the scheduled UEs.

The system may support one set of transport channels for the downlinkand another set of transport channels for the uplink. These transportchannels may be used to provide information transfer services to MediumAccess Control (MAC) and higher layers. The transport channels may bedescribed by how and with what characteristics information is sent overa radio link. The transport channels may be mapped to physical channels,which may be defined by various attributes such as modulation andcoding, mapping of data to resource blocks, etc. Table 1 lists somephysical channels used for the downlink (DL) and uplink (UL) in LTE inaccordance with one design.

TABLE 1 Link Channel Channel Name Description DL PBCH Physical BroadcastCarry control information Channel broadcast over a cell. DL PDCCHPhysical Downlink Carry UE-specific control Control Channel informationfor the PDSCH. DL PDSCH Physical Downlink Carry data for UEs in a SharedChannel shared manner. UL PRACH Physical Random Carry random accesspreambles Access Channel from UEs attempting to access the system. ULPUCCH Physical Uplink Carry control information Control Channel from UEssuch as CQI, ACK/ NAK, resource requests, etc. UL PUSCH Physical UplinkCarry data sent by a UE on Shared Channel uplink resources assigned tothe UE.

Other physical channels may also be used for paging, multicast, etc. Thephysical channels may also be referred to by other names. For example,the PDCCH may also be referred to as a Shared Downlink Control Channel(SDCCH), Layer 1/Layer 2 (L1/L2) control, etc. The PDSCH may also bereferred to as a downlink PDSCH (DL-PDSCH). The PUSCH may also bereferred to as an uplink PDSCH (UL-PDSCH).

The transport channels may include a Downlink Shared Channel (DL-SCH)used to send data to UEs, an Uplink Shared Channel (UL-SCH) used to senddata by UEs, a Random Access Channel (RACH) used to access the system,etc. The DL-SCH may be mapped to the PDSCH and may also be referred toas a Downlink Shared Data Channel (DL-SDCH). The UL-SCH may be mapped tothe PUSCH and may also be referred to as an Uplink Shared Data Channel(UL-SDCH). The RACH may be mapped to the PRACH.

A UE may transmit a random access preamble on the uplink whenever the UEdesires to access the system, e.g., if the UE has data to send or if theUE is paged by the system. A random access preamble may also be referredto as an access signature, an access probe, a random access probe, asignature sequence, a RACH signature sequence, etc. The random accesspreamble may include various types of information and may be sent invarious manners, as described below. An eNB may receive the randomaccess preamble and may respond by sending a random access response tothe UE. A random access response may also be referred to as an accessgrant (AGCH), an access response, etc. The random access response maycarry various types of information and may be sent in various manners,as described below. The UE and Node B may further exchange signaling toset up a radio connection and may thereafter exchange data.

It may be beneficial to provide assigned resources and controlinformation in the random access response in order to expeditecommunication between the UE and eNB. However, a large number of bitsmay be used to convey the resource assignment and control information.In an aspect, the random access response may be partitioned intomultiple parts that may be efficiently sent on the PDCCH and PDSCH, asdescribed below. In another aspect, the eNB may asynchronously respondto the random access preamble and may identify this random accesspreamble using various mechanisms, as also described below.

FIG. 3 shows a message flow for a design of a random access procedure300. In this design, the UE may access the system by sending a randomaccess preamble, e.g., in response to data arriving at a UE transmitbuffer (step Al). The random access preamble may include L bits, where Lmay be any integer value. An access sequence may be selected from a poolof 2^(L) available access sequences and sent for the random accesspreamble. In one design, the random access preamble may include L=6bits, and one access sequence may be selected from a pool of 64 accesssequences. The access sequences may be of any length and may be designedto have good detection properties.

In one design, the random access preamble may include (i) a random IDthat may be pseudo-randomly selected by the UE and (ii) a downlink CQIindicative of the downlink channel quality as measured by the UE. Therandom ID may be used to identify the random access preamble from theUE. The downlink CQI may be used to send subsequent downlinktransmission to the UE and/or to assign uplink resources to the UE. Inone design, a 6-bit random access preamble may include a 4-bit random IDand a 2-bit CQI. In another design, a 6-bit random access preamble mayinclude a 5-bit random ID and a 1-bit CQI. The random access preamblemay also include different and/or additional information, and each typeof information may include any number of bits.

The UE may determine an Implicit Radio Network Temporary Identifier(I-RNTI) that may be used as a temporary ID for the UE during systemaccess. The UE may be identified by the I-RNTI until a more permanent IDsuch as a Cell RNTI (C-RNTI) is assigned to the UE. In one design, theI-RNTI may include the following:

-   -   System time (8 bits)—time when the access sequence is sent by        the UE, and    -   RA-preamble identifier (6 bits)—index of the access sequence        sent by the UE.

The RA-preamble identifier may be an L-bit value for the random accesspreamble being sent by the UE. The RA-preamble identifier may also bereferred to as a random access preamble identifier, an access signatureindex, etc.

The I-RNTI may have a fixed length (e.g., 16 bits) and may be paddedwith a sufficient number of zeros (e.g., 2 zeros) to achieve the fixedlength. The UE may send the access sequence in an access slot that ispresent in each frame. The system time may then be given in units offrames. An 8-bit system time may be unambiguous over 256 frames. If aframe has a duration of 10 milliseconds (ms), then the I-RNTI may bevalid for 2560 ms with the 8-bit system time. In another design, theI-RNTI is composed of 4-bit system time, 6-bit RA-preamble identifier,and padding bits (if needed). In this design, the I-RNTI may be validfor 160 ms. In yet another design, a frequency slot may be used foreither the RA-preamble identifier or the system time. In general, theI-RNTI may be formed with any information that may (i) allow the UE orrandom access preamble to be individually addressed and (ii) reduce thelikelihood of collision with another UE using the same I-RNTI. Thelifetime of the I-RNTI may be selected based on the maximum expectedresponse time for an asynchronous response to the random accesspreamble.

An eNB may receive the random access preamble from the UE and mayrespond by sending a random access response to the UE. The eNB maydetermine the I-RNTI of the UE in the same manner as the UE. Since theI-RNTI is valid for a particular time window or lifetime (e.g., 2560 mswith the 8-bit system time), the eNB may respond any time within thistime window. However, the eNB may typically respond in a much shorterinterval (e.g., in 40 to 80 ms) in order to save on complexity andimprove system access response time. The I-RNTI may thus allow the eNBto address the UE and to asynchronously respond to the random accesspreamble from the UE.

The eNB may send the random access response on the PDCCH and PDSCH tothe UE (steps A2 and A3). In one design, the PDCCH may carry a messagecontaining the following:

-   -   I-RNTI—identify the UE as the recipient of the access grant sent        by the eNB,    -   Timing advance—indicate adjustment to the transmit timing of the        UE,    -   UL resources—indicate resources granted to the UE for uplink        transmission, and    -   DL resources—indicate PDSCH resources used to send remaining        information in the random access response to the UE.

The timing advance may also be referred to as timing alignmentinformation, timing adjustment, timing connection, etc. The eNB maydetermine the timing of the random access preamble, as received at theeNB. The eNB may generate the timing advance such that subsequent uplinktransmissions from the UE are properly time-aligned at the eNB.

The UL and DL resources may be conveyed in various manners. In onedesign, the available resources for a given link may be partitioned intoresource blocks, and the granted resources may be conveyed by a resourceblock index. In another design, the grant resources may be conveyed bythe size and time-frequency location of the granted resources. Theaccess grant may also convey the modulation and coding to use for thegranted resources. Alternatively, the modulation and coding may befixed/predefined or may be advertised on a broadcast channel. Ingeneral, the PDCCH may convey any information used by the UE to transmiton the UL resources and any information used by the UE to receive thetransmission sent on the PDSCH to the UE.

The I-RNTI may be sent explicitly in a designated field. Alternatively,the I-RNTI may be sent implicitly and embedded with other information,which may reduce the amount of information to send on the PDCCH. Forexample, a cyclic redundancy check (CRC) may be generated based on allinformation being sent on the PDCCH (except for the I-RNTI). The CRC maybe exclusive ORed (XORed) with the I-RNTI, and the XORed CRC may be senton the PDCCH. The recipient UE would be able to recover the CRC byapplying the correct I-RNTI, while other UEs would generate erroneousCRCs by applying wrong I-RNTIs.

In one design, the PDSCH may carry a message containing the following:

-   -   C-RNTI—included by the eNB if one is being assigned to the UE,    -   CQI resources—indicate UL resources granted to the UE to send        CQI,    -   PC resources—indicate DL resources used to send PC corrections        to the UE, and    -   PC connection—indicate adjustment to the transmit power of the        UE.

The C-RNTI may be used to identify the UE for a communication session. AMAC ID or some other type of ID may also be used instead of the C-RNTIto identify the UE. The C-RNTI may be sent on the PDSCH as part of therandom access response, if it is available, or may be sent at any timewithin the lifetime of the I-RNTI. The I-RNTI may be used to identifythe UE until the C-RNTI is assigned. The CQI and PC resources may beconveyed in various manners. In one design, the CQI or PC resources maybe conveyed by a resource block index, the size and time-frequencylocation of the granted resources, the frequency of the grantedresources, etc. In one design, the PC correction may be either (i) an upcommand to increase the UE's transmit power by a predetermined up stepsize or (ii) a down command to decrease the UE's transmit power by apredetermined down step size. In another design, the PC correction mayindicate the amount of increase or decrease in transmit power.

The messages sent on the PDCCH and PDSCH may also carry different and/orother information. The eNB may transmit the PDCCH in a broadcast mannerso that it can be reliably received by all UEs within the coverage ofthe eNB, e.g., by using sufficiently low code rate and modulation orderand sufficiently high transmit power. The eNB may transmit the messagefor the UE on the PDSCH in a broadcast manner. Alternatively, the eNBmay transmit this message using a modulation and coding scheme (MCS)selected based on the CQI received from the UE in the random accesspreamble. This may result in more efficient use of the availableresources for the PDSCH.

The UE may receive and decode the messages sent on the PDCCH and PDSCHto the UE. After decoding these two messages, the UE has sufficientresources configured and can exchange Layer 3 signaling and/or data withthe eNB (step A4). The UE may send an acknowledgement (ACK) to the eNBusing on-off keying (OOK) to indicate successful reception of themessages. For OOK, an ACK may be sent as 1 (or “on”), and a negativeacknowledgement (NAK) may be sent as 0 (or “off”). If the eNBasynchronously responds to the random access preamble from the UE, thenthe use of OOK would result in the UE transmitting on the uplink onlyfor the ACK and not for the NAK. After achieving synchronization, the UEmay transmit ACKs/NAKs using other modulation techniques, e.g., 3-statemodulation.

Multiple UEs may randomly select the same random ID and may also sendrandom access preambles in the same frame. When such a collision occurs,a mechanism may be implemented in the signaling exchange in step A4 toresolve the access contention.

The UE may operate in one of several states such as LTE Detached, LTEIdle and LTE Active states, which may be associated with RRC_NULL,RRC_IDLE and RRC_CONNECTED states, respectively. Radio Resource Control(RRC) may perform various functions for establishment, maintenance andtermination of calls. In the LTE Detached state, the UE has not accessedthe system and is not known by the system. The UE may power up in theLTE Detached state and may operate in the RRC_NULL state. The UE maytransition to either the LTE Idle state or LTE Active state uponaccessing the system and performing registration. In the LTE Idle state,the UE may have performed registration but may not have any data toexchange on the downlink or uplink. The UE may thus be idle and operatein the RRC_IDLE state. In the LTE Idle state, the UE and system may havepertinent context information to allow the UE to quickly transition tothe LTE Active state. The UE may transition to the LTE Active state whenthere is data to send or receive. In the LTE Active state, the UE mayactively communicate with the system on the downlink and/or uplink andmay operate in the RRC_CONNECTED state.

FIG. 4 shows a message flow for a design of a random access procedure400. The UE may access the system by sending a random access preamblethat may include a random ID, a downlink CQI, and an access type (stepB1). The access type may indicate whether the UE is accessing the systemfrom the RRC_NULL, RRC_IDLE or RRC_CONNECTED state. The UE may gothrough an authentication procedure when accessing the system from theRRC_NULL or RRC_IDLE state and may thus need different resourceassignment than for system access from the RRC_CONNECTED state. The UEmay communicate with an eNB in the RRC_CONNECTED state and may accessanother eNB for handover. The random access preamble may also includedifferent and/or additional information. The UE may determine an I-RNTIas described above for FIG. 3.

An eNB may receive the random access preamble from the UE and mayrespond by sending a random access response on the PDCCH and PDSCH tothe UE (steps B2 and B3). The eNB may determine the I-RNTI of the UEbased on the random access preamble. In one design, the PDCCH may carrya message containing the I-RNTI and the DL resources for the PDSCH,which is used to send remaining information to the UE. In one design,the PDSCH may carry a message containing a C-RNTI (if available), timingadvance, UL resources, CQI resources, PC resources, PC correction, etc.The messages sent on the PDCCH and PDSCH may also carry different and/orother information.

The eNB may transmit the PDCCH and PDSCH as described above for FIG. 3.The UE may receive and decode the messages sent on the PDCCH and PDSCHto the UE. After decoding these two messages, the UE has sufficientresources configured and can exchange Layer 3 signaling and/or data withthe eNB (step B4).

FIG. 5 shows a message flow for a design of a random access procedure500. The UE may access the system by sending a random access preamblethat may include a random ID and a downlink CQI (step C1). The randomaccess preamble may also include different and/or additionalinformation.

An eNB may receive the random access preamble from the UE and mayrespond by sending a random access response on the PDCCH and PDSCH tothe UE (steps C2 and C3). In one design, the PDCCH may carry a messagecontaining an RA-preamble identifier for the received random accesspreamble, timing advance, UL resources, DL resources, and a validityfield. The validity field may support asynchronous access response andmay indicate the frame for which the random access response isapplicable. In one design, the validity field may include two bits andmay be set to 00 to indicate that the current response is for the randomaccess preamble sent in the current frame, to 01 to indicate that thecurrent response is for the random access preamble sent in the previousframe, etc. To save bits, the RA-preamble identifier may mask a CRCgenerated based on all information sent on the PDCCH. In one design, thePDSCH may carry a message containing a C-RNTI (if available), CQIresources, PC resources, PC correction, etc. The messages sent on thePDCCH and PDSCH may also carry different and/or other information.

The eNB may transmit the PDCCH and PDSCH as described above for FIG. 3.The UE may receive and decode the messages sent on the PDCCH and PDSCHto the UE. After decoding these two messages, the UE has sufficientresources configured and can exchange Layer 3 signaling and/or data withthe eNB (step C4).

In general, the random access preamble and the random access responsemay include any parameters, which may have any sizes. In one design, therandom access preamble and the random access response may include theparameters given below:

-   -   Random access preamble may include the following:        -   Random ID—4 bits        -   Downlink CQI—2 bits    -   Random access response may include the following:        -   C-RNTI—16 bits        -   Timing advance—8 bits        -   CQI resources & PC resources—16 bits        -   UL resources—7 bits for resource block ID and 5 bits for MCS        -   CRC—16 bits (possibly masked with the I-RNTI or RA-preamble            identifier)

In the design given above, a total of 68 bits may be sent for the randomaccess response. A 68-bit message may be too large to efficiently sendon the PDCCH Improved efficiency may be achieved by splitting theinformation in the random access response into two parts and sendingthem on the PDCCH and PDSCH. In one design, the messages for the twoparts may be as follows:

-   -   Message for part I sent on the PDCCH may include the following:        -   Timing advance—8 bits        -   DL resources—7 bits for resource block ID        -   UL resources—7 bits for resource block ID        -   Validity—2 bits        -   CRC masked with the RA-preamble identifier—16 bits    -   Message for part II sent on the PDSCH may include the following:        -   C-RNTI—16 bits        -   CQI resources—16 bits        -   PC resources—16 bits

In the design given above, the DL and UL resources are conveyed by aresource block ID or index. A predetermined modulation scheme (e.g.,QPSK) and/or a predetermined coding scheme (e.g., code rate ⅓) may beused for the UL resources. Alternatively, the modulation and coding forthe UL resources may be sent on the PDCCH or PDSCH. Similarly, apredetermined modulation scheme (e.g., QPSK) and/or a predeterminedcoding scheme (e.g., code rate ⅓) may be used for the DL resources.Alternatively, the modulation and coding for the DL resources may besent on the PDCCH. For both the UL and DL resources, the code rate maybe dependent on the number of assigned resource blocks.

In the design given above, a 40-bit message may be sent on the PDCCH,which may be the standard message size for the PDCCH. In general, themessage sent on the PDCCH for part I may be defined such that it can besent like other messages on the PDCCH. The remaining information for therandom access response may be sent on the PDSCH.

A specific design for various parameters that may be sent for the randomaccess preamble and the random access response has been described above.In general, the random access preamble and the random access responsemay each include any set of parameters that may have any suitable sizes.

FIG. 6 shows a message flow for a design of a random access procedure600. In this design, multiple RACHs may be available, and the UE mayrandomly select one of the available RACHs for use. Each RACH may beassociated with a different Random Access RNTI (RA-RNTI). The availableRACHs and/or their RA-RNTIs may be sent in the broadcast channel orconveyed in other manners. The UE may access the system by sending arandom access preamble on the selected RACH (step D1). The random accesspreamble may include a random ID, a downlink CQI, an access type, someother information, or any combination thereof. The UE may be identifiedby a combination of the RA-preamble identifier and the RA-RNTI of theselected RACH during the system access. In effect, an I-RNTI may bedefined based on the RA-preamble identifier and the RA-RNTI (instead ofsystem time).

