Title of Invention

METHOD AND PROTOCOL FOR HANDLING ACCESS ATTEMPTS FOR COMMUNICATIONS SYSTEMS

Abstract An improved access attempt procedure for call establishment is achieved by deriving a probability of access transmission as a function of both a priority level for access attempts and a random access cause, and performing link establishment authentication and security control call establishment based upon the deriving.
Full Text 1
Description
METHOD AND PROTOCOL FOR HANDLING ACCESS AT-
TEMPTSFOR COMMUNICATIONS SYSTEMS
Technical Field
[1] The present invention relates to radio communications, and in particular, relates to
managing access attempts for communication systems.
Background Art
[2] A radio (wireless) communication system may be comprised of an access network
and a plurality of access terminals. The access network may include access points,
such as Node Bs, base stations, or the like, that allow the access terminals to connect
with the access network for uplink (UL: terminal-to-network) communications and
downlink (DL: network-to-terminal) communications via various types of channels.
The access terminals may be user equipment (UE), mobile stations, or the like.
[3] Although the concepts described hereafter may be applicable to different types of c
ommunication systems, the Universal Mobile Telecommunications System (UMTS)
will be described merely for exemplary purposes. A typical UMTS has at least one
core network (CN) connected with at least one UTRAN (UMTS Terrestrial Radio
Access Network) that has Node Bs acting as access points for multiple UEs.
[4] Figure 1 shows the radio interface protocol architecture according to the 3GPP
radio access network standards. The radio interface protocol has horizontal layers
comprising a physical layer, a data link layer, and a network layer, and has vertical
planes comprising a user plane (U-plane) for transmitting user data and a control plane
(C-plane) for transmitting control information. The user plane is a region that handles
traffic information with the user, such as voice or Internet protocol (IP) packets. The
control plane is a region that handles control information for an interface with a
network, maintenance and management of a call, and the like.
[5] The protocol layers in Figure 1 can be divided into a first layer (LI), a second layer
(L2), and a third layer (L3) based on the three lower layers of an open system inter-
connection (OSI) standard model. The first layer (LI), namely, the physical layer
(PHY), provides an information transfer service to an upper layer by using various
radio transmission techniques. The physical layer is connected to an upper layer called
a medium access control (MAC) layer, via a transport channel. The MAC layer and the
physical layer exchange data via the transport channel. The second layer (L2) includes
a MAC layer, a radio link control (RLC) layer, a broadcast/multicast control (BMC)
layer, and a packet data convergence protocol (PDCP) layer. The MAC layer handles
mapping between logical channels and transport channels and provides allocation of

2
the MAC parameters for allocation and re-allocation of radio resources. The MAC
layer is connected to an upper layer called the radio link control (RLC) layer, via a
logical channel. Various logical channels are provided according to the type of in-
formation transmitted.
[6] The MAC layer is connected to the physical layer by transport channels and can be
divided into a MAC-b sub-layer, a MAC-d sub-layer, a MAC-c/sh sub-layer, a MAC-
hs sub-layer and a MAC-m sublayer according to the type of transport channel being
managed. The MAC-b sub-layer manages a BCH (Broadcast Channel), which is a
transport channel handling the broadcasting of system information. The MAC-c/sh
sub-layer manages a common transport channel, such as a forward access channel
(FACH) or a downlink shared channel (DSCH), which is shared by a plurality of
terminals, or in the uplink, the Random Access Channel (RACH). The MAC-m
sublayer may handle the MBMS data. The MAC-d sub-layer manages a dedicated
channel (DCH), which is a dedicated transport channel for a specific terminal. The
MAC-d sublayer is located in a serving RNC (SRNC) that manages a corresponding
terminal and one MAC-d sublayer also exists in each terminal.
[7] The RLC layer, depending of the RLC mode of operation, supports reliable data
transmissions and performs segmentation and concatenation on a plurality of RLC
service data units (SDUs) delivered from an upper layer. When the RLC layer receives
the RLC SDUs from the upper layer, the RLC layer adjusts the size of each RLC SDU
in an appropriate manner based upon processing capacity, and then creates data units
by adding header information thereto. These data units, called protocol data units
(PDUs), are transferred to the MAC layer via a logical channel. The RLC layer
includes a RLC buffer for storing the RLC SDUs and/or the RLC PDUs.
[8] The BMC layer schedules a cell broadcast (CB) message transferred from the core
network and broadcasts the CB message to terminals positioned in a specific cell or
cells.
[9] The PDCP layer is located above the RLC layer. The PDCP layer is used to
transmit network protocol data, such as IPv4 or IPv6, efficiently on a radio interface
with a relatively small bandwidth. For this purpose, the PDCP layer reduces un-
necessary control information used in a wired network, namely, a function called
header compression is performed.
[10] The radio resource control (RRC) layer located at the lowest portion of the third
layer (L3) is only defined in the control plane. The RRC layer controls the transport
channels and the physical channels in relation to setup, reconfiguration, and the release
or cancellation of the radio bearers (RBs). The RB signifies a service provided by the
second layer (L2) for data transmission between the terminal and the UTRAN. In
general, the set up of the RB refers to the process of stipulating the characteristics of a

3
protocol layer and a channel required for providing a specific data service, and setting
the respective detailed parameters and operation methods. Additionally, the RRC layer
handles user mobility within the RAN, and additional services, e.g., location services.
[11] Call establishment between a HE (User Equipment) and a radio network in current
wireless communications systems, such as UMTS, is performed on a RACH (Random
Access Channel) according to appropriate procedures. The timing at which the UE can
start a random access procedure is derived on the basis of an Access Service Class
(ASC) that gives a priority level for access attempts. The random access procedure is
divided into two phases-, an access attempt phase, and when the access is succeeded the
message transmission phase indicating an establishment cause. When the establishment
cause is decoded by the network, depending upon the request and the radio resource
availability, a decision is made by the network to accept or to reject the call es-
tablishment.
[12] In general, the procedure where the UE sends a first message to the network is
referred to as initial access. For this, the common uplink channel called RACH
(Random Access Channel) is used. In all cases (GSM and UMTS systems), the initial
access starts from the UE with the connection request message including the reason of
the request, and the answer from the network indicating the allocation of radio
resources for the requested reason.
[13] There are several reasons, which may be referred to as an establishment cause, for
sending a connection request message and the following list shows some examples
specified in UMTS:
[14] Originating Conversational Call,
[15] Originating Streaming Call,
[16] Originating Interactive Call,
[17] Originating Background Call,
[18] Originating Subscribed traffic Call,
[19] Terminating Conversational Call,
[20] Terminating Streaming Call,
[21] Terminating Interactive Call,
[22] Terminating Background Call,
[23] Emergency Call,
[24] Inter-RAT cell re-selection,
[25] Inter-RAT cell change order,
[26] Registration, Detach,
[27] Originating High Priority Signalling,
[28] Originating Low Priority Signalling,
[29] Call re-establishment,

4
[30] Terminating High Priority Signalling,
[31] Terminating Low Priority Signalling,
[32] Regarding the definitions of the terms used above, originating call means that the
UE wants to setup a connection (for instance a speech connection), terminating call
means that the UE answers to paging, while registration means that the user wants to
register only to perform a location update.
[33] To send the information over the air interface, the physical random access
procedure is used. The physical random access transmission is performed under the
control of a higher layer protocol, which performs some important functions related to
priority and load control. These procedures differ between GSM and UMTS radio
systems. The description of GSM random access procedure can be found in The GSM
System for Mobile Communications, published by M. Mouly and M. B. Pautet, 1992.
As the present innovation is UMTS enhancement/evolution related, the W-CDMA
random access procedure will be described in more detailed below.
[34] In the UMTS physical layer random access procedure, the UE randomly selects an
access resource and transmits a RACH preamble part of a random access procedure to
the network. The preamble is a short signal that is sent before the transmission of the
RACH connection request message. The UE repeatedly transmits the preamble by
increasing the transmission power every time the preamble is sent until it receives an
AI (Acquisition Indicator) on an AICH (Acquisition Indicator Channel), which
indicates the detection of the preamble by the network. The UE stops the transmission
of the preamble once it receives the AI (Acquisition Indicator), and sends the message
part at a level of power equal to the preamble transmission power at that point, plus an
offset signalled by the network. This random access procedure avoids a power ramping
procedure for the entire message. Such power ramping procedure would create more
interference due to unsuccessful sent messages and it would be less efficient due to the
larger delay, since it would take much more time to decode the message before an ac-
knowledgement could be given that it was received successful.
[35] The main characteristics of the RACH is that it is a contention based channel, which
means that due to simultaneous access of several users, collisions may occur such that
the initial access message cannot be decoded by the network. The UE can start the
random-access transmission (both preambles and message) at the beginning of an
access slot only. This kind of access method is therefore a type of slotted ALOHA
approach with fast acquisition indication.
[36] Figure 2 shows an example of the timing (i.e. access slots) related to a random
access transmission, while Figure 3 shows examples of the reception of a downlink
AICH access slot by the UE and the reception of an uplink PRACH access slot by the
UE.

5
[37] The time axis of both the RACH and the AICH is divided into time intervals, called
access slots. There are 15 access slots per two frames (one frame is 10 ms in length or
38400 chips) and they are spaced 1.33 ms (5120 chips) apart. Information on what
access slots are available for random-access transmission and what timing offsets to
use between RACH and ATCH, between two successive preambles and between the
last preamble and the message is signalled by the network. If the AICH transmission
timing is 0 and 1, it is sent 3 and 4 access slots after the last preamble access slot
transmitted, respectively
[38] As for the format of the preambles,each preamble consists of 4096 chips, which is a
sequence of 256 repetitions of Hadamard codes of length 16. The Hadamard codes are
referred to as the signatureof the preamble. There are 16 different signatures and a
signature is randomly selected (from available signatures sets on the basis of ASC) and
repeated 256 times for each transmission of the preamble part.
[39] Figure 4 shows an exemplary structure (format) of the AICH. The AICH consists of
a repeated sequence of 15 consecutive access slots, each having a length of 40 bit
intervals (5120chips). Each access slot consists of two parts, an Acquisition Indicator
(AI) part consisting of 32 real-valued signals aO,..., a31 and a part of duration 1024
chips where transmission is switched off.
[40] When the network detects the transmission of a RACH preamble in a RACH access
slot with a certain signature, it repeats tixis signature in the associated AICH access
slot. This means that the Hadamard code used as the signature on the RACH preamble
is modulated onto the AI part of the AICH. The acquisition indicator corresponding to
the signature can take the values +U-1, and 0, depending upon whether a positive ac-
knowledgement, a negative acknowledgement or no acknowledgement is given to a
specific signature.
[41] A positive polarity of the signature indicates that the preamble has been acquired
and the message can be sent. A negative polarity indicates that the preamble has been
acquired and the power ramping procedure shall be stopped, but the message shall not
be sent. This negative acknowledgement is used when there is a congestion situation in
the network, and thus a transmitted message cannot be processed at the present time. In
this case, the access attempt needs to be repeated some time later by the UE.
[42] For the control of random access transmissions, the network decides whether the
mobile station should be permitted to use radio access resource based primarily upon
the access class to which the UE belongs. A specified priority level is implied by the
Access Class (AC) which is stored on the UE SIM card.
[43] Certain aspect of access control will be described hereafter. Regarding the purpose
of access control,under certain circumstances, it will be desirable to prevent UE users
from making access attempts (including emergency call attempts) or responding to

6
pages in specified areas of a PLMN (Public Land Mobile Network). Such situations
may arise during states of emergency, or where 1 of 2 or more co-located PLMNs has
failed. Broadcast messages should be available on a cell-by-cell basis indicating the
class(es) of subscribers barred from network access. The use of this facility allows the
network operator to prevent overload of the access channel under critical conditions. It
is not intended that access control be used under normal operating conditions.
[44] Figure 5 shows an example of the types of access classes (AC) and their re-
spectively related access service (AS), each containing an information element (IE).
[45] For allocation,all UEs are members of one out of ten randomly allocated mobile
populations, defined as Access Classes 0 to 9. The population number can be stored in
a SIM/USIM for the UE. In addition, the UEs may be members of one or more out of 5
special categories (Access Classes 11 to 15), which also may be stored in the SIM/
USIM. These may be allocated to specific high priority users as follows. (This
enumeration is not meant as a priority sequence):
[46] Class 15 - PLMN Staff;
[47] Class 14 - Emergency Services;
[48] Class 13 - Public Utilities (e.g. water/gas suppliers);
[49] Class 12 - Security Services;
[50] Class 11 - For PLMN Use.
[51] For operation, if the UE is a member of at least one Access Class which
corresponds to the permitted classes as signalled over the air interface, and the Access
Class is applicable in the serving network, access attempts are allowed. Otherwise
access attempts are not allowed.
[52] Access Classes are applicable as follows:
[53] Classes 0 ~ 9 - Home and Visited PLMNs;
[54] Classes 11 and 15 - Home PLMN only;
[55] Classes 12, 13,14- Home PLMN and visited PLMNs of home
[56] country only,
[57]
[58] Any number of these classes may be barred at any one time.
[59] For emergency calls, an additional control bit known as Access Class 10 is also
signalled over the air interface to the UE. This indicates whether or not network access
for Emergency Calls is allowed for UEs with access classes 0 to 9 or without an IMSI.
For UEs with access classes 11 to 15, Emergency Calls are not allowed if both Access
Class 10 and the relevant Access Class (11 to 15) are barred. Otherwise, Emergency
Calls may be allowed.
[60] In UMTS, the AC are mapped to Access Service Classes (ASC). There are eight
different priority levels defined (ASC 0 to ASC 7), with level 0 being the highest

7
priority.
[61] For Mapping of Access Classes to Access Service Classes,the Access Classes shall
only be applied at initial access, i.e. when sending an RRC CONNECTION REQUEST
message. A mapping between Access Class (AC) and Access Service Class (ASC)
shall be indicated by the information element AC-to-ASC mapping in System In-
formation Block type 5. The correspondence between AC and ASC is indicated in
Figure 5.
[62] In the table of Figure 5, the n IE designates an ASC number i in the range 0 - 7 to
AC. If the ASC indicated by the n IE is undefined, the UE behaviour is unspecified.
[63] For random access, the parameters implied by the respective ASC shall be
employed. In case the UE is a member of several ACs, it shall select the ASC for the
highest AC number. In connected mode, AC shall not be applied.
[64] An ASC consists of a subset of RACH preamble signatures and access slots, which
are allowed to be used for this access attempt and a persistence value corresponding to
a probability Pv access transmission is a load control mechanism, which allows reducing of the load of
incoming traffic when the collision probability is high or when radio resources are low.
[65] Figures 6 and 7 show a flow chart of the control access procedure.
[66] 1. Existing specifications provide many RACH transmission control parameters
which are stored and updated by the UE based on system information broadcasted by
the network. The RACH transmission control parameters include Physical RACH
(PRACH), Access Service Class (ASC), a maximum number of preamble ramping
cycles M range of backoff interval for timer T given in terms of numbers of
max, BOl,
transmission 10 ms time intervals N and N , applicable when negative ac-
BOlmax BOlmm
knowledgement on AICH is received (S201).
[67] 2. The UE maps the assigned AC to an ASC, and a count value M is set to zero
(S203 S205, S207).
[68] 3. The count value M is incremented by one (S209). Next, the UE determines if the
count value M representing the number of transmission attempts exceeds the maximum
number of permitted RACH transmission attempts M (S211). If so, then the UE
max
treats the transmission as unsuccessful (S212).
[69] 4. However, if M is less than or equal to the maximum number of permitted RACH
transmission attempts M , then the UE updates the RACH transmission control
max
parameters (S213). In the next step, a 10 ms timer T2 is set (S215). The UE decides
whether to attempt transmission based on the persistence value Pi associated with the
ASC selected by the UE. Specifically, a random number Ri is generated between 0 and
1 (S217). If the random number Ri is less than or equal to the persistence value Pi, the
UE attempts to transmit over the assigned RACH resources, otherwise, the UE waits

8
until the 10 ms timer T2 expires and perform the procedure in step 4 again (S219,
S220, S221).
[70] 5. When one access attempt is transmitted, the UE determines whether the network
responds with an Acknowledgement (ACK), a Non Acknowledgment (NACK), or no
response (S223). If no response is received from the network, after the timer T2
expires the process is performed again from step 3 (S224). If a NACK, indicating a
failed receipt of the transmission by the network (often due to collision) is received,
then the UE waits for the timer T2 to expire then generates a back off value N
BOl
randomly chosen between the maximum and minimum back off values N and N
BOlmax
associated with the PRACH assigned to the UE (S225). The UE then waits a back
BOlmin
off interval T equal to 10 ms times the back off value N before performing the
BOl BOl
process from step again (S226). If an ACK, indicating receipt of the UE transmission
by the network, is received, then the UE begins the message transmission (S227).
[71] Figure 8 shows an example of Signalling Establishment procedure.Once the
PRACH power control preambles have been acknowledged, the RRC Connection
Request message can be transmitted (S81). It contains the reason why the connection is
requested.
[72] Depending on the request reason, the radio network makes a decision regarding the
kind of resources to reserve, and performs synchronization and signaling establishment
among certain radio network nodes (i.e. Node B and serving RNC) (S82). When the
radio network is ready, it sends to the UE the Connection Setup message conveying in-
formation about the radio resources to use (S83). The UE confirms connection es-
tablishment by sending the Connection Setup Complete message (S84). When the
connection has been established, the UE sends an Initial Direct Transfer message
including a large amount of information, such as the UE identity, its current location,
and the kind of transaction requested (S85). Then the UE and the network authenticate
each other and establish security mode communication (S86). The actual set up in-
formation is delivered through the Call Control Setup message (S87). It identifies the
transaction and indicates the quality of service (QoS) requirements. Upon receiving the
message, the network starts activities for radio bearer allocation by checking if there
are enough resources available to satisfy the requested QoS. If yes, the radio bearer is
allocated according to the request. If not, the network may select either to continue
allocation with a lowered QoS value, or it may select to queue the request until radio
resources become available or to reject the call request (S88, S89).
Disclosure of Invention
Technical Problem
[73] However, the present inventor has recognized that improvements to the background

