Title of Invention

AN APPARATUS AND METHOD FOR FAST ACCESS IN A WIRELESS COMMUNICATION SYSTEM

Abstract Systems and methodologies are described that facilitate a fast access in a wireless communication system, such as OFDMA. According to various aspects, the system and methods are described for transmitting an access probe, receiving a first grant message, wherein the first grant message comprises a portion representing a first identification, transmitting a message using a second identification, wherein the second identification is not equal to the first identification. Also, generating an access grant in response to receiving the access probe wherein the access grant comprising a portion representing a first identification
Full Text AN APPARATILS AND METHOD FOR FAST ACCESS IN A WIRELESS COMMUNICATION SYSTEM

CROSS-REFERENCE TO RELATED APPLICATION

|000i | This application claims the benefit of U. S provisional application Serial

No. 60/784,740, filed on March 20, 2006, and entitled A FAST ACCESS METHOD. The entirety of this application is incorporated herein by reference

BACKGROUND I- Field

[00021 The following description relates generally to wireless communications, and more particularly to schemes for fast access of resources

IL Background

[00031 Wireless communication systems are widely deployed to provide \ arious types of communication content such as voice, data, and so on These systems may be multiple-access systems capable of supporting communication with multiple users by sharing the available system resources (e g.. bandwidth and transmit power). Examples of such multiple-access systems include code division multiple access (CDMA) systems, time division multiple access (TDMA) systems, frequency division multiple access (FDMA) systems, and orthogonal frequency division multiple access (OFDMA) systems.

[0004} Wireless communication systems have become a prevalent means by which majority of people worldwide have come to communicate. Wireless communication devices have become smaller and more powerful in order to meet consumer needs, improve portability and convenience. The increase in processing power in mobile devices such as cellular telephones has lead to an increase in demands on Vt ire! ess network transmission systems.

[0005} A typical wireless communication network (e.g., employing frequency, time, and code division techniques) includes one or more base stations that provide a coverage area and one or more mobile {e.g., wireless) terminals that can transmit and receive data within the coverage area. A typical base station can concurrently transmit

multiple data streams for broadcast, multicast, and/or unicast services, wherein a data stream is a stream of data that can be of independent reception interest to a mobile terminal A mobile terminal within the coverage area of that base station can be interested in leceiving one, more than one or all the data streams carried by the composite stream Likewise, a mobile terminal can transmit data to the base station or another mobile terminal

|0006] In a Long Eerm Evolution (I I E) systems, a random access channel

(RAC?t) may be used when a terminal or user equipment (UF) requires resources for establishing a connection with base station s

SUMMARY f0007| The following presents a simplified summary of one or more aspects in order to pro\ idc a basic understanding of such aspects This summary is not an extensive overview of all contemplated aspects, and is intended to neither identify key or critical elements of all aspects nor delineate the scope of any or all aspects Its sole purpose is to present some concepts of one or more aspects in a simplified form as a prelude to the more detailed description that is presented later |000S| In accordance an aspect, a method of fast access in a wireless communication system, the method generating an access probe comprising an access preamble ha\ uig a quality of sen tee information and transmitting the access probe on a random access channel

|0009| In accordance an aspect, a method of fast access in a wireless communication system, the method receiving an access probe, the access probe

comprising a quality of service information, generating an access grant in response to the receive access probe, scrambling the access grant using information from the access probe, and transmitting the access grant

According to another aspect, an apparatus operable in a wireless communication system, the apparatus comprises' means for transmitting an access probe, means for receiving a first access grant, wherein a portion of the first access grant is set to null; and means for transmitting user data along with a first MAC ID if the user data is transmitted after receiving the first access grant.

In another aspect, an apparatus operable in a wireless communication system, the apparatus comprises, means for receiving an access probe; means for generating an access grant in response to receiving the access probe wherein the access grant- comprising a portion of the access grant set to null; and means for receiving user data and a first MAC ID.

In accordance with still another aspect, a computer readable medium has stored thereon computer executable instructions for performing the following instructions: transmitting an access probe; receiving a first access grant, wherein a portion of the first access grant is set to null; and transmitting user data along with a first MAC ID if the user data is transmitted after receiving the first access grant

In another aspect, a computer readable medium has stored thereon computer executable instructions for performing the following instructions: receiving an access probe; generating an access grant in response to receiving the access probe wherein the access grant comprising a portion of the access grant set to null; and receiving user data and a first MAC IJ).

According to yet another aspect, an integrated circuit comprises, means for transmitting an access probe; means for receiving a first access grant, wherein a portion of the first access grant is set to null, and means for transmitting user data along with a first MAC ID if the user data is transmitted after receiving the first access grant.

In another aspect, an integrated circuit comprises: means for receiving an access probe; means for generating an access grant in response to receiving the access probe wherein the access grant comprising a portion of the access grant set to null; and means for receiving user data and a first MAC ?D.

In accordance with yet another aspect, an electronic device operable in a wireless communication s> stem, comprises a transmitter, the transmitter transmitting an access probe, a receiver, the receiver receiving a first access grant, wherein a portion of the first access giant is set to null, and the transmitter further transmitting usei data along with a first MAC ?D if the user data is transmitted after receiving the first access grant

Yet in another aspect. In accordance with an aspect, a method of fast access in a ¦\\ u el ess communication system, comprising transmitting an access probe, receiving a first grant message, wherein the first grant message comprises a portion representing a first identification, and transmitting a message using a second identification, wherein the second identification is not equal to the first identification

According to yet another aspect, a method of fast access in a wireless communication system, comprises receiving an access probe, generating an access grant in response to receiving the access probe wherein the access grant comprising a portion representing a first identification, and receiving a message comprising a second identification that not equal to the transmitted first identification

According to another aspect, an apparatus operable in a wireless communication s> stem, the apparatus comprises means for transmitting an access probe, means for receiving a first grant message, wherein the first grant message comprises a portion representing a first identification, and means for Uansmitt?ng a message using a second identification, wherein the second identification is not equal to the first identification

Another aspect relates to an apparatus operable in a wireless communication svstem, comprising means foi reeeh ing an access probe, means for generating an access grant in response to receiving the access probe wherein the access grant comprising a portion representing a first identification, and means for receiving a message comprising a second identification that not equal to the transmitted first identification

Yet another aspect relates to a computer readable medium having stored thereon computer executable instructions for performing the following instructions transmitting an access probe; receiving a first grant message, wherein the first grant message comprises a portion representing a first identification, and transmitting a message using

a second identification, wherein the second identification is not equal to the first identification

Another aspect provides for a computer readable medium having stored thereon computer executable instructions for performing the following instructions receiving an access probe, generating an access grant in response to receiving the access; probe wherein the access grant comprising a portion representing a first identification, and receiving a message comprising a second identification that not equal to the transmuted fust identification

Still \et another aspect relates to an integrated circuit comprising means for transmitting an access probe, means for receiving a first grant message, wherein the first grant message comprises a portion representing a first identification, and means for transmitting a message using a second identification, wherein the second identification is not equal to the first identification

According to yet another aspect, an integrated circuit comprises means for receiving an access probe, means for generating an access grant in response to receiving the access probe wherein the access grant comprising a portion representing a first identification, and means for receiving a message comprising a second identification that not equal to the transmitted first identification

According to another aspect, an electronic device operable in a wireless communication system, the electronic device comprises a transmitter, the transmitter transmitting an access probe, a receiver, the receiver receiving a first grant message, wherein the first grant message comprises a portion representing a first identification, and the transmitter transmitting a message using a second identification, wherein the second identification is not equal to the fust identification

Yet another aspect relates to an electronic tee operable in a wireless communication system, com prisescompri sing a receiver, the receiver receiving an access probe, a processor, the processor generating an access grant in response to receiving the access probe therein the access grant comprising a portion of the access grant set to misrepresenting a first identification, and the recener further receiving user data and a first MAC IDa message comprising a second identification that not equal to the transmitted first identification

|0010| To the accomplishment of the foregoing and related ends, the one or more aspects comprise the features hereinafter fully described and particularly pointed out in the claims The following description and the annexed drawings set forth in detail certain illustraihe aspects of the one or mote aspects These aspects aie indicative, however, of but a few of the ways in which the principles of various aspects may be employed and the described aspects are intended to include all such aspects and their equivalents

BRIEF DESCRIPTION OF THE DRAWINGS f 00111 FlG 1 i s an i Il ustrati on of an exampl e sy stem that effectuates opti m al downlink transmission in a wireless communication environment

{00121 FJG » is an illustration of an example methodology that facilitates a t\ pe of system employ ed by an access point in a wireless communications system

|0013 j KIG 3 is an illustration of an example methodology that facilitates a t>pe of system employed by an access terminal in a wireless communications system

{00141 FIG 4 is a methodology that facilitates a fast access procedure in a wireless communication system in accordance with various aspects set forth herein

[0015} KIG 5 is an example methodology that facilitates receiving an access probe in a wireless communications system

{0016J FIG 6 illustrates a wireless communication system in accordance with various embodiments presented herein

|0017| FlGs 7 A and 7B illustrates s\ stems that facilitates fast access in a wireless communication

{001 SJ FIG 8 illustrates a terminal or user device that provides foi other scctoi communication in a wireless communication environment in accordance with one or more aspects set forth herein

|0019} Fig 0 is an illustration of a system that facilitates other sector communication in a communication environment in accordance with various aspects

{002OJ Fig 10 illustrates an exemplary wireless communication system in accordance with various aspects

DETAILED DESCRIPTION

|0021| Various embodiments are now described with, reference to the drawings, wherein like reference numerals are used to refer to like elements throughout In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of one or more embodiments. It may be evident, however, that such embodiment^ rnay be practiced without these specific details, in other instances, well-known structures and devices are shown in block- diagram form in order to facilitate describing one or more embodiments. [0022} As used in this application, the terms "component," "module," "system," and the like are intended to refer to a computer-related entity, either hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers, in addition, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems by way of the signal).

|002J| Furthermore, various embodiments are described herein in connection with a mobile device. A mobile device can also be called a system, subscriber unit, subscriber station, mobile station, mobile, remote station, remote terminal, access terminal, user terminal, terminal, wireless communication device, user agent, user device, or user equipment (UE). A mobile device may be a cellular telephone, a cordless telephone, a Session Initiation Protocol (SlP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a handheld device having wireless connection capability, computing device, or other processing device connected to a wireless modem. Moreover, various embodiments are described herein in connection

with a base station A base station may be utilized for communicating with mobile device(s) and may a! so be referred to as an access point, Node B, or some other terminology

J0O24J Moreen er, various aspects or features described herein may be implemented as a method, apparatus, or article of manufacture using standard programming and'Or engineering techniques The term "article of manufacture" as used herein is intended to encompass a computer program accessible from any computer- readable de\ ice, carrier, or media For example, computer-readable media can include but are not limited to magnetic storage deuces ie #;. hard disL floppy disk, magnetic strips, efcX optical disks (.#., compact disk (CD), digital versatile disk (DVD), efcX smart cards and Hash memory devices (e g , RPROM1 card, stick, key drive, etc.) Additionally, \arious storage media described herein can represent one or more devices and/or other machine-readable media for storing information The term "machine- readahie medium" can include, without being limited to, wireless channels and various other media capable of storing, containing, and/or carrying instruct! on(s) and/or data J0025| Referring now to K?g. 1. a sv stem 100 that effectuates optimal down! ink transmission in a wireless communication environment is illustrated in accordance with ?arious embodiments herein Base station 102 is configured to communicate with one or more mobile ices 104 Base station 102 is comprised of an optimization component 10o thai allows for multiplexing of localized and distributed transmissions, and a receiving component 108 that, for example, receives information regarding base station capabilities Optimization component ! 06 allows for downlink transmission such that frequency diversity is achieved and overhead costs associated with the transmission are mitigated via various schemes, as discussed injra As can be appreciated, multiplexing of localized and distributed transmissions allows for accommodation of various traffic services, user abilities and further allows a user of the one or more mobile devices 104 to take advantage of channel properties Moreover, for example, the one or more mobile devices 104 can prov ide the optimization component 106 at the base station 102 with information related to mobile device capabilities, an estimate of downlink channel conditions, and subscriber data It is also to be appreciated that the base station 102 can determine a percentage of high speed versus low speed users, store subscriber data and information related to mobile device

capabilities Such capabilities of base station J 02 can further allow optimization component 1 Oo to choose the optimal multiplexing scheme according to surrounding conditions

|0026j Referring to Figs, 2-3, methodologies relating to a fast access communication system are illustrated While, for purposes of simplicity of explanation, the methodologies are shown and described as a series of acts, it is to be understood and appreciated that the methodologies are not limited by the order of acts, as some acts may. in accordance with the claimed subject matte?, occur in different orders and/or concurrently with other acts from that shown and described herein For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or esents, such as in a state diagram Moreover, not all illustrated acts may be required to implement a methodology m accordance with the claimed subject matter

|0027 j Turning specifically to Fig. 2, a methodology 200 that facilitates a fast access procedure in a wireless communication system (for example, OFDM or OFDMA systems) is illustrated The method may be used for initial access, synchronization when terminal is lost synchronization or is not in sync with access network, or handoff T he method starts at 202, an access probe is transmitted to the access network (Node B) In an aspect, the access probe is transmitted on random access channel (RACH) To rnirmpi/e the use of uplink resources, only a preamble is transmitted The preamble may include downlink CVI information {enables power control of an access grant message sent on the downlink in response to access probe, discussed below ), channel quality indicator feedback, QoS related information (enables scheduler to select and/or prioritize initial resource assignment), Random ID (reduces probability that identical access probes from different I His arrive at Node B at the same time) and Cell ID (used for scrambling access probe so that the probe is decoded successfully at the target Node B onh ) ?n access probe preamble comprises of an access sequence The access sequence is derived from I1H^s downlink O/l, QoS info and/or a random number used to possible collisions In an aspect, all access sequences are orthogonal The access sequence is scrambled before transmission h> the cell specific scrambling sequence In another aspect, scrambling sequence is not only a function of cell ID but also in addition of cell ID a function of MAC1 ID (arty sort of L? (D ?s sufficient)

|0028| In an aspect, after transmitting the access probe the method moves to

204, a determination is made as to whether an access grant is recehed in response to the access probe Jf access grant is reeeh ed, the method moves to 206 after decoding the access grant using information from the access probe At 206, a connection open lequest message (for example, CurmectionQpep Request) is transmitted the method waits for response At 208. a connection open response message (COnIIeCIiOIiOpCnReSpOn4Se) is received in response to the connection open request message In another aspect, if the terminal is already assigned a MAC ID (for example when terminal is active state), method described at 206 and 208 may be eliminated and the terminal may start exchanging data with access network f O029J Referring hack to 204, if the access grant is not received after a predetermined time, the method moves to 208 At 210, a determi nation is made as to w hether a predetermined maximum number of retransmissions are reached if the maximum number of retransmission of access probe have occurred, then method moves to 212 At 2)2. transmit power is reset to original level and access probe is retransmitted The method moves to 204 to check if the access grant is received If the maximum number of retransmission of access probe was not reached, the method moves to 214 ?t 214, the access probe is retransmitted with higher power T he method mox es to 204 to check if the access grant is received

|0030| With reference now to Fig. 3. an example methodology 300 that facilitates a receiving an access probe a wireless communications system is illustrated The method begins at iO2, an access probe comprising an access sequence is received If the access probe is successfully detected, then the method moves to 304 At 304, the access network generates an access gram The access giant h associated with the access probe and uses information from the received access probe lhe access network determines the parameters to provide to the terminal associated with the access probe to the terminal to exchange data with the access network The access grant, among other things, comprises terminal MAC ID. uplink resource assignment and uplink adjustments The access grant raa\ be scrambled and protected using error correction schemes If the access grant is transmitted on a broadcast channel to several terminals, then it may be scrambled using information from access probe, such that only the requestor is able decode the access grant 1-or example, the Node B scrambles the access

grant with access preamble sequence it has received. Only the UE thai selected the corresponding access preamble sequence may decode the access grant. After the access grant is generated, at 306, the method transmits the access grant and waits for request for an open connection At 308, the open connection request message is received. After authenticating the terminal, at 310, the open connection response message is transmitted

|0031] In another aspect methodologies illustrated in Fig 2-3 may be applied for handoiT scheme. The UC negotiates handoff with the source Node B. In parallel, the source Node B negotiates handoff with the target Node B. Before UE may start exchanging data on target Node B. UE transmits synchronization message towards the target node B Synchronization message consists of access preamble and it is transmitted on RACH Scrambling sequence is a function of target cell ID as its MAC H). When uplink synchronization is achieved, target Node B sends access grant to UE |00321 In another aspect methodologies illustrated in Fig 4-5 may be applied for synchronization Turning specifically to Fig. 4, a methodology 400 that facilitates a fast access procedure in a wireless communication system (for example, OFDM or OFDMA systems) is illustrated The method may be used for synchronization when terminal has lost synchronization or is no! in sync with access network or handoff. The method 400 is executed upon the terminal determining that it is not in sync with access network. The terminal may loose sync with access network if terminal transit?oped into sleep mode from active mode, deep fading, or during a handoff procedure. In an aspect, the method starts at 404, the access terminal transmits an access signature (may be referred to as access probe) to the access network (Node B). In an aspect, the access probe is transmitted on random access channel (RACII). The access probe may include downlink (71 information, channel quality indicator feedback, QoS related information, Random ?D, Cell ID or MAC ID flag. Since this method is for re- synchronization, the terminal may already have a MAC ID and does not need a new MAC ID from the access network. In an aspect, the MAC ID flag of access probe may be set to indicate that a new MAC ID is not desired or the MAO ID flag is not used. J0033| After transmitting the access probe the method moves to 406. the terminal receives an UL access grant from access network (Node B) in response to the access probe. In an aspect, the first UL grant message received in response to the access

probe may contain information about UL resources, timing parameters to adjust the timing and a MAV H) portion In an aspect, the MAC ID portion may be set to NULL, (for example a series of zeros or any pattern used for indicating unusable data) for the first UI grant message receh ed in response to the access probe Tbe terminal may ignore the processing of the MAC ?D portion of the grant message Where the MAC ID portion is not KL II. (access network has assigned a new MAC ID), the terminal may continue to ignore the new MAC Sl) and use the any previously assigned MAC IE) slot ed in memory If a terminal does not have an assigned MAC ID, then terminal may use the MAC ID from the access grant message \a another aspect, the access network may provide the MAC TD extracted from the mcrnors based on information from the access probe In this aspect, the IH grant message ma\ comprise different set of parameters and the terminal would process the MAC ID portion the difference UL grant message

|0034 j Referring to 408, using the received parameters from access grant, establishing communication with access network wherein the terminal begins communicating user data In an aspect, the terminal provides its MAC ID when transmitting on uplink shared channel The access network may store this MAC ID in memory \\ 410, the terminal receh es a second or subsequent UL access grant message from access network I he terminal processes the M?C ID portion of all LrL grant messages received subsequent to receiving first UI access grant message (discussed at 406) Thereafter, at 412, the terminal transmits user data on uplink shared channel, but does not provide the M AC ID as part of subsequent user data transmissions [0035} With reference now- to Fig, 55 an example methodology 500 that facilitates receiving an access probe in a wireless communications system The method begins at 502, an access probe is recened If the access probe is successfully detected, then the method moves to 504 At 504, the access network generates an access grant The access grant is associated with the access probe and user information from the received access probe The access network determines the parameters to provide to the terminal associated with the access probe to the terminal to exchange data with the access network The access grant among other tilings, comprises, uplink resource assignment and uplink adjustments In an aspect, the access probe may include a VlAC ID flag If the MAC1 ID flag is part of the access probe and is set {thus the terminal is

requesting access network to assign a MAC ID), then a MAC ID may be included as part of the access grant message In another aspect, the access probe does not include any indication that a ?i AC ID is request In this aspect, the MAC ID portion of the UL access grant message, transmitted in. response to access probe indicating that MAC ID is not required, provides MAC ID as NULL In another aspect, the access probe comprises a first indicator If the first indicator is set, then the access network determines the access probe as a zero rate request and the access network may only provide timing adjustment oi pouei adjustment At 506, the access network receives a first message after the access grant The first message may contain MAC ID or user data At 508, the access network updates memory to indicate that all future messages, for example a second UI. access grant menage will use received MAC ID {00361 Referring now to Kig. 6. a wireless communication system 600 is illustrated in accordance with various embodiments presented herein S> stem 600 can comprise one or more base stations 602 (e.g., access points) in one or more sectors mat receive, transmit, repeat, tic, wireless communication signals to each other and/or to one or more mobile de\ ices 604 Bach base station 602 can comprise a transmitter chain and a receiver chain, each of which can in turn comprise a plurality of components associated with signal transmission and reception (e.g., processors, modulators, multiplexers, demodulators, demultiplexers, antennas, ) as will be appreciated by one skilled in the art Mobile ices 604 can be, for example, cellular phones, smart phones, laptops, handheld communication devices, handheld computing devices, satellite radios, global positioning s\ stems, PDAs, and''or an\ other suitable device for communicating over wireless communication system 600 |0O37J Base stations 602 can broadcast content to mobile devices 604 by employing OFDM or OFDMA techniques Frequency ?h ision based techniques such as OFDM typically separate the frequency spectrum into distinct channels, for instance, the frequency spectrum max be split into uniform chunks of bandwidth (frequency range) OFDM effectively partitions the overall system bandwidth into multiple orthogonal frequency channels The frequency channels may use Sync or Async HARQ assignments, depending on the system requirements Additionally, an OFDM system may use time and/or frequency division multiplexing to achieve orthogonality among multiple data transmissions for multiple base stations 602

|0038J Referring now to Fig. 7A, a system 700 that facilitates fast access in a wireless communication is illustrated. System 700 may include a module 702 for generating an access probe, a module 704 for receiving a first access grant and module 706 for transmitting user data. Modules 702, 704 and 706 may be a processor or any electronic device and may be coupled to memory module 708. |0039J Referring now to Fig, 7B, a system 750 that facilitates fast access in a wireless communication is illustrated. System 750 may include a module 752 for receiving an access probe, a module 754 for generating an access grant in response to the receive access probe, and a module 756 for receiving user data Modules 752-756 may be a processor or any electronic device and may be coupled to memory module 760

{00401 F>g« 8 is an illustration of a terminal or user device 800 that provides for other sector communication in a wireless communication environment in accordance with one or more aspects set forth herein. Terminal 800 comprises a receiver 802 that receives a signal for instance one or more receive antennas, and performs typical actions {e.g., filters, amplifies, downcomerts. etc.) the received signal and digitizes the conditioned signal to obtain samples A demodulator 804 can demodulate the samples and provide received pilot symbols to a processor 806.

|004I j Processor 806 can be a processor dedicated to analyzing information received by receiver component 802 and/or generating information for transmission by a transmitter 814. Processor 806 can be a processor that controls one or more components of terminal 800, and/or a processor that analyzes information received by receiver 802, generates information for transmission by a transmitter 814, and controls one or more components of terminal 800 Processor 806 can utilize any of the methodologies described herein, including those described with respect to Figs. 2-3, fOO42| In addition, terminal 800 can include a transmission control component

SOS that analyzes received input, including acknowledgements of successful transmissions. Acknowledgements (ACK) can be received from the serving sector and/or a neighboring sector. Acknowledgements can indicate that a previous transmission has been successful Sy received and decoded by one of the access points If no acknowledgement is received, or if a negative acknowledgement (NAK) is received, the transmission can be resent. Transmission control component 808 can be

incorporated into the processor 806. It is to be appreciated that transmission control component 808 can include transmission control code that performs analysis in connection with determining receipt of acknowledgement

|0043j Terminal 800 can additionally comprise memory 810 that is operatively coupled to processor 806 and that can store information related to transmissions, an active set of sectors, methods for controlling transmissions, lookup tables comprising information related thereto, and any other suitable information related to transmissions and active set sectors as described herein It will be appreciated that the data store (e.g.. memories) components described herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of illustration, and not limitation, nonvolatile memory can include read only memory (ROM)1 programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (KEPROM), or flash memory. Volatile memory can include random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAMj, enhanced SDRAM (ESDRAM), Synchlink DRAM (SLJ)RAM), and direct Rambus RAM (DRRAM). The memory S l O of the subject systems and methods is intended to comprise, without being limited to, these and any other suitable types of memory. Processor S06 is connected to a symbol modulator 812 and transmitter 814 that transmits the modulated signal. f0044| Fig. 9 is an illustration of a system 900 that facilitates other sector communication in a communication environment in accordance with various aspects. System 900 comprises an access point 902 with a receiver 910 that receives signal(s) from one or more terminals 904 through one or more receive antennas 906, and transmits to the one or more terminals 904 through a plurality of transmit antennas 908. Terminals 904 can include those terminals supported by the access point 902, as well as terminals 904 supported by neighboring sectors. In one or more aspects, receive antennas 006 and transmit antennas 90S can be implemented using a single set of antennas. Receiver 910 can receive information from receive antennas 906 and is operatively associated with a demodulator 912 that demodulates received information Receiver 910 can be, for example, a Rake receiver (e.g., a technique that individually

processes multi-path signal components using a plurality of baseband correlators, ...}, an MMSE-hased receiver, or some other suitable receiver for separating out terminals assigned thereto, as will be appreciated by one skilled in the art According to various aspects, multiple receivers can be employed (e.g. , one per receive antenna), and such receivers can communicate with each other to provide improved estimates of user data. Demodulated symbols are analyzed by a processor 914 that is similar to the processor described above with regard to Fig. 10, and is coupled to a memory 916 that stores information related to terminals, assigned resources associated with terminals and the like. Receiver o?tp?t for each antenna can he jointly processed by receiver 910 and/or processor 914. A modulator 918 can multiplex the signal for transmission by a transmitter 920 through transmit antennas 908 to terminals 904 J0045] Access point 902 further comprises a terminal communication component 922, which can be a processor distinct from, or integral to, processor 914. Terminal communication component 922 can obtain resource assignment information for terminals supported by neighboring sectors In addition, terminal communication component 922 can provide assignment information to neighboring sectors for terminals supported by access point 902 Assignment information can be provided via backha?l signaling.

|0046| Based upon information regarding assigned resources, terminal communication component 922 can direct detection of transmissions from terminals supported by neighboring sectors, as well as decoding of received transmissions. Memory 916 can maintain packets received from terminals prior to receipt of the assignment information necessary for decoding of packets. Terminal communication component 922 can also control transmission and receipt of acknowledgments indicating successful reception and decoding of transmissions. It is to be appreciated that terminal communication component 922 can include transmission analysis code that performs utility based control in connection with assigning resources, identifying terminals for soft handoff, decoding transmissions and the like. The terminal analysis code can utilize artificial intelligence based methods in connection with, performing inference and/or probabilistic determinations and/or statistical -based determinations in connection w;ith optimizing terminal performance

|0047| Fig, JO shows an exemplary wireless communication system 1000. The wireless communication system 600 depicts one terminal and two access points for sake of brevity However, it is to be appreciated that the system can include one or more access point and/or more than one terminal, wherein additional access points and/or terminals can be substantially similar or different from the exemplary access points and terminal described below. In addition, it is to be appreciated that the access points and/or the terminal can employ the systems (Figs. I 5 4-9) and/or methods ( Figs, 2-3) described herein.

[0048} Fig. 10 shows a block diagram of a terminal 1004, a serving access point

I002X point that supports terminal 1024 and a neighbor access point I 002Y in multiple-access multi-carrier communication system 1000 At access point 1002X, a transmit (TX) data processor !O H receives traffic data (i.e., information bits) from a data source 1012 and signaling and other information from a controller 1020 and a scheduler 1030. For example, scheduler 1030 may provide assignments of carriers for the terminals. Additionally, a memory 1022 can maintain information regarding current or previous assignments. TX data processor 1014 encodes and modulates the received data using multi-carrier modulation (e.g., OFDM) to provide modulated data (e.g., OFDM symbols). A transmitter unit (TM FR) 1016 then processes the modulated data to generate a downlink modulated signal that is then transmitted from an antenna K) I S |0049| Prior to transmission of assignment information to terminal 1004. scheduler can provide assignment information to access point 1002 Y. The assignment information can be provided via backhaul signaling (e.g., a Tl line) 1010. Alternatively, assignment information can be provided to access point S 002Y after transmission to terminal 1004. føOSOJ At terminal 1004, the transmitted and modulated signal is received by an antenna 1052 and provided to a receiver unit (RCVR) 1054. Receiver unit 1054 processes and digitizes the received signal to provide samples A received (RX) data processor 1056 then demodulates and decodes the samples to provide decoded data, which may include recovered traffic data, messages, signaling, and so on. The traffic data may be provided to a data sink 1058, and the carrier assignment information for the terminal 1004 is provided to a controller 1060.

|005iJ Controller 1060 directs data transmission on the uplink using the specific carriers that been assigned to terminal 1004 and indicated in the receked carrier assignment A memory 1062 can maintain information regarding assigned resources (e.g., frequency, lime and/or code) and other related information |0052J For terminal 1004, a TX data processor 1074 receives traffic data from a data source 1072 and signaling and other information from controller 1060 The various types of data are coded and modulated by TX data processor 1074 using the assigned carries: s and further processed by a transmitter unit S 076 to generate an uplink modulated signal that is then transmitted from antenna 1052 |00531 At access points 1002X and 1002 Y, the transmitted and modulated signals from terminal 1004 are received antenna 1018, processed by a receiver unit 1032, and demodulated and decoded by an RX data processor 1034 Transmitted signals can be decoded based upon assignment information generated h> sen ing access point 1002X and ided to neighbor access point 1002 Y in addition, access points 10Q2X and 1002 Y can generate an acknowledgement (ACK) that can be provided to the other access point {1002X or 1002Y) and/or to terminal 1004 The decoded signals can be provided to a data sink 1036 Recen cr unit 1032 may estimate the received signal quality (e.g , the receix ed signal-to-noise ratio (SKR)) for each terminal and prcn ide this information to controller 1020 RX data processor 1034 provides the recovered feedback information for each terminal to controller 1020 and scheduler 1030 f0054| Scheduler 1030 uses the feedback information to perform a number of functions such as ( \) selecting a set of terminals for data transmission on the reverse link and (2) assigning carriers to the selected terminals E he carrier assignments for the scheduled terminals arc then transmitted on the foiward link to these terminals f 0055J I he techniques described herein may be implemented b\ \ arious means

For example, these techniques may be implemented in hardware, software, or a combination thereof For a hardware implementation the processing units (e g , controllers 1020 and 1060, FX and RX processors 1014 and 1034, and so on) for these techniques raa\ be implemented within one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs). programmable logic devices (PLDs), field programmable gate arrays

10

(FPGAs), processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described herein, or a combination thereof. j?O56| For a software implementation, the techniques described herein may be implemented with modules '.# , procedures, functions, and so on) that perform the functions described herein The software codes may be stored in memory units and executed by processors The memory unit may be implemented within the processor or external to the processor, in which case it can be communicatively coupled to the processor via various means as is known in the art

[0057} What has been described above includes examples of one or more aspects. It is. of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the aforementioned aspects, but one of ordinary skill in the art may recognize that many further combinations and permutations of various aspects are possible Accordingly, the described aspects are intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims Furthermore, to the extent that the term "includes" is used in either the detailed description or the claims, such term is intended to be inclusive in a mariner similar to the term "comprising^ as '"comprising^ is interpreted when employ ed as a transitional word in a claim.

Claims

What is claimed is"

1. A method of fast access in a wireless communication system, the method comprising. transmitting an access probe; receiving a first grant message, wherein the first grant message comprises a portion representing a fust identification: and transmitting a message using a second identification, wherein the second identification is not equal to the first identification

2. The method of claim I, further comprises of receiving a second access grant comprising the first MAC ID, wherein the MAC ID is equal to the second identification.

3. The method of claim 2, further comprises of transmitting subsequent user data without using MAC ID.

4. The method of claim 1 , further comprises of determining if synchronization with an access network is lost prior to the transmitting the access probe.

5. The method of claim i, further comprises of determining if the state of the terminal is sleep mode prior to the transmitting the access probe

6. The method of claim 1 , further comprises of increasing transmission power at which a second access probe is transmitted prior to transmitting a second access probe if the first access grant was not received within first time period

7 A method of fast access in a wireless communication system, the method comprising: receiving an access probe;

generating an access grant in response to receiving the access probe wherein the access grant comprising a portion representing a first identification, and receiving a message comprising a second identification that not equal to the transmitted first identification

8 The method of claim 7, further comprises of transmitting a second access grant comprising the second identification extracted from the received message

c> The method of claim 8, further comprises of receh ing subsequent user data without the first MAC ID

10 The method of claim 7. further comprises of transmitting a second access grant comprising the first identification extracted from memory

! 1 A apparatus operable in a wireless communication system, the apparatus comprising means for transmitting an access probe, means for receh ing a first grant message, wherein the first grant message comprises a portion representing a first identification, and means for transmitting a message using a second identification, wherein the second identification is not equal to the first identification

12 The apparatus of claim i I 5 further comprises means for receiving a second access giant composing the fust MAC ID, wherein the MAC ID is equal to the second identification

13 The apparatus of claim \ 2, further comprises means for transmitting subsequent user data without using MAC ID

14 Hie apparatus of claim I L further comprises means for determining if synchronization with an access network is lost prior to the transmitting the access probe


15. The apparatus of claim 1 J , further comprises means for determining if the state of the terminal is sleep mode prior to the transmitting the access probe.

16. The apparatus of claim ! 1 , further comprises means for increasing transmission power at which a second access probe is transmitted prior to transmitting a second access probe if the first access grant was not received within first time period

17. A apparatus operable in a wireless communication system, the apparatus comprising: means for receiving an access probe; means for generating an access grant in response to receiving the access probe wherein the access grant comprising a portion representing a first identification; and means for receiving a message comprising a second identification that not equal to the transmitted first identification.

18. The apparatus of claim 7, further comprises means for transmitting a second access grant comprising the second identification extracted from the received message.

i 9. The apparatus of claim 8, further comprises means for receiving subsequent user data without the first MAC ID.

20. The apparatus of claim 7, further comprises means for transmitting a second access grant comprising the first identification extracted from memory.

21. A computer readable medium having stored thereon computer executable instmctions for performing the following instructions: transmitting an access probe, receiving a first grant message, wherein the first grant message comprises a portion representing a first identification, and transmitting a message using a second identification, wherein the second identification is not equal to the first identification.


22. A computer readable medium having stored thereon computer executable instructions for performing the following instructions: receiving an access probe; generating an access grant in response to receiving the access probe wherein the access grant comprising a portion representing a first identification; and receiving a message comprising a second identification that not equal to the transmitted first identification.

23. An integrated circuit comprising: means for transmitting an access probe; means for receiving a first grant message, wherein the first grant message comprises a portion representing a first identification; and means for transmitting a message using a second identification, wherein the second identification is not equal to the first identification.

24. An integrated circuit comprising: means for receiving an access probe; means for generating an access grant in response to receiving the access probe wherein the access grant comprising a portion representing a first identification; and means for receiving a message comprising a second identification that not equal to the transmitted first identification.

25. An electronic device operable in a wireless communication system, the electronic device comprising: a transmitter, the transmitter transmitting an access probe; a receiver, the receiver receiving a first grant message, wherein the first grant message comprises a portion representing a first identification; and the transmitter transmitting a message using a second identification, wherein the second identification is not equal to the first identification.

ftECT/FiED SHEET (RULE 91) ISA/EP


26. An electronic device operable in a wireless communication system, the electronic device comprising: a receiver, the receiver receiving an access probe; a processor, the processor generating an access grant in response to receiving the access probe wherein the access grant comprising a portion representing a first identification; and the receiver further receiving a message comprising a second identification that not equal to the transmitted first identification.

HECTIFlED SHEET (RULE 91) ISA/EP.

Documents:


Patent Number 260148
Indian Patent Application Number 2158/MUMNP/2008
PG Journal Number 14/2014
Publication Date 04-Apr-2014
Grant Date 01-Apr-2014
Date of Filing 08-Oct-2008
Name of Patentee QUALCOMM INCORPORATED
Applicant Address 5775 MOREHOUSE DRIVE, SAN DIEGO, CALIFORNIA
Inventors:
# Inventor's Name Inventor's Address
1 DAMNJANOVIC ALEKSANDAR 14256 PINEWOOD DRIVE DEL MAR CALIFORNIA 92014
PCT International Classification Number H04Q7/38
PCT International Application Number PCT/US2007/064409
PCT International Filing date 2007-03-20
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 60/784,740 2006-03-20 U.S.A.