An eNB may receive the random access preamble from the UE and mayrespond by sending a random access response on the PDCCH and PDSCH tothe UE (steps D2 and D3). In one design, the PDCCH may carry a messagecontaining the RA-RNTI and the DL resources for the PDSCH. In onedesign, the PDSCH may carry a message containing the RA-preambleidentifier, a C-RNTI (if available), timing advance, UL resources, CQIresources, PC resources, PC correction, etc. The messages sent on thePDCCH and PDSCH may also carry different and/or other information. TheeNB may transmit the PDCCH and PDSCH as described above for FIG. 3.

The UE may receive and decode the message sent on the PDCCH. The UE mayrecognize that a message might be sent on the PDSCH to the UE based onthe RA-RNTI included in the message sent on the PDCCH. The UE may thenreceive and decode the message sent on the PDSCH. The UE may recognizethat this message might be addressed to the UE based on the RA-preambleidentifier included in the message. After decoding these two messages,the UE has sufficient resources configured and can exchange Layer 3signaling and/or data with the eNB (step D4).

FIG. 7 shows a message flow for a design of a random access procedure700. In this design, the UE may be in an RRC_NULL or RRC_IDLE state andmay access the system by sending a random access preamble (step E1). Therandom access preamble may include a random ID and possibly one or moreadditional bits for downlink CQI and/or other information. The UE maydetermine an I-RNTI as described above for FIG. 3.

An eNB may receive the random access preamble from the UE and mayrespond by sending a random access response on the PDCCH and/or PDSCH tothe UE (steps E2). The random access response may include timingadvance, UL resources, and a CRC. The CRC may be XORed with the I-RNTI(as shown in FIG. 7), an RA-preamble identifier, an RA-RNTI, and/orother information to identify the UE being addressed. Different and/orother information may also be sent on the PDCCH/PDSCH in step E2.

The UE may then respond with a unique UE ID in order to resolve possiblecollision (steps E3). The unique UE ID may be an International MobileSubscriber Identity (IMSI), a Temporary Mobile Subscriber Identity(TMSI), an International Mobile Equipment Identity (IMEI), an ElectronicSerial Number (ESN), a Mobile Equipment Identifier (MEID), an IPaddress, etc. The unique UE ID may also be a registration area ID if theUE has already registered in a given area. The UE may also send downlinkCQI, pilot measurement report, etc., along with the unique UE ID.

The eNB may receive a unique “handle” or pointer to the unique UE ID.The eNB may then assign a C-RNTI and control channel resources to theUE. The eNB may send a response on the PDCCH and PDSCH (steps E4 andE5). In one design, the PDCCH may carry a message containing the I-RNTIand the DL resources for the PDSCH. In one design, the PDSCH may carry amessage containing the unique UE ID, the C-RNTI (if assigned), CQIresources, PC resources, PC correction, etc. The messages sent on thePDCCH and PDSCH may also carry different and/or other information.

The UE may receive and decode the messages sent on the PDCCH and PDSCHto the UE. After decoding these two messages, the UE has sufficientresources configured and can exchange Layer 3 signaling with the eNB(steps E6 and E7). The Layer 3 signaling may include Non-Access Stratum(NAS) messages for authentication of the UE, configuration of the radiolink between the UE and eNB, connection management, etc. The UE and eNBmay exchange data after completing the Layer 3 signaling (step E8).

The system may support hybrid automatic retransmission (HARQ) in orderto improve reliability of data transmission. For HARQ, a transmitter maysend a transmission for a message and may send one or moreretransmissions, if needed, until the message is decoded correctly by areceiver, or the maximum number of retransmissions has been sent, orsome other termination condition is encountered. A message may also bereferred to as a packet, a data frame, a data unit, a data block, etc.Each transmission and each retransmission of a message may also bereferred to as an HARQ transmission.

As shown in FIG. 7, HARQ may be used for the messages sent in steps E3and later. A transmitter may send an HARQ transmission for a message,and a receiver may send an ACK if the message is decoded correctly or aNAK if the message is decoded in error. For an HARQ transmission sent onassigned DL resources, an ACK or NAK may be sent on UL control resourcesassociated with the assigned DL resources. Similarly, for an HARQtransmission sent on assigned UL resources, an ACK or NAK may be sent onDL control resources associated with the assigned UL resources. Thelocation of the ACKs/NAKs may thus be implicit and known a priori basedon the assigned DL or UL resources.

FIG. 8 shows a message flow for a design of a random access procedure800. In this design, the UE may be in an RRC_IDLE or RRC_CONNECTED stateand may already have an C-RNTI assigned to the UE. The UE may access thesystem from the RRC_IDLE state in response to receiving data to send orfrom the RRC_CONNECTED state in response to a handover command. The UEmay send a random access preamble, which may include a random ID andpossibly one or more additional bits for downlink CQI and/or otherinformation (step F1).

An eNB may receive the random access preamble from the UE and mayrespond by sending a random access response on the PDCCH and/or PDSCH tothe UE (step F2). The random access response may include timing advance,UL resources, and a CRC that may be XORed with an I-RNTI (as shown inFIG. 8), an RA-preamble identifier, an RA-RNTI, and/or other informationto identify the UE. Different and/or other information may also be senton the PDCCH/PDSCH in step F2.

The UE may then send its C-RNTI, downlink CQI, pilot measurement reportand/or other information to the eNB (steps F3). The eNB does not need toassign a C-RNTI but may assign control channel resources to the UE. TheeNB may then send a response on the PDCCH and PDSCH (steps F4 and F5).In one design, the PDCCH may carry a message containing the C-RNTI andthe DL resources for the PDSCH. In one design, the PDSCH may carry amessage containing the CQI resources, PC resources, PC correction, etc.The messages sent on the PDCCH and PDSCH may also carry different and/orother information.

The UE may receive and decode the messages sent on the PDCCH and PDSCHto the UE. After decoding these two messages, the UE has sufficientresources configured and can exchange data with the eNB (step F6). Sincethe UE has already been authenticated prior to being assigned theC-RNTI, the Layer 3 signaling exchange may be omitted, and the UE andeNB may exchange data immediately.

FIG. 8 may also be used when the UE does not have an assigned C-RNTI. Inthis case, a registration area ID or some other identificationinformation may be sent instead of the C-RNTI.

FIG. 9 shows a message flow for a design of a random access procedure900 for handover. In this design, the UE may be communicating with asource eNB and may be handed over to a target eNB. The UE may beassigned a random ID by the source eNB for use to access the target eNB.To avoid collision, a subset of all possible random IDs may be reservedfor handover, and the random ID assigned to the UE may be selected fromthis reserved subset. Information regarding the subset of reservedrandom IDs (or the remaining random IDs usable for normal system access)may be broadcast to all UEs or made known to the UEs in other manners.

The source eNB may inform the target eNB of the C-RNTI, random ID, CQIresources, PC resources and/or other information for the UE. Collisionresolution may not be necessary due to a one-to-one mapping between theassigned random ID and the C-RNTI of the UE. The target eNB may thushave pertinent information for the UE prior to the random accessprocedure. For simplicity, FIG. 9 shows the random access procedurebetween the UE and the target eNode B.

The UE may send a random access preamble, which may include the randomID assigned to the UE and possibly other information (step G1). Thetarget eNB may receive the random access preamble and may respond bysending a random access response on the PDCCH and/or PDSCH to the UE(steps G2). The random access response may include timing advance, ULresources, and a CRC that may be XORed with the C-RNTI of the UE.Different and/or other information may also be sent on the PDCCH/PDSCHin step G2.

After receiving the information sent in step G2, the UE has sufficientresources configured and can exchange data with the eNB. The UE may senda Layer 2 ACK for the information received in step G2 and may also senddata and/or other information (steps G3). The eNB may then send data tothe UE on the PDSCH (step G5) and may send signaling for the PDSCH onthe PDCCH (step G4).

The random access procedure in FIG. 9 may also be used for initialsystem access. For example, the UE may operate in the RRC_IDLE state andmay receive a page from the system, e.g., for an incoming call or fordownlink data available for the UE. The page may include the assignedrandom ID, which may be selected from the reserved subset.

FIGS. 3 through 9 show various random access procedures that may be usedfor initial system access (e.g., from the RRC_NULL state), system accesswhile idle (e.g., from the RRC_IDLE state), and system access forhandover (e.g., from the RRC_CONNECTED state). For these random accessprocedures, the UE may transmit a random access preamble, and an eNB mayrespond with a random access response that may assign various types ofresources and/or provide various types of information. In general, theeNB may assign any resources such as C-RNTI, UL resources, CQIresources, PC resources, etc., which may allow the UE to quicklytransmit on the uplink. The eNB may also send control information suchas timing advance, PC correction, etc., to control the uplinktransmission from the UE.

FIG. 10 shows a design of a process 1000 for system access by a UE. TheUE may send a random access preamble for system access (block 1012). Therandom access preamble may include or may be determined based on arandom ID, a downlink CQI, an access type, etc., or any combinationthereof. An access sequence may be selected for the random accesspreamble from a pool of available access sequences. The selected accesssequence may be sent to convey the random access preamble.

The UE may receive a random access response comprising control channelresources assigned to the UE (block 1014). The control channel resourcesmay include CQI resources used to send CQI on the uplink by the UE, PCresources used to send PC corrections on the downlink to the UE, etc.The UE may also receive control information (e.g., timing advance and/orPC correction), UL resources, a C-RNTI, etc., from the random accessresponse (block 1016). The UE may receive a first message for the randomaccess response on a control channel (e.g., the PDCCH) for a shared datachannel (e.g., the PDSCH) and may receive a second message for therandom access response on the shared data channel. The first message mayinclude identification information for the random access preamble, DLresources for the shared data channel, etc. The second message mayinclude the assigned control channel resources, control information, ULresources, C-RNTI, etc. The random access response may also be sent inother manners. The UE may exchange control information using theassigned control channel resources (block 1018). The UE may also senddata using the assigned uplink resources (block 1020).

FIG. 11 shows a design of an apparatus 1100 for a UE. Apparatus 1100includes means for sending a random access preamble for system access(module 1112), means for receiving a random access response comprisingcontrol channel resources assigned to the UE (module 1114), means forreceiving control information, UL resources, a C-RNTI, etc., from therandom access response (module 1116), means for exchanging controlinformation using the assigned control channel resources (module 1118),and means for sending data using the assigned uplink resources (module1120).

FIG. 12 shows a design of a process 1200 performed by a base station,e.g., an eNB, to support system access. The base station may receive arandom access preamble sent by a UE for system access (block 1212). Thebase station may send a random access response comprising controlchannel resources (e.g., CQI resources, PC resources, etc.) assigned tothe UE (block 1214). The base station may also send control information(e.g., timing advance and/or PC correction), UL resources, a C-RNTI,etc., in the random access response (block 1216). The base station mayexchange control information with the UE using the assigned controlchannel resources (block 1218). The base station may also receive datafrom the UE via the assigned uplink resources (block 1220).

FIG. 13 shows a design of an apparatus 1300 for a base station.Apparatus 1300 includes means for receiving a random access preamblesent by a UE for system access (module 1312), means for sending a randomaccess response comprising control channel resources assigned to the UE(module 1314), means for sending control information, UL resources, aC-RNTI, etc., in the random access response (module 1316), means forexchanging control information with the UE using the assigned controlchannel resources (module 1318), and means for receiving data from theUE via the assigned uplink resources (module 1320).

FIG. 14 shows a design of a process 1400 for system access by a UE. TheUE may send a random access preamble for system access, with the randomaccess preamble comprising identification information (block 1412). TheUE may receive a random access response from a base station, with therandom access response being asynchronous with respect to the randomaccess preamble and addressing the random access preamble based on theidentification information (block 1414). The identification informationmay comprise a random ID and/or some other information. The randomaccess response may comprise a temporary ID (e.g., an I-RNTI), anRA-preamble identifier, a C-RNTI, and/or some other ID associated withor derived from the identification information. The UE may receive therandom access response within a predetermined time window from when therandom access preamble was sent.

The UE may select a random ID for use as the identification information.The UE may also be directly or indirectly assigned a random ID, whichmay be selected from a pool of reserved random IDs. For example, the UEmay be assigned a random access preamble or access sequence determinedbased on the selected random ID and additional information such as CQI.The UE may determine the random access preamble based on the random IDand additional information, e.g., a downlink CQI, an access type, etc.The UE may receive a temporary ID (e.g., an I-RNTI) formed based on therandom ID, an RA-preamble identifier determined based on the random ID,a C-RNTI assigned to the UE and associated with the random ID, and/orsome other ID from the random access response.

For the design shown in FIG. 6, the UE may send the random accesspreamble on a random access channel selected from among a plurality ofavailable random access channels. The UE may receive a first message forthe random access response on a control channel for a shared datachannel, with the first message including an RA-RNTI for the selectedrandom access channel. The UE may receive a second message for therandom access response on the shared data channel, with the secondmessage including the random access preamble identifier.

FIG. 15 shows a design of an apparatus 1500 for a UE. Apparatus 1500includes means for sending a random access preamble for system access,with the random access preamble comprising identification information(module 1512), and means for receiving a random access response from abase station, with the random access response being asynchronous withrespect to the random access preamble and addressing the random accesspreamble based on the identification information (module 1514).

FIG. 16 shows a design of a process 1600 performed by a base station tosupport system access. The base station may receive a random accesspreamble sent by a UE for system access, with the random access preamblecomprising identification information (block 1612). The base station maysend a random access response to the UE, with the random access responsebeing asynchronous with respect to the random access preamble andaddressing the random access preamble based on the identificationinformation (block 1614). The identification information may comprise arandom ID and/or other information. The random access response maycomprise a temporary ID (e.g., I-RNTI), an RA-preamble identifier, aC-RNTI, and/or some other ID associated with or derived from theidentification information.

FIG. 17 shows a design of an apparatus 1700 for a base station.Apparatus 1700 includes means for receiving a random access preamblesent by a UE for system access, with the random access preamblecomprising identification information (module 1712), and means forsending a random access response to the UE, with the random accessresponse being asynchronous with respect to the random access preambleand addressing the random access preamble based on the identificationinformation (module 1714).

FIG. 18 shows a design of a process 1800 for system access by a UEduring handover. The UE may communicate with a first/source base station(block 1812). The UE may receive a random ID directly or indirectly forhandover of the UE from the first base station to a second/target basestation (block 1814). The UE may receive the random ID from the firstbase station, with the random ID being selected from a pool of reservedrandom IDs. The UE may also be assigned a random access preamble/accesssequence composed of the random ID selected by the first base stationand additional information such as CQI. The UE may send a random accesspreamble comprising the random ID to access the second base station,with the random ID being used to identify the UE (block 1816). The UEmay receive a random access response comprising UL resources, timingadvance, etc. (block 1818). The UE may determine that the random accessresponse is intended for the UE based on a CRC masked with a C-RNTIassigned to the UE. The UE may exchange data with the second basestation after receiving the random access response (block 1820).

FIG. 19 shows a design of an apparatus 1900 for a UE. Apparatus 1900includes means for communicating with a first/source base station(module 1912), means for receiving a random ID for handover of the UEfrom the first base station to a second/target base station (module1914), means for sending a random access preamble comprising the randomID to access the second base station, with the random ID being used toidentify the UE (module 1916), means for receiving a random accessresponse comprising UL resources, timing advance, etc. (module 1918),means for determining that the random access response is intended forthe UE based on a CRC masked with a C-RNTI assigned to the UE, and meansfor exchanging data with the second base station after receiving therandom access response (module 1920).

FIG. 20 shows a design of a process 2000 performed by a target basestation to support system access during handover. The target basestation may receive from a source base station a random ID assigned to aUE for handover from the source base station to the target base station(block 2012). The target base station may also receive other informationfor the UE such as a C-RNTI, CQI resources, PC resources, etc. from thesource base station. The target base station may receive a random accesspreamble comprising the random ID from the UE (block 2014). The targetbase station may identify the random access preamble as being from theUE based on the random ID (block 2016). The target base station may sendto the UE a random access response including UL resources, timingadvance, a CRC masked with the C-RNTI, etc. (block 2018). The targetbase station may exchange data with the UE after sending the randomaccess response (block 2020).

FIG. 21 shows a design of an apparatus 2100 for a target base station.Apparatus 2100 includes means for receiving from a source base station arandom ID assigned to a UE for handover from the source base station tothe target base station (module 2112), means for receiving a randomaccess preamble comprising the random ID from the UE (module 2114),means for identifying the random access preamble as being from the UEbased on the random ID (module 2116), means for sending to the UE arandom access response including UL resources, timing advance, a CRCmasked with the C-RNTI, etc. (module 2118), and means for exchangingdata with the UE after sending the random access response (module 2120).

FIG. 22 shows a design of a process 2200 for system access by a UE. TheUE may send a random access preamble to access a base station (block2212). The UE may receive a random access response from the base station(block 2214). The random access response may include timing advance, ULresources, etc. The UE may send to the base station a first messagecomprising a unique ID for the UE (block 2216). The unique ID may be anIMSI, a TMSI, a C-RNTI, a registration area ID, or some other IDassigned to the UE. The UE may receive from the base station a secondmessage addressed to the UE based on the unique ID (block 2218). Thesecond message may include CQI resources, PC resources, etc. The UE mayexchange signaling and/or data with the base station after sending thesecond message (block 2220).

The UE may operate in an idle state prior to sending the random accesspreamble and may send the random access preamble to transition from theidle state to an active state. The UE may exchange Layer 3 signalingwith the base station after receiving the second message and mayexchange data with the base station after completing the Layer 3signaling exchange, as shown in FIG. 8.

The UE may send the random access preamble to perform handover to thebase station. The UE may send its C-RNTI in the first message and mayreceive control channel resources from the second message. The UE maythen exchange data with the base station after receiving the secondmessage, as shown in FIG. 9.

The random access preamble and the random access response may be sentwithout HARQ. The first and second messages may be sent with HARQ, asshown in FIGS. 8 and 9.

FIG. 23 shows a design of an apparatus 2300 for a UE. Apparatus 2300includes means for sending a random access preamble to access a basestation (module 2312), means for receiving a random access response fromthe base station (module 2414), means for sending to the base station afirst message comprising a unique ID for the UE (module 2316), means forreceiving from the base station a second message addressed to the UEbased on the unique ID (module 2328), and means for exchanging signalingand/or data with the base station after sending the second message(module 2320).

FIG. 24 shows a design of a process 2400 performed by a base station tosupport system access. The base station may receive a random accesspreamble sent by a UE to access the base station (block 2412). The basestation may send a random access response to the UE (block 2414). Thebase station may receive a first message comprising a unique ID for theUE (block 2416). The base station may send a second message addressed tothe UE based on the unique ID (block 2418). The base station mayexchange signaling and/or data with the UE after sending the secondmessage (block 2420).

FIG. 25 shows a design of an apparatus 2500 for a base station.Apparatus 2500 includes means for receiving a random access preamblesent by a UE to access the base station (module 2512), means for sendinga random access response to the UE (module 2514), means for receiving afirst message comprising a unique ID for the UE (module 2516), means forsending a second message addressed to the UE based on the unique ID(module 2518), and means for exchanging signaling and/or data with theUE after sending the second message (module 2520).

The modules in FIGS. 11, 13, 15, 17, 19, 21, 23 and 25 may compriseprocessors, electronics devices, hardware devices, electronicscomponents, logical circuits, memories, etc., or any combinationthereof.

Those of skill in the art would understand that information and signalsmay be represented using any of a variety of different technologies andtechniques. For example, data, instructions, commands, information,signals, bits, symbols, and chips that may be referenced throughout theabove description may be represented by voltages, currents,electromagnetic waves, magnetic fields or particles, optical fields orparticles, or any combination thereof.

Those of skill would further appreciate that the various illustrativelogical blocks, modules, circuits, and algorithm steps described inconnection with the disclosure herein may be implemented as electronichardware, computer software, or combinations of both. To clearlyillustrate this interchangeability of hardware and software, variousillustrative components, blocks, modules, circuits, and steps have beendescribed above generally in terms of their functionality. Whether suchfunctionality is implemented as hardware or software depends upon theparticular application and design constraints imposed on the overallsystem. Skilled artisans may implement the described functionality invarying ways for each particular application, but such implementationdecisions should not be interpreted as causing a departure from thescope of the present disclosure.

The various illustrative logical blocks, modules, and circuits describedin connection with the disclosure herein may be implemented or performedwith a general-purpose processor, a digital signal processor (DSP), anapplication specific integrated circuit (ASIC), a field programmablegate array (FPGA) or other programmable logic device, discrete gate ortransistor logic, discrete hardware components, or any combinationthereof designed to perform the functions described herein. Ageneral-purpose processor may be a microprocessor, but in thealternative, the processor may be any conventional processor,controller, microcontroller, or state machine. A processor may also beimplemented as a combination of computing devices, e.g., a combinationof a DSP and a microprocessor, a plurality of microprocessors, one ormore microprocessors in conjunction with a DSP core, or any other suchconfiguration.

The steps of a method or algorithm described in connection with thedisclosure herein may be embodied directly in hardware, in a softwaremodule executed by a processor, or in a combination of the two. Asoftware module may reside in RAM memory, flash memory, ROM memory,EPROM memory, EEPROM memory, registers, hard disk, a removable disk, aCD-ROM, or any other form of storage medium known in the art. Anexemplary storage medium is coupled to the processor such that theprocessor can read information from, and write information to, thestorage medium. In the alternative, the storage medium may be integralto the processor. The processor and the storage medium may reside in anASIC. The ASIC may reside in a user terminal. In the alternative, theprocessor and the storage medium may reside as discrete components in auser terminal.

In one or more exemplary designs, the functions described may beimplemented in hardware, software, firmware, or any combination thereof.If implemented in software, the functions may be stored on ortransmitted over as one or more instructions or code on acomputer-readable medium. Computer-readable media includes both computerstorage media and communication media including any medium thatfacilitates transfer of a computer program from one place to another. Astorage media may be any available media that can be accessed by ageneral purpose or special purpose computer. By way of example, and notlimitation, such computer-readable media can comprise RAM, ROM, EEPROM,CD-ROM or other optical disk storage, magnetic disk storage or othermagnetic storage devices, or any other medium that can be used to carryor store desired program code means in the form of instructions or datastructures and that can be accessed by a general-purpose orspecial-purpose computer, or a general-purpose or special-purposeprocessor. Also, any connection is properly termed a computer-readablemedium. For example, if the software is transmitted from a website,server, or other remote source using a coaxial cable, fiber optic cable,twisted pair, digital subscriber line (DSL), or wireless technologiessuch as infrared, radio, and microwave, then the coaxial cable, fiberoptic cable, twisted pair, DSL, or wireless technologies such asinfrared, radio, and microwave are included in the definition of medium.Disk and disc, as used herein, includes compact disc (CD), laser disc,optical disc, digital versatile disc (DVD), floppy disk and blu-ray discwhere disks usually reproduce data magnetically, while discs reproducedata optically with lasers. Combinations of the above should also beincluded within the scope of computer-readable media.

The previous description of the disclosure is provided to enable anyperson skilled in the art to make or use the disclosure. Variousmodifications to the disclosure will be readily apparent to thoseskilled in the art, and the generic principles defined herein may beapplied to other variations without departing from the spirit or scopeof the disclosure. Thus, the disclosure is not intended to be limited tothe examples and designs described herein but is to be accorded thewidest scope consistent with the principles and novel features disclosedherein.

What is claimed is:
 1. A method for wireless communication, comprising:transmitting, by a user equipment (UE), a random access preamble forsystem access by the UE on a random access channel (RACH), the RACHbeing associated with a radio network temporary identity; receiving afirst part of a random access response message on a physical downlinkcontrol channel, the first part of the random access response messagecomprising the radio network temporary identity associated with theRACH; and receiving a second part of the random access response messageon a physical downlink shared channel, the second part of the randomaccess response message comprising a timing advance command for the UE,a grant of uplink resources assigned to the UE, and a cell radio networktemporary identity.
 2. The method of claim 1, further comprising:receiving a grant of downlink resources in the first part of the randomaccess response message.
 3. The method of claim 2, wherein the secondpart of the random access response message is received over the downlinkresources granted in the first part of the random access responsemessage.
 4. The method of claim 1, further comprising: transmitting anuplink transmission based on the grant of uplink resources in the randomaccess response message.
 5. The method of claim 4, further comprising:adjusting a timing of the uplink transmission based at least in part onthe timing advance command.
 6. The method of claim 4, wherein the uplinktransmission comprises the cell radio network temporary identity.
 7. Themethod of claim 1, further comprising: selecting a random accesspreamble index for the random access preamble from a predefined set ofavailable random access preamble indexes; wherein the random accesspreamble is transmitted based on the selected random access preambleindex.
 8. An apparatus for wireless communication, comprising: aprocessor; and a memory in electronic communication with the processor,the memory embodying instructions, the instructions being executable bythe processor to: transmit, by a user equipment (UE), a random accesspreamble for system access by the UE on a random access channel (RACH),the RACH being associated with a radio network temporary identity;receive a first part of a random access response message on a physicaldownlink control channel, the first part of the random access responsemessage comprising the radio network temporary identity associated withthe RACH; and receive a second part of the random access responsemessage on a physical downlink shared channel, the second part of therandom access response message comprising a timing advance command forthe UE, a grant of uplink resources assigned to the UE, and a cell radionetwork temporary identity.
 9. The apparatus of claim 8, wherein theinstructions are further executable by the processor to: receive a grantof downlink resources in the first part of the random access responsemessage.
 10. The apparatus of claim 9, wherein the second part of therandom access response message is received over the downlink resourcesgranted in the first part of the random access response message.
 11. Theapparatus of claim 8, wherein the instructions are further executable bythe processor to: transmit an uplink transmission based on the grant ofuplink resources in the random access response message.
 12. Theapparatus of claim 11, wherein the instructions are further executableby the processor to: adjust a timing of the uplink transmission based atleast in part on the timing advance command.
 13. The apparatus of claim11, wherein the uplink transmission comprises the cell radio networktemporary identity.
 14. The apparatus of claim 8, wherein theinstructions are further executable by the processor to: select a randomaccess preamble index for the random access preamble from a predefinedset of available random access preamble indexes; wherein the randomaccess preamble is transmitted based on the selected random accesspreamble index.
 15. An apparatus for wireless communication, comprising:means for transmitting, by a user equipment (UE), a random accesspreamble for system access by the UE on a random access channel (RACH),the RACH being associated with a radio network temporary identity; meansfor receiving a first part of a random access response message on aphysical downlink control channel, the first part of the random accessresponse message comprising the radio network temporary identityassociated with the RACH; and means for receiving a second part of therandom access response message on a physical downlink shared channel,the second part of the random access response message comprising atiming advance command for the UE, a grant of uplink resources assignedto the UE, and a cell radio network temporary identity.
 16. Theapparatus of claim 15, further comprising: means for receiving a grantof downlink resources in the first part of the random access responsemessage.
 17. The apparatus of claim 16, wherein the second part of therandom access response message is received over the downlink resourcesgranted in the first part of the random access response message.
 18. Theapparatus of claim 15, further comprising: means for transmitting anuplink transmission based on the grant of uplink resources in the randomaccess response message.
 19. The apparatus of claim 18, furthercomprising: means for adjusting a timing of the uplink transmissionbased at least in part on the timing advance command.
 20. The apparatusof claim 18, wherein the uplink transmission comprises the cell radionetwork temporary identity.
 21. The apparatus of claim 15, furthercomprising: means for selecting a random access preamble index for therandom access preamble from a predefined set of available random accesspreamble indexes; wherein the random access preamble is transmittedbased on the selected random access preamble index.
 22. A computerprogram product for wireless communication, the computer program productcomprising non-transitory computer-readable storage medium comprisinginstructions executable by a processor to: transmit, by a user equipment(UE), a random access preamble for system access by the UE on a randomaccess channel (RACH), the RACH being associated with a radio networktemporary identity; receive a first part of a random access responsemessage on a physical downlink control channel, the first part of therandom access response message comprising the radio network temporaryidentity associated with the RACH; and receive a second part of therandom access response message on a physical downlink shared channel,the second part of the random access response message comprising atiming advance command for the UE, a grant of uplink resources assignedto the UE, and a cell radio network temporary identity.
 23. The computerprogram product of claim 22, wherein the instructions are furtherexecutable by the processor to: receive a grant of downlink resources inthe first part of the random access response message.
 24. The computerprogram product of claim 23, wherein the second part of the randomaccess response message is received over the downlink resources grantedin the first part of the random access response message.
 25. Thecomputer program product of claim 22, wherein the instructions arefurther executable by the processor to: transmit an uplink transmissionbased on the grant of uplink resources in the random access responsemessage.
 26. The computer program product of claim 25, wherein theinstructions are further executable by the processor to: adjust a timingof the uplink transmission based at least in part on the timing advancecommand.
 27. The computer program product of claim 25, wherein theuplink transmission comprises the cell radio network temporary identity.28. The computer program product of claim 22, wherein the instructionsare further executable by the processor to: select a random accesspreamble index for the random access preamble from a predefined set ofavailable random access preamble indexes; wherein the random accesspreamble is transmitted based on the selected random access preambleindex.