CN109644503A - For the method for random access, the network equipment and terminal device - Google Patents

For the method for random access, the network equipment and terminal device Download PDF

Info

Publication number
CN109644503A
CN109644503A CN201680088658.XA CN201680088658A CN109644503A CN 109644503 A CN109644503 A CN 109644503A CN 201680088658 A CN201680088658 A CN 201680088658A CN 109644503 A CN109644503 A CN 109644503A
Authority
CN
China
Prior art keywords
random access
request message
access request
information
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201680088658.XA
Other languages
Chinese (zh)
Other versions
CN109644503B (en
Inventor
唐海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN109644503A publication Critical patent/CN109644503A/en
Application granted granted Critical
Publication of CN109644503B publication Critical patent/CN109644503B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the present invention provides a kind of for the method for random access, the network equipment and terminal device, and this method compatibility with higher is conducive to terminal device and is accurately judged to one's own RAR.This method comprises: the network equipment receives the random access request message that first terminal equipment is sent, which carries random access lead code;The network equipment determines random access radio network temporary identifier RA-RNTI according to the random access request message;The network equipment sends random access response RAR message according to the RA-RNTI, the RAR message carries preamble information and instruction information, the preamble information is used to indicate the random access lead code, and the first terminal equipment that the preamble information and the instruction information are used to receive at least one terminal device of the RAR message determines that the RAR message belongs to the first terminal equipment.

Description

For the method for random access, the network equipment and terminal device Technical field
The present embodiments relate to fields of communication technology, and more particularly, to for the method for random access, the network equipment and terminal device.
Background technique
In existing long term evolution (Long Term Evolution, LTE) in system, when the network equipment receives the random access request message of terminal device transmission, the network equipment will be in Physical Downlink Shared Channel (Physical Downlink Shared CHannel, PDSCH random access response RAR (Random Access Response is sent on), RAR) message, wherein the random access request message carries random access lead code.The RAR message carries the index of random access lead code, time adjustment information, initial ascending resource distribution (for sending subsequent msg3) information and an interim Cell Radio Network Temporary Identifier/Identity, Cell-RNTI (Cell-Radio Network Temporary Identifier, C-RNTI) for uplink synchronous.
After terminal device sends random access request message, it needs using random access radio network temporary identifier (Random Access-Radio Network Temporary Identifier, RA-RNTI) Physical Downlink Control Channel (Physical Downlink Control Channel, PDCCH) is monitored with for receiving one's own RAR message.If the random access lead code for the index instruction that the received RAR message of terminal device carries is identical as the random access lead code that terminal device is sent, terminal device determines the RAR message to one's name, and carries out corresponding operating according to the information that the RAR message carries.
However, determining that one's own RAR message has biggish limitation using this method, it is unfavorable for terminal device and accurately determines one's own RAR message.
Summary of the invention
The embodiment of the present invention provides a kind of for the method for random access, the network equipment and terminal device, and this method compatibility with higher is conducive to terminal device and accurately determines one's own RAR message.
In a first aspect, providing a kind of method for random access, this method comprises: the network equipment receives the random access request message that first terminal equipment is sent, which carries random access lead code;The network equipment determines random access radio network temporary identifier RA-RNTI according to the random access request message;The network equipment sends random access response RAR message according to the RA-RNTI, The RAR message carries preamble information and instruction information, the preamble information is used to indicate the random access lead code, and the first terminal equipment that the preamble information and the instruction information are used to receive at least one terminal device of the RAR message determines that the RAR message belongs to the first terminal equipment.
Compared with the index of the random access lead code carried in the prior art according only to RAR message determines one's own RAR message, in this scenario, first terminal equipment determines one's own RAR message according to instruction information and preamble information, this method compatibility with higher, advantageous first terminal equipment accurately determines one's own RAR message, in order to which first terminal equipment can efficiently carry out random access procedure.
In the possible implementation of first aspect, which determines RA-RNTI according to the random access request message, comprising: the first resource information for the resource that the network equipment is occupied according to the random access request message determines the RA-RNTI;The instruction information includes: the Secondary resource information for the resource that the random access request message occupies, the Secondary resource information of the resource occupied using the random access request message as at least one of the information of the functional value of variable and the information in addition to the random lead code of random access request message carrying, wherein, the first resource information is different with the Secondary resource information.
The instruction information may include a plurality of types of information, and program flexibility is high, in order to which terminal device efficiently can determine one's own RAR message according to instruction information.
In the possible implementation of first aspect, which is used to indicate the frequency domain resource of random access request message occupancy, which is used to indicate the time-domain resource of random access request message occupancy.
Compared with the information of the information of the frequency domain resource occupied in the prior art according to random access request message and time-domain resource determines RA-RNTI jointly, in this scenario, the first resource information for the frequency domain resource that the network equipment and first terminal equipment can be occupied according to random access request message determines RA-RNTI, the Secondary resource information for the time-domain resource that random access request message occupies is sent to first terminal equipment by RAR message, the complexity that first terminal equipment obtains RA-RNTI can be reduced, first terminal equipment can be made to accurately determine one's own RAR message simultaneously.
In the possible implementation of first aspect, the first resource information is used to indicate the frequency domain resource and time-domain resource of random access request message occupancy, the Secondary resource information is used to indicate the time-domain resource of random access request message occupancy, and the granularity of the time-domain resource of first resource information instruction is greater than the granularity of the time-domain resource of Secondary resource information instruction.
In this scenario, although first resource information indicates time-domain resource and frequency domain resource simultaneously, the granularity of the time-domain resource of first resource information instruction is larger, can reduce the acquisition of first terminal equipment The granularity of the complexity of RA-RNTI, the time-domain resource of Secondary resource instruction is smaller, and first terminal equipment can be made to accurately determine one's own RAR message.The program can determine the determined number of one's own RAR message with the complexity and terminal device of balanced termination equipment reception RAR message.
In the possible implementation of first aspect, which is specifically used for the initial position for the time-domain resource for indicating that the random access request message occupies and at least one of the end position of time-domain resource of random access request message occupancy.
In the program, Secondary resource information can indicate initial position and/or end position, the high compatibility with higher of program flexibility and applicability.
In the possible implementation of first aspect, which is specifically used for indicating at least one of following information: the number for first subframe that the random access request message occupies;The number of first time slot or first mini time slot that the random access request message occupies;The number for the last one subframe that the random access request message occupies;The number of the last one time slot or the last one mini time slot that the random access request message occupies.
In the possible implementation of first aspect, the information of the functional value is used to indicate at least one of following information: the difference between the number of first subframe of the number for first subframe that the RAR message occupies and random access request message occupancy;Difference between the number for first mini time slot that the number for first mini time slot that difference or the RAR message between the number for first time slot that the number for first time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy;Difference between the number for the last one subframe that the number for the last one subframe that the RAR message occupies and the random access request message occupy;Difference between the number for the last one mini time slot that the number for the last one mini time slot that difference or the RAR message between the number for the last one time slot that the number for the last one time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy.
In the possible implementation of first aspect, the information in addition to the random lead code which carries includes at least one of sending time stamp of the location information of the first terminal equipment, the identification information of the first terminal equipment and the random access request message.
The program not only makes first terminal equipment accurately determine one's own RAR message, further, the program can by LTE system msg2 message and msg3 merge, can save signaling overheads, improve the efficiency of terminal device random access.
In the possible implementation of first aspect, which is carried in medium access control subheader MAC subheader or the MAC RAR of the RAR message.
In the program, instruction information can neatly carry in RAR message, compatibility with higher.
Second aspect provides a kind of method for random access, this method comprises: first terminal equipment sends random access request message to the network equipment, which carries random access lead code;The first terminal equipment determines random access radio network temporary identifier RA-RNTI according to the random access request message;The first terminal equipment receives the random access response RAR message of network equipment transmission according to the RA-RNTI, which carries preamble information and instruction information;Random access lead code, the preamble information and instruction information that the first terminal equipment is carried according to the random access request message determine whether the RAR message belongs to the first terminal equipment.
Compared with the index of the random access lead code carried in the prior art according only to RAR message determines one's own RAR message, in this scenario, first terminal equipment determines one's own RAR message according to instruction information and preamble information, it can be improved the accuracy rate that first terminal equipment determines one's own RAR message, in order to which terminal device can efficiently carry out random access.
In the possible implementation of second aspect, the first terminal equipment receives the random access response RAR message of network equipment transmission according to the RA-RNTI, comprising: the first resource information for the resource that the first terminal equipment is occupied according to the random access request message determines the RA-RNTI;If the random access lead code of preamble information instruction is identical as the random access lead code that the random access request message carries, and the instruction information includes: the Secondary resource information for the resource that the random access request message occupies, the Secondary resource information of the resource occupied using the random access request message as at least one of the information of the functional value of variable and the information in addition to the random lead code of random access request message carrying, this method further include: the first terminal equipment determines that the RAR message belongs to the first terminal equipment;Wherein, the first resource information is different with the Secondary resource information.
First terminal equipment determines one's own RAR message according to preamble information and instruction information, so that first terminal equipment can efficiently determine one's own RAR message.
In the possible implementation of second aspect, which is used to indicate the frequency domain resource of random access request message occupancy, which is used to indicate the time-domain resource of random access request message occupancy.
Compared with the information of the information of the frequency domain resource occupied in the prior art according to random access request message and time-domain resource determines RA-RNTI jointly, in this scenario, the first resource information for the frequency domain resource that first terminal equipment can be occupied according to random access request message determines RA-RNTI, and the Secondary resource information for the time-domain resource that random access request message occupies is sent to first terminal by RAR message Equipment can reduce first terminal equipment and obtain the complexity of RA-RNTI, while can be improved the accuracy rate that first terminal equipment determines one's own RAR message.
In the possible implementation of second aspect, the first resource information is used to indicate the frequency domain resource and time-domain resource of random access request message occupancy, the Secondary resource information is used to indicate the time-domain resource of random access request message occupancy, and the granularity of the time-domain resource of first resource information instruction is greater than the granularity of the time-domain resource of Secondary resource information instruction.
Although first resource information indicates time-domain resource and frequency domain resource simultaneously, but the granularity of the time-domain resource of first resource information instruction is larger, not only first terminal equipment can have been reduced and obtained the complexity of RA-RNTI, but also the efficiency that first terminal equipment receives one's own RAR message can be improved.The program can determine the determined number of one's own RAR message with the complexity and terminal device of balanced termination equipment reception RAR message.
In the possible implementation of second aspect, which is specifically used for the initial position for the time-domain resource for indicating that the random access request message occupies and at least one of the end position of time-domain resource of random access request message occupancy.
In the possible implementation of second aspect, which is specifically used for indicating at least one of following information: the number for first subframe that the random access request message occupies;The number of first time slot or first mini time slot that the random access request message occupies;The number for the last one subframe that the random access request message occupies;The number of the last one time slot or the last one mini time slot that the random access request message occupies.
In the possible implementation of second aspect, the information of the functional value is used to indicate at least one of following information: the difference between the number of first subframe of the number for first subframe that the RAR message occupies and random access request message occupancy;Difference between the number for first mini time slot that the number for first mini time slot that difference or the RAR message between the number for first time slot that the number for first time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy;Difference between the number for the last one subframe that the number for the last one subframe that the RAR message occupies and the random access request message occupy;Difference between the number for the last one mini time slot that the number for the last one mini time slot that difference or the RAR message between the number for the last one time slot that the number for the last one time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy.
In the possible implementation of second aspect, the information in addition to the random lead code which carries includes the mark letter of the location information of the first terminal equipment, the first terminal equipment At least one of the sending time of breath and random access request message stamp.
The accuracy rate that terminal device determines one's own RAR message not only can be improved in the program, further, the program can by LTE system msg2 message and msg3 merge, can save signaling overheads, improve the efficiency of terminal device random access.
In the possible implementation of second aspect, which is carried in medium access control subheader MAC subheader or the MAC RAR of the RAR message.
In the program, instruction information can neatly carry in RAR message, compatibility with higher.
In the possible implementation of second aspect, if the random access lead code of preamble information instruction is different from the random access lead code that the random access asks message to carry, or the instruction information and the random request message mismatch, this method further include: the first terminal equipment determines that the RAR message is not belonging to the first terminal equipment;Wherein, the instruction information and the random access request message mismatch, comprising: the resource information that the instruction information includes is different from the Secondary resource information of resource that the random access request message occupies;And/or the information of the instruction information functional value that includes is different as the information of the functional value of variable from the Secondary resource information of the resource occupied using the random access request message;And/or the location information that the instruction information includes is different from the location information of the first terminal equipment that the random access request message carries;And/or the identification information that the instruction information includes is different from the identification information of the first terminal equipment that the random access request message carries;And/or the sending time stamp that the instruction information includes is different from the sending time stamp that the random access request message carries.
The third aspect provides a kind of network equipment, for executing the method in the arbitrarily possible implementation of first aspect or first aspect.Specifically, which may include the module and/or unit for executing the method in the arbitrarily possible implementation of above-mentioned first aspect or first aspect.
Fourth aspect provides a kind of terminal device, for executing the method in the arbitrarily possible implementation of second aspect or second aspect.Specifically, which may include the module and/or unit for executing the method in the arbitrarily possible implementation of above-mentioned second aspect or second aspect.
5th aspect, a kind of network equipment is provided, it include: including transceiver, memory and processor, the transceiver is used for receiving and transmitting signal, the memory is for storing instruction, the processor is used to execute the instruction of memory storage, and the execution to the instruction stored in the memory is so that the processor executes the method in any possible implementation of first aspect or first aspect.
6th aspect, provides a kind of terminal device, comprising: including transceiver, memory and processor, which is used for receiving and transmitting signal, and for storing instruction, the processor is for executing the storage for the memory The instruction of device storage, and the execution to the instruction stored in the memory is so that the processor executes the method in any possible implementation of second aspect or second aspect.
7th aspect, provides a kind of computer storage medium, is stored with program code in the computer storage medium, which is used to indicate the instruction in any possible implementation for executing above-mentioned first aspect or first aspect.
Eighth aspect provides a kind of computer storage medium, is stored with program code in the computer storage medium, which is used to indicate the instruction in any possible implementation for executing above-mentioned second aspect or second aspect.
9th aspect, a kind of System on Chip/SoC is provided, which includes input interface, output interface, processor and memory, which is used to execute the code in the memory, when the code is performed, which may be implemented the method in aforementioned first aspect and various implementations.
Tenth aspect, a kind of System on Chip/SoC is provided, which includes input interface, output interface, processor and memory, which is used to execute the code in the memory, when the code is performed, which may be implemented the method in aforementioned second aspect and various implementations.
Therefore, in embodiments of the present invention, RAR message can carry instruction information and preamble information, the instruction information may include this at least one of the Secondary resource information of the resource for stating access request message occupancy, the information in addition to the random lead code carried using the Secondary resource information with the resource for stating random access request message occupancy as the information of the functional value of variable and the random access request message, and first terminal equipment is allowed to accurately determine one's own RAR message according to the instruction information and preamble information.
Detailed description of the invention
Fig. 1 is the schematic diagram of the wireless communication system suitable for the embodiment of the present invention.
Fig. 2 is the schematic flow chart of the method according to an embodiment of the present invention for random access.
Fig. 3 is the schematic diagram of the medium access control subheader MAC subheader suitable for the embodiment of the present invention.
Fig. 4 is the schematic diagram of an example of the MAC RAR suitable for the embodiment of the present invention.
Fig. 5 is another schematic diagram of the MAC RAR suitable for the embodiment of the present invention.
Fig. 6 is the schematic block diagram of an example of the network equipment according to an embodiment of the present invention.
Fig. 7 is the schematic block diagram of an example of terminal device according to an embodiment of the present invention.
Fig. 8 is another schematic block diagram of the network equipment according to an embodiment of the present invention.
Fig. 9 is another schematic block diagram of terminal device according to an embodiment of the present invention.
The schematic block diagram of Figure 10 chip according to the system in the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical scheme in the embodiment of the invention is clearly and completely described.
Fig. 1 shows the wireless communication system 100 suitable for the embodiment of the present invention.The wireless communication system 100 may include the network equipment 100.The network equipment 100 can be the equipment with terminal equipment in communication.The network equipment 100 can provide communication overlay for specific geographic area, and can be communicated with the terminal device (such as UE) being located in the overlay area.Optionally, the network equipment 100 can be base station (the Base Transceiver Station in gsm system or cdma system, BTS), base station (the NodeB being also possible in WCDMA system, NB), it can also be evolved base station (the Evolutional Node B in LTE system, eNB or eNodeB), either cloud Radio Access Network (Cloud Radio Access Network, CRAN the wireless controller in), or the network equipment can be relay station, access point, mobile unit, wearable device, public land mobile network (the Public Land of network side equipment or the following evolution in the following 5G network Mobile Network, PLMN) in the network equipment etc..
The wireless communication system 100 further includes at least one terminal device in 110 coverage area of the network equipment, such as first terminal equipment 120 and second terminal equipment 130.Terminal device can be mobile or fixed.Optionally, terminal device can refer to the accession to terminal, user equipment (User Equipment, UE), subscriber unit, subscriber station, movement station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless telecom equipment, user agent or user apparatus.Access terminal can be cellular phone, wireless phone, session initiation protocol (Session Initiation Protocol, SIP) phone, wireless local loop (Wireless Local Loop, WLL it) stands, the terminal device in the PLMN of personal digital assistant (Personal Digital Assistant, PDA), the handheld device with wireless communication function, the other processing equipments for calculating equipment or being connected to radio modem, mobile unit, wearable device, the terminal device in future 5G network or the following evolution etc..
Optionally, 5G system or network can also be known as new wireless (New Radio, NR) system or network.
Fig. 1 schematically illustrates a network equipment and two terminal devices, optionally, the wireless communication system 100 may include multiple network equipments and each network equipment coverage area in may include The terminal device of other quantity, it is not limited in the embodiment of the present invention.
Optionally, which can also include that other network entities, the embodiment of the present invention such as network controller, mobile management entity are not construed as limiting this.
It should be understood that the terms " system " and " network " is often used interchangeably herein.The terms "and/or", only a kind of incidence relation for describing affiliated partner, indicates may exist three kinds of relationships, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.In addition, character "/" herein, typicallys represent the relationship that forward-backward correlation object is a kind of "or".
It should be noted that " first ", " second " etc. in the embodiment of the present invention are only to constitute any restriction without coping with the embodiment of the present invention for distinguishing different objects.
It should also be noted that, the division of situation, mode and classification in the embodiment of the present invention is merely to the convenience described, should not constitute special restriction, the feature in various situations, mode and classification can combine in the case of no contradiction.
The network equipment can determine RA-RNTI according to the random access request message received first before sending RAR message.Correspondingly, terminal device determines RA-RNTI according to the random access request message of transmission.In other words, the network equipment and terminal device determine the corresponding RA-RNTI of random access request message respectively.The mode for determining RA-RNTI in the prior art is introduced first.
The number for the frequency domain position that random access request message occupies in the number and first subframe of first subframe (subframe) that the network equipment and terminal device are occupied according to random access request message, determines RA-RNTI.
Specifically, the network equipment and terminal device can determine RA-RNTI according to formula (1).
RA-RNTI=1+t_id+10f_id (1)
Wherein, t_id is the number for first subframe that random access request message occupies, and f_id is the number for the frequency domain position that random access request message occupies in first subframe.
After the network equipment receives random access request message, RA-RNTI is determined according to formula (1), and RAR message is sent according to the RA-RNTI, correspondingly, terminal device determines the RA-RNTI, and monitors one's own RAR message according to the RA-RNTI.Which will increase the complexity that terminal device obtains RAR message.
For example, in order to improve the success rate that terminal device sends random access request message, terminal device can send random access request message to the network equipment by different wave beams in multi-beam Multi-beam system.For terminal device when different wave beams sends random access request message, each wave beam is corresponding The information of time-domain resource is different (for example, the number of corresponding first subframe is different).At this point, terminal device needs to attempt multiple RA-RNTI when monitoring one's own RAR message, the complexity for causing terminal device to obtain RAR is higher.
In another example, in order to improve the success rate that terminal device sends random access lead code, the mode that frequency division multiplexing can be used in terminal device sends multiple random access request messages in the same time-domain resource (random access lead code that multiple random access request messages carry can be the same or different).At this point, terminal device is also required to attempt multiple RA-RNTI when monitoring and belonging to the RAR message of the first terminal equipment, the complexity for causing terminal device to obtain RAR message is higher.
In order to reduce the complexity that terminal device obtains RAR message, RA-RNTI can be determined in the following ways.
Mode one,
The first resource information of the resource occupied according to random access request message determines RA-RNTI.Wherein, which is used to indicate the frequency domain resource or time-domain resource of random access request message occupancy.
For example, the network equipment and terminal device can determine RA-RNTI according to formula (2).
RA-RNTI=t_id+A (2)
Wherein, t_id is the number for first subframe that random access request message occupies;A is adjusting parameter.
In another example the network equipment and terminal device can determine RA-RNTI according to formula (3).
RA-RNTI=10f_id+B (3)
Wherein, f_id is the frequency domain position number that the random access request message occupies in first subframe that random access request message occupies, and B is adjusting parameter.
Which determines RA-RNTI, the complexity that terminal device obtains RAR message can be reduced, but, the one's own RAR message of determination in the prior art has limitation, if being easy to cause terminal device judgement error by mode one in conjunction with the mode for determining one's own RAR message in the prior art.
Such as, in the case where first resource information is used to indicate the frequency domain resource of random access request message occupancy, the network equipment and terminal device determine RA-RNTI according to first resource information, if first terminal equipment and second terminal equipment occupy frequency domain resource A and send random access request message, and the random access request message that first terminal equipment and second terminal equipment are sent includes random access lead code B, the random access request message that the network equipment is first sent according to second terminal equipment sends RAR message and (is denoted as Second RAR message), first terminal equipment and second terminal equipment listen to second RAR message, which carries the information (for example, index of random access lead code B) of random access lead code B.If still (determining one's own RAR message according only to the index of random access lead code) by the way of determining RAR message in the prior art, it is one's own RAR message that first terminal equipment, which will mistakenly believe that second RAR message, and relevant operation is carried out using the information in second RAR message, lead to the processing error of first terminal equipment.
Similarly, in the case where first resource information is used to indicate the time-domain resource of random access request message occupancy, since the one's own RAR message of determination in the prior art has limitation, also it is easy to cause terminal device judgement error.
Mode two,
The first resource information of the resource occupied according to random access request message determines RA-RNTI.Wherein, which is used to indicate the frequency domain resource and time-domain resource of random access request message occupancy, and the granularity for the time-domain resource that first resource information indicates in mode two is larger.
For example, the information (for example, number of first radio frames occupied) for the radio frames that the network equipment and terminal device are occupied according to random access request message determines RA-RNTI in mode two.
This method is capable of that balanced termination equipment receives the complexity of RAR message and terminal device determines the number of one's own RAR.But, since the one's own RAR message of determination in the prior art has limitation, if by mode two in conjunction with the mode for determining one's own RAR message in the prior art, it is easy to cause terminal device judgement error, it illustrates and may refer to associated description above, in order to which succinctly details are not described herein again.
Further, assuming that multiple terminal devices occupy identical subframe and frequency domain resource sends identical random access lead code, the multiple terminal equipment receives after the RAR message of some terminal device, the random access lead code carried according to the RAR message, it will be considered that the RAR message to one's name, and be at war with process according to the RAR message.Since terminal device does not identify one's own RAR message correctly, it will lead to terminal device and carry out meaningless competition.
By analysis it can be found that being unfavorable for terminal device using determining that one's own RAR message has limitation according only to the index of the random access lead code in RAR message in the prior art and accurately determining one's own RAR message.
In view of this, the embodiment of the present invention provides a kind of method for random access, the RAR message that the network equipment is sent includes preamble information and instruction information, and whether to one's name terminal device can determine the RAR message received according to preamble information and instruction information.This method compatibility with higher, Be conducive to terminal device and accurately judge one's own RAR message.The method for random access that an embodiment of the present invention will be described in detail below.
Fig. 2 shows the schematic flow charts of the method 200 according to an embodiment of the present invention for random access described from the angle of equipment interaction.This method 200 can be applied to include in the communication system of the network equipment and at least one terminal device.Wherein, which can be wireless communication system 100 shown in FIG. 1.
Hereinafter, without loss of generality, by taking the interaction of the network equipment and first terminal equipment (and second terminal equipment) as an example, being described in detail according to the method for the embodiment of the present invention.It should be understood that first terminal equipment is any one terminal device at least one terminal device, " first " is only used for distinguishing explanation, constitutes any restriction without coping with the embodiment of the present invention.Similarly, second terminal equipment also should not constitute any restriction to the embodiment of the present invention.
As shown in Fig. 2, this method 200 includes:
S210, first terminal equipment send random access request message to the network equipment, and correspondingly, the network equipment receives the random access request message that first terminal equipment is sent, wherein the random access request message includes random access lead code.
Optionally, in the embodiment of the present invention, first terminal equipment can send access request message to the network equipment by way of multi-beam.
Wherein, for terminal device when sending random access request message by way of multi-beam, the position of the starting subframe of different wave beams can be different.
Optionally, in the embodiment of the present invention, after first terminal equipment can send random access request message by a wave beam, the RAR message for waiting the network equipment to send, if not waiting until the RAR message that the network equipment is sent, random access request message is sent using another wave beam, and the RAR message for waiting the network equipment to send stops sending random access request message if receiving the RAR message of network equipment transmission, otherwise, selection wave beam sends random access request message again.
S220, the network equipment determine RA-RNTI according to the random access request message, and correspondingly, first terminal equipment determines RA-RNTI according to the random access request message;
S230, the network equipment send RAR message according to RA-RNTI, correspondingly, first terminal equipment receives the RAR message that the network equipment is sent according to RA-RNTI, wherein, the RAR message includes that instruction information and preamble information, the preamble information are used to indicate the random access lead code;
Specifically, the network equipment sends RAR message according to RA-RNTI and the random access request message.
S240, the first terminal equipment determine the RAR according to the instruction information and the preamble information Message belongs to the first terminal equipment.
For ease of description, " random access request message that first terminal equipment is sent " can be denoted as " the first request message ", " random access lead code that the first random access request message carries " is denoted as " the first lead code ", " RA-RNTI determined according to the first request message " is denoted as " the first RA-RNTI ", " RAR message that the network equipment is sent according to the first request message " is denoted as " the first RAR message ".
Specifically, first terminal equipment is it needs to be determined that whether the RAR message received belongs to the first terminal equipment.
Such as, first terminal equipment is sent after the first request message, if the instruction information that the received RAR message of first terminal equipment carries matches with the first request message, and the random access lead code of the preamble information instruction of RAR message carrying is identical as the first lead code, first terminal equipment can determine that the RAR message belongs to the first terminal equipment.
In another example, first terminal equipment is sent after the first request message, if instruction information and the first request message that the received RAR message of first terminal equipment carries mismatch, or the RAR message carry preamble information instruction random access lead code and the first lead code it is not identical, first terminal equipment can determine that the RAR message is not belonging to the first terminal equipment.
Compared with terminal device in the prior art determines one's own RAR message according only to the index of the random access lead code in RAR message, in embodiments of the present invention, RAR message not only carries preamble information and also carries instruction information, the preamble information and instruction information that first terminal equipment is carried according to RAR message determine one's own RAR message, this method compatibility with higher, it can be suitable for plurality of application scenes, be conducive to first terminal equipment and accurately determine one's own RAR message.
Optionally, before S240, this method 200 can also include:
S201, second terminal equipment send the second random access request message to the network equipment, and correspondingly, the network equipment receives second random access request message, " the second random access request message " can be denoted as " the second request message ";
S202, second terminal equipment determine RA-RNTI according to second request message, and correspondingly, the network equipment determines RA-RNTI according to second request message, " RA-RNTI determined according to the second request message " can be denoted as " the 2nd RA-RNTI ";
S203, the network equipment send the second RAR message according to the 2nd RA-RNTI;
The preamble information and instruction information that S204, second terminal equipment are carried according to second RAR message, determine that second RAR message is one's own RAR message, which stops prison Listen one's own RAR message;
For first terminal equipment, it at least may include following two situation that the network equipment, which sends the second RAR message:
Situation one, the first RA-RNTI and the 2nd RA-RNTI be not identical, and first terminal equipment can not receive second RAR message.
Situation two, the first RA-RNTI and the 2nd RA-RNTI are identical, first terminal equipment and second terminal equipment can receive second RAR message, the first terminal equipment need according in the second RAR message instruction information and preamble information determine whether second RAR message belongs to the first terminal equipment.If the first terminal equipment determines that second RAR message belongs to the first terminal equipment, which can be handled according to second RAR message;If the first terminal equipment determines that second RAR message is not belonging to the first terminal equipment, which needs to continue to monitor the RAR message for belonging to the first terminal equipment.
Specifically, in situation two, this method 200 may include:
The preamble information and instruction information that S205, first terminal equipment are carried according to the second RAR message, determine that second RAR message is not belonging to the first terminal equipment, first terminal equipment needs continue to monitor one's own RAR message, wherein, the instruction information instruction information corresponding from the first request message which carries is different.
Specifically, the instruction information that RAR message carries may include at least a kind of in following a few class instruction information:
The first kind,
First kind instruction information includes the Secondary resource information for the resource that random access request message occupies.
For example, the instruction information that the first RAR is carried includes the Secondary resource information for the resource that the first request message occupies, the instruction information that the 2nd RAR is carried includes the Secondary resource information for the resource that the second request message occupies.
Optionally an example determines RA-RNTI according to mode one, and first resource information is different with the domain classification of Secondary resource information.
For example, first resource information, which is used to indicate random access request message, occupies frequency domain resource, Secondary resource information is used to indicate the time-domain resource of random access request message occupancy.The first resource information of resource that i.e. network equipment and terminal device are occupied according to random access request message determines RA-RNTI, and the first resource information is used to indicate the frequency domain resource of random access request message occupancy, which is used to indicate the time-domain resource of random access request message occupancy.
Optionally, which can serve to indicate that at least one of the end position of time-domain resource that the initial position for the time-domain resource that random access request message occupies and random access request message occupy.
For example, the Secondary resource information is specifically used for indicating at least one of following information:
The number for first subframe that 1a, random access request message occupy;
For example, the instruction information that the first RAR message carries includes Secondary resource information, which is used to indicate the number of first subframe of the first request message occupancy;The Secondary resource information that second RAR message carries is used to indicate the number of first subframe of the second request message occupancy.
The number of 1b, first time slot that random access request message occupies or first mini time slot;
The number for the last one subframe that 1c, random access request message occupy;
The number of 1d, the last one time slot that random access request message occupies or the last one mini time slot.
The explanation of 1b, 1c and 1d may refer to the associated description of 1a, in order to which succinctly details are not described herein again.
Indicate that information can separate frequency domain resource and time-domain resource by the first kind.Such as, RA-RNTI is determined using the frequency domain resource that random access request message occupies, instruction information is determined using the time-domain resource that random access request message occupies, this method can make first terminal equipment accurately determine one's own RAR message, while this method can reduce the complexity that first terminal equipment receives RAR message.
Such as, for indicating that information includes 1a, the frequency domain resource that first request message and the second request message occupy is A, it is B that first lead code is identical with the second lead code, the number for first subframe that first request message occupies is (N >=0) N, the number for first subframe that second request message occupies is (M >=0 M, and M ≠ N), the network equipment sends the second RAR message after receiving the second request message, second RAR message includes the information and number M of the second lead code B, since first terminal equipment and second terminal equipment send random access request message using identical frequency domain resource, first terminal equipment and second terminal equipment can receive and (listen to) the second RAR message.Since number M is different from number N, first terminal equipment determines that second RAR message is not belonging to oneself, and first terminal equipment continues to monitor one's own RAR message.If first terminal equipment listens to the first RAR message of information and number M including the first lead code B, first terminal equipment determines that first RAR message belongs to the first terminal equipment.
Optionally another example determines RA-RNTI according to mode two, and the granularity for the resource that first resource information is indicated with Secondary resource information is different, and the granularity of the resource of first resource information instruction is greater than The granularity of the resource of Secondary resource information instruction.
Such as, first resource information be used to indicate random access request message (such as, first request message) occupy frequency domain resource and time-domain resource, Secondary resource information is used to indicate the time-domain resource of random access request message (the first request message) occupancy, and the granularity of the time-domain resource of first resource information instruction is greater than the granularity of the time-domain resource of Secondary resource information instruction.
It should be noted that the granularity in the embodiment of the present invention can refer to the unit-sized of resource.For example, the granularity of radio frames is greater than the granularity of subframe by taking time-domain resource as an example, the granularity of subframe is greater than the granularity etc. of time slot.Wherein, which also can reflect the accuracy of time-domain resource.In other words, the accuracy of the time-domain resource of Secondary resource information instruction is higher than the accuracy of the time-domain resource of first resource information instruction.
For example, first resource information is used to indicate the information of the radio frames of random access request message occupancy, Secondary resource information is used to indicate the information of the subframe of random access request message occupancy.
In another example first resource information is used to indicate the information of the subframe of random access request message occupancy, Secondary resource information is used to indicate the information of the time slot (or mini time slot) of random access request message occupancy.
Indicate that information can be with the number of the complexity of balance reception RAR message and reception RAR message by the second class.Specifically, the time-domain resource of frequency domain resource and big granularity that first terminal equipment can be occupied according to random access request message first receives a part of RAR message, the receive number of the complexity and RAR message that receive RAR message can be reduced, first terminal equipment determines one's own RAR message (i.e. the first RAR message) further according to the time-domain resource of small grain size, is conducive to first terminal equipment and accurately identifies one's own RAR message.
Such as, first terminal equipment sends the first request message A by three wave beams, first request message B and third request message C, first request message A, first request message B and third request message C occupies identical frequency domain resource and radio frames, and the number of first subframe of three first request messages occupancy is 1 respectively, 2 and 3, three first request messages correspond to identical RA-RNTI, first terminal equipment can receive any of three first request messages according to the RA-RNTI (without attempting multiple RA-RNTI), it can reduce the complexity for receiving RAR message.The Secondary resource information for being used to accurately indicate the time-domain resource of the first request message is carried by the first RAR message, one's own RAR message can accurately be identified by being conducive to first terminal equipment.
It should be noted that, the granularity of the time-domain resource of Secondary resource information instruction is smaller (accuracy is higher), terminal device determines that the accuracy rate of the RAR message of oneself is higher, can efficiently improve the efficiency of random access, avoids executing meaningless random competition process.
For example, the frequency domain resource and starting subframe that are still occupied using random access request message are determined RA-RNTI, the instruction information that first RAR message includes is the number for the time slot that the first request message occupies, this method can be improved the accuracy that first terminal equipment determines to one's name RAR message, so that first terminal equipment can efficiently carry out random access procedure.
Second class,
The Secondary resource information that second class instruction information is occupied using random access request message is the information of the functional value of variable.
Such as, the instruction information that first RAR is carried includes the Secondary resource information of the resource occupied using the first request message as the information of the functional value of variable, and the instruction information that the 2nd RAR is carried includes the Secondary resource information of the resource occupied using the second request message as the information of the functional value of variable.
By taking Secondary resource information is used to indicate time-domain resource as an example, which can serve to indicate that at least one of following information:
Difference between the number for first subframe that the number and random access request message for first subframe that 2a, RAR message occupy occupy;
Such as, the instruction information that first RAR message carries is used to indicate the difference between the number of first subframe of the first RAR message occupancy and the number of first subframe of the first request message occupancy, the difference between the number for first subframe that the instruction information that the second RAR message carries is used to indicate the number of first subframe of the second RAR message occupancy and the first request message occupies.
Difference between the number for first mini time slot that the number and random access request message for first mini time slot that difference or the RAR message between the number for first time slot that the number and random access request message for first time slot that 2b, RAR message occupy occupy occupy occupy;
Difference between the number for the last one subframe that the number for the last one subframe that 2c, RAR message occupy and the random access request message occupy;
Difference between the number for the last one mini time slot that the number for the last one mini time slot that difference or the RAR message between the number for the last one time slot that the number for the last one time slot that 2d, the RAR message occupy and the random access request message occupy occupy and the random access request message occupy.
The explanation of 2b, 2c and 2d may refer to the associated description of 2a, in order to which succinctly details are not described herein again.
First terminal equipment receives after RAR message, the information for the time-domain resource that the corresponding random access request message of the RAR message occupies can be determined according to the instruction information in RAR message, and judge whether the information of the information of the time-domain resource of the determination and the time-domain resource of the random access request message oneself sent is identical, if they are the same, determine the RAR message to one's name, if it is different, determining that the RAR disappears Breath is not belonging to oneself and continues to monitor one's own RAR message.
Such as, assuming that instruction information includes 2a, first request message and the second request message occupy identical frequency domain resource A, first lead code and the second lead code are B, the number for first subframe that first request message occupies is (N >=0) N, the number for first subframe that second request message occupies is (M >=0 M, and M ≠ N), in K (N≤K after the network equipment the second request message of reception, and M ≠ N) the second RAR message of a subframe transmission, second RAR message carries the information and difference K-M of the second lead code B, first terminal equipment determines that the number of first subframe of the corresponding random access request message occupancy of the second RAR message is M according to difference K-M, first terminal equipment can determine that second RAR message is not belonging to the first terminal equipment.If first terminal equipment listens to the first RAR message, first RAR message carries the information and difference K-N of the first lead code B, first terminal equipment determines that the number of first subframe of the corresponding random access request message occupancy of second RAR message is N according to difference K-N, the first terminal equipment determines that the corresponding random access request message of the first RAR message and the preamble information of the first request message and the resource information of occupancy are all the same, which determines that first RAR message is to belong to the first terminal equipment.
Third class,
Third class instruction information includes the information in addition to random access lead code that random access request message carries.
Specifically, third class instruction information may include at least one of following information:
The location information of terminal device;
For example, the first request message carries the location information of first terminal equipment, the first RAR carries the location information of first terminal equipment;Second request message carries the location information of second terminal equipment, and the 2nd RAR carries the location information of second terminal equipment.
The identification information of terminal device;
For example, the first request message carries the identification information of first terminal equipment, the first RAR carries the identification information of first terminal equipment;Second request message carries the identification information of second terminal equipment, and the 2nd RAR carries the identification information of second terminal equipment.
The beam information of terminal device;
The sending time of random access request message is stabbed.For example, the first RAR message carries the sending time stamp of the first request message, the second RAR message carries the sending time stamp of the second request message.
Wherein, sending time stamp may include character string, and for identifying the sending time of random access request message, the acceptable specific sending instant of sending time stamp is (for example, Beijing time 12: 15 Divide 50 seconds).The sending time stabs the partial information (for example, 50s) that can also be sending instant.
Optionally, if RAR message carries third class and indicates information, can by existing LTE system msg2 message and msg3 merge, can save signaling overheads, improve the efficiency of terminal device random access.
Such as, the first request message that first terminal equipment is sent carries the identification information of the first lead code and first terminal equipment, if the RAR message that first terminal equipment receives includes first lead code and the identification information, the first terminal equipment can determine that the RAR message belongs to the first terminal equipment, further, which can also determine that the first terminal equipment competes success in the random access procedure.
More than, describe the three classes instruction information of RAR message carrying.Specifically, first terminal equipment receives after RAR message, whether the instruction information and preamble information for judging RAR message carrying match with the random request message oneself sent, if matching, first terminal equipment determines the RAR message to one's name, determines that the RAR message is not belonging to oneself if mismatching.
For example, the preamble information is matched with the first request message if the random access lead code for the preamble information instruction that RAR message carries is identical as the first lead code that the first request message carries.Conversely, mismatching.
In another example, if the instruction information includes resource information, and the resource information it is identical as the Secondary resource information of resource that the first request message occupies (or the instruction information include first request message occupy resource Secondary resource information), such as, the resource information that the instruction information includes is the number for first subframe that the first request message occupies, the resource information that the instruction information includes is matched with the first request message, conversely, mismatching.
Again for example, if the information of RAR message carrying functional value, and the information of the functional value is that the information of functional value of variable is identical (or the instruction information includes the Secondary resource information of the resource occupied using the first request message as the information of the functional value of variable) with the Secondary resource information for the resource that the first request message occupies, such as, the information for the functional value that the instruction information includes is identical as the information of functional value that first terminal equipment is determined according to the first request message and received RAR message, the information for the functional value that the instruction information includes is matched with the first request message, it is on the contrary, it mismatches.
Again for example, if the instruction information includes location information, and the location information is identical as the location information of the first terminal equipment that the first request message carries (or indicating that information includes the location information of the first terminal equipment), the instruction information includes that location information is matched with first request message, conversely, mismatching.
For another example if the instruction information includes identification information, and the identification information is taken with the first request message The identification information of the first terminal equipment of band is identical (or the instruction information include the first terminal equipment identification information), which includes that identification information is matched with first request message, conversely, mismatching.
Again for example, if the instruction information includes sending time stamp, and sending time stamp is identical as the sending time stamp of the first terminal equipment that the first request message carries (the sending time stamp that the instruction information includes the first request message), the instruction information includes that sending time stamp is matched with first request message, conversely, mismatching.
It should be noted that instruction any of information and preamble information is mismatched with random access request message, then terminal device determines that the RAR message is not belonging to oneself.
Optionally, which can be carried in the MAC subheader of RAR message.Fig. 3 is the schematic diagram of the MAC subheader suitable for the embodiment of the present invention.
As shown in figure 3, the MAC subheader of RAR message includes following field:
Extended field (E);
Type field (T)
The ID (RAPID) of random access lead code;
The instruction information can be carried in some field in the field that MAC subheader includes.
Optionally, which can be carried in the MAC RAR of RAR message.Fig. 4 is the schematic diagram of an example of the MAC RAR suitable for the embodiment of the present invention.MAC RAR of the Fig. 4 mainly for ordinary user.Fig. 5 is another schematic diagram of the MAC RAR suitable for the embodiment of the present invention.MAC RAR of the Fig. 5 mainly for coverage enhancement type of user.As shown in Figure 4 and Figure 5, MAC RAR includes at least following field:
Reserved place (R);
Time advance adjustment order (Timing Advance Command);
Indicate used resource (UL grant) when uplink msg3 is sent;
Radio network temporary identifier (Temporary C-RNTI).
The instruction information can be carried in some field in the field that MCA RAR includes.Optionally, the network equipment can also increase an extended field in MAC RAR, and the extended field is dedicated for carrying the instruction information.
Therefore, with in the prior art, terminal device determines that one's own RAR message is compared according only to the index of the random access lead code carried in RAR message, RAR message carries instruction information and preamble information in the embodiment of the present invention, this method compatibility with higher, it can be suitable for plurality of application scenes, be conducive to terminal device and accurately determine one's own RAR message.
More than, the method according to an embodiment of the present invention for random access is described, hereinafter, the network equipment, terminal device and System on Chip/SoC according to an embodiment of the present invention is described in detail in conjunction with Fig. 6 to Figure 10.
Fig. 6 is the schematic block diagram of the network equipment 300 according to an embodiment of the present invention.As shown in fig. 6, a kind of network equipment 300, stating the network equipment 300 includes:
Receiving unit 310, for receiving the random access request message of first terminal equipment transmission, which carries random access lead code;
Processing unit 320, for determining random access radio network temporary identifier RA-RNTI according to the random access request message;
Transmission unit 330, for sending random access response RAR message according to the RA-RNTI, the RAR message carries preamble information and instruction information, the preamble information is used to indicate the random access lead code, and the first terminal equipment that the preamble information and the instruction information are used to receive at least one terminal device of the RAR message determines that the RAR message belongs to the first terminal equipment.
Optionally, which is specifically used for: the first resource information of the resource occupied according to the random access request message determines the RA-RNTI;The instruction information includes: the Secondary resource information for the resource that the random access request message occupies, the Secondary resource information of the resource occupied using the random access request message as at least one of the information of the functional value of variable and the information in addition to the random lead code of random access request message carrying, wherein, the first resource information is different with the Secondary resource information.
Optionally, which is used to indicate the frequency domain resource of random access request message occupancy, which is used to indicate the time-domain resource of random access request message occupancy.
Optionally, the first resource information is used to indicate the frequency domain resource and time-domain resource of random access request message occupancy, the Secondary resource information is used to indicate the time-domain resource of random access request message occupancy, and the granularity of the time-domain resource of first resource information instruction is greater than the granularity of the time-domain resource of Secondary resource information instruction.
Optionally, at least one of the end position of time-domain resource that Secondary resource information is specifically used for the initial position for the time-domain resource for indicating that the random access request message occupies and the random access request message occupies is stated.
Optionally, which is specifically used for indicating at least one of following information: the number for first subframe that the random access request message occupies;The number of first time slot or first mini time slot that the random access request message occupies;The number for the last one subframe that the random access request message occupies;The volume of the last one time slot or the last one mini time slot that the random access request message occupies Number.
Optionally, the information of the functional value is used to indicate at least one of following information: the difference between the number of first subframe of the number for first subframe that the RAR message occupies and random access request message occupancy;Difference between the number for first mini time slot that the number for first mini time slot that difference or the RAR message between the number for first time slot that the number for first time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy;Difference between the number for the last one subframe that the number for the last one subframe that the RAR message occupies and the random access request message occupy;Difference between the number for the last one mini time slot that the number for the last one mini time slot that difference or the RAR message between the number for the last one time slot that the number for the last one time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy.
Optionally, the information in addition to the random lead code which carries includes at least one of sending time stamp of the location information of the first terminal equipment, the identification information of the first terminal equipment and the random access request message.
Optionally, which is carried in medium access control subheader MAC subheader or the MAC RAR of the RAR message.
It should be understood that the network equipment 300 can correspond to the network equipment in the method 200 according to an embodiment of the present invention for random access, which may include the unit for executing the method that the network equipment executes in the above method.Also, each unit and other above-mentioned operation and/or functions in the network equipment 300 are respectively for the corresponding process of the above method, for sake of simplicity, details are not described herein.
Fig. 7 is the schematic block diagram of terminal device 400 according to an embodiment of the present invention.As shown in fig. 7, a kind of terminal device, which is first terminal equipment, which includes:
Transmission unit 410, for sending random access request message to the network equipment, which carries random access lead code;
Processing unit 420, for determining random access radio network temporary identifier RA-RNTI according to the random access request message;
Receiving unit 430, for receiving the random access response RAR message of network equipment transmission according to the RA-RNTI, which carries preamble information and instruction information;
The processing unit 420 is also used to: determining whether the RAR message belongs to the first terminal equipment according to random access lead code, the preamble information and instruction information that the random access request message carries.Optionally, which is specifically used for the of the resource occupied according to the random access request message One resource information determines the RA-RNTI;If the random access lead code of preamble information instruction is identical as the random access lead code that the random access request message carries, and the instruction information includes: the Secondary resource information for the resource that the random access request message occupies, using the Secondary resource information as at least one of the information of the functional value of variable and the information in addition to the random lead code of random access request message carrying, which is also used to: determining that the RAR message belongs to the first terminal equipment;Wherein, the first resource information is different with the Secondary resource information.
Optionally, which is used to indicate the frequency domain resource of random access request message occupancy, which is used to indicate the time-domain resource of random access request message occupancy.
Optionally, the first resource information is used to indicate the frequency domain resource and time-domain resource of random access request message occupancy, the Secondary resource information is used to indicate the time-domain resource of random access request message occupancy, and the granularity of the time-domain resource of first resource information instruction is greater than the granularity of the time-domain resource of Secondary resource information instruction.
Optionally, at least one of the end position of frequency domain resource which is specifically used for the initial position for the time-domain resource for indicating that the random access request message occupies and the random access request message occupies.
Optionally, which is specifically used for indicating at least one of following information: the number for first subframe that the random access request message occupies;The number of first time slot or first mini time slot that the random access request message occupies;The number for the last one subframe that the random access request message occupies;The number of the last one time slot or the last one mini time slot that the random access request message occupies.
Optionally, the information of the functional value is used to indicate at least one of following information: the difference between the number of first subframe of the number for first subframe that the RAR message occupies and random access request message occupancy;Difference between the number for first mini time slot that the number for first mini time slot that difference or the RAR message between the number for first time slot that the number for first time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy;Difference between the number for the last one subframe that the number for the last one subframe that the RAR message occupies and the random access request message occupy;Difference between the number for the last one mini time slot that the number for the last one mini time slot that difference or the RAR message between the number for the last one time slot that the number for the last one time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy.
Optionally, the information in addition to the random lead code which carries includes should At least one of sending time stamp of the location information of first terminal equipment, the identification information of the first terminal equipment and the random access request message.
Optionally, which is carried in medium access control subheader MAC subheader or the MAC RAR of the RAR message.
Optionally, if the random access lead code of preamble information instruction is different from the random access lead code that the random access asks message to carry, or the instruction information and the random request message mismatch, this method further include: the first terminal equipment determines that the RAR message is not belonging to the first terminal equipment;Wherein, the instruction information and the random access request message mismatch, comprising: the resource information that the instruction information includes is different from the Secondary resource information of resource that the random access request message occupies;And/or the information of the instruction information functional value that includes is different as the information of the functional value of variable from the Secondary resource information of the resource occupied using the random access request message;And/or the location information that the instruction information includes is different from the location information of the first terminal equipment that the random access request message carries;And/or the identification information that the instruction information includes is different from the identification information of the first terminal equipment that the random access request message carries;And/or the sending time stamp that the instruction information includes is different from the sending time stamp that the random access request message carries.
It should be understood that the terminal device 400 can correspond to the first terminal equipment in the method 200 according to an embodiment of the present invention for random access, which may include the unit for executing the method that first terminal equipment executes in the above method.Also, each unit and other above-mentioned operation and/or functions in the terminal device are respectively for the corresponding process of the above method, for sake of simplicity, details are not described herein.
Fig. 8 is the schematic block diagram of the network equipment 500 according to an embodiment of the present invention.As shown in figure 8, the network equipment 500 includes transceiver 510 and processor 520.
Wherein, transceiver 510 is used for: receiving the random access request message that first terminal equipment is sent, which carries random access lead code;Processor 520 is used for: determining random access radio network temporary identifier RA-RNTI according to the random access request message;Transceiver 510 is also used to: sending random access response RAR message according to the RA-RNTI, the RAR message carries preamble information and instruction information, the first terminal equipment that the preamble information and the instruction information are used to receive at least one terminal device of the RAR message determines that the RAR message is to belong to the RAR message of the first terminal equipment, which is also used to indicate the random access lead code.
It should be understood that the network equipment 500 can correspond to the network equipment in the method 200 according to an embodiment of the present invention for random access, which may include the solid element for executing the method that the network equipment executes in the above method.Also, each solid element and other above-mentioned operations in the network equipment And/or function is respectively for the corresponding process of the above method, for sake of simplicity, details are not described herein.
Fig. 9 is the schematic block diagram of terminal device 600 according to an embodiment of the present invention.Specifically, which is first terminal equipment, as shown in fig. 6, the terminal device 600 includes transceiver 610 and processor 620.
Transceiver 610 is used for: sending random access request message to the network equipment, which carries random access lead code;Processor 620 is used for: determining random access radio network temporary identifier RA-RNTI according to the random access request message;Transceiver 610 is also used to: receiving the random access response RAR message that the network equipment is sent according to the random access request message according to the RA-RNTI, the RAR message carries preamble information and instruction information, which is used to indicate the random access lead code;The processor 630 is also used to: according to the preamble information and the instruction information, determining that the RAR message is to belong to the RAR message of the first terminal equipment
It should be understood that the terminal device 600 can correspond to the first terminal equipment in the method 200 according to an embodiment of the present invention for random access, which may include the solid element for executing the method that first terminal equipment executes in the above method.Also, each solid element and other above-mentioned operation and/or functions in the terminal device are respectively for the corresponding process of the above method, for sake of simplicity, details are not described herein.
Figure 10 is the schematic diagram of the System on Chip/SoC of the embodiment of the present invention.The System on Chip/SoC 700 of Figure 10 includes being connected between input interface 701, output interface 702, the processor 703 and memory 704 by bus 705, which is used to execute the code in the memory 704.
Optionally, when the code is performed, by the method for network equipment execution in the 703 implementation method embodiment of processor.For sake of simplicity, details are not described herein.
Optionally, when the code is performed, by the method for the first equipment execution in the 703 implementation method embodiment of processor.For sake of simplicity, details are not described herein.
It should be understood that the processor in the embodiment of the present invention can be a kind of IC chip, the processing capacity with signal.During realization, each step of above method embodiment can be completed by the integrated logic circuit of the hardware in processor or the instruction of software form.Above-mentioned processor can be central processing unit (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hardware components.May be implemented or execute disclosed each method in the embodiment of the present invention, step and Logic diagram.General processor can be microprocessor or the processor is also possible to any conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly in hardware decoding processor and execute completion, or in decoding processor hardware and the combination of software device execute completion.Software device can be located at random access memory, flash memory, read-only memory, in the storage medium of this fields such as programmable read only memory or electrically erasable programmable memory, register maturation.The step of storage medium is located at memory, and processor reads the information in memory, completes the above method in conjunction with its hardware.
It it should also be understood that the memory in the embodiment of the present invention can be volatile memory or nonvolatile memory, or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read-Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), Erasable Programmable Read Only Memory EPROM (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.Volatile memory can be random access memory (Random Access Memory, RAM "), be used as External Cache.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDR SDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links dynamic random access memory (Synchlink DRAM, SLDRAM it) is deposited with direct rambus arbitrary access Reservoir (Direct Rambus RAM, DR RAM).It should be noted that the memory of system and method described herein is intended to include but is not limited to the memory of these and any other suitable type.
It should also be understood that the bus system in addition to including data/address bus, can also include power bus, control bus and status signal bus in addition etc..But for the sake of clear explanation, various buses are all designated as bus system in figure.
The embodiment of the present invention also proposed a kind of computer readable storage medium, the computer-readable recording medium storage one or more program, the one or more program includes instruction, the instruction can make the method for the portable electronic device execution embodiment of the present invention when the portable electronic device for being included multiple application programs executes.
Those of ordinary skill in the art may be aware that unit described in conjunction with the examples disclosed in the embodiments of the present disclosure and algorithm steps, can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are implemented in hardware or software actually, the spy depending on technical solution Fixed application and design constraint.Professional technician can use different methods to achieve the described function each specific application, but this realization is it is not considered that exceed the range of the embodiment of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, system, the specific work process of device and unit of foregoing description can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In several embodiments provided by the embodiment of the present invention, it should be understood that disclosed systems, devices and methods may be implemented in other ways.Such as, the apparatus embodiments described above are merely exemplary, such as, the division of the unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed mutual coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit, can be electrical property, mechanical or other forms.
Unit may or may not be physically separated as illustrated by the separation member for this, and component shown as a unit may or may not be physical unit, it can and it is in one place, or may be distributed over multiple network units.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
In addition, each functional unit in each embodiment of the embodiment of the present invention can integrate in one processing unit, it is also possible to each unit and physically exists alone, can also be integrated in one unit with two or more units.
If the function is realized in the form of SFU software functional unit and when sold or used as an independent product, can store in a computer readable storage medium.Based on this understanding, substantially the part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products the technical solution of the embodiment of the present invention in other words, the computer software product is stored in a storage medium, it uses including some instructions so that a computer equipment (can be personal computer, server or the network equipment etc.) execute each embodiment this method of the embodiment of the present invention all or part of the steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), the various media that can store program code such as magnetic or disk.
It is described above; the only specific embodiment of the embodiment of the present invention; but the protection scope of the embodiment of the present invention is not limited thereto; anyone skilled in the art is in the technical scope that the embodiment of the present invention discloses; it can easily think of the change or the replacement, should all cover within the protection scope of the embodiment of the present invention.Therefore, the protection scope of the embodiment of the present invention should be subject to the protection scope in claims.

Claims (38)

  1. A method of for random access, which is characterized in that the described method includes:
    The network equipment receives the random access request message that first terminal equipment is sent, and the random access request message carries random access lead code;
    The network equipment determines random access radio network temporary identifier RA-RNTI according to the random access request message;
    The network equipment sends random access response RAR message according to the RA-RNTI, the RAR message carries preamble information and instruction information, the preamble information is used to indicate the random access lead code, and the first terminal equipment that the preamble information and the instruction information are used to receive at least one terminal device of the RAR message determines that the RAR message belongs to the first terminal equipment.
  2. The method according to claim 1, wherein the network equipment determines random access radio network temporary identifier RA-RNTI according to the random access request message, comprising:
    The first resource information for the resource that the network equipment is occupied according to the random access request message determines the RA-RNTI;
    The instruction information includes: the Secondary resource information for the resource that the random access request message occupies, the Secondary resource information of the resource occupied using the random access request message as at least one of the information of the functional value of variable and the information in addition to the random lead code of random access request message carrying, wherein, the first resource information is different with the Secondary resource information.
  3. According to the method described in claim 2, the Secondary resource information is used to indicate the time-domain resource that the random access request message occupies it is characterized in that, the first resource information is used to indicate the frequency domain resource that the random access request message occupies.
  4. According to the method for claim 2, it is characterized in that, the first resource information is used to indicate the frequency domain resource and time-domain resource that the random access request message occupies, the Secondary resource information is used to indicate the time-domain resource that the random access request message occupies, and the granularity of the time-domain resource of first resource information instruction is greater than the granularity of the time-domain resource of Secondary resource information instruction.
  5. The method according to claim 3 or 4, it is characterized in that, at least one of the end position of time-domain resource that the Secondary resource information is specifically used for the initial position for the time-domain resource for indicating that the random access request message occupies and the random access request message occupies.
  6. Method according to any one of claim 3 to 5, which is characterized in that the Secondary resource information is specifically used for indicating at least one of following information:
    The number for first subframe that the random access request message occupies;
    The number of first time slot or first mini time slot that the random access request message occupies;
    The number for the last one subframe that the random access request message occupies;
    The number of the last one time slot or the last one mini time slot that the random access request message occupies.
  7. Method according to any one of claim 3 to 5, which is characterized in that the information of the functional value is used to indicate at least one of following information:
    Difference between the number for first subframe that the number for first subframe that the RAR message occupies and the random access request message occupy;
    Difference between the number for first mini time slot that the number for first mini time slot that difference or the RAR message between the number for first time slot that the number for first time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy;
    Difference between the number for the last one subframe that the number for the last one subframe that the RAR message occupies and the random access request message occupy;
    Difference between the number for the last one mini time slot that the number for the last one mini time slot that difference or the RAR message between the number for the last one time slot that the number for the last one time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy.
  8. The method according to any one of claim 2 to 7, it is characterized in that, the information in addition to the random lead code that the random access request message carries includes at least one of sending time stamp of the location information of the first terminal equipment, the identification information of the first terminal equipment and the random access request message.
  9. Method according to any one of claim 1 to 8, which is characterized in that the instruction information is carried in medium access control subheader the MAC subheader or MACRAR of the RAR message.
  10. A method of for random access, which is characterized in that the described method includes:
    First terminal equipment sends random access request message to the network equipment, and the random access request message carries random access lead code;
    The first terminal equipment determines random access radio network temporary identifier RA-RNTI according to the random access request message;
    The first terminal equipment receives connecing at random for the network equipment transmission according to the RA-RNTI Enter and respond RAR message, the RAR message carries preamble information and instruction information;
    Random access lead code, the preamble information and the instruction information that the first terminal equipment is carried according to the random access request message determine whether the RAR message belongs to the first terminal equipment.
  11. According to the method described in claim 10, it is characterized in that, the first terminal equipment receives the random access response RAR message that the network equipment is sent according to the RA-RNTI, comprising:
    The first resource information for the resource that the first terminal equipment is occupied according to the random access request message determines the RA-RNTI;
    If the random access lead code of the preamble information instruction is identical as the random access lead code that the random access request message carries, and the instruction information includes: the Secondary resource information for the resource that the random access request message occupies, the Secondary resource information of the resource occupied using the random access request message as at least one of the information of the functional value of variable and the information in addition to the random lead code of random access request message carrying
    The method also includes:
    The first terminal equipment determines that the RAR message belongs to the first terminal equipment;
    Wherein, the first resource information is different with the Secondary resource information.
  12. According to the method for claim 11, which is characterized in that the first resource information is used to indicate the frequency domain resource that the random access request message occupies, and the Secondary resource information is used to indicate the time-domain resource that the random access request message occupies.
  13. According to the method for claim 11, it is characterized in that, the first resource information is used to indicate the frequency domain resource and time-domain resource that the random access request message occupies, the Secondary resource information is used to indicate the time-domain resource that the random access request message occupies, and the granularity of the time-domain resource of first resource information instruction is greater than the granularity of the time-domain resource of Secondary resource information instruction.
  14. Method according to claim 12 or 13, it is characterized in that, at least one of the end position of time-domain resource that the Secondary resource information is specifically used for the initial position for the time-domain resource for indicating that the random access request message occupies and the random access request message occupies.
  15. Method described in any one of 2 to 14 according to claim 1, which is characterized in that the Secondary resource information is specifically used for indicating at least one of following information:
    The number for first subframe that the random access request message occupies;
    The number of first time slot or first mini time slot that the random access request message occupies;
    The number for the last one subframe that the random access request message occupies;
    The number of the last one time slot or the last one mini time slot that the random access request message occupies.
  16. Method described in any one of 2 to 15 according to claim 1, which is characterized in that the information of the functional value is used to indicate at least one of following information:
    Difference between the number for first subframe that the number for first subframe that the RAR message occupies and the random access request message occupy;
    Difference between the number for first mini time slot that the number for first mini time slot that difference or the RAR message between the number for first time slot that the number for first time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy;
    Difference between the number for the last one subframe that the number for the last one subframe that the RAR message occupies and the random access request message occupy;
    Difference between the number for the last one mini time slot that the number for the last one mini time slot that difference or the RAR message between the number for the last one time slot that the number for the last one time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy.
  17. Method described in any one of 1 to 16 according to claim 1, it is characterized in that, the information in addition to the random lead code that the random access request message carries includes at least one of sending time stamp of the location information of the first terminal equipment, the identification information of the first terminal equipment and the random access request message.
  18. Method described in any one of 0 to 17 according to claim 1, which is characterized in that the instruction information is carried in medium access control subheader MAC subheader or the MAC RAR of the RAR message.
  19. Method described in any one of 0 to 18 according to claim 1, it is characterized in that, if the random access lead code of the preamble information instruction is different from the random access lead code that the random access asks message to carry, or the instruction information and the random request message mismatch, the method also includes:
    The first terminal equipment determines that the RAR message is not belonging to the first terminal equipment;
    Wherein, the instruction information and the random access request message mismatch, comprising:
    The resource information that the instruction information includes is different from the Secondary resource information of resource that the random access request message occupies;And/or
    The information and the Secondary resource information of the resource occupied using the random access request message for the functional value that the instruction information includes are different as the information of the functional value of variable;And/or
    The location information that the instruction information includes is different from the location information of the first terminal equipment that the random access request message carries;And/or
    The identification information that the instruction information includes is different from the identification information of the first terminal equipment that the random access request message carries;And/or
    The sending time stamp that the instruction information includes is different from the sending time stamp that the random access request message carries.
  20. A kind of network equipment, which is characterized in that the network equipment includes:
    Receiving unit, for receiving the random access request message of first terminal equipment transmission, the random access request message carries random access lead code;
    Processing unit, for determining random access radio network temporary identifier RA-RNTI according to the random access request message;
    Transmission unit, for sending random access response RAR message according to the RA-RNTI, the RAR message carries preamble information and instruction information, the preamble information is used to indicate the random access lead code, and the first terminal equipment that the preamble information and the instruction information are used to receive at least one terminal device of the RAR message determines that the RAR message belongs to the first terminal equipment.
  21. The network equipment according to claim 20, which is characterized in that the processing unit is specifically used for: the first resource information of the resource occupied according to the random access request message determines the RA-RNTI;
    The instruction information includes: the Secondary resource information for the resource that the random access request message occupies, the Secondary resource information of the resource occupied using the random access request message as at least one of the information of the functional value of variable and the information in addition to the random lead code of random access request message carrying, wherein, the first resource information is different with the Secondary resource information.
  22. The network equipment according to claim 21, which is characterized in that the first resource information is used to indicate the frequency domain resource that the random access request message occupies, and the Secondary resource information is used to indicate the time-domain resource that the random access request message occupies.
  23. The network equipment according to claim 21, it is characterized in that, the first resource information is used to indicate the frequency domain resource and time-domain resource that the random access request message occupies, the Secondary resource information is used to indicate the time-domain resource that the random access request message occupies, and the granularity of the time-domain resource of first resource information instruction is greater than the granularity of the time-domain resource of Secondary resource information instruction.
  24. The network equipment according to claim 22 or 23, which is characterized in that second money At least one of the end position of time-domain resource that source information is specifically used for the initial position for the time-domain resource for indicating that the random access request message occupies and the random access request message occupies.
  25. The network equipment according to any one of claim 22 to 24, which is characterized in that the Secondary resource information is specifically used for indicating at least one of following information:
    The number for first subframe that the random access request message occupies;
    The number of first time slot or first mini time slot that the random access request message occupies;
    The number for the last one subframe that the random access request message occupies;
    The number of the last one time slot or the last one mini time slot that the random access request message occupies.
  26. The network equipment according to any one of claim 22 to 25, which is characterized in that the information of the functional value is used to indicate at least one of following information:
    Difference between the number for first subframe that the number for first subframe that the RAR message occupies and the random access request message occupy;
    Difference between the number for first mini time slot that the number for first mini time slot that difference or the RAR message between the number for first time slot that the number for first time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy;
    Difference between the number for the last one subframe that the number for the last one subframe that the RAR message occupies and the random access request message occupy;
    Difference between the number for the last one mini time slot that the number for the last one mini time slot that difference or the RAR message between the number for the last one time slot that the number for the last one time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy.
  27. The network equipment according to any one of claim 21 to 26, it is characterized in that, the information in addition to the random lead code that the random access request message carries includes at least one of sending time stamp of the location information of the first terminal equipment, the identification information of the first terminal equipment and the random access request message.
  28. The network equipment according to any one of claim 20 to 27, which is characterized in that the instruction information is carried in medium access control subheader MAC subheader or the MAC RAR of the RAR message.
  29. A kind of terminal device, which is characterized in that the terminal device is first terminal equipment, and the terminal device includes:
    Transmission unit, for sending random access request message to the network equipment, the random access request message carries random access lead code;
    Processing unit, for determining random access radio network temporary identifier RA-RNTI according to the random access request message;
    Receiving unit, for receiving the random access response RAR message that the network equipment is sent according to the RA-RNTI, the RAR message carries preamble information and instruction information;
    The processing unit is also used to: determining whether the RAR message belongs to the first terminal equipment according to random access lead code, the preamble information and the instruction information that the random access request message carries.
  30. Terminal device according to claim 29, which is characterized in that the first resource information that the processing unit is specifically used for the resource occupied according to the random access request message determines the RA-RNTI;
    If the random access lead code of the preamble information instruction is identical as the random access lead code that the random access request message carries, and the instruction information includes: the Secondary resource information for the resource that the random access request message occupies, using the Secondary resource information as at least one of the information of the functional value of variable and the information in addition to the random lead code of random access request message carrying
    The processing unit is also used to: determining that the RAR message belongs to the first terminal equipment;
    Wherein, the first resource information is different with the Secondary resource information.
  31. Terminal device according to claim 30, which is characterized in that the first resource information is used to indicate the frequency domain resource that the random access request message occupies, and the Secondary resource information is used to indicate the time-domain resource that the random access request message occupies.
  32. Terminal device according to claim 30, it is characterized in that, the first resource information is used to indicate the frequency domain resource and time-domain resource that the random access request message occupies, the Secondary resource information is used to indicate the time-domain resource that the random access request message occupies, and the granularity of the time-domain resource of first resource information instruction is greater than the granularity of the time-domain resource of Secondary resource information instruction.
  33. The terminal device according to claim 31 or 32, it is characterized in that, at least one of the end position of frequency domain resource that the Secondary resource information is specifically used for the initial position for the time-domain resource for indicating that the random access request message occupies and the random access request message occupies.
  34. The terminal device according to any one of claim 31 to 33, which is characterized in that the Secondary resource information is specifically used for indicating at least one of following information:
    The number for first subframe that the random access request message occupies;
    The number of first time slot or first mini time slot that the random access request message occupies;
    The number for the last one subframe that the random access request message occupies;
    The number of the last one time slot or the last one mini time slot that the random access request message occupies.
  35. The terminal device according to any one of claim 31 to 34, which is characterized in that the information of the functional value is used to indicate at least one of following information:
    Difference between the number for first subframe that the number for first subframe that the RAR message occupies and the random access request message occupy;
    Difference between the number for first mini time slot that the number for first mini time slot that difference or the RAR message between the number for first time slot that the number for first time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy;
    Difference between the number for the last one subframe that the number for the last one subframe that the RAR message occupies and the random access request message occupy;
    Difference between the number for the last one mini time slot that the number for the last one mini time slot that difference or the RAR message between the number for the last one time slot that the number for the last one time slot that the RAR message occupies and the random access request message occupy occupy and the random access request message occupy.
  36. The terminal device according to any one of claim 30 to 35, it is characterized in that, the information in addition to the random lead code that the random access request message carries includes at least one of sending time stamp of the location information of the first terminal equipment, the identification information of the first terminal equipment and the random access request message.
  37. The terminal device according to any one of claim 29 to 36, which is characterized in that the instruction information is carried in medium access control subheader MAC subheader or the MAC RAR of the RAR message.
  38. The terminal device according to any one of claim 29 to 37, it is characterized in that, if the random access lead code of the preamble information instruction is different from the random access lead code that the random access asks message to carry, or the instruction information and the random request message mismatch, the processing unit is also used to: determining that the RAR message is not belonging to the first terminal equipment;
    Wherein, the instruction information and the random access request message mismatch, comprising:
    The resource that the resource information and the random access request message that the instruction information includes occupy Secondary resource information is different;And/or
    The information and the Secondary resource information of the resource occupied using the random access request message for the functional value that the instruction information includes are different as the information of the functional value of variable;And/or
    The location information that the instruction information includes is different from the location information of the first terminal equipment that the random access request message carries;And/or
    The identification information that the instruction information includes is different from the identification information of the first terminal equipment that the random access request message carries;And/or
    The sending time stamp that the instruction information includes is different from the sending time stamp that the random access request message carries.
CN201680088658.XA 2016-12-05 2016-12-05 Method, network equipment and terminal equipment for random access Active CN109644503B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/108587 WO2018102966A1 (en) 2016-12-05 2016-12-05 Method for random access, network device, and terminal device

Publications (2)

Publication Number Publication Date
CN109644503A true CN109644503A (en) 2019-04-16
CN109644503B CN109644503B (en) 2021-08-10

Family

ID=62490674

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680088658.XA Active CN109644503B (en) 2016-12-05 2016-12-05 Method, network equipment and terminal equipment for random access

Country Status (3)

Country Link
CN (1) CN109644503B (en)
TW (1) TWI687120B (en)
WO (1) WO2018102966A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112134747A (en) * 2019-06-24 2020-12-25 中兴通讯股份有限公司 Method for detecting transmission delay and related equipment
CN113711685A (en) * 2019-04-26 2021-11-26 株式会社Ntt都科摩 User device and base station device
CN113767702A (en) * 2019-04-30 2021-12-07 中兴通讯股份有限公司 Resource indication in random access

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
PL3923660T3 (en) * 2019-02-14 2024-02-26 Beijing Xiaomi Mobile Software Co., Ltd. Methods and apparatuses for processing random access
CN111818549A (en) * 2019-04-11 2020-10-23 普天信息技术有限公司 Random access response message transmission method and device
US20220353917A1 (en) * 2019-07-03 2022-11-03 Beijing Xiaomi Mobile Software Co., Ltd. Random access method, apparatus and system, and storage medium
CN114223308A (en) * 2019-10-10 2022-03-22 Oppo广东移动通信有限公司 Random access method, electronic device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010064858A2 (en) * 2008-12-04 2010-06-10 Lg Electronics Inc. Method and apparatus for performing random access in a multi-carrier system
CN102325382A (en) * 2011-06-30 2012-01-18 电信科学技术研究院 Random access method and equipment
CN102883459A (en) * 2011-07-12 2013-01-16 华为技术有限公司 Receiving-transmitting method of random access response, user equipment, base station and system
CN103220813A (en) * 2012-01-20 2013-07-24 中兴通讯股份有限公司 Random access method of multi-carrier system and system and terminal and base station equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102595636B (en) * 2012-03-14 2015-09-02 电信科学技术研究院 A kind of accidental access response defining method, Apparatus and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010064858A2 (en) * 2008-12-04 2010-06-10 Lg Electronics Inc. Method and apparatus for performing random access in a multi-carrier system
CN102325382A (en) * 2011-06-30 2012-01-18 电信科学技术研究院 Random access method and equipment
CN102883459A (en) * 2011-07-12 2013-01-16 华为技术有限公司 Receiving-transmitting method of random access response, user equipment, base station and system
CN103220813A (en) * 2012-01-20 2013-07-24 中兴通讯股份有限公司 Random access method of multi-carrier system and system and terminal and base station equipment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113711685A (en) * 2019-04-26 2021-11-26 株式会社Ntt都科摩 User device and base station device
CN113767702A (en) * 2019-04-30 2021-12-07 中兴通讯股份有限公司 Resource indication in random access
CN113767702B (en) * 2019-04-30 2024-04-09 中兴通讯股份有限公司 Resource indication in random access
CN112134747A (en) * 2019-06-24 2020-12-25 中兴通讯股份有限公司 Method for detecting transmission delay and related equipment

Also Published As

Publication number Publication date
TW201822573A (en) 2018-06-16
TWI687120B (en) 2020-03-01
CN109644503B (en) 2021-08-10
WO2018102966A1 (en) 2018-06-14

Similar Documents

Publication Publication Date Title
CN109644503A (en) For the method for random access, the network equipment and terminal device
US11871427B2 (en) Data transmission method, terminal device and network device
US11096131B2 (en) Wireless communication method and device
US10716051B2 (en) Method and apparatus for transmitting D2D discovery signal and communication system
US11071135B2 (en) Uplink transmission method based on uplink reference signal, terminal, and network device
EP3917251A1 (en) Data transmission method and apparatus
US20220361241A1 (en) Signal transmission method and device
CN111586881B (en) Random access method and device
CN108307413A (en) Cut-in method, terminal device and base station
WO2018141115A1 (en) Method for use in transmitting signal, terminal device, and network device
JP2021502727A (en) Wireless communication methods, terminals and network devices
JP2021534617A (en) Random access method, terminal device and network device
EP3796735A1 (en) User device and base station apparatus
US11212839B2 (en) Method for random access and terminal device
WO2019047182A1 (en) Wireless communication method, network device and terminal device
WO2020155181A1 (en) Channel transmission method and device
CN110971364B (en) Transmission method and device of downlink control information
WO2016161592A1 (en) Method, device and apparatus for nb m2m-based dci length indication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant