白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Measurement-based random access configuration

專利號(hào)
US11991548B2
公開日期
2024-05-21
申請(qǐng)人
ZTE Wistron Telecom AB; ZTE (TX) INC.(SE Kista US TX Austin)
發(fā)明人
Patrick Svedman; Jan Johansson; Yonghong Gao; Aijun Cao; Thorsten Schier; Bojidar Hadjiski
IPC分類
H04W24/10; H04B7/026; H04L5/00; H04W56/00; H04W74/0833; H04W48/16
技術(shù)領(lǐng)域
random,access,rs's,in,tp,tp's,resources,rs,some,ait
地域: Kista

摘要

A method includes: receiving one or more synchronization signals; deriving a synchronization reference from the one or more synchronization signals; receiving a plurality of reference signals; based on the derived synchronization reference, performing a plurality of measurements on the plurality of reference signals; based on the plurality of measurements, selecting a plurality of random access resources; and selecting a random access resource from the plurality of random access resources for transmitting a random access signal to at least one of the one or more TP's.

說明書

It is often useful to be able to adapt the amount of random access resources. If there are too few random access resources in relation to the amount of random access attempts, the ratio of failed attempts might be too high. If there are too many random access resources in relation to the amount of random access attempts, then resources may be wasted, since other uplink transmissions might be avoided on the random access resources, resulting in reduced system performance.

In various systems including state-of-the-art systems such as LTE, the amount of random access resources can be adapted. The LTE UEs can learn which, and the amount of, random access resources that are currently in use, i.e. the set of allowed random access resources, by reading system information (SIB2), which can be received on the PDSCH.

The system and methods described in this disclosure allow adaptation of the random access resources without requiring the devices to obtain the current configuration of random access resources from system information. This is illustrated in FIGS. 9A and 9B and 10.

權(quán)利要求

1
微信群二維碼
意見反饋