9
art could be made. Namely, one problem that needs to be solved is the delay associated
to the random access procedure and the interference level due to network signaling
with call establishment.
[74] For example, once the access attempt has been acknowledged by the network, the
data message containing the reason for the connection request can be transmitted. If the
UE is within an area of poor uplink coverage, then it is possible that the network does
not receive this message and does not send a response. In this case, the UE may need
to re-transmit this message many times and this can have a significant impact on the
call establishment delay and also affect the network interference level.
Technical Solution
[75] A scheme for managing access attempts for communication systems is achieved by
deriving a probability of access transmission as a function of both a priority level for
access attempts and the purpose(s) for RACH (i.e., random access cause, RACH cause,
reason for random access, etc.).
[76]
Brief Description of the Drawings
[77] Figure 1 shows the radio interface protocol architecture according to the 3GPP
radio access network standards.
[78] Figure 2 shows an example of the timing (i.e. access slots) related to a random
access transmission.
[79] Figure 3 shows examples of the reception of a downlink AICH access slot by the
UE and the reception of an uplink PRACH access slot by the UE.
[80] Figure 4 shows an exemplary structure of an AICH.
[81] Figure 5 shows an example of the types of access classes (AC) and their re-
spectively related access service class (ASC) that has an information element (IE).
[82] Figures 6 and 7 show an exemplary flow chart of the control access procedure.
[83] Figure 8 shows an example of a Signaling Establishment procedure.
[84] Figure 9 shows a call establishment procedure of the background art.
[85] Figure 10 shows an exemplary call establishment procedure of the present
invention.
Mode for the Invention
[86] One aspect of the present invention is the recognition by the present inventor
regarding the problems and drawbacks of the related art described above. Based upon
such recognition, the features of the present invention have been developed.
[87] Although the following description will refer to optimized RACH procedures for
UMTS merely for the sake of explanation, the features of the present invention are
clearly intended to be applicable to various other types of communication methods and

10
systems that would benefit from employing the particular features of the present
invention.
[88] One aspect of the invention is to provide priority levels for allowed access attempts
on a basis of access class (AC) and the purpose(s) for RACH.
[89] Here, it should be noted that the purpose(s) for RACH may also be referred to by
other similar terms and phrases, such as random access cause, RACH cause, es-
tablishment cause, reason for random access, and the like. However, it can be clearly
understood that such labeling and other terminology are mere exemplary and thus may
be clarified (or amended) as a result of ongoing or future discussions in stan-
dardization.
[90] Another aspect of the invention is to derive the purpose(s) for RACH from the first
phase of access attempt through the various combinations of access resources
allocation in frequency domain, in time domain, in code domain, or mixtures thereof.
The allocation resources for allowed access attempt can be achieved in several ways,
with the most suitable depending on the application or the purpose(s) for RACH and
the type of data being transferred or the particular requirement.
[91] The invention could be implemented as part of any fixed or wireless network in
order to optimize the random access delay and to reduce the interference level of the
associate signaling.
[92] Similar to the background art, all UEs are members of randomly allocated mobile
populations, defined as Access Classes (AC). The population number may be stored in
the UE (e.g., stored in a SIM/USIM). If the UE is a member of at least one AC which
corresponds to the permitted classes as signalled by the network, access attempts are
allowed; otherwise access attempts are not allowed.
[93] Equation (1):
[94] Allowed access attempt = f(access service class).
[95] In the present invention, UE derives when to start access attempts, based on the
transmission probability on a basis of access service class and also on the basis of
access resources allocated to the corresponding purpose(s) for RACH as signalled by
the network.
[96] Equation (2):
[97] Probability of access transmission =j\access service class, purposes for RACH).
[98] The particular purpose(s) for RACH for which a UE wants the access determines
when the UE is allowed to use access resources. Allocation of access resources should
be done through the various combinations of radio resources in frequency domain, in
time domain, in code domain, or mixtures thereof.
[99] Equation (3):
[100] Radio access resource allocation =f(time and/or frequency and/or code and/or...).

11
[101] Equation (4):
[102] Allowed access resource = /(Purposes for RACH).
[103] Access resources should be divided among several purposes for RACH with
different priorities. Note that the purposes for RACH could be divided into different
purpose for RACH groups depending on the type of data being transferred, such as,
traffic class (conversational, background, interactive, streaming); mobility
management (location area update, etc.); measurement report, and the like.
[104] Each purpose for RACH represents the transmission priority of the access attempt,
so that certain kinds of cause have a higher probability to gain access than other kinds
of cause. Allocation of access resources could be fixed or based on a load balancing
through the possible establishment cause. Load balancing can be implemented in
different ways, for example:
[105] Random Allocation
[106] In a random allocation, access resources are assigned to any purpose for RACH
randomly. Such case can lead to overloading of access resources for one purpose for
RACH while under allocation of others, since one of the purpose for RACH may be
assigned many more access resources during some time period , while the other
purpose for RACH are without accesses resources assigned. However, on average,
each purpose for RACH gets its share of the load due to the random selection.
[107] Uniform Allocation
[108] Uniform allocation keeps the access resources equally divided among the available
purposes for RACH in an orderly fashion. The access resources are allocated on a
rotating basis. Allocation of resources for the first purpose for RACH is selected
randomly from the list of purposes for RACH. For the following allocations, the
selection follows the circular order. Once a purpose for RACH is assigned to access
resources, this purpose for RACH is moved to the end of the list.
[109] Weighted Allocation
[110] Weighted allocation is a variant of uniform allocation. In case of a weighted
allocation, one can assign a weight to each purpose for RACH in the list so that if one
network/operator wants to allocate twice as much access resources to one purpose for
RACH as the other, this purpose for RACH gets a weight of two. In such cases, the
network/operator can take care of the network capacity and access resources capacity
for any purpose for RACH.
[Ill] The configuration of a load balancing should be decided on the particular re-
quirement. For example, the weighted allocation should be used:
[112] - if some of the purposes for RACH take longer than the others to process;
[113] - to allow access for some purposes for RACH while denying the access to other;
and/or

12
[114] - to control availability of radio resources dedicated for specific services.
[115] However, if the capacity is equally required for all purposes for RACH, uniform
allocation will be sufficient.
[116] Accordingly, the access resources in which the UE attempts the access indicate
about the purpose(s) for RACH. In such case, the present invention solves the
problems of the background art.
[117] No need to transmit or re-transmit the message conveying purpose for RACH, thus:
number of signalling message is reduced; and interference level caused by re-
transmissions is decreased.
[118] Also, collision probability is decreased by: 1/number of purposes for RACH, since
the purposes for RACH for which a UE wants the access determines when the UE is
allowed to use access resources.
[119] Thus, the overall access delay is decreased compared to the background art.
[120] Figure 9 shows a call establishment procedure of the background art., and Figure 10
shows an embodiment of a call establishment procedure of the present invention.
[121] Referring to Figure 9, the call establishment procedure in the related art required the
exchanging of several messages between a mobile terminal (UE: user equipment) and a
radio network. The call establishment procedure is divided into two phases.
[122] In the first phase, the UE derives a random access probability on the basis of an
access service class (S91). Upon doing so, a message indicating an access attempt
procedure is sent to the network (S92). When the access attempt is successful, the
network responds by sending a message indicating such to the UE (S94). It can be
noted that multiple access attempts may need to be repeatedly performed until it is
successful. In these multiple access attempts, a new random access probability is
derived for each repetition (S93).
[123] In the second phase, upon receiving the message from the network indicating that
the access attempt was successful, the UE then transmits another message that includes
the purpose(s) for RACH (i.e., the reason or purpose of call establishment) (S95).
Upon proper receipt, the network sends an acknowledgement back to the UE (S97).
Here, the sending of the purpose(s) for RACH may need to be repeated until proper ac-
knowledgement from the network is received (S96).
[124] Upon completing the first and second phases, a link establishment authentication
and security control for call establishment are performed (S98).
[125] Referring to Figure 10, the call establishment procedure of the present invention
requires a minimal amount of message exchanges between the UE and the network.
Here, the related art second phase procedure is not necessary in the present invention.
[126] The UE derives a random access probability on the basis of an access service class
and also the purposes for RACH (S101). Upon doing so, a message indicating an

13
access attempt procedure is sent to the network (S102). When the access attempt is
successful, the network responds by sending a message indicating such to the UE
(S104). It can be noted that multiple access attempts may need to be repeatedly
performed until it is successful. In these multiple access attempts, a new random access
probability is derived for each repetition (S103).
[127] Thereafter, a link establishment authentication and security control for call es-
tablishment are performed (S104, S105).
[1281 Thus far, an exemplary scheme for improved access attempts has been described for
mobile communication systems. However, the concept and features of the present
invention are not limited to wireless system, but has applicability to any com-
munication system having an access protocol for communication resources.
[129] The probability of access transmission is on a basis of both and access service class
as well as the purposes for RACH (i.e., random access cause, RACH cause, etc.). The
reason for call establishment is derived from the first phase of access attempt through
the various combinations of access resources allocation. The particular purpose for
RACH for which a UE wants the access determines when the UE is allowed to use
access resources.
[130] The present invention may result in a decrease in random access delays, a decrease
in collision probability, a reduction in signaling messages, a decrease in interference
level caused by a related art establishment cause message transmission, and the Like.
[131] Minimizing the call setup delay across the network may be additionally achieved by
also improving coverage and reducing the number of retransmissions.
[132] The present invention provides a method of handling access attempts by a network,
the method comprising: allocating access resources depending upon at least one
random access cause in relation with access service classes; transmitting information
about the allocated access resources; and allowing at least one terminal to perform
access attempts using the allocated access resources
[133] The method may further comprise: deriving the random access cause from a
preamble in an access burst received from the terminal. The deriving step may
comprise: using radio resources divided among several random access causes or
groups of random access causes with different priorities. The allocating step may
comprise allocation of access resources in a fixed or dynamic manner. The dynamic
allocation of access resources may be based on load balancing. The load balancing
may be performed through random access causes. The load balancing may be im-
plemented by at least one of a group comprising random allocation, uniform allocation
and weighted allocation. The network may know how to reserve appropriate resources
for a traffic channel depending on the ransom access cause. The ransom access cause
may be derived from a first phase of an access attempt through various combinations

14
of access resource allocation in frequency domain, in time domain, or both. The access
resource allocation may also depend on the type of data being transferred.
[134] Also, the present invention provides a method of handling access attempts by a
terminal, the method comprising: receiving parameters about access attempts from a
network; receiving information about radio access resources for each random access
cause; and attempting random access on a basis of an access service class and a
random access cause.
[135] The attempting step may be performed in a given window period if time division
multiplexing is used. The attempting step may comprise: transmitting a preamble in an
access burst related to the random access cause. The access service class may be used
to derive a random access attempt, and the random access cause is used to derive
which access resources are to be used.
[136] Additionally, the present invention provides a radio interface protocol stack
comprising: a protocol entity adapted to derive a probability of access transmission as
a function of both a priority level for access attempts and a random access cause, and
to perform link establishment authentication and security control call establishment
based upon the deriving.
[137] The priority level may be defined as an access service class indicating a randomly
allocated mobile population number. The random access cause may be defined as a
purpose for RACH. The protocol stack wherein the features may be implemented in a
mobile terminal. The deriving step may comprise: receiving parameters about access
attempts from a network; and receiving information about radio access resources for
each random access cause. The protocol entity may be implemented in a network
entity. The deriving step may comprise: allocating access resources depending upon at
least one random access cause in relation with access service classes; and transmitting,
to a mobile terminal, information about the allocated access resources.
[138] It should be noted that the features of the present invention are related to at least the
3GPP standard. Certain relative portions of the 3GPP specification, such as 22.011 (=
GSM 02.11), 25.321, 25.331 related to the Medium Access Control (MAC) protocol
specification, V6.5.0 and their related sections or portions thereof, as well as various
developing enhancements thereof pertain to the present invention. Such standards are
part of the embodiments of the present invention and constitute part of the present
disclosure by being incorporated herein by reference.
[139] This specification describes various illustrative embodiments of the present
invention. The scope of the claims is intended to cover various modifications and
equivalent arrangements of the illustrative embodiments disclosed in the specification.
Therefore, the following claims should be accorded the reasonably broadest inter-
pretation to cover modifications, equivalent structures, and features that are consistent

15
with the spirit and scope of the invention disclosed herein.

16
Claims
[1] A method of handling access attempts by a network, the method comprising:
allocating access resources depending upon at least one random access cause in
relation with access service classes;
transmitting information about the allocated access resources; and
allowing at least one terminal to perform access attempts using the allocated
access resources.
[2] The method of claim 1, further comprising:
deriving the random access cause from a preamble in an access burst received
from the terminal.
[3] The method of claim 2, wherein the deriving step comprises:
using radio resources divided among several random access causes or groups of
random access causes with different priorities.
[4] The method of claim 1, wherein the allocating step comprises allocation of
access resources in a fixed or dynamic manner.
[5] The method of claim 4, wherein the dynamic allocation of access resources is
based on load balancing.
[6] The method of claim 5, wherein the load balancing is performed through random
access causes.
[7] The method of claim 5, wherein the load balancing is implemented by at least
one of a group comprising random allocation, uniform allocation and weighted
allocation.
[8] The method of claim 1, wherein the network knows how to reserve appropriate
resources for a traffic channel depending on the ransom access cause.
[9] The method of claim 1, wherein the ransom access cause is derived from a first
phase of an access attempt through various combinations of access resource
allocation in frequency domain, in time domain, or both.
[10] The method of claim 9, wherein the access resource allocation also depends on
the type of data being transferred.
[11] A method of handling access attempts by a terminal, the method comprising:
receiving parameters about access attempts from a network;
receiving information about radio access resources for each random access
cause; and
attempting random access on a basis of an access service class and a random
access cause.
[12] The method of claim 11, wherein the attempting step is performed in a given
window period if time division multiplexing is used.

17
[13] The method of claim 11, wherein the attempting step comprises:
transmitting a preamble in an access burst related to the random access cause.
[14] The method of claim 11, wherein the access service class is used to derive a
random access attempt, and the random access cause is used to derive which
access resources are to be used.
[15] A radio interface protocol stack comprising:
a protocol entity adapted to derive a probability of access transmission as a
function of both a priority level for access attempts and a random access cause,
and to perform link establishment authentication and security control call es-
tablishment based upon the deriving.
[16] The protocol stack of claim 15, wherein the priority level is defined as an access
service class indicating a randomly allocated mobile population number.
[17] The protocol stack of claim 15, wherein the random access cause is defined as a
purpose for RACH.
[18] The protocol stack of claim 15, wherein the features are implemented in a mobile
terminal.
[19] The protocol stack of claim 18, wherein the deriving step comprises:
receiving parameters about access attempts from a network; and
receiving information about radio access resources for each random access cause.
[20] The protocol stack of claim 15, where the protocol entity is implemented in a
network entity.
[21] The protocol stack of claim 20, wherein the deriving step comprises:
allocating access resources depending upon at least one random access cause in
relation with access service classes; and
transmitting, to a mobile terminal, information about the allocated access
resources.

An improved
access attempt procedure for call
establishment is achieved by deriving
a probability of access transmission
as a function of both a priority level
for access attempts and a random
access cause, and performing link
establishment authentication and
security control call establishment
based upon the deriving.

Documents:

http://ipindiaonline.gov.in/patentsearch/GrantedSearch/viewdoc.aspx?id=TR/Tx7K5lTZXiF7IR9ASOg==&loc=wDBSZCsAt7zoiVrqcFJsRw==


Patent Number 268776
Indian Patent Application Number 467/KOLNP/2008
PG Journal Number 38/2015
Publication Date 18-Sep-2015
Grant Date 16-Sep-2015
Date of Filing 01-Feb-2008
Name of Patentee LG ELECTRONICS INC.
Applicant Address 20 YOIDO-DONG, YONGDUNGPO-GU, SEOUL
Inventors:
# Inventor's Name Inventor's Address
1 VUJCIC DRAGAN 8TER, RUE DES CENDRIERES, F-91470 LIMOURS
PCT International Classification Number H04L 29/06
PCT International Application Number PCT/KR2006/003563
PCT International Filing date 2006-09-07
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 60/715,704 2005-09-08 U.S.A.