CN109429356B - System information transmission processing method and user terminal - Google Patents

System information transmission processing method and user terminal Download PDF

Info

Publication number
CN109429356B
CN109429356B CN201710731910.0A CN201710731910A CN109429356B CN 109429356 B CN109429356 B CN 109429356B CN 201710731910 A CN201710731910 A CN 201710731910A CN 109429356 B CN109429356 B CN 109429356B
Authority
CN
China
Prior art keywords
system information
random access
user terminal
mac layer
rrc layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710731910.0A
Other languages
Chinese (zh)
Other versions
CN109429356A (en
Inventor
鲍炜
陈力
杨晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201710731910.0A priority Critical patent/CN109429356B/en
Priority to PCT/CN2018/101540 priority patent/WO2019037716A1/en
Publication of CN109429356A publication Critical patent/CN109429356A/en
Application granted granted Critical
Publication of CN109429356B publication Critical patent/CN109429356B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a processing method for system information transmission and a user terminal, wherein the method comprises the following steps: the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to the base station and starts a timer; and before the timer is overtime, if the RRC layer receives the system information sent by the base station, stopping the timer. Therefore, the performance of the user terminal for processing the system information sent based on the request can be improved.

Description

System information transmission processing method and user terminal
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method for processing system information transmission and a user terminal.
Background
In future communication systems (e.g., 5G communication systems), the system information may be divided into two types, one is periodically broadcast-transmitted system information, and the other is request-based (on-demand) transmitted system information. The system information sent based on the request means that the user terminal sends a system information request to the base station, and the base station sends the system information corresponding to the request to the user terminal. However, the procedures based on the system information requested to be transmitted involve Radio Resource Control (RRC) layer and Medium Access Control (MAC) layer procedures, and no complete solution is provided. It can be seen that, at present, the performance of the system information processing based on request sending by the user terminal is poor.
Disclosure of Invention
The embodiment of the invention provides a processing method for system information transmission and a user terminal, which aim to solve the problem that the performance of the user terminal for processing system information sent based on a request is poor.
In a first aspect, an embodiment of the present invention provides a method for processing system information transmission, which is applied to a user terminal, and includes:
the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to a base station and starts a timer;
and before the timer is overtime, if the RRC layer receives the system information sent by the base station, stopping the timer.
In a second aspect, an embodiment of the present invention provides a user terminal, including:
the starting module is used for triggering a Media Access Control (MAC) layer of the user terminal to send a system information request to a base station by an RRC layer of the user terminal and starting a timer;
and a stopping module, configured to stop the timer if the RRC layer receives the system information sent by the base station before the timer expires.
In a third aspect, an embodiment of the present invention provides a user terminal, including: the system information transmission processing method comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the computer program realizes the steps in the system information transmission processing method provided by the embodiment of the invention when being executed by the processor.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the steps of the processing method for system information transmission provided in the embodiment of the present invention.
In the embodiment of the invention, the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to a base station and starts a timer; and before the timer is overtime, if the RRC layer receives the system information sent by the base station, stopping the timer. The timer is started in the RRC layer, and before the timer is overtime, the timer is stopped if the RRC layer receives the system information sent by the base station, so that the RRC layer can stop processing the system information sent based on the request after receiving the system information, and the performance of the user terminal for processing the system information sent based on the request is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a block diagram of a system information transmission processing system according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a processing method for system information transmission according to an embodiment of the present invention;
fig. 3 is a schematic diagram of another processing method for system information transmission according to an embodiment of the present invention;
fig. 4 is a schematic diagram of another processing method for system information transmission according to an embodiment of the present invention;
fig. 5 is a schematic diagram of another processing method for system information transmission according to an embodiment of the present invention;
fig. 6 is a schematic diagram of another processing method for system information transmission according to an embodiment of the present invention;
fig. 7 is a schematic diagram of another processing method for system information transmission according to an embodiment of the present invention;
fig. 8 is a schematic diagram of another processing method for system information transmission according to an embodiment of the present invention;
fig. 9 is a schematic diagram of another processing method for system information transmission according to an embodiment of the present invention;
fig. 10 is a structural diagram of a user terminal according to an embodiment of the present invention;
fig. 11 is a block diagram of another ue according to an embodiment of the present invention;
fig. 12 is a block diagram of another ue according to an embodiment of the present invention;
fig. 13 is a block diagram of another ue according to an embodiment of the present invention;
fig. 14a is a block diagram of another ue according to an embodiment of the present invention;
fig. 14b is a block diagram of another ue according to an embodiment of the present invention;
fig. 15 is a block diagram of another ue according to an embodiment of the present invention;
fig. 16 is a block diagram of another user terminal according to an embodiment of the present invention;
fig. 17 is a block diagram of another ue according to an embodiment of the present invention;
fig. 18 is a block diagram of another user terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a structural diagram of a processing system for system information transmission according to an embodiment of the present invention, and as shown in fig. 1, the processing system includes a user terminal 11 and a base station 12, where the user terminal 11 may be a ue (user equipment), such as a terminal-side Device, for example, a Mobile phone, a Tablet Personal Computer (Tablet Personal Computer), a laptop Computer (L ap Computer), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), or a Wearable Device (Wearable Device), and it should be noted that a specific type of the user terminal 11 is not limited in the embodiment of the present invention, and the base station 12 may be a 5G base station (e.g., a gNB, a 5 NRNB), or may be a 4G base station (e.g., an eNB), or may be a 3G base station (e.g., an NB), and it should be noted that a specific type of the base station 12 is not limited in the embodiment of the present invention.
It should be noted that the specific functions of the user terminal 11 and the base station 12 are described in detail through a plurality of embodiments below.
Referring to fig. 2, fig. 2 is a schematic diagram of a processing method for system information transmission according to an embodiment of the present invention, and as shown in fig. 2, the processing method includes the following steps:
step 201, the RRC layer of the ue triggers the MAC layer of the ue to send a system information request to the base station, and starts a timer.
The above-mentioned RRC layer triggering the MAC layer of the user terminal to send the system information request to the base station may be that the RRC layer sends a message content corresponding to the system information request to the MAC layer to trigger the MAC layer to send the system information request to the base station. In addition, the system information request can be Msg1 or Msg3 in the random access process, so that the system information request can be sent to the base station through Msg1 or Msg3, and the transmission overhead can be reduced.
For example: the user terminal can determine the Preamble (Msg1) to be sent and the corresponding time-frequency resource position according to the required system information message (SI message) and the configuration information of the Preamble (Preamble) associated with the SI message broadcasted by the network; the network side equipment determines the SI message requested by the user terminal according to the received Preamble and the position of the corresponding time-frequency resource, and feeds back the Msg 2; the user terminal receives the Msg2, and the user terminal can confirm that the request message has been successfully received by the network side device. Wherein, the SI message may include one or more System Information Blocks (SIBs)
Or, the user terminal determines that the required SI message is sent by using an on demand mode, but the network does not broadcast the configuration information of the Preamble associated with the SI message; thus, the user terminal can select an available Preamble and a corresponding Random Access Channel (RACH) to send Msg 1; the network side equipment receives the Msg1, and allocates uplink wireless resources for the user terminal through the Msg2 for sending the Msg 3; the user terminal indicates the identifier of the requested SI message to the network side equipment in the Msg3 (for example: RRC message); the network side device confirms to the user terminal that Msg3 has been received in Msg 4.
The duration of the timer may be notified to the ue by the base station through a broadcast or a dedicated RRC message, or may be determined by Minimum System Information (Minimum System Information MSI) notification or protocol predefined, and the like, which is not limited in this embodiment of the present invention.
In addition, the ue may request one or more SI messages through a system information request procedure, that is, the system information request may request one or more SI messages.
Step 202, before the timer is overtime, if the RRC layer receives the system information sent by the base station, the timer is stopped.
The ue may start to monitor the system information sent by the base station after starting the timer, and the RRC layer receives the system information sent by the base station before the timer expires, so as to stop the timer. In addition, the system information received by the RRC layer may include:
the system information requests all or part of the requested system information.
And the system information here may be SI message, such as: the SI message received in step 202 may include all the SI messages requested by the ue or at least one requested SI message.
The above steps can be implemented by starting a timer based on the system information requested to be sent, and before the timer expires, stopping the timer if the RRC layer receives the system information sent by the base station, so that after receiving the system information, the RRC layer can stop processing the system information sent based on the request, thereby improving the performance of the user terminal in processing the system information sent based on the request.
It should be noted that, in the embodiment of the present invention, the method may be applied to a 5G communication system or other communication systems, for example: 6G communication system, etc., and the embodiments of the present invention are not limited thereto.
In the embodiment of the invention, the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to a base station and starts a timer; and before the timer is overtime, if the RRC layer receives the system information sent by the base station, stopping the timer. The timer is started in the RRC layer, and before the timer is overtime, the timer is stopped if the RRC layer receives the system information sent by the base station, so that the RRC layer can stop processing the system information sent based on the request after receiving the system information, and the performance of the user terminal for processing the system information sent based on the request is improved.
Referring to fig. 3, fig. 3 is a schematic diagram of a processing method for system information transmission according to an embodiment of the present invention, as shown in fig. 3, including the following steps:
step 301, the RRC layer of the ue triggers the MAC layer of the ue to send a system information request to the base station, and starts a timer.
As an optional implementation manner, the triggering, by the RRC layer of the user terminal, the MAC layer of the user terminal to send a system information request to the base station includes:
the RRC layer of the user terminal transmits the configuration information of Preamble to the MAC layer of the user terminal; or
The RRC layer of the user terminal transfers an RRC system information request message to the MAC layer of the user terminal.
After receiving the configuration information of the Preamble or the RRC system information request message, the MAC layer may send a system information request to the base station. The configuration information of the Preamble may be identification information of the Preamble code and/or time-frequency resource location information sent by the Preamble code, and the RRC system information request message may be a message content for requesting a system information request, for example: identification of the SI message requested by the user terminal.
In this embodiment, the system information request triggered by the configuration information of the Preamble may be sent in Msg1 in the random access procedure, and the system information request triggered by the RRC system information request message may be sent in Msg3 in the random access procedure.
In the embodiment, the MAC can be triggered to send the system information request to the base station in different modes, so that the flexibility of the user terminal can be improved, and different communication scenes can be applied.
Step 302, before the timer is overtime, if the RRC layer receives the system information sent by the base station, the timer is stopped.
As another optional implementation, the system information received by the RRC layer includes:
the system information requests all or part of the requested system information.
The system information received by the RRC layer may be system information broadcast and sent by the base station in response to the ue, or system information broadcast and sent by the base station in response to other ues, for example: the user terminal system information request fails to be sent, but other user terminals request the same system information and request to be sent successfully, so that the user terminal can also receive the system information.
Optionally, in this embodiment, before the timer expires, if the RRC layer receives the system information sent by the base station, the stopping the timer includes:
and before the timer is overtime, if the RRC layer receives the system information sent by the base station, the system information is considered to be successfully acquired, and the timer is stopped.
The step can realize that the system information can be considered to be successfully acquired as long as the user terminal receives all or part of the system information requested by the user terminal returned by the base station.
Step 303, if the timer is overtime, the RRC layer considers that the system information acquisition is failed.
Through step 303, when the real-time timer times out, it can be considered that the system information acquisition fails, so that the user terminal can perform corresponding processing, for example: the MAC layer stops the system information application process or the random access process, so that the performance of the user terminal for processing the system information sent based on the request is further improved.
It should be noted that, in this embodiment, step 303 is optional, for example: before the timer is overtime, the RRC layer receives the system information, so that the condition that the timer is overtime can not exist.
As another optional implementation, the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to the base station, and after the step of the RRC layer starting the timer, the method further includes:
before the timer is overtime, the RRC layer receives the system information sent by the base station, and then the RRC layer informs the MAC layer to stop the random access process.
Wherein, after the RRC layer informs the MAC layer to stop the random access process, the MAC layer stops the random access process. In addition, the above-mentioned notifying the MAC layer to stop the random access procedure may be notifying the MAC layer to stop the random access procedure when the random access procedure initiated by the MAC layer is successful, or notifying the MAC layer to stop the random access procedure when the random access procedure initiated by the MAC layer fails.
For example: before the timer expires, if the RRC layer receives the system information sent by the base station, the RRC layer notifies the MAC layer to stop the random access procedure, which may include:
before the timer is overtime, the RRC layer receives the system information sent by the base station, and receives the random access process success message fed back by the MAC layer, so that the RRC layer informs the MAC layer to stop the random access process.
The process can refer to the example shown in fig. 4: as shown in fig. 4, the method comprises the following steps:
step 401, the RRC layer of the ue initiates a system request procedure, and starts a timer T, where the length of the timer T may be MSI notification or protocol specification or other manners.
The step may be a scheme of requesting system information by using Msg1, in which the RRC layer may transfer configuration information of Preamble to the MAC layer; or the step may be a scheme of requesting system information by Msg3, in which the RRC layer may generate an RRC SI request message and deliver it to the MAC layer;
step 402, the MAC layer of the ue initiates a random access procedure (RACH procedure) according to the RRC layer trigger, and the RACH procedure fails for the first time (dashed box).
For example: if the scheme of requesting system information by using the Msg1 is adopted, the failure can mean that the Msg2 is not received; if the scheme of requesting system information using Msg3 is adopted, failure may mean that Msg2 or Msg4 is not received.
In step 403, the MAC layer of the user terminal re-initiates the RACH procedure, and the procedure is successful (i.e., the random access procedure is successful).
If the scheme of requesting system information by Msg1 is adopted, the success of the RACH procedure may mean that the MAC layer successfully receives Msg2 in a random access procedure and confirms that Msg2 is a response to Msg 1;
if the scheme of requesting system information by Msg3 is adopted, the success of the RACH procedure may mean that the MAC layer successfully receives Msg4 in a random access procedure and confirms that Msg4 is a response to Msg 3.
In step 403a, the MAC layer of the ue feeds back a random access procedure success message to the RRC layer.
This step is optional.
Step 404, the RRC layer of the network side device receives the list of SI messages requested by the UE;
in this step, since the SI message list may be notified to the network-side device through Msg1 or Msg3, step 404 may be started before or after step 403 is ended;
step 405, after receiving the requested SI message, the RRC layer of the ue stops the timer T.
Here, the SI message may include all SI messages requested by the ue or at least one SI message requested by the ue.
Step 406, the user terminal RRC layer informs the MAC layer to stop the RACH procedure.
Wherein, the ue may monitor the requested SI message from step 401; it is also possible to start listening for the requested SI message after the success of step 403.
In addition, in the RACH procedure of step 403, for a scheme that uses Msg1 to request system information, the MAC layer obtains the SI message list requested by the user terminal through Msg 1; for the Msg3based scheme, the MAC layer obtains the SI message list requested by the user terminal through Msg 3; after obtaining the list, the MAC layer of the network side device may initiate step 404 without waiting until Msg2 or Msg4 is sent to the user terminal.
In addition, in order to reduce power consumption of the user terminal, the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to the base station, and after the step of the RRC layer starting the timer, the method may further include:
the RRC layer receives a random access process success message fed back by the MAC layer;
if the random access process success message is received before the RRC layer receives the system information sent by the base station, the RRC layer does not need to notify the MAC layer to stop the random access process after receiving the system information sent by the base station; or
If the random access procedure success message is received before the timer is overtime and the RRC layer does not receive the system information sent by the base station, the MAC layer does not need to be informed to stop the random access procedure after the timer is overtime.
For example: in the example shown in fig. 4, after the RACH is successful (random access procedure is successful), the user terminal MAC layer may inform the RRC layer; after receiving the RACH success message of 403a, the RRC layer of the user terminal knows that the MAC layer has stopped the RACH procedure; thus, the RRC layer may not notify the MAC to stop the RACH after receiving the requested SI message (step 405) (i.e., step 406 is skipped). Similarly, if the random access procedure success message is received before the timer expires, the MAC layer does not need to be notified to stop the random access procedure after the timer expires, because if the timer expires, it indicates that the system information acquisition fails, and at this time, the MAC layer has stopped the RACH procedure.
In the above embodiment, in which the RRC layer receives the system information sent by the base station before the timer expires, and the RRC layer notifies the MAC layer to stop the random access process, it can also be implemented that the RRC layer notifies the MAC layer to stop the random access process when the random access process fails, so as to prevent the MAC layer from trying the random access process all the time after the RRC receives the system information, thereby reducing the power consumption of the user equipment.
As another optional implementation manner, if the timer expires, the determining, by the RRC layer, that the system information acquisition is failed includes:
and if the timer is overtime, the RRC layer considers that the system information acquisition is failed and informs the MAC layer to stop the random access process.
In this embodiment, if the timer is overtime, it may be determined that the system information acquisition is failed, and the MAC layer is notified to stop the random access process, so as to reduce power consumption of the ue.
In addition, in this embodiment, when the timer expires and the number of times of failure of the MAC layer random access procedure reaches a certain number of times, the MAC layer may be notified to stop the random access procedure. For example: before the step of the RRC layer informing the MAC layer to stop the random access procedure, the method further includes:
if the MAC layer fails to initiate the random access process for the Nth time, the MAC layer reports a random access process failure message to the RRC layer and continues to initiate the random access process, wherein N is an integer greater than or equal to 1.
Wherein N is that the base station notifies the ue through a broadcast or dedicated RRC message, and the MAC layer stops the random access procedure after receiving the RRC notification.
Through the steps, the MAC layer is informed to stop the random access process only when the timer is overtime and the failure times of the MAC layer random access process reach a certain number, so that the power of the user terminal is reduced, and the MAC layer is prevented from continuously initiating the random access process.
For example: as shown in fig. 5, the method comprises the following steps:
step 501, the RRC layer of the ue initiates a system request procedure, and starts a timer T, where the length of the timer T may be MSI notification or protocol specification or other manners.
The step may be a scheme of requesting system information by using Msg1, in which the RRC layer may transfer configuration information of Preamble to the MAC layer; or the step may be a scheme of requesting system information by Msg3, in which the RRC layer may generate an RRC SI request message and deliver it to the MAC layer;
step 502, the MAC layer of the user terminal initiates a random access RACH procedure according to the RRC layer trigger, and the RACH procedure fails for the first time (dashed box).
For example: if the scheme of requesting system information by using the Msg1 is adopted, the failure can mean that the Msg2 is not received; if the scheme of requesting system information using Msg3 is adopted, failure may mean that Msg2 or Msg4 is not received.
After the MAC layer of the ue performs N-1 attempts, the MAC layer fails to re-initiate the RACH procedure (N-th failure), step 503.
Step 503a, after the nth failure, the MAC layer of the ue reports an RACH procedure failure message to the RRC layer.
Here, N may be configured by RRC of the user terminal UE, and the configuration parameter of RRC may be from broadcast or dedicated configuration of the network.
In step 504, the MAC layer of the ue continues RACH attempt and fails.
That is, the RACH procedure of the MAC layer is not stopped by reaching the preset number.
Step 505, the timer T of the RRC layer of the user terminal is overtime, the system message request process fails, and the RRC layer notifies the MAC layer to stop the RACH process.
It should be noted that, in the above embodiment where the MAC layer reports a random access procedure failure message to the RRC layer and continues to initiate a random access procedure after the MAC layer has failed to initiate a random access procedure for the nth time, the same may be applied to the above-described embodiment where the RRC layer receives the system information sent by the base station before the timer times out, and the RRC layer notifies the MAC layer to stop a random access procedure, for example: as shown in fig. 6, the method comprises the following steps:
step 601, the RRC layer of the ue initiates a system request procedure, and starts a timer T, where the length of the timer T may be MSI notification or protocol specification or other manners.
The step may be a scheme of requesting system information by using Msg1, in which the RRC layer may transfer configuration information of Preamble to the MAC layer; or the step may be a scheme of requesting system information by Msg3, in which the RRC layer may generate an RRC SI request message and deliver it to the MAC layer;
step 602, the MAC layer of the ue initiates a random access RACH procedure according to the RRC layer trigger, where the RACH procedure fails for the first time (dashed box).
For example: if the scheme of requesting system information by using the Msg1 is adopted, the failure can mean that the Msg2 is not received; if the scheme of requesting system information using Msg3 is adopted, failure may mean that Msg2 or Msg4 is not received.
Step 603, after the MAC layer of the user terminal performs N-1 attempts, the MAC layer fails to re-initiate the RACH procedure (nth failure).
Step 603a, after the nth failure, the MAC layer of the ue reports an RACH procedure failure message to the RRC layer.
Here, N may be configured by RRC of the user terminal UE, and the configuration parameter of RRC may be from broadcast or dedicated configuration of the network.
Step 604, the MAC layer of the user terminal continues the RACH attempt and succeeds.
Step 604a, the MAC layer of the user terminal feeds back a RACH success message to the RRC layer.
Step 605, the RRC layer of the network side device receives the list of SI messages requested by the UE;
in this step, since the SI message list may be notified to the network-side device through Msg1 or Msg3, step 605 may be started before or after step 604 is ended;
step 606, the RRC layer of the ue stops the timer T after receiving the requested SI message.
Here, the SI message may include all SI messages requested by the ue or at least one SI message requested by the ue.
Step 607, the user terminal RRC layer informs the MAC layer to stop the RACH procedure.
As another optional implementation, the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to the base station, and after the step of the RRC layer starting the timer, the method further includes:
if the MAC layer fails to initiate the random access process for the Mth time, the MAC layer reports a random access process failure message to the RRC layer, and the MAC layer terminates the random access process, wherein M is an integer greater than or equal to 1;
and the RRC layer does not receive the system information returned by the base station, considers that the system information acquisition fails according to the random access process failure message and terminates the timer.
Wherein, the M may be notified to the user terminal by the base station through a broadcast or dedicated RRC message.
In this embodiment, when the number of times of failure in the random access procedure reaches M times, the RRC terminates the timer and considers that the system information acquisition is failed, so that power consumption of the user terminal can be reduced.
For example: as shown in fig. 7:
step 701, the RRC layer of the ue initiates a system request procedure, and starts a timer T, where the length of the timer T may be MSI notification or protocol specification or other manners.
The step may be a scheme of requesting system information by using Msg1, in which the RRC layer may transfer configuration information of Preamble to the MAC layer; or the step may be a scheme of requesting system information by Msg3, in which the RRC layer may generate an RRC SI request message and deliver it to the MAC layer;
step 702, the MAC layer of the ue initiates a random access RACH procedure according to the RRC layer trigger, and the RACH procedure fails for the first time (dashed box).
For example: if the scheme of requesting system information by using the Msg1 is adopted, the failure can mean that the Msg2 is not received; if the scheme of requesting system information using Msg3 is adopted, failure may mean that Msg2 or Msg4 is not received.
Step 703, after the MAC layer of the ue performs M-1 attempts, the MAC layer fails to re-initiate the RACH procedure (M-th failure).
Step 703a, after the mth failure, the MAC layer of the ue reports an RACH procedure failure message to the RRC layer.
Here, M may be configured by RRC of the user terminal UE, and the configuration parameter of RRC may be from broadcast or dedicated configuration of the network. In addition, the RACH procedure failure message may also be referred to as a RACH procedure failure indication.
After receiving the RACH failure message, the RRC layer of the user terminal terminates the timer T, and considers that the system message request process has failed, and the RRC layer does not need to process the system information, so as to save power consumption of the user terminal.
As another optional implementation, the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to the base station, and after the step of the RRC layer starting the timer, the method further includes:
if the random access process initiated by the MAC layer fails, the MAC layer initiates the random access process again;
before the timer is overtime, the RRC layer receives the system information sent by the base station, and then the RRC layer informs the MAC layer to stop the random access process.
The above-mentioned re-initiating the random access procedure by the MAC may be performed within a valid period of the timer if the random access procedure initiated by the MAC layer fails, or it may be understood that the above-mentioned re-initiating the random access procedure by the MAC is performed before the timer expires if the random access procedure initiated by the MAC layer fails.
In this embodiment, before the timer expires, the RRC layer receives the system information sent by the base station, and when the random access procedure fails, the RRC layer notifies the MAC layer to stop the random access procedure, so as to reduce power consumption of the ue. For example: as shown in fig. 8, the method comprises the following steps:
step 801, the RRC layer of the user terminal initiates a system request procedure, and starts a timer T, where the length of the timer T may be MSI notification or protocol specification or other manners.
The step may be a scheme of requesting system information by using Msg1, in which the RRC layer may transfer configuration information of Preamble to the MAC layer; or the step may be a scheme of requesting system information by Msg3, in which the RRC layer may generate an RRC SI request message and deliver it to the MAC layer;
step 802, the MAC layer of the ue initiates a random access RACH procedure according to the RRC layer trigger, and the RACH procedure fails for the first time (dashed box).
For example: if the scheme of requesting system information by using the Msg1 is adopted, the failure can mean that the Msg2 is not received; if the scheme of requesting system information using Msg3 is adopted, failure may mean that Msg2 or Msg4 is not received.
Step 803, the MAC layer of the user terminal re-initiates the RACH procedure, which fails.
Step 804, after receiving the requested SI message, the RRC layer of the ue stops the timer T.
Step 805, the user terminal RRC layer informs the MAC layer to stop the RACH procedure.
The SI message received by the UE may be a network broadcast message triggered by SI requests of other UEs, and step 804 may occur at any time, for example, before step 802. If step 804 occurs after step 801, the user terminal may terminate the timer T, informing the MAC to stop the RACH procedure, upon receipt of step 804.
As another optional implementation, the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to the base station, and after the step of the RRC layer starting the timer, the method further includes:
and the RRC layer receives the random access process success message fed back by the MAC layer, and the RRC layer does not receive the system information returned by the base station, the timer is terminated, the system information request sent to the base station by the user terminal is considered to be successfully sent, and the base station successfully receives the system information request.
In this embodiment, if the RRC receives the random access procedure success message fed back by the MAC, the timer may be terminated, and the system information request procedure may be considered to be successful, so that power consumption of the ue may be reduced. For example: as shown in fig. 9, the method comprises the following steps:
step 901, the RRC layer of the ue initiates a system request procedure, and starts a timer T, where the length of the timer T may be MSI notification or protocol specification or other manners.
The step may be a scheme of requesting system information by using Msg1, in which the RRC layer may transfer configuration information of Preamble to the MAC layer; or the step may be a scheme of requesting system information by Msg3, in which the RRC layer may generate an RRC SI request message and deliver it to the MAC layer;
step 902, the MAC layer of the ue initiates a random access RACH procedure according to the RRC layer trigger, and the RACH procedure fails for the first time (dashed box).
For example: if the scheme of requesting system information by using the Msg1 is adopted, the failure can mean that the Msg2 is not received; if the scheme of requesting system information using Msg3 is adopted, failure may mean that Msg2 or Msg4 is not received.
Step 903, when the MAC layer of the user terminal performs the X-th attempt, the RACH of the MAC layer is successful.
Where X is less than N or M in the above examples.
Step 903a, the MAC layer of the user terminal reports a RACH process success message to the RRC layer; after the RRC layer of the user terminal receives the RACH success message, the timer T is terminated, and the system message request process is successful.
It should be noted that, in this embodiment of the present invention, if the system information request is Msg1 in a random access process, the random access process success message may indicate that the MAC layer successfully receives Msg2 in the random access process, and confirms that the Msg2 carries an identifier of a preamble in the Msg1, that is, the random access process success means that the MAC layer successfully receives Msg2 in the random access process, and confirms that the Msg2 and the Msg2 are responses to the Msg 1; or
The system information request is Msg3 in a random access process, and the random access process success message may indicate that the MAC layer successfully receives Msg4 in the random access process, and confirms that the Msg4 carries bit information at a preset position in the Msg3, that is, the random access process success means that the MAC layer successfully receives Msg4 in the random access process, and confirms that the Msg4 carries bit information at a preset position in the Msg 3.
By confirming that the Msg2 is a response to the Msg1 or confirming that the Msg4 is a response to the Msg3, the accuracy of the random access procedure success message can be improved, and the performance of the user terminal can be improved.
It should be noted that, in the embodiment of the present invention, the system information request is Msg1 in the random access process, and the random access process failure message indicates that the MAC layer does not successfully receive Msg2 in the random access process, that is, the random access process failure means that the MAC layer does not successfully receive Msg2 in the random access process; or
And if the system information request is Msg3 in the random access process, the random access process failure message indicates that the MAC layer does not successfully receive Msg4 in the random access process, i.e., the random access process failure means that the MAC layer does not successfully receive Msg4 in the random access process.
It should be noted that, in this embodiment of the present invention, notifying the MAC layer to stop the random access process may include: and informing the MAC layer of resetting. Wherein, the storage space of the user terminal can be saved by notifying the reset of the MAC layer, because after the reset of the MAC layer, the related information of the MAC layer about the requested system information does not need to be stored.
Of course, the embodiment of the present invention is not limited thereto, for example: informing the MAC layer to stop the random access procedure may be informing the MAC to suspend the random access procedure, or the like.
In this embodiment, various optional implementation manners are added on the basis of the embodiment shown in fig. 2, and the performance of the user terminal for processing the system information sent based on the request can be improved, and beneficial effects such as saving power consumption of the user terminal can be achieved.
Referring to fig. 10, fig. 10 is a structural diagram of a user terminal according to an embodiment of the present invention, and as shown in fig. 10, the user terminal 1000 includes:
a starting module 1001, configured to trigger, by an RRC layer of the ue, a MAC layer of the ue to send a system information request to a base station, and start a timer;
a stopping module 1002, configured to stop the timer before the timer expires, if the RRC layer receives the system information sent by the base station.
As an alternative implementation, as shown in fig. 11, the user terminal 1000 further includes:
a considering module 1003, configured to, if the timer is overtime, consider, by the RRC layer, that system information acquisition fails.
Optionally, in this embodiment, the considering module 1003 is configured to, if the timer is overtime, consider that the system information acquisition is failed by the RRC layer, and notify the MAC layer of stopping the random access procedure by the RRC layer.
As another optional implementation, the system information request is Msg1 or Msg3 in a random access process.
As another optional implementation, the starting module 1001 is configured to enable an RRC layer of the user equipment to transmit configuration information of a Preamble to an MAC layer of the user equipment, and start a timer in the RRC layer, where the MAC layer sends a system information request to a base station according to the configuration information; or
The starting module 1001 is configured to enable an RRC layer of the user equipment to transmit an RRC system information request message to an MAC layer of the user equipment, and start a timer in the RRC layer, where the MAC layer sends a system information request to a base station according to the RRC system information request message.
As another optional implementation, the system information received by the RRC layer includes:
the system information requests all or part of the requested system information.
Optionally, in this embodiment, the stopping module 1002 is configured to, before the timer expires, consider that system information is successfully acquired if the RRC layer receives the system information sent by the base station, and stop the timer.
As another alternative implementation, as shown in fig. 12, the user terminal 1000 further includes:
a first notifying module 1004, configured to, before the timer expires, the RRC layer receives the system information sent by the base station, and then the RRC layer notifies the MAC layer to stop a random access procedure.
Optionally, in this embodiment, the first notifying module 1004 is configured to, before the timer expires, receive, by the RRC layer, system information sent by the base station, and receive, by the RRC layer, a random access procedure success message fed back by the MAC layer, and then notify, by the RRC layer, the MAC layer to stop a random access procedure.
As another alternative implementation, as shown in fig. 13, the user terminal 1000 further includes:
a receiving module 1005, configured to receive, by the RRC layer, a random access procedure success message fed back by the MAC layer;
if the random access process success message is received before the RRC layer receives the system information sent by the base station, the RRC layer does not need to notify the MAC layer to stop the random access process after receiving the system information sent by the base station; or
If the random access procedure success message is received before the timer is overtime and the RRC layer does not receive the system information sent by the base station, the MAC layer does not need to be informed to stop the random access procedure after the timer is overtime.
As another alternative implementation, as shown in fig. 14a or 14b, the user terminal 1000 further includes:
a first reporting module 1006, configured to, if the MAC layer fails to initiate the random access procedure for the nth time, report a random access procedure failure message to the RRC layer by the MAC layer, and continue to initiate the random access procedure, where N is an integer greater than or equal to 1.
As another alternative implementation, as shown in fig. 15, the user terminal 1000 further includes:
a second reporting module 1007, configured to report a random access procedure failure message to the RRC layer by the MAC layer if the MAC layer fails to initiate a random access procedure for the mth time, and the MAC layer terminates the random access procedure, where M is an integer greater than or equal to 1;
a first terminating module 1008, configured to terminate the timer according to the random access procedure failure message and consider that system information acquisition fails, if the RRC layer does not receive the system information returned by the base station.
As another alternative implementation, as shown in fig. 16, the user terminal 1000 further includes:
an initiating module 1009, configured to, if the random access procedure initiated by the MAC layer fails, re-initiate the random access procedure by the MAC layer;
a second notifying module 10010, configured to, before the timer expires, the RRC layer receives the system information sent by the base station, and then the RRC layer notifies the MAC layer to stop the random access process.
As another alternative implementation, as shown in fig. 17, the user terminal 1000 further includes:
a second termination module 10011, configured to terminate the timer if the RRC layer receives the random access procedure success message fed back by the MAC layer and the RRC layer does not receive the system information returned by the base station, and consider that the system information request sent by the user terminal to the base station is successfully sent, and the base station successfully receives the system information request.
Optionally, the duration of the timer is that the base station notifies the ue through a broadcast or dedicated RRC message.
Optionally, the N is a notification of the ue by the base station through a broadcast or dedicated RRC message.
Optionally, the M is a notification of the ue by the base station through a broadcast or dedicated RRC message.
Optionally, if the system information request is Msg1 in a random access process, the random access process success message indicates that the MAC layer successfully receives Msg2 in the random access process, and confirms that the Msg2 carries an identifier of a preamble in the Msg 1; or
And if the system information request is Msg3 in the random access process, the random access process success message indicates that the MAC layer successfully receives Msg4 in the random access process, and confirms that the Msg4 carries bit information of a preset position in the Msg 3.
Optionally, the system information request is Msg1 in a random access process, and the random access process failure message indicates that the MAC layer does not successfully receive Msg2 in the random access process; or
And if the system information request is Msg3 in the random access process, the random access process failure message indicates that the MAC layer does not successfully receive Msg4 in the random access process.
Optionally, the notifying the MAC layer to stop the random access process includes:
and informing the MAC layer of resetting.
It should be noted that, in this embodiment, the user terminal 1000 may be a user terminal of any implementation manner in the method embodiment of the present invention, and any implementation manner of the user terminal in the method embodiment of the present invention may be implemented by the user terminal 1000 in this embodiment, and the same beneficial effects are achieved, and details are not described here.
Referring to fig. 18, fig. 18 is a block diagram of another user terminal according to an embodiment of the present invention. As shown in fig. 18, the user terminal 1800 includes: at least one processor 1801, memory 1802, at least one network interface 1804, and a user interface 1803. The various components in the user terminal 1800 are coupled together by a bus system 1805. As can be appreciated, the bus system 1805 is used to enable connected communication between these components. The bus system 1805 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are identified in fig. 18 as the bus system 1805.
The user interface 1803 may include, among other things, a display, a keyboard, or a pointing device (e.g., a mouse, track ball, touch pad, or touch screen, etc.).
It is understood that Memory 1802 in embodiments of the present invention may be either volatile Memory or non-volatile Memory, or may include both volatile and non-volatile Memory, wherein non-volatile Memory may be Read-Only Memory (ROM), Programmable Read-Only Memory (PROM), Erasable Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), or flash Memory volatile Memory may be Random Access Memory (RAM), which serves as external cache Memory, by way of illustrative but not limiting illustration, many forms of RAM are available, such as Static Random Access Memory (Static RAM, SRAM), Dynamic Random Access Memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), Double data rate Synchronous Dynamic Random Access Memory (Double data RAM, rsddr DRAM), Enhanced Synchronous DRAM (Enhanced DRAM), or SDRAM L, and other types of RAM suitable for Direct Access systems including but not limited to DRAM, SDRAM, and SDRAM, DRAM, and SDRAM, and RAM, and SDRAM, and RAM, and SDRAM, and RAM, and SDRAM, and RAM.
In some embodiments, memory 1802 stores the following elements, executable modules or data structures, or a subset thereof, or an expanded set thereof: an operating system 18021 and application programs 18022.
The operating system 18021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application 18022 includes various applications, such as a Media Player (Media Player), a Browser (Browser), and the like, for implementing various application services. A program implementing the method of an embodiment of the present invention may be included in the application 18022.
In the embodiment of the present invention, the user terminal 1800 further includes a computer program stored in the memory 1802 and operable on the processor 1801, and specifically, may be a computer program stored in the application 18022, and when the computer program is executed by the processor 1801, the following steps are implemented:
the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to a base station and starts a timer;
and before the timer is overtime, if the RRC layer receives the system information sent by the base station, stopping the timer.
The method disclosed in the above embodiments of the present invention may be applied to the processor 1801, or implemented by the processor 1801. The processor 1801 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be implemented by integrated logic circuits of hardware or instructions in the form of software in the processor 1801. The Processor 1801 may be a general-purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable Gate Array (FPGA) or other programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 1802, and the processor 1801 reads the information in the memory 1802 and, in conjunction with the hardware thereof, performs the steps of the above-described method.
For a hardware implementation, the Processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable logic devices (P L D), Field-Programmable Gate arrays (FPGAs), general purpose processors, controllers, microcontrollers, microprocessors, other electronic units configured to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
Optionally, the RRC layer of the user equipment triggers the MAC layer of the user equipment to send a system information request to the base station, and after the step of starting the timer by the RRC layer, the computer program, when executed by the processor 1801, further implements the following steps:
and if the timer is overtime, the RRC layer considers that the system information acquisition fails.
Optionally, the system information request is Msg1 or Msg3 in a random access process.
Optionally, the RRC layer of the user equipment executed by the processor 1801 triggers the MAC layer of the user equipment to send a system information request to the base station, where the system information request includes:
the RRC layer of the user terminal transmits the configuration information of the Preamble to the MAC layer of the user terminal; or
The RRC layer of the user terminal transfers an RRC system information request message to the MAC layer of the user terminal.
Optionally, the system information received by the RRC layer includes:
the system information requests all or part of the requested system information.
Optionally, the stopping the timer by the processor 1801 before the timer expires if the RRC layer receives the system information sent by the base station includes:
and before the timer is overtime, if the RRC layer receives the system information sent by the base station, the system information is considered to be successfully acquired, and the timer is stopped.
Optionally, the RRC layer of the user equipment triggers the MAC layer of the user equipment to send a system information request to the base station, and after the step of starting the timer by the RRC layer, the computer program, when executed by the processor 1801, further implements the following steps:
before the timer is overtime, the RRC layer receives the system information sent by the base station, and then the RRC layer informs the MAC layer to stop the random access process.
Optionally, before the timer expires, the RRC layer executed by the processor 1801 receives the system information sent by the base station, and then the RRC layer notifies the MAC layer to stop the random access process, where the process includes:
before the timer is overtime, the RRC layer receives the system information sent by the base station, and receives the random access process success message fed back by the MAC layer, so that the RRC layer informs the MAC layer to stop the random access process.
Optionally, the RRC layer of the user equipment triggers the MAC layer of the user equipment to send a system information request to the base station, and after the step of starting the timer by the RRC layer, the computer program, when executed by the processor 1801, further implements the following steps:
the RRC layer receives a random access process success message fed back by the MAC layer;
if the random access process success message is received before the RRC layer receives the system information sent by the base station, the RRC layer does not need to notify the MAC layer to stop the random access process after receiving the system information sent by the base station; or
If the random access procedure success message is received before the timer is overtime and the RRC layer does not receive the system information sent by the base station, the MAC layer does not need to be informed to stop the random access procedure after the timer is overtime.
Optionally, if the timer is overtime, the RRC layer considers that the system information acquisition is failed, which is executed by the processor 1801, and includes:
and if the timer is overtime, the RRC layer considers that the system information acquisition is failed and informs the MAC layer to stop the random access process.
Optionally, before the step of the RRC layer notifying the MAC layer of stopping the random access procedure, the computer program when executed by the processor 1801 further implements the following steps:
if the MAC layer fails to initiate the random access process for the Nth time, the MAC layer reports a random access process failure message to the RRC layer and continues to initiate the random access process, wherein N is an integer greater than or equal to 1.
Optionally, the RRC layer of the user equipment triggers the MAC layer of the user equipment to send a system information request to the base station, and after the step of starting the timer by the RRC layer, the computer program, when executed by the processor 1801, further implements the following steps:
if the MAC layer fails to initiate the random access process for the Mth time, the MAC layer reports a random access process failure message to the RRC layer, and the MAC layer terminates the random access process, wherein M is an integer greater than or equal to 1;
and if the RRC layer does not receive the system information returned by the base station, the RRC layer considers that the system information acquisition fails according to the random access process failure message and terminates the timer.
Optionally, the RRC layer of the user equipment triggers the MAC layer of the user equipment to send a system information request to the base station, and after the step of starting the timer by the RRC layer, the computer program, when executed by the processor 1801, further implements the following steps:
if the random access process initiated by the MAC layer fails, the MAC layer initiates the random access process again;
before the timer is overtime, the RRC layer receives the system information sent by the base station, and then the RRC layer informs the MAC layer to stop the random access process.
Optionally, the RRC layer of the user equipment triggers the MAC layer of the user equipment to send a system information request to the base station, and after the step of starting the timer by the RRC layer, the computer program, when executed by the processor 1801, further implements the following steps:
and the RRC layer receives the random access process success message fed back by the MAC layer, and the RRC layer does not receive the system information returned by the base station, the timer is terminated, the system information request sent to the base station by the user terminal is considered to be successfully sent, and the base station successfully receives the system information request.
Optionally, the duration of the timer is that the base station notifies the ue through a broadcast or dedicated RRC message.
Optionally, the N is a notification of the ue by the base station through a broadcast or dedicated RRC message.
Optionally, the M is a notification of the ue by the base station through a broadcast or dedicated RRC message.
Optionally, if the system information request is Msg1 in a random access process, the random access process success message indicates that the MAC layer successfully receives Msg2 in the random access process, and confirms that the Msg2 carries an identifier of a preamble in the Msg 1; or
And if the system information request is Msg3 in the random access process, the random access process success message indicates that the MAC layer successfully receives Msg4 in the random access process, and confirms that the Msg4 carries bit information of a preset position in the Msg 3.
Optionally, the system information request is Msg1 in a random access process, and the random access process failure message indicates that the MAC layer does not successfully receive Msg2 in the random access process; or
And if the system information request is Msg3 in the random access process, the random access process failure message indicates that the MAC layer does not successfully receive Msg4 in the random access process.
Optionally, the notifying the MAC layer to stop the random access process includes:
and informing the MAC layer of resetting.
It should be noted that, in this embodiment, the user terminal 1800 may be a user terminal in any implementation manner in the method embodiment of the present invention, and any implementation manner of the user terminal in the method embodiment of the present invention may be implemented by the user terminal 1800 in this embodiment, and the same beneficial effects are achieved, and details are not described here.
An embodiment of the present invention further provides a user terminal, including: the system information transmission processing method comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the computer program realizes the steps in the system information transmission processing method provided by the embodiment of the invention when being executed by the processor.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the processing method for system information transmission provided by the embodiment of the present invention are implemented.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (40)

1. A processing method for system information transmission is applied to a user terminal, and is characterized by comprising the following steps:
the Radio Resource Control (RRC) layer of the user terminal triggers a Media Access Control (MAC) layer of the user terminal to send a system information request to a base station and starts a timer;
before the timer is overtime, the RRC layer receives the system information sent by the base station, and then the timer is stopped;
the RRC layer receives a random access process success message fed back by the MAC layer;
if the random access process success message is received before the RRC layer receives the system information sent by the base station, the RRC layer does not need to notify the MAC layer to stop the random access process after receiving the system information sent by the base station; or
If the random access procedure success message is received before the timer is overtime and the RRC layer does not receive the system information sent by the base station, the MAC layer does not need to be informed to stop the random access procedure after the timer is overtime.
2. The method of claim 1, wherein the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to a base station, and after the step of the RRC layer starting a timer, the method further comprises:
and if the timer is overtime, the RRC layer considers that the system information acquisition fails.
3. The method of claim 1, wherein the system information request is a message Msg1 or Msg3 in a random access procedure.
4. The method of claim 1, wherein the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to a base station, comprising:
the RRC layer of the user terminal transmits the configuration information of the Preamble to the MAC layer of the user terminal; or
The RRC layer of the user terminal transfers an RRC system information request message to the MAC layer of the user terminal.
5. The method of claim 1, wherein the system information received by the RRC layer comprises:
the system information requests all or part of the requested system information.
6. The method as claimed in claim 5, wherein said stopping said timer if said RRC layer receives system information transmitted from said base station before said timer expires comprises:
and before the timer is overtime, the RRC layer receives the system information sent by the base station, considers that the system information is successfully acquired, and stops the timer.
7. The method of claim 1, wherein the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to a base station, and after the step of the RRC layer starting a timer, the method further comprises:
before the timer is overtime, the RRC layer receives the system information sent by the base station, and then the RRC layer informs the MAC layer to stop the random access process.
8. The method as claimed in claim 7, wherein the said RRC layer receives the system information sent by the base station before the said timer expires, and then the said RRC layer informs the MAC layer to stop the random access procedure, including:
before the timer is overtime, the RRC layer receives the system information sent by the base station, and receives the random access process success message fed back by the MAC layer, so that the RRC layer informs the MAC layer to stop the random access process.
9. The method of claim 2, wherein the considering, by the RRC layer, that the system information acquisition has failed if the timer expires comprises:
and if the timer is overtime, the RRC layer considers that the system information acquisition is failed and informs the MAC layer to stop the random access process.
10. The method of claim 7 or 9, wherein prior to the step of the RRC layer informing the MAC layer to stop the random access procedure, the method further comprises:
if the MAC layer fails to initiate the random access process for the Nth time, the MAC layer reports a random access process failure message to the RRC layer and continues to initiate the random access process, wherein N is an integer greater than or equal to 1.
11. The method of claim 1, wherein the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to a base station, and after the step of the RRC layer starting a timer, the method further comprises:
if the MAC layer fails to initiate the random access process for the Mth time, the MAC layer reports a random access process failure message to the RRC layer, and the MAC layer terminates the random access process, wherein M is an integer greater than or equal to 1;
and the RRC layer does not receive the system information returned by the base station, considers that the system information acquisition fails according to the random access process failure message and terminates the timer.
12. The method of claim 1, wherein the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to a base station, and after the step of the RRC layer starting a timer, the method further comprises:
if the random access process initiated by the MAC layer fails, the MAC layer initiates the random access process again;
before the timer is overtime, the RRC layer receives the system information sent by the base station, and then the RRC layer informs the MAC layer to stop the random access process.
13. The method of claim 1, wherein the RRC layer of the user terminal triggers the MAC layer of the user terminal to send a system information request to a base station, and after the step of the RRC layer starting a timer, the method further comprises:
and the RRC layer receives the random access process success message fed back by the MAC layer, and the RRC layer does not receive the system information returned by the base station, the timer is terminated, the system information request sent to the base station by the user terminal is considered to be successfully sent, and the base station successfully receives the system information request.
14. The method of claim 1, wherein the duration of the timer is that the base station notifies the user terminal through a broadcast or dedicated RRC message.
15. The method of claim 10, wherein the N is notified to the user terminal by the base station through a broadcast or dedicated RRC message.
16. The method of claim 11, wherein M is notified to the user terminal by the base station through a broadcast or dedicated RRC message.
17. The method according to claim 1, 8 or 13, wherein the system information request is Msg1 in a random access procedure, and the random access procedure success message indicates that the MAC layer successfully receives Msg2 in a random access procedure and confirms that the Msg2 carries an identifier of a preamble in the Msg 1; or
And if the system information request is Msg3 in the random access process, the random access process success message indicates that the MAC layer successfully receives Msg4 in the random access process, and confirms that the Msg4 carries bit information of a preset position in the Msg 3.
18. The method of claim 11 or 12, wherein the system information request is Msg1 in a random access procedure, and the random access procedure failure message indicates that the MAC layer did not successfully receive Msg2 in a random access procedure; or
And if the system information request is Msg3 in the random access process, the random access process failure message indicates that the MAC layer does not successfully receive Msg4 in the random access process.
19. The method of claim 1, 7, 8, 10 or 13, wherein the notifying the MAC layer to stop a random access procedure comprises:
and informing the MAC layer of resetting.
20. A user terminal, comprising:
the starting module is used for triggering a Media Access Control (MAC) layer of the user terminal to send a system information request to a base station by an RRC layer of the user terminal and starting a timer;
a stopping module, configured to stop the timer if the RRC layer receives the system information sent by the base station before the timer expires;
a receiving module, configured to receive, by the RRC layer, a random access procedure success message fed back by the MAC layer;
if the random access process success message is received before the RRC layer receives the system information sent by the base station, the RRC layer does not need to notify the MAC layer to stop the random access process after receiving the system information sent by the base station; or
If the random access procedure success message is received before the timer is overtime and the RRC layer does not receive the system information sent by the base station, the MAC layer does not need to be informed to stop the random access procedure after the timer is overtime.
21. The user terminal of claim 20, wherein the user terminal further comprises:
and the considering module is used for considering that the system information acquisition fails by the RRC layer if the timer is overtime.
22. The user terminal of claim 20, wherein the system information request is Msg1 or Msg3 in a random access procedure.
23. The ue according to claim 20, wherein the starting module is configured to enable an RRC layer of the ue to transmit configuration information of a Preamble to an MAC layer of the ue, and start a timer in the RRC layer, and the MAC layer sends a system information request to a base station according to the configuration information; or
The starting module is used for transmitting an RRC system information request message to an MAC layer of the user terminal by the RRC layer of the user terminal, starting a timer on the RRC layer, and sending a system information request to a base station by the MAC layer according to the RRC system information request message.
24. The user terminal of claim 20, wherein the system information received by the RRC layer includes:
the system information requests all or part of the requested system information.
25. The ue of claim 24, wherein the stopping module is configured to consider that system information acquisition is successful and stop the timer if the RRC layer receives system information sent by the base station before the timer expires.
26. The user terminal of claim 20, wherein the user terminal further comprises:
a first notifying module, configured to, before the timer expires, the RRC layer receives the system information sent by the base station, and then the RRC layer notifies the MAC layer to stop a random access procedure.
27. The ue of claim 26, wherein the first notifying module is configured to, before the timer expires, receive system information sent by the base station by the RRC layer, and the RRC layer receives a random access procedure success message fed back by the MAC layer, and then the RRC layer notifies the MAC layer to stop a random access procedure.
28. The ue according to claim 21, wherein the considering module is configured to consider that the system information acquisition is failed by the RRC layer and notify the MAC layer to stop the random access procedure if the timer expires.
29. The user terminal according to claim 26 or 28, wherein the user terminal further comprises:
a first reporting module, configured to report a random access procedure failure message to the RRC layer and continue to initiate a random access procedure if the MAC layer fails to initiate the random access procedure for the nth time, where N is an integer greater than or equal to 1.
30. The user terminal of claim 20, wherein the user terminal further comprises:
a second reporting module, configured to report a random access procedure failure message to the RRC layer by the MAC layer if the MAC layer fails to initiate a random access procedure for an mth time, and the MAC layer terminates the random access procedure, where M is an integer greater than or equal to 1;
and the first termination module is used for considering that the system information acquisition fails according to the random access process failure message and terminating the timer if the RRC layer does not receive the system information returned by the base station.
31. The user terminal of claim 30, wherein the user terminal further comprises:
the initiating module is used for re-initiating the random access process by the MAC layer if the random access process initiated by the MAC layer fails;
and a second notification module, configured to, before the timer expires, receive, by the RRC layer, the system information sent by the base station, and notify, by the RRC layer, the MAC layer to stop a random access procedure.
32. The user terminal of claim 20, wherein the user terminal further comprises:
and the second termination module is used for terminating the timer if the RRC layer receives the random access process success message fed back by the MAC layer and does not receive the system information returned by the base station, and considering that the system information request sent by the user terminal to the base station is successfully sent and the base station successfully receives the system information request.
33. The ue of claim 20, wherein the duration of the timer is signaled to the ue by the base station through a broadcast or dedicated RRC message.
34. The ue of claim 29, wherein N is notified to the ue by the bs through a broadcast or dedicated RRC message.
35. The ue of claim 30, wherein M is notified to the ue by a broadcast or dedicated RRC message for the base station.
36. The user terminal of claim 20, 27 or 32, wherein the system information request is Msg1 in random access procedure, and the random access procedure success message indicates that the MAC layer successfully receives Msg2 in random access procedure and confirms that the Msg2 carries the identifier of the preamble in Msg 1; or
And if the system information request is Msg3 in the random access process, the random access process success message indicates that the MAC layer successfully receives Msg4 in the random access process, and confirms that the Msg4 carries bit information of a preset position in the Msg 3.
37. The user terminal of claim 30 or 31, wherein the system information request is Msg1 in random access procedure, and the random access procedure failure message indicates that the MAC layer did not successfully receive Msg2 in random access procedure; or
And if the system information request is Msg3 in the random access process, the random access process failure message indicates that the MAC layer does not successfully receive Msg4 in the random access process.
38. The user terminal of claim 20, 26, 27 or 31, wherein said notifying the MAC layer to stop the random access procedure comprises:
and informing the MAC layer of resetting.
39. A user terminal, comprising: memory, processor and computer program stored on the memory and executable on the processor, which when executed by the processor implements the steps in the processing method of system information transmission according to any one of claims 1 to 19.
40. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the method of processing a system information transmission according to any one of claims 1 to 19.
CN201710731910.0A 2017-08-23 2017-08-23 System information transmission processing method and user terminal Active CN109429356B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710731910.0A CN109429356B (en) 2017-08-23 2017-08-23 System information transmission processing method and user terminal
PCT/CN2018/101540 WO2019037716A1 (en) 2017-08-23 2018-08-21 Processing method for system information transmission and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710731910.0A CN109429356B (en) 2017-08-23 2017-08-23 System information transmission processing method and user terminal

Publications (2)

Publication Number Publication Date
CN109429356A CN109429356A (en) 2019-03-05
CN109429356B true CN109429356B (en) 2020-07-14

Family

ID=65439929

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710731910.0A Active CN109429356B (en) 2017-08-23 2017-08-23 System information transmission processing method and user terminal

Country Status (2)

Country Link
CN (1) CN109429356B (en)
WO (1) WO2019037716A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020087231A1 (en) * 2018-10-29 2020-05-07 Oppo广东移动通信有限公司 Method and apparatus for reducing terminal power consumption, and terminal
CN111698767B (en) * 2019-03-13 2021-08-31 华为技术有限公司 Method and equipment for requesting system information
CN111866962A (en) * 2019-04-28 2020-10-30 华为技术有限公司 Channel access method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217689A (en) * 2007-01-05 2008-07-09 大唐移动通信设备有限公司 A systematic message transmitting method and its implementation device
CN102548012A (en) * 2010-12-22 2012-07-04 中兴通讯股份有限公司 Random access method and terminal
CN106714272A (en) * 2016-11-03 2017-05-24 展讯通信(上海)有限公司 System information transmission method and device, network side equipment and user equipment
WO2017135052A1 (en) * 2016-02-04 2017-08-10 シャープ株式会社 Terminal device, base station device, communications method, and integrated circuit

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110237239A1 (en) * 2010-03-25 2011-09-29 Industrial Technology Research Institiute Method and apparatus for selectively muting a control channel for a femtocell for interference avoidance
CN107040977B (en) * 2017-05-05 2019-11-12 宇龙计算机通信科技(深圳)有限公司 A kind of system information transmission method and relevant device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217689A (en) * 2007-01-05 2008-07-09 大唐移动通信设备有限公司 A systematic message transmitting method and its implementation device
CN102548012A (en) * 2010-12-22 2012-07-04 中兴通讯股份有限公司 Random access method and terminal
WO2017135052A1 (en) * 2016-02-04 2017-08-10 シャープ株式会社 Terminal device, base station device, communications method, and integrated circuit
CN106714272A (en) * 2016-11-03 2017-05-24 展讯通信(上海)有限公司 System information transmission method and device, network side equipment and user equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
On demand SI General Procedure;vivo;《3GPP TSG-RAN WG2 #99 R2-1708426》;20170812;第1、2.1-2.2.3、3节 *
On Demand SI: Remaining Issues;Samsung;《3GPP TSG-RAN WG2 #99 R2-1707678》;20170803;全文 *

Also Published As

Publication number Publication date
WO2019037716A1 (en) 2019-02-28
CN109429356A (en) 2019-03-05

Similar Documents

Publication Publication Date Title
JP6856300B2 (en) Random access methods, network devices, and user equipment
CN109089303B (en) System information transmission method, terminal and network equipment
CN106797573B (en) Paging method and device
EP3611943B1 (en) Method and apparatus for acquiring system information
CN109547947B (en) Method and device for establishing user equipment cooperation group
US11337078B2 (en) Uplink data transmission method and apparatus and storage medium
US11051333B2 (en) Data transmission method, network device, and terminal device
CN109275187B (en) Random access method, terminal and computer readable storage medium
CN109429356B (en) System information transmission processing method and user terminal
CN112913319B (en) Random access method and device and storage medium
EP3661305A1 (en) System information acquisition method, transmission control method and related device
US20200288483A1 (en) Method and terminal device for managing timer and transmitting information
CN109152081B (en) Random access method based on multi-beam, network side equipment and user terminal
WO2019062582A1 (en) Information acquisition method and terminal
CN108307335B (en) Data transmission method, device and system
CN111757393B (en) Method and apparatus for random access
CN109548094B (en) Connection recovery method and device and computer storage medium
JP6951458B2 (en) How to transmit system information, base stations and terminals
CN114071802A (en) Information reporting method, terminal and network side equipment
JP2020510369A5 (en)
CN114390440B (en) Service processing method and device and related equipment
WO2022082522A1 (en) Method and apparatus for subsequent data transmission
CN110022595B (en) Downlink data transmission method, network device and computer storage medium
WO2018161972A1 (en) System information transmission method, device, apparatus, and computer readable storage medium
CN110999189A (en) Confirmation of system information request

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant