CN110062473A - Accidental access method, terminal device and the network equipment - Google Patents
Accidental access method, terminal device and the network equipment Download PDFInfo
- Publication number
- CN110062473A CN110062473A CN201810055552.0A CN201810055552A CN110062473A CN 110062473 A CN110062473 A CN 110062473A CN 201810055552 A CN201810055552 A CN 201810055552A CN 110062473 A CN110062473 A CN 110062473A
- Authority
- CN
- China
- Prior art keywords
- random access
- sequences
- preamble
- sequence
- access sequence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 107
- 230000005540 biological transmission Effects 0.000 claims description 66
- 238000013461 design Methods 0.000 description 100
- 238000004891 communication Methods 0.000 description 78
- 238000012545 processing Methods 0.000 description 69
- 238000013507 mapping Methods 0.000 description 26
- 125000004122 cyclic group Chemical group 0.000 description 22
- 238000001228 spectrum Methods 0.000 description 21
- 238000010586 diagram Methods 0.000 description 17
- 230000006870 function Effects 0.000 description 12
- 238000003780 insertion Methods 0.000 description 12
- 230000037431 insertion Effects 0.000 description 12
- 238000010295 mobile communication Methods 0.000 description 11
- 238000004364 calculation method Methods 0.000 description 8
- 230000001427 coherent effect Effects 0.000 description 7
- 230000009286 beneficial effect Effects 0.000 description 6
- 238000004590 computer program Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 230000003595 spectral effect Effects 0.000 description 4
- 230000007774 longterm Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 235000019800 disodium phosphate Nutrition 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000001356 surgical procedure Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
- H04W74/0841—Random access procedures, e.g. with 4-step access with collision treatment
- H04W74/085—Random access procedures, e.g. with 4-step access with collision treatment collision avoidance
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the present application provides a kind of accidental access method, terminal device and the network equipment, this method comprises: terminal device obtains the first random access mark;The terminal device selects the first random access to identify corresponding first random access sequence set in random access sequence collection is combined, the random access sequence collection is combined including L random access sequence set, each random access sequence set includes J random access sequence, and the L and the J are positive integer and the J is more than or equal to 2;The terminal device sends X the first random access sequences to the network equipment, and the X is positive integer.Accidental access method, terminal device and the network equipment provided by the embodiments of the present application, multiple terminal devices can be reduced while accessing the probability (i.e. reduction random access collision probability) of cell using the request of identical random access sequence, improve the RACH capacity of cell.
Description
Technical Field
The present invention relates to communications technologies, and in particular, to a random access method, a terminal device, and a network device.
Background
In order to cope with explosive mobile data traffic increase, massive mobile communication device connection, and various new services and application scenarios which are continuously emerging in the future, a fifth generation (5G) communication system which can support multiple services has been developed. Compared with a random access scenario in a Long Term Evolution (LTE) communication system, a random access scenario in a 5G communication system requires that the number of users in a serving cell can reach 10-100 times the number of users in the serving cell in the LTE communication system, a Random Access Channel (RACH) can support more functions (for example, uplink and downlink beams can be indicated), the spectral efficiency of the RACH can be increased by 4 times in a scenario lower than 6GHz, and the spectral efficiency of the RACH can be increased by 64 times in a scenario higher than 6 GHz.
In the existing LTE communication system, a network device may generate a preamble set required for uplink random access for each cell by performing cyclic shift on different Zadoff-chu (zc) root sequences. The preamble set of each cell may include 64 ZC sequences (sequences generated by cyclic shifting ZC root sequences), and each ZC sequence corresponds to a preamble Identity (ID). When the terminal device accesses a certain cell in a contention random access manner, the terminal device may randomly select a ZC sequence corresponding to a preamble ID in a preamble set used by the cell as a random access sequence, and send the ZC sequence to the network device to which the cell belongs, so as to request access to the cell.
The random access scenario of the 5G communication system requires that the number of users of a service cell can reach 10-100 times of the number of users of the service cell in the LTE communication system. Therefore, when the terminal device in the 5G communication system accesses the cell by using the contention random access method, if the method of generating the random access sequence in the LTE communication system is still used, a situation (that is, the random access is collided) that a plurality of terminal devices simultaneously use the same random access sequence to request to access the cell tends to occur, resulting in a failure of accessing the cell by the plurality of terminal devices.
Disclosure of Invention
The embodiment of the application provides a random access method, terminal equipment and network equipment, which can reduce the probability that a plurality of terminal equipment simultaneously use the same preamble sequence to request access to a cell (namely reduce the random access collision probability), and improve the RACH capacity of the cell.
In a first aspect, an embodiment of the present application provides a random access method, where the method includes:
the terminal equipment acquires a first random access identifier;
the terminal equipment selects a first random access sequence set corresponding to a first random access identifier from a random access sequence set group, wherein the random access sequence set group comprises L random access sequence sets, each random access sequence set comprises J random access sequences, L and J are positive integers, and J is more than or equal to 2;
the terminal equipment sends X first random access sequences to network equipment, wherein X is a positive integer.
With the random access method provided in the first aspect, in a manner that one preamble ID corresponds to J preamble sequences in one preamble sequence set, the terminal device can obtain X first preamble sequences flexibly and variously according to the first preamble sequence set corresponding to the first preamble ID. Therefore, when the terminal device generates the preamble sequence requesting to access the cell to be accessed by adopting the above manner, the probability that a plurality of terminal devices simultaneously use the same preamble sequence to request to access the cell (i.e. the random access collision probability) can be reduced, so that the RACH capacity of the cell can be improved.
In one possible design, each of the first random access sequences is a random access sequence obtained according to the first set of random access sequences.
In one possible design, X is equal to 1, and the first random access sequence is: and J random access sequences in the first random access sequence set are added to generate a random access sequence.
According to the random access method provided by the possible design, one preamble ID corresponds to J preamble sequences in one preamble sequence set, so that when terminal equipment generates a preamble sequence by adding the J preamble sequences of the first preamble sequence set corresponding to the first preamble ID, the probability that a plurality of terminal equipment use the same preamble sequence set to request access to a preamble sequence of a cell to be accessed can be reduced, that is, the probability that the plurality of terminal equipment simultaneously use the same preamble sequence to request access to the cell (namely, the random access collision probability) can be reduced, and the RACH capacity of the cell can be improved.
In one possible design, the terminal device sends X first random access sequences to the network device, including:
the terminal device maps the first random access sequence on a first time-frequency resource to send to the network device, where the first time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and 1 frequency domain resource allowing transmission of the first random access sequence.
By the random access method provided by the possible design, the length of the first preamble sequence can be kept the same as the length of the preamble sequence sent by the terminal equipment in the LTE communication system by the way of adding the J preamble sequences of the first preamble sequence set, so that the time-frequency resource size used when the terminal equipment sends the first preamble sequence is kept the same as the time-frequency resource size used when the terminal equipment sends the preamble sequence in the LTE communication system. In this way, the terminal device can send the first preamble sequence along the subcarrier interval used when the terminal device sends the preamble sequence in the LTE communication system, so that the first preamble sequence sent by the terminal device has better delay spread resistance and supports a large cell radius.
In one possible design, the J random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences.
In one possible design, X is equal to J, and each of the first random access sequences is: one random access sequence of the first set of random access sequences.
According to the random access method provided by the possible design, one preamble ID corresponds to J preamble sequences in one preamble sequence set, so that the terminal device can use each preamble sequence of the first preamble sequence set corresponding to the first preamble ID as one preamble sequence, and thus the probability that the preamble sequences generated by a plurality of terminal devices are the same can be reduced, that is, the probability that a plurality of terminal devices simultaneously use the same preamble sequence to request access to a cell (namely, the random access collision probability is reduced), and the RACH capacity of the cell can be improved. When the same time-frequency resource is adopted to transmit X first random access sequences as an LTE communication system, the time delay expansion resistance can be improved, and the radius of a supported cell is large.
In one possible design, the terminal device sends X first random access sequences to the network device, including:
the terminal device maps the X first random access sequences on a second time-frequency resource to send to the network device, wherein the second time-frequency resource comprises: 1 time domain resource allowing transmission of the first random access sequence and X frequency domain resources allowing transmission of the first random access sequence.
In one possible design, the first set of random access sequences includes M subsets of random access sequences, each subset of random access sequences includes Y random access sequences, M and Y are both positive integers;
each of the first random access sequences is a random access sequence obtained according to a random access sequence subset.
In one possible design, X is equal to M, and each of the first random access sequences is: y random access sequences in a subset of random access sequences are added to generate a random access sequence.
By the random access method provided by the possible design, 1 preamble ID corresponds to M × Y preamble sequences, so that the probability that the preamble sequences generated by a plurality of terminal devices are the same is reduced, that is, the probability that the plurality of terminal devices simultaneously use the same preamble sequence to request access to the cell (i.e., the random access collision probability is reduced), and the RACH capacity of the cell can be improved.
In one possible design, the terminal device sends X first random access sequences to the network device, including:
the terminal device maps the X first random access sequences on a third time-frequency resource to send to the network device, where the third time-frequency resource includes: m time domain resources allowing the first random access sequence to be transmitted and 1 frequency domain resource allowing the first random access sequence to be transmitted; or, the third time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and M frequency domain resources allowing transmission of the first random access sequence.
In one possible design, the Y random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences.
In one possible design, X is equal to a product of M and Y, and each of the first random access sequences is: one random access sequence of a subset of random access sequences.
By the random access method provided by the possible design, 1 preamble ID corresponds to M × Y preamble sequences, so that the probability that the preamble sequences generated by a plurality of terminal devices are the same is reduced, that is, the probability that the plurality of terminal devices simultaneously use the same preamble sequence to request access to the cell (i.e., the random access collision probability is reduced), and the RACH capacity of the cell can be improved. When the same time-frequency resource is adopted to transmit X first random access sequences as an LTE communication system, the method can increase the RACH subcarrier interval and has better frequency deviation resistance.
In one possible design, the terminal device sends X first random access sequences to the network device, including:
the terminal device maps the X first random access sequences on a fourth time-frequency resource to send to the network device, where the fourth time-frequency resource includes: m time domain resources allowed to transmit the first random access sequence and Y frequency domain resources allowed to transmit the first random access sequence.
In one possible design, the first set of random access sequences includes M subsets of random access sequences, each subset of random access sequences includes K sets of random access sequences, each set of random access sequences includes Q random access sequences, where M, K, and Q are positive integers;
each first random access sequence is a random access sequence obtained according to a random access sequence group.
By the random access method provided by the possible design, 1 preamble ID corresponds to M × K × Y preamble sequences, so that the probability that the preamble sequences generated by a plurality of terminal devices are the same is reduced, that is, the probability that the plurality of terminal devices simultaneously use the same preamble sequence to request access to the cell (i.e., the random access collision probability is reduced), and the RACH capacity of the cell can be improved. When the same time-frequency resource is adopted to transmit X first random access sequences as an LTE communication system, the method can increase the RACH subcarrier interval and has better frequency deviation resistance.
In one possible design, X is a product of M and K, and each of the first random access sequences is: and the Q random access sequences in one random access sequence group are added to generate a random access sequence.
In one possible design, the terminal device sends X first random access sequences to the network device, including:
the terminal device maps the X first random access sequences on a fifth time-frequency resource to send to the network device, where the fifth time-frequency resource includes: m time domain resources allowed to transmit the first random access sequence and K frequency domain resources allowed to transmit the first random access sequence.
In one possible design, the Q random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences.
In a second aspect, an embodiment of the present application provides a random access method, where the method includes:
network equipment broadcasts configuration information of a random access sequence set group, wherein the random access sequence set group comprises L random access sequence sets, each random access sequence set comprises J random access sequences, L and J are positive integers, and J is more than or equal to 2;
the network equipment detects X first random access sequences sent by terminal equipment, wherein X is a positive integer;
and the network equipment determines the random access identification corresponding to the X first random access sequences.
In one possible design, each of the first random access sequences is a random access sequence obtained according to the first set of random access sequences.
In one possible design, X is equal to 1, and the first random access sequence is: and J random access sequences in the first random access sequence set are added to generate a random access sequence.
In one possible design, the detecting, by the network device, X first random access sequences sent by the terminal device includes:
the network device detects the X first random access sequences on a first time-frequency resource, where the first time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and 1 frequency domain resource allowing transmission of the first random access sequence.
In one possible design, the network device detects the X first random access sequences on a first time-frequency resource, including:
the network equipment screens out at least one second random access sequence set from the random access sequence set group according to the X first random access sequences received on the first time-frequency resource;
and the network equipment determines a random access sequence set corresponding to the X first random sequences according to the at least one second random access sequence set.
In one possible design, the determining, by the network device, a random access sequence set corresponding to the X first random sequences according to the at least one second random access sequence set includes:
and the network equipment combines J random access sequences in each second random access sequence set, and takes the second random access sequence set with the maximum receiving power and larger than a preset threshold value as the random access sequence set corresponding to the X first random sequences.
In one possible design, the J random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences.
In one possible design, X is equal to J, and each of the first random access sequences is: one random access sequence of the first set of random access sequences.
In one possible design, the detecting, by the network device, X first random access sequences sent by the terminal device includes:
the network device detects the X first random access sequences on a second time-frequency resource, where the second time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and X frequency domain resources allowing transmission of the first random access sequence.
In one possible design, the network device detecting the first random access sequence on a second time-frequency resource includes:
the network equipment screens out at least one third random access sequence set from the random access sequence set group according to the X first random access sequences received on the X frequency domain resources;
and the network equipment determines a random access sequence set corresponding to the X first random sequences according to the at least one third random access sequence set.
In one possible design, the determining, by the network device, a random access sequence set corresponding to the X first random sequences according to the at least one third random access sequence set includes:
and the network equipment combines J random access sequences in each third random access sequence set, and takes the third random access sequence set with the maximum receiving power and larger than a preset threshold value as a random access sequence set corresponding to the first random sequence.
In one possible design, the first set of random access sequences includes M subsets of random access sequences, each subset of random access sequences includes Y random access sequences, M and Y are both positive integers;
each of the first random access sequences is a random access sequence obtained according to a random access sequence subset.
In one possible design, X is equal to M, and each of the first random access sequences is: y random access sequences in a subset of random access sequences are added to generate a random access sequence.
In one possible design, the detecting, by the network device, X first random access sequences sent by the terminal device includes:
the network device detects the X first random access sequences on a third time-frequency resource, where the third time-frequency resource includes: m time domain resources allowing the first random access sequence to be transmitted and 1 frequency domain resource allowing the first random access sequence to be transmitted; or, the third time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and M frequency domain resources allowing transmission of the first random access sequence.
In one possible design, when the third time-frequency resource includes M time-domain resources allowing transmission of the first random access sequence and 1 frequency-domain resource allowing transmission of the first random access sequence, the network device detects the X first random access sequences on the third time-frequency resource, including:
the network equipment screens at least X first random access sequence subsets from the random access sequence set group according to the X first random access sequences received on the X time domain resources;
the network equipment determines at least one second random access sequence subset according to at least one first random access sequence subset on each time domain resource;
and the network equipment determines a random access sequence set corresponding to the X first random sequences according to at least X second random access sequence subsets determined on the X time domain resources.
In one possible design, the network device determines, on each of the time domain resources, at least one second subset of random access sequences from at least one of the first subset of random access sequences, including:
and the network equipment combines Y random access sequences in each first random access sequence subset on each time domain resource, and takes the first random access sequence subset with the maximum receiving power and larger than a preset threshold value as a second random access sequence subset.
In one possible design, the determining, by the network device, a set of random access sequences corresponding to the X first random sequences according to at least X second random access sequence subsets determined on the X time domain resources includes:
and the network equipment combines the at least X second random access sequence subsets according to the X time domain resources, and takes a random access sequence set with the maximum receiving power and larger than a preset threshold value as a random access sequence set corresponding to the X first random sequences.
In one possible design, the Y random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences.
In one possible design, the determining, by the network device, random access identities corresponding to the X first random access sequences includes:
and the network equipment takes the random access identifier of the random access sequence set corresponding to the X first random access sequences as the random access identifier corresponding to the X first random access sequences.
In one possible design, X is equal to a product of M and Y, and each of the first random access sequences is: one random access sequence of a subset of random access sequences.
In one possible design, the detecting, by the network device, X first random access sequences sent by the terminal device includes:
the network device detects the X first random access sequences on a fourth time-frequency resource, where the fourth time-frequency resource includes: m time domain resources allowed to transmit the first random access sequence and Y frequency domain resources allowed to transmit the first random access sequence.
In one possible design, the first set of random access sequences includes M subsets of random access sequences, each subset of random access sequences includes K sets of random access sequences, each set of random access sequences includes Q random access sequences, where M, K, and Q are positive integers;
each first random access sequence is a random access sequence obtained according to a random access sequence group.
In one possible design, X is a product of M and K, and each of the first random access sequences is: and the Q random access sequences in one random access sequence group are added to generate a random access sequence.
In one possible design, the detecting, by the network device, X first random access sequences sent by the terminal device includes:
the network device detects the X first random access sequences on a fifth time-frequency resource, where the fifth time-frequency resource includes: m time domain resources allowed to transmit the first random access sequence and K frequency domain resources allowed to transmit the first random access sequence.
In one possible design, the Q random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences.
The beneficial effects of the random access method provided by the second aspect and the possible designs of the second aspect may refer to the beneficial effects brought by the first aspect and the possible designs of the first aspect, which are not described herein again.
In a third aspect, an embodiment of the present application provides a terminal device, where the terminal device includes:
a processing module, configured to obtain a first random access identifier, and select a first random access sequence set corresponding to the first random access identifier from a random access sequence set group, where the random access sequence set group includes L random access sequence sets, each random access sequence set includes J random access sequences, L and J are positive integers, and J is greater than or equal to 2;
a sending module, configured to send X first random access sequences to a network device, where X is a positive integer.
In one possible design, each of the first random access sequences is a random access sequence obtained according to the first set of random access sequences.
In one possible design, X is equal to 1, and the first random access sequence is: and J random access sequences in the first random access sequence set are added to generate a random access sequence.
In a possible design, the sending module is specifically configured to map the first random access sequence on a first time-frequency resource and send the first random access sequence to the network device, where the first time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and 1 frequency domain resource allowing transmission of the first random access sequence.
In one possible design, the J random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences.
In one possible design, X is equal to J, and each of the first random access sequences is: one random access sequence of the first set of random access sequences.
In a possible design, the sending module is specifically configured to map the X first random access sequences on a second time-frequency resource, and send the second time-frequency resource to the network device, where the second time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and X frequency domain resources allowing transmission of the first random access sequence.
In one possible design, the first set of random access sequences includes M subsets of random access sequences, each subset of random access sequences includes Y random access sequences, M and Y are both positive integers;
each of the first random access sequences is a random access sequence obtained according to a random access sequence subset.
In one possible design, X is equal to M, and each of the first random access sequences is: y random access sequences in a subset of random access sequences are added to generate a random access sequence.
In a possible design, the sending module is specifically configured to map the X first random access sequences on a third time-frequency resource, and send the third time-frequency resource to the network device, where the third time-frequency resource includes: m time domain resources allowing the first random access sequence to be transmitted and 1 frequency domain resource allowing the first random access sequence to be transmitted; or, the third time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and M frequency domain resources allowing transmission of the first random access sequence.
In one possible design, the Y random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences.
In one possible design, X is equal to a product of M and Y, and each of the first random access sequences is: one random access sequence of a subset of random access sequences.
In a possible design, the sending module is specifically configured to map the X first random access sequences on a fourth time-frequency resource and send the fourth time-frequency resource to the network device, where the fourth time-frequency resource includes: m time domain resources allowed to transmit the first random access sequence and Y frequency domain resources allowed to transmit the first random access sequence.
In one possible design, the first set of random access sequences includes M subsets of random access sequences, each subset of random access sequences includes K sets of random access sequences, each set of random access sequences includes Q random access sequences, where M, K, and Q are positive integers;
each first random access sequence is a random access sequence obtained according to a random access sequence group.
In one possible design, X is a product of M and K, and each of the first random access sequences is: and the Q random access sequences in one random access sequence group are added to generate a random access sequence.
In a possible design, the sending module is specifically configured to map the X first random access sequences on a fifth time-frequency resource, and send the fifth time-frequency resource to the network device, where the fifth time-frequency resource includes: m time domain resources allowed to transmit the first random access sequence and K frequency domain resources allowed to transmit the first random access sequence.
In one possible design, the Q random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences.
The beneficial effects of the terminal device provided by the possible designs of the third aspect and the third aspect may refer to the beneficial effects brought by the possible designs of the first aspect and the first aspect, which are not repeated herein.
In a fourth aspect, an embodiment of the present application provides a network device, where the network device includes:
a sending module, configured to broadcast configuration information of a random access sequence set group, where the random access sequence set group includes L random access sequence sets, each random access sequence set includes J random access sequences, L and J are positive integers, and J is greater than or equal to 2;
the receiving module is used for receiving X first random access sequences sent by the terminal equipment;
and the processing module is used for detecting the X first random access sequences and determining random access identifiers corresponding to the X first random access sequences, wherein X is a positive integer.
In one possible design, each of the first random access sequences is a random access sequence obtained according to the first set of random access sequences.
In one possible design, X is equal to 1, and the first random access sequence is: and J random access sequences in the first random access sequence set are added to generate a random access sequence.
In one possible design, the processing module is specifically configured to detect the X first random access sequences on a first time-frequency resource, where the first time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and 1 frequency domain resource allowing transmission of the first random access sequence.
In a possible design, the processing module is specifically configured to screen at least one second random access sequence set from the random access sequence set group according to the X first random access sequences received by the receiving module on the first time-frequency resource, and determine a random access sequence set corresponding to the X first random access sequences according to the at least one second random access sequence set.
In a possible design, the processing module is specifically configured to combine J random access sequences in each second random access sequence set, and use the second random access sequence set with a maximum received power and a value greater than a preset threshold as a random access sequence set corresponding to the X first random sequences.
In one possible design, the J random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences.
In one possible design, X is equal to J, and each of the first random access sequences is: one random access sequence of the first set of random access sequences.
In a possible design, the processing module is specifically configured to detect the X first random access sequences on a second time-frequency resource, where the second time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and X frequency domain resources allowing transmission of the first random access sequence.
In a possible design, the processing module is specifically configured to screen at least one third random access sequence set from the random access sequence set group according to the X first random access sequences received by the receiving module on the X frequency domain resources, and determine a random access sequence set corresponding to the X first random access sequences according to the at least one third random access sequence set.
In a possible design, the processing module is specifically configured to combine J random access sequences in each third random access sequence set, and use the third random access sequence set with a maximum receiving power and a value greater than a preset threshold as the random access sequence set corresponding to the first random sequence.
In one possible design, the first set of random access sequences includes M subsets of random access sequences, each subset of random access sequences includes Y random access sequences, M and Y are both positive integers;
each of the first random access sequences is a random access sequence obtained according to a random access sequence subset.
In one possible design, X is equal to M, and each of the first random access sequences is: y random access sequences in a subset of random access sequences are added to generate a random access sequence.
In a possible design, the processing module is specifically configured to detect the X first random access sequences on a third time-frequency resource, where the third time-frequency resource includes: m time domain resources allowing the first random access sequence to be transmitted and 1 frequency domain resource allowing the first random access sequence to be transmitted; or, the third time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and M frequency domain resources allowing transmission of the first random access sequence.
In a possible design, when the third time-frequency resource includes M time-domain resources allowing to send the first random access sequence and 1 frequency-domain resource allowing to send the first random access sequence, the processing module is specifically configured to screen out at least X first random access sequence subsets from the random access sequence set group according to the X first random access sequences received by the receiving module on the X time-domain resources; determining at least one second subset of random access sequences from at least one of the first subset of random access sequences on each of the time domain resources; and determining a random access sequence set corresponding to the X first random sequences according to at least X second random access sequence subsets determined on the X time domain resources.
In a possible design, the processing module is specifically configured to combine Y random access sequences in each of the first random access sequence subsets on each of the time domain resources, and use the first random access sequence subset with a maximum received power and greater than a preset threshold as the second random access sequence subset.
In a possible design, the processing module is specifically configured to combine the at least X second random access sequence subsets according to the X time domain resources, and use a random access sequence set with a maximum received power and a value greater than a preset threshold as a random access sequence set corresponding to the X first random sequences.
In one possible design, the Y random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences.
In a possible design, the processing module is specifically configured to use a random access identifier of a random access sequence set corresponding to the X first random access sequences as the random access identifier corresponding to the X first random access sequences.
In one possible design, X is equal to a product of M and Y, and each of the first random access sequences is: one random access sequence of a subset of random access sequences.
In a possible design, the processing module is specifically configured to detect the X first random access sequences on a fourth time-frequency resource, where the fourth time-frequency resource includes: m time domain resources allowed to transmit the first random access sequence and Y frequency domain resources allowed to transmit the first random access sequence.
In one possible design, the first set of random access sequences includes M subsets of random access sequences, each subset of random access sequences includes K sets of random access sequences, each set of random access sequences includes Q random access sequences, where M, K, and Q are positive integers;
each first random access sequence is a random access sequence obtained according to a random access sequence group.
In one possible design, X is a product of M and K, and each of the first random access sequences is: and the Q random access sequences in one random access sequence group are added to generate a random access sequence.
In a possible design, the processing module is specifically configured to detect the X first random access sequences on a fifth time-frequency resource, where the fifth time-frequency resource includes: m time domain resources allowed to transmit the first random access sequence and K frequency domain resources allowed to transmit the first random access sequence.
In one possible design, the Q random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences.
The beneficial effects of the network device provided by the possible designs of the fourth aspect and the fourth aspect may refer to the beneficial effects brought by the possible designs of the first aspect and the first aspect, which are not described herein again.
In a fifth aspect, an embodiment of the present application provides a terminal device, where the terminal device includes: a processor, a memory, a transmitter; the transmitter is coupled to the processor, and the processor controls the transmitting action of the transmitter;
wherein the memory is to store computer-executable program code, the program code comprising instructions; the instructions, when executed by the processor, cause the terminal device to perform a random access method as provided by the first aspect or by various possible designs of the first aspect.
In a sixth aspect, an embodiment of the present application provides a network device, where the network device includes: a processor, a memory, a receiver, a transmitter; the receiver is coupled to the processor, the processor controls the transmitting action of the transmitter, and the processor controls the receiving action of the receiver;
wherein the memory is to store computer-executable program code, the program code comprising instructions; the instructions, when executed by the processor, cause the network device to perform a random access method as provided by the second aspect or possible designs of the second aspect.
In a seventh aspect, an embodiment of the present application provides a communication device, which includes a unit, a module, or a circuit configured to perform the method provided in the above first aspect or each possible design of the first aspect. The communication device may be a terminal device, or may be a module applied to the terminal device, for example, a chip applied to the terminal device.
In an eighth aspect, embodiments of the present application provide a communication device, which includes a unit, a module, or a circuit for performing the method provided in the second aspect or each possible design of the second aspect. The communication device may be a network device, or may be a module applied to the network device, for example, a chip applied to the network device.
In a ninth aspect, embodiments of the present application provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of the first aspect or the various possible designs of the first aspect.
In a tenth aspect, embodiments of the present application provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of the second aspect or the various possible designs of the second aspect.
In an eleventh aspect, embodiments of the present application provide a computer-readable storage medium having stored therein instructions, which, when executed on a computer, cause the computer to perform the above-mentioned first aspect or the methods in the various possible designs of the first aspect.
In a twelfth aspect, embodiments of the present application provide a computer-readable storage medium having stored therein instructions that, when executed on a computer, cause the computer to perform the method of the second aspect or the various possible designs of the second aspect.
According to the random access method, the terminal device and the network device provided by the embodiment of the application, in a manner that one preamble ID corresponds to J preamble sequences in one preamble sequence set, the terminal device can obtain X first preamble sequences flexibly and variously according to the first preamble sequence set corresponding to the first preamble ID. Therefore, when the terminal device generates the preamble sequence requesting to access the cell to be accessed by adopting the above manner, the probability that a plurality of terminal devices simultaneously use the same preamble sequence to request to access the cell (i.e. the random access collision probability) can be reduced, so that the RACH capacity of the cell can be improved.
Drawings
Fig. 1 is a schematic architecture diagram of a mobile communication system according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a random access method according to an embodiment of the present application;
fig. 3A is a schematic structural diagram of a transmitter of a terminal device according to an embodiment of the present application;
fig. 3B is a schematic flowchart of another random access method according to an embodiment of the present application;
fig. 3C is a schematic structural diagram of a transmitter of another terminal device according to an embodiment of the present application;
fig. 3D is a schematic flowchart of another random access method according to an embodiment of the present application;
fig. 4A is a schematic flowchart of another random access method according to an embodiment of the present application;
fig. 4B is a schematic structural diagram of a transmitter of another terminal device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a network device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of another terminal device provided in the present application;
fig. 8 is a schematic structural diagram of another network device according to an embodiment of the present application.
Detailed Description
Fig. 1 is a schematic architecture diagram of a mobile communication system according to an embodiment of the present application. As shown in fig. 1, the mobile communication system may include a core network device 110, a radio access network device 120, and at least one terminal device (e.g., terminal device 130 and terminal device 140 in fig. 1). The terminal device is connected to the radio access network device 120 in a wireless manner, and the radio access network device 120 is connected to the core network device 110 in a wireless or wired manner. The core network device 110 and the radio access network device 120 may be separate physical devices, or the function of the core network device 110 and the logical function of the radio access network device 120 may be integrated on the same physical device, or a physical device in which the function of a part of the core network device 110 and the function of a part of the radio access network device 120 are integrated. The terminal equipment may be fixed or mobile. Fig. 1 is a schematic diagram, and the mobile communication system may further include other network devices, such as a wireless relay device and a wireless backhaul device, which are not shown in fig. 1. The embodiments of the present application do not limit the number of the core network device 110, the radio access network device 120, and the terminal device included in the mobile communication system.
The radio access network device 120 is an access device that the terminal device accesses to the mobile communication system in a wireless manner, and may be a base station NodeB, an evolved node b, a base station in a 5G mobile communication system or a new generation wireless (new radio, NR) communication system, a base station in a future mobile communication system, an access node in a WiFi system, and the like. In this embodiment, the radio access network device 120 is simply referred to as a network device, and if no special description is provided, in this embodiment, the network devices are all referred to as the radio access network devices 120. In addition, in the embodiments of the present application, the terms 5G and NR may be equivalent.
The Terminal device may also be referred to as a Terminal, a User Equipment (UE), a Mobile Station (MS), a Mobile Terminal (MT), and the like. The terminal device may be a mobile phone (mobile phone), a tablet (pad), a computer with wireless transceiving function, a Virtual Reality (VR) terminal device, an Augmented Reality (AR) terminal device, a wireless terminal in industrial control (industrial control), a wireless terminal in self driving (self driving), a wireless terminal in remote surgery (remote medical supply), a wireless terminal in smart grid (smart grid), a wireless terminal in transportation safety (transportation safety), a wireless terminal in smart city (smart city), a wireless terminal in smart home (smart home), and the like.
The radio access network device 120 and the terminal device may be deployed on land, including indoors or outdoors, hand-held or vehicle-mounted; can also be deployed on the water surface; it may also be deployed on airborne airplanes, balloons and satellite vehicles. The application scenarios of the radio access network device 120 and the terminal device are not limited in the embodiments of the present application.
The radio access network device 120 and the terminal device may communicate via a licensed spectrum (licensed spectrum), may communicate via an unlicensed spectrum (unlicensed spectrum), or may communicate via both the licensed spectrum and the unlicensed spectrum. The radio access network device 120 and the terminal device may communicate with each other through a frequency spectrum of 6 gigahertz (GHz) or less, through a frequency spectrum of 6GHz or more, or through both a frequency spectrum of 6GHz or less and a frequency spectrum of 6GHz or more. The spectrum resource used between the radio access network device 120 and the terminal device is not limited in the embodiment of the present application.
The random access process is a process in which the terminal device accesses the cell, and aims to establish an uplink synchronization relationship with the network device to which the cell belongs, and to request the network device to which the cell belongs to allocate a user ID and transmission resources to the terminal device for data transmission. Compared with a random access scenario in a Long Term Evolution (LTE) communication system, a random access scenario in a 5G communication system requires that the number of users in a serving cell can reach 10-100 times the number of users in the serving cell in the LTE communication system, a Random Access Channel (RACH) can support more functions (for example, uplink and downlink beams can be indicated), the spectral efficiency of the RACH can be increased by 4 times in a scenario lower than 6GHz, and the spectral efficiency of the RACH can be increased by 64 times in a scenario higher than 6 GHz.
In the existing LTE communication system, a network device may generate a preamble set required for uplink random access for each cell by performing cyclic shift on different ZC root sequences. The preamble set of each cell may include 64 ZC sequences (sequences generated by cyclic shifting of ZC root sequences), and each ZC sequence corresponds to one preamble ID in the preamble ID set.
When the terminal device needs to access a certain cell, the terminal device may generate a preamble set configured for the cell by the network device and a corresponding preamble ID set according to the preamble set configuration information broadcasted by the network device to which the cell belongs. The configuration information may include a ZC root sequence used when generating the preamble set, a cyclic shift value, and the like.
At this time, if the terminal device accesses the cell by using a contention random access method, the terminal device may randomly select one preamble ID from the preamble ID set, and send a ZC sequence corresponding to the preamble ID in the preamble set as a random access sequence to the network device to which the cell belongs, so as to request for accessing the cell. If the terminal device accesses the cell in a non-contention random access manner, after generating a preamble set configured by the network device for the cell, the terminal device may send a ZC sequence corresponding to the preamble ID in the preamble set as a random access sequence to the network device to which the cell belongs, based on the preamble ID indicated by the network device, to request access to the cell. For how the network device indicates the preamble ID, reference may be made to the prior art, which is not described herein again. It should be noted that the random access sequence may be referred to as a preamble sequence for short. It is to be understood that the term of preamble sequence in the aforementioned communication system may still be followed by the random access sequence in the 5G mobile communication system. The embodiment of the present application does not limit the nomenclature of the random access sequence in each communication system. The embodiment of the present application takes a random access sequence as a preamble sequence as an example for explanation.
The random access scenario of the 5G communication system requires that the number of users of a service cell can reach 10-100 times of the number of users of the service cell in the LTE communication system. Therefore, when the terminal device in the 5G communication system accesses the cell in a contention random access manner, if the manner of generating the preamble sequence in the LTE communication system is still used, a situation (that is, random access collision occurs) that a plurality of terminal devices simultaneously use the same preamble sequence to request to access the cell is likely to occur, resulting in a failure of accessing the cell by the plurality of terminal devices.
In view of the above problem, embodiments of the present application provide a random access method, which can reduce the probability that multiple terminal devices simultaneously use the same preamble sequence to request access to a cell (i.e., reduce the random access collision probability) by using a manner that one preamble id corresponds to multiple preamble sequences, thereby improving the RACH capacity of the cell. It can be understood that the random access method provided in the embodiment of the present application includes, but is not limited to, a random access scenario in a 5G communication system (including a random access scenario in which a cell is accessed in a contention random access manner, and a random access scenario in which a cell is accessed in a non-contention random access manner).
It should be noted that the method of the embodiment of the present application may be applied to a network device, and may also be applied to a chip in the network device, and accordingly, the method of the embodiment of the present application may be applied to a terminal device, and may also be applied to a chip in the terminal device. The following describes the technical solution of the present application in detail through some embodiments, taking the application to network devices and terminal devices as examples. The following several embodiments may be combined with each other and may not be described in detail in some embodiments for the same or similar concepts or processes.
Fig. 2 is a flowchart illustrating a random access method according to an embodiment of the present application. The present embodiment relates to a specific process in which a terminal device generates X preamble sequences and sends the X preamble sequences to a network device based on J preamble sequences in a first preamble sequence set corresponding to a first random access identifier. As shown in fig. 2, the method may include:
s101, broadcasting preamble sequence set group configuration information by the network equipment.
In this embodiment, the network device may generate a preamble sequence set for each cell. Wherein, one preamble sequence set group may include L preamble sequence sets. Each preamble sequence set may include J preamble sequences. At least one of the J preamble sequences included in each preamble sequence set is different. L and J are positive integers, and J is not less than 2. Each preamble sequence set in the preamble sequence set group corresponds to one random access identifier in the random access identifier set. That is, one random access identity corresponds to J preamble sequences. It will be appreciated that the above-mentioned random access identification may still follow the terminology of preamble ID in the aforementioned communication system in a 5G mobile communication system. The embodiment of the present application does not limit the naming of the random access identifier in each communication system. The embodiment of the present application takes a random access identifier as a preamble ID as an example for explanation.
The correspondence between each preamble sequence set in the preamble sequence set and the preamble ID in the preamble ID set can be shown in table 1, for example:
TABLE 1
preamble ID set | preamble sequence set group | preamble sequences |
preamble ID 1 | preamble sequence set 1 | J1A preamble sequence |
preamble ID 2 | preamble sequence set 2 | J2A preamble sequence |
preamble ID 3 | preamble sequence set 3 | J3A preamble sequence |
preamble ID 4 | preamble sequence set 4 | J4A preamble sequence |
…… | …… | …… |
preamble ID L | preamble sequence set L | JlA preamble sequence |
In this embodiment of the present application, the network device may broadcast the configuration information of the preamble sequence set group configured for each cell by the network device in a manner that the network device broadcasts the configuration information in the LTE communication system. The preamble sequence set configuration information may include an identifier of a cell, a ZC root sequence used when generating a preamble sequence set of the cell, a cyclic shift value, a value of L, a value of J, and the like. In this way, when the terminal device needs to access a certain cell (i.e. a cell to be accessed) under the network device, the terminal device may generate a preamble sequence set group configured for the cell to be accessed by the network device according to the preamble sequence set group configuration information of the cell to be accessed, which is broadcast by the network device.
S102, the terminal equipment acquires the first preambleID.
When the terminal device accesses the cell to be accessed by adopting a contention random access mode, the terminal device may randomly select one preamble ID from a preamble ID set of the cell to be accessed as a first preamble ID. If the terminal device accesses the cell to be accessed in a non-contention random access manner, the terminal device may use the preamble ID indicated by the network device as the first preamble ID. How the network device indicates the preamble ID to the terminal device can be seen in the prior art.
S103, the terminal equipment selects a first preamble sequence set corresponding to the first preamble ID in the preamble sequence set group.
After acquiring the first preamble ID, the terminal device may search, according to the first preamble ID, a first preamble sequence set corresponding to the first preamble ID, that is, J preamble sequences corresponding to the first preamble ID, in a preamble sequence set group of the cell to be accessed.
S104, the terminal equipment sends X first preamble sequences to the network equipment.
The terminal device may request the network device to access the cell to be accessed by sending the X first preamble sequences to the network device. Wherein X is a positive integer. In this embodiment, in a manner that one preamble ID corresponds to J preamble sequences in one preamble sequence set, the terminal device may obtain X first preamble sequences according to a first preamble sequence set corresponding to the first preamble ID. For example, the terminal device may add a plurality of preamble sequences in the first preamble sequence set to generate a first preamble sequence, or the terminal device may use a certain preamble sequence in the first preamble sequence set as a first preamble sequence, and so on.
At least one of the J preamble sequences included in each preamble sequence set is different, and the manner in which the terminal device generates the X first preamble sequences is flexible and diverse. Therefore, when the terminal device generates the preamble sequence requesting to access the cell to be accessed by adopting the above manner, the probability that a plurality of terminal devices simultaneously use the same preamble sequence to request to access the cell (i.e. the random access collision probability) can be reduced, so that the RACH capacity of the cell can be improved.
S105, the network equipment detects X first preamble sequences sent by the terminal equipment.
The network device may detect, through a preamble sequence set group of a cell to be accessed, X first preamble sequences sent by the terminal device, so as to identify a preamble sequence set corresponding to the X first preamble sequences. Optionally, the network device may also determine an uplink advance (TA) of the terminal device through the X first preamble sequences sent by the terminal device. Through the TA of each terminal device, the network device may control the time for the uplink signal sent by the terminal device using the same time domain resource to reach the network device side to be substantially aligned, so that uplink synchronization may be ensured.
S106, the network equipment determines preamble IDs corresponding to the X first preamble sequences.
After identifying the preamble sequence set corresponding to the X first preamble sequences, the network device may use the preamble ID corresponding to the preamble sequence set as the preamble ID corresponding to the X first preamble sequences. After determining the preamble IDs corresponding to the X first preamble sequences and the TA of the terminal device, the network device may carry the preamble IDs and the corresponding TAs in a Random Access Response (RAR) and send the Random Access Response (RAR) to the terminal device. Correspondingly, when the terminal device determines, based on the preamble ID carried in the RAR, that the preamble ID is the first preamble ID used when the terminal device generates X first preamble sequences, the terminal device may complete the subsequent random access procedure based on the TA corresponding to the preamble ID in the RAR, which may specifically refer to the prior art and is not described herein again.
The following introduces and explains a process of obtaining X first preamble sequences by the terminal device according to the first preamble sequence set, and a process of detecting X first preamble sequences by the network device, with reference to a specific structure of the preamble sequence set in the preamble sequence set group, and may specifically include the following structures:
the first structure is as follows: each preamble sequence set in the preamble sequence set group includes J preamble sequences, and the J preamble sequences included in each preamble sequence set are different from each other by at least one.
Wherein, each preamble sequence in the J preamble sequences included in each preamble sequence set is a ZC sequence. That is, each preamble sequence set includes J ZC sequences. The J ZC sequences may be the same ZC sequence, may have at least one different ZC sequence, or may be all different ZC sequences. When the preamble sequence set includes different ZC sequences, the different ZC sequences may be sequences generated by the same ZC root sequence. I.e., a different ZC sequence randomly selected from a set of cyclic shift sequences generated from a single ZC root sequence. In this implementation, any two of the different ZC sequences are orthogonal sequences. Alternatively, these different ZC sequences may be sequences generated by multiple ZC root sequences. I.e., a different ZC sequence randomly selected from a set of cyclic shift sequences generated from a plurality of ZC root sequences. In this implementation, any two preamble sequences of these different ZC sequences are both quasi-orthogonal sequences.
Under this structure, the manner of generating the first random access sequence by the terminal device includes the following two implementation manners:
the first mode is as follows: fig. 3A is a schematic structural diagram of a transmitter of a terminal device according to an embodiment of the present application. As shown in fig. 3A, when the preamble sequence set group includes the preamble sequence set with the structure shown above, and each preamble sequence set includes at least one different preamble sequence from the J preamble sequences, the terminal device may generate a first preamble sequence by adding the J preamble sequences in the first preamble sequence set corresponding to the first preamble ID. I.e. X in the above X first random access sequences equals 1.
Assuming that J preamble sequences included in the first preamble sequence set are S1 and S2 … … Sj, the terminal device may generate the first preamble sequence by the following formula (1).
S=S1+S2+…+Sj(1)
After generating the first preamble sequence, the terminal device may perform processing such as subcarrier mapping, inverse discrete fourier transform, and cyclic prefix insertion on the first preamble sequence. Optionally, if the first preamble sequence is a time domain sequence, discrete fourier transform is further required to be performed before subcarrier mapping is performed on the first preamble sequence. If the first preamble sequence is a frequency domain sequence, discrete fourier transform is not required to be performed before subcarrier mapping is performed on the first preamble sequence. Correspondingly, if the preamble sequence format used by the terminal device is "repeat X first preamble sequences for multiple times", the terminal device needs to repeat the first preamble sequence according to the preamble sequence format after performing the inverse discrete fourier transform on the first preamble sequence. It should be noted that, for how the terminal device performs discrete fourier transform, subcarrier mapping, inverse discrete fourier transform, repetition processing, cyclic prefix insertion, and the like on the first preamble sequence, reference may be made to the prior art, and details thereof are not described again.
After the terminal device performs the above processing on the first preamble sequence, the terminal device may map the first preamble sequence on the first time-frequency resource and send the first preamble sequence to the network device. The first time-frequency resource may include, for example: 1 time domain resource allowing transmission of the first preamble sequence and 1 frequency domain resource allowing transmission of the first preamble sequence. For example, the terminal device may map the first preamble sequence on 1 RACH frequency domain resource, and generate 1 preamble symbol (symbol). Then, the terminal device may transmit the 1 preamble symbol on 1 RACH time-frequency symbol.
Since at least one of J preamble sequences included between preamble sequence sets is different, even if a manner of generating a preamble sequence set using 64 ZC sequences in one cell in an LTE communication system is used, the number of preamble sequence sets generated by the 64 ZC sequences is greater than 64. Therefore, the probability that a plurality of terminal devices use the same preamble sequence set to generate a preamble sequence requesting access to a cell to be accessed is reduced, that is, the probability that a plurality of terminal devices simultaneously use the same preamble sequence to request access to the cell (that is, the random access collision probability is reduced), so that the RACH capacity of the cell can be improved.
In addition, since the length of the first preamble sequence transmitted by the terminal device is the length of one ZC sequence, the length of the first preamble sequence can be kept the same as the length of the preamble sequence transmitted by the terminal device in the LTE communication system. That is, the preamble sequence set group may be generated using a ZC sequence generated by a ZC root sequence having the same length as the ZC root sequence in the LTE communication system. In this way, the size of the time-frequency resource used when the terminal device sends the first preamble sequence may be the same as the size of the time-frequency resource used when the terminal device sends the preamble sequence in the LTE communication system. That is to say, the terminal device may send the first preamble sequence along the subcarrier interval used when the terminal device sends the preamble sequence in the LTE communication system, so that the first preamble sequence sent by the terminal device has better delay spread resistance and supports a large cell radius.
Fig. 3B is a flowchart of another random access method according to an embodiment of the present application. As shown in fig. 3B, when the terminal device sends, to the network device, a first preamble sequence generated by adding J preamble sequences in the first preamble sequence set on the first time-frequency resource, the network device may detect, on the first time-frequency resource, the first random access sequence sent by the terminal device. As shown in fig. 3B, the method includes:
s201, the network device screens out at least one second preamble sequence set from the preamble sequence set group according to the X first preamble sequences received on the first time-frequency resource.
Because different terminal devices are located at different positions, when other terminal devices send the first preamble sequence to the network device at the same time as the terminal device, the network device receives the first preamble sequence sent by the other terminal devices at the same time as the terminal device at different receiving times. Therefore, the network device can distinguish the first preamble sequence sent by the terminal device through the location of the TA.
After acquiring the first preamble sequence sent by the terminal device, the network device may perform fourier transform on the first preamble sequence first, so as to transform the first preamble sequence from the time domain to the frequency domain. Correspondingly, the network device also performs fourier transform on the preamble sequence in each preamble sequence set in the preamble sequence set group. Then, the network device performs frequency domain correlation, inverse Fourier transform and power delay spectrum calculation on the first preamble sequence and the preamble sequence set in the preamble sequence set group in sequence to obtain at least one second preamble sequence set. The received power of each preamble sequence in the at least one second preamble sequence set may be greater than or equal to a preset first threshold value. The size of the first threshold may be specifically determined according to the configuration of the network device.
It should be noted that, the network device performs frequency domain correlation, inverse fourier transform, and power delay spectrum calculation on the first preamble sequence and the preamble sequence set in the preamble sequence set group, which may follow the manner in the prior art and is not described herein again.
S202, the network equipment determines preamble sequence sets corresponding to the X first random sequences according to at least one second preamble sequence set.
After the network device screens out at least one second preamble sequence set from the preamble sequence set group, the network device may perform coherent combining on the J preamble sequences in the at least one second preamble sequence set after performing frequency domain correlation. Then, the network device may perform inverse fourier transform and power delay spectrum calculation on each second preamble sequence set after coherent combining to obtain the received power of each second preamble sequence set. In this embodiment, the first preamble sequence generated by the terminal device using the J preamble sequences is sent on 1 frequency domain resource allowing sending the first preamble sequence, that is, the channel environments of the J preamble sequences constituting the first preamble sequence are the same. Therefore, the network device combines the J preamble sequences in each second preamble sequence set after fourier transform in a coherent combination manner, and the subsequently obtained received power of each second preamble sequence set is more accurate.
After obtaining the received power of each second preamble sequence set, the network device may use the second preamble sequence set with the maximum received power and larger than a preset second threshold as the preamble sequence set corresponding to the first random sequence. The size of the second threshold may be specifically determined according to the configuration of the network device. Then, the network device may use the preamble ID of the preamble sequence set corresponding to the first random sequence as the preamble ID corresponding to the first preamble sequence. Namely, the preamble ID of the second preamble sequence set with the maximum received power and larger than the preset second threshold is used as the preamble ID corresponding to the first preamble sequence.
The processing flow of the network device after determining the preamble IDs corresponding to the X first preamble sequences may refer to the description of step S106, which is not described herein again.
The second mode is as follows: fig. 3C is a schematic diagram of a transmitter structure of another terminal device according to an embodiment of the present application. As shown in fig. 3C, when the preamble sequence set group includes the preamble sequence set with the structure shown above, that is, when the first preamble sequence set includes J preamble sequences, the terminal device may use each preamble sequence in the first preamble sequence set corresponding to the first preamble ID as a first preamble sequence. I.e. X of the above X first random access sequences equals J. In this implementation, the length Nzc of each first preamble sequence is equal to the length of one preamble sequence (i.e., ZC sequence) in the set of preamble sequences. The X first preamble sequences may have the same first preamble sequence, or any two preamble sequences in the X first preamble sequences are different, and specifically, the determination may be made according to whether J preamble sequences included in the first preamble sequence set are the same.
After generating the J first preamble sequences, the terminal device may perform subcarrier mapping on the J first preamble sequences, respectively. Then, the terminal device may perform inverse discrete fourier transform, cyclic prefix insertion, and the like on the J first preamble sequences. Optionally, if the first preamble sequence is a time domain sequence, discrete fourier transform is further performed before subcarrier mapping is performed on each first preamble sequence. If the first preamble sequence is a frequency domain sequence, discrete fourier transform is not required to be performed before subcarrier mapping is performed on each first preamble sequence. Correspondingly, if the preamble sequence format used by the terminal device is "repeat X first preamble sequences for multiple times", the terminal device needs to repeat the X first preamble sequences according to the preamble sequence format after performing the inverse discrete fourier transform on the first preamble sequence. It should be noted that, for how the terminal device performs discrete fourier transform, subcarrier mapping, inverse discrete fourier transform, repetition processing, cyclic prefix insertion, and the like on the first preamble sequence, reference may be made to the prior art, and details thereof are not described again.
After the terminal device performs the above processing on the J first preamble sequences, the J first preamble sequences may be mapped on the second time-frequency resource and sent to the network device. The second time-frequency resource may include: 1 time domain resource allowing transmission of the first preamble sequence and X frequency domain resources allowing transmission of the first preamble sequence. For example, the terminal device may map J first preamble sequences on J RACH frequency domain resources, respectively, to generate 1 preamble symbol (symbol). Then, the terminal device may transmit the 1 preamble symbol on 1 RACH time-frequency symbol.
Since at least one of J preamble sequences included between preamble sequence sets is different, even if a mode of using 64 ZC sequences in one cell in an LTE communication system is used, the number of preamble sequence sets generated by the 64 ZC sequences is greater than 64. Therefore, the terminal device can reduce the probability that the preamble sequences generated by the plurality of terminal devices are the same by using each preamble sequence of the first preamble sequence set corresponding to the first preamble ID as one first preamble sequence, that is, can reduce the probability that the plurality of terminal devices simultaneously use the same preamble sequence to request to access the cell (that is, reduce the random access collision probability), thereby improving the RACH capacity of the cell.
In addition, in this embodiment, when the network device generates the preamble sequence set, the network device may use a ZC root sequence having a length equal to one J of the length of the ZC root sequence in the LTE communication system, so that the length of each of the J first preamble sequences generated by the terminal device based on the first preamble sequence set corresponding to the first preamble ID is one J of the preamble sequences in the LTE communication system. Therefore, the terminal device can send the X first preamble sequences at the subcarrier intervals used when the terminal device sends the preamble sequences in the LTE communication system, so that the first preamble sequences sent by the terminal device have better delay spread resistance and support a large cell radius.
Fig. 3D is a flowchart illustrating another random access method according to an embodiment of the present application. As shown in fig. 3D, when the terminal device sends the J first preamble sequences to the network device on the second time-frequency resource, the network device may detect the J first random access sequences sent by the terminal device on the second time-frequency resource. As shown in fig. 3D, the method includes:
s301, the network device screens out at least one third preamble sequence set from the preamble sequence set group according to the J first preamble sequences received on the J frequency domain resources.
Because different terminal devices are located at different positions, when there are J first preamble sequences sent to the network device by other terminal devices at the same time as the terminal device, the network device receives J first preamble sequences sent by other terminal devices at the same time as the terminal device at different receiving times. Therefore, the network device can distinguish the J first preamble sequences sent by the terminal device by the TA location.
After receiving the J first preamble sequences sent by the terminal device on the J frequency domain resources, the network device may perform fourier transform on the J first preamble sequences, so as to transform the J first preamble sequences from the time domain to the frequency domain. Then, the network device may perform inverse subcarrier mapping processing on the J fourier transformed first preamble sequences to split the J fourier transformed first preamble sequences. Correspondingly, the network device also performs fourier transform on the preamble sequence in each preamble sequence set in the preamble sequence set group.
Then, the network device may perform frequency domain correlation, inverse fourier transform, and power delay spectrum calculation on each first preamble sequence after fourier transform and the preamble sequence set in the preamble sequence set group in sequence to obtain at least one third preamble sequence set. The received power of each preamble sequence in the at least one third preamble sequence set is greater than or equal to a preset first threshold value.
It should be noted that how the network device performs sub-carrier inverse mapping processing on the J fourier-transformed first preamble sequences to split the J fourier-transformed first preamble sequences, and the network device performs frequency domain correlation, inverse fourier transform, and power delay spectrum calculation on the J first preamble sequences and the preamble sequence set in the preamble sequence set group in the frequency domain, may follow the manner of the prior art, and is not described herein again.
S302, the network equipment determines preamble sequence sets corresponding to the J first random sequences according to at least one third preamble sequence set.
After the network device screens out at least one third preamble sequence set from the preamble sequence set group, the network device may sequentially perform inverse fourier transform, power delay spectrum calculation, and non-coherent combining on the at least one third preamble sequence set after the frequency domain correlation, so as to obtain the received power of each third preamble sequence set. In this embodiment, the J first preamble sequences generated by the terminal device using the J preamble sequences are sent on the J frequency domain resources allowing sending the first preamble sequences, that is, the channel environments of the J preamble sequences are different. Therefore, the network device performs incoherent combination on the J preamble sequences in each third preamble sequence set after the power delay spectrum is calculated in an incoherent combination manner, and the received power of each third preamble sequence set obtained subsequently is more accurate.
After obtaining the received power of each third preamble sequence set, the network device may use the third preamble sequence set with the maximum received power and larger than a preset second threshold as the preamble sequence set corresponding to the first random sequence. Then, the network device may use the preamble ID of the preamble sequence set corresponding to the first random sequence as the preamble ID corresponding to the first preamble sequence. Namely, the preamble ID of the third preamble sequence set with the maximum received power and larger than the preset second threshold is used as the preamble ID corresponding to the first preamble sequence.
The processing flow of the network device after determining the preamble IDs corresponding to the J first preamble sequences may refer to the description of step S106, which is not described herein again.
It should be noted that the process of detecting J first preamble sequences by the network device shown in fig. 3D is similar to the process of detecting J first preamble sequences by the network device shown in fig. 3B, and the only difference is that the network device in fig. 3B detects J first preamble sequences in a code domain, and the network device in fig. 3D detects J first preamble sequences in a frequency domain.
The second structure is as follows: each preamble sequence set in the preamble sequence set group comprises M preamble sequence subsets, each preamble sequence subset comprises Y preamble sequences, and M and Y are positive integers. At least one subset of preamble sequences is different between each set of preamble sequences. The M preamble sequence subsets included in one preamble sequence set may be the same or different. That is, the first set of preamble sequences comprises M subsets of preamble sequences, each subset of preamble sequences comprising Y preamble sequences. In this scenario, each first preamble sequence is a preamble sequence obtained according to one preamble sequence subset in the first preamble sequence set.
Taking the first preamble sequence set as an example, the first preamble sequence set can be shown in table 2, for example:
TABLE 2
In this scenario, the configuration information of the preamble sequence set broadcast by the network device may further include a value of M and a value of Y.
Wherein, each preamble sequence in the Y preamble sequences included in each preamble sequence subset is a ZC sequence. That is, each preamble sequence subset includes Y ZC sequences. The Y ZC sequences may be the same ZC sequence, may have at least one different ZC sequence, or may be all different ZC sequences. When the preamble sequence subset includes different ZC sequences, the different ZC sequences may be sequences generated by the same ZC root sequence. I.e., a different ZC sequence randomly selected from a subset of cyclically shifted sequences generated from a single ZC root sequence. In this implementation, any two of the different ZC sequences are orthogonal sequences. Alternatively, these different ZC sequences may be sequences generated by multiple ZC root sequences. I.e., a different ZC sequence randomly selected from a subset of cyclically shifted sequences generated from a plurality of ZC root sequences. In this implementation, any two preamble sequences of these different ZC sequences are both quasi-orthogonal sequences.
When the first preamble sequence set is shown in table 2, the manner for the terminal device to generate the first random access sequence includes the following two implementation manners:
the first mode is as follows: with reference to fig. 3A, the terminal device may generate a first preamble sequence by adding Y preamble sequences in each subset of the first preamble sequence in the first preamble sequence set corresponding to the first preamble ID. I.e. X of the above X first random access sequences may be equal to M. In this implementation manner, the same first preamble sequence may exist in the M first preamble sequences, or any two preamble sequences in the M first preamble sequences are different from each other, and specifically, it may be determined whether M preamble sequence subsets included in the first preamble sequence set are the same. In specific implementation, the terminal device may generate the first preamble sequence by adding the Y preamble sequences in a manner shown in formula (1), which is not described herein again.
After the terminal device generates the M first preamble sequences, the terminal device may perform processing such as subcarrier mapping, inverse discrete fourier transform, and cyclic prefix insertion on the M first preamble sequences. Optionally, if the first preamble sequence is a time domain sequence, discrete fourier transform needs to be performed on each first preamble sequence before subcarrier mapping is performed on the M first preamble sequences. If the first preamble sequence is a frequency domain sequence, discrete fourier transform does not need to be performed on each first preamble sequence before subcarrier mapping is performed on the M first preamble sequences. Correspondingly, if the preamble sequence format used by the terminal device is "repeat X first preamble sequences for multiple times", the terminal device needs to repeat the M first preamble sequences according to the preamble sequence format after performing the inverse discrete fourier transform on the M first preamble sequences. It should be noted that, for how the terminal device performs discrete fourier transform, subcarrier mapping, inverse discrete fourier transform, repetition processing, cyclic prefix insertion, and the like on the first preamble sequence, reference may be made to the prior art, and details thereof are not described again.
After the terminal device performs the above processing on the M first preamble sequences, the terminal device may map the M first preamble sequences on the third time-frequency resource and send the third time-frequency resource to the network device. The third time-frequency resource here includes: m time domain resources allowing transmission of the first preamble sequence and 1 frequency domain resource allowing transmission of the first preamble sequence. For example, the terminal device may map the M first preamble sequences on 1 RACH frequency domain resource, and generate M preamble symbols (symbols). Then, the terminal device may transmit the M preamble symbols on M RACH time-frequency symbols.
Since at least one preamble sequence subset is different between each preamble sequence set, even if a manner of generating the preamble sequence sets by using 64 ZC sequences in one cell in the LTE communication system is used, the number of the preamble sequence sets generated by the 64 ZC sequences is greater than 64. Therefore, the probability that a plurality of terminal devices use the same preamble sequence set to generate a preamble sequence requesting access to a cell to be accessed is reduced, that is, the probability that a plurality of terminal devices simultaneously use the same preamble sequence to request access to the cell (that is, the random access collision probability is reduced), so that the RACH capacity of the cell can be improved.
In addition, since the terminal device needs to occupy M time domain resources to transmit M first preamble sequences, when the length of the M first preamble sequences is kept the same as the length of the terminal device transmitting the preamble sequences in the LTE communication system, compared with the subcarrier interval used when the terminal device transmits the preamble sequences in the LTE communication system, the terminal device in this embodiment needs to increase the subcarrier interval used when transmitting the first preamble sequences, that is, reduce the length of the first preamble sequences. For example, the length of each first preamble sequence is M times smaller than the preamble sequence in the LTE communication system. That is to say, in this embodiment, when the network device generates the preamble sequence set, the network device may use a ZC root sequence having a length equal to M times of the ZC root sequence length in the LTE communication system, so that the length of each of M first preamble sequences generated by the terminal device based on the first preamble sequence set corresponding to the first preamble ID is M times of the preamble sequence in the LTE communication system. By the method, the M first preamble sequences sent by the terminal equipment have better frequency offset resistance.
Fig. 4A is a flowchart illustrating another random access method according to an embodiment of the present application. When the terminal device sends each first preamble sequence generated by adding Y preamble sequences in one preamble sequence subset in the first preamble sequence set to the network device on the third time frequency resource, the network device may detect the first random access sequence sent by the terminal device on the third time frequency resource. As shown in fig. 4A, the method includes:
s401, the network device screens at least X first preamble sequence subsets from the preamble sequence set group according to X first preamble sequences received on X time domain resources.
Because different terminal devices are located at different positions, when other terminal devices send the M first preamble sequences to the network device at the same time as the terminal device, the network device receives the M first preamble sequences sent by the other terminal devices at the same time as the terminal device at different receiving times. Therefore, the network device can distinguish the M first preamble sequences sent by the terminal device through the location of the TA.
After receiving the M first preamble sequences sent by the terminal device on the M time domain resources, the network device may perform fourier transform on each first preamble sequence to transform the first preamble sequence from the time domain to the frequency domain. Correspondingly, the network device also performs fourier transform on the preamble sequence in each preamble sequence set in the preamble sequence set group. Then, the network device may perform frequency domain correlation, inverse fourier transform, and power delay spectrum calculation on each first preamble sequence and each preamble sequence subset in the preamble sequence set group in the frequency domain in sequence to obtain at least one first preamble sequence subset corresponding to each first preamble sequence. I.e. at least X subsets of first preamble sequences corresponding to the M first preamble sequences. Wherein, the received power of each preamble sequence in the at least one first preamble sequence subset may be greater than or equal to a preset first threshold. The size of the first threshold may be specifically determined according to the configuration of the network device.
It should be noted that, the network device performs frequency domain correlation, inverse fourier transform, and power delay spectrum calculation on the first preamble sequence and each preamble sequence subset in the preamble sequence set group in the frequency domain, which may follow the manner in the prior art and is not described herein again.
S402, the network equipment determines at least one second preamble sequence subset according to at least one first preamble sequence subset on each time domain resource.
After the network device screens at least M first preamble sequence subsets from the preamble sequence set group, combining Y preamble sequences in each first preamble sequence subset on each time domain resource, and taking the first preamble sequence subset with the maximum receiving power and larger than a second threshold value as a second preamble sequence subset. That is, the network device determines at least M preamble sequence subsets corresponding to the M first random sequences, respectively, and the at least M preamble sequence subsets may form at least one preamble sequence set. For how to merge Y preamble sequences in each first preamble sequence subset and how to screen the second preamble sequence subset, reference may be made to the description of how to merge J preamble sequences in the preamble sequence set in S202, which is not described herein again.
S403, the network device determines preamble sequence sets corresponding to the X first random sequences according to at least X second preamble sequence subsets determined on the X time domain resources.
After the network device determines at least M second preamble sequence subsets corresponding to the M first random sequences, the network device may combine the at least M second preamble sequence subsets determined on the M time domain resources, and use a preamble sequence set with a maximum received power and greater than a third threshold as a preamble sequence set corresponding to the X first random sequences. The size of the third threshold may be specifically determined according to the configuration of the network device. In this embodiment, the M first preamble sequences generated by the terminal device using the preamble sequence subset are sent on M time domain resources allowing sending the first preamble sequences, that is, channel environments of the M first preamble sequences are different. Therefore, the network device performs incoherent combination on the second preamble sequence subset after the power delay spectrum is calculated in an incoherent combination mode, and the received power of each subsequently obtained preamble sequence set is more accurate.
Then, the network device may use the preamble ID of the preamble sequence set corresponding to the first random sequence as the preamble ID corresponding to the first preamble sequence. Namely, the preamble ID of the preamble sequence set with the maximum received power and larger than the preset third threshold is used as the preamble ID corresponding to the first preamble sequence.
The processing flow of the network device after determining the preamble IDs corresponding to the X first preamble sequences may refer to the description of step S106, which is not described herein again.
The second mode is as follows: fig. 4B is a schematic structural diagram of a transmitter of another terminal device according to an embodiment of the present application. As shown in fig. 4B, in this embodiment, the terminal device may generate M first random access sequences, and the generation manner of the M first random access sequences may refer to the description of the first manner in this structure, which is not described again.
Different from the first method, after generating the M first preamble sequences, the terminal device may perform subcarrier mapping on the M first preamble sequences, respectively. Then, the terminal device may perform inverse discrete fourier transform, cyclic prefix insertion, and the like on the M first preamble sequences. Optionally, if the first preamble sequence is a time domain sequence, discrete fourier transform needs to be performed on each first preamble sequence before subcarrier mapping is performed on the M first preamble sequences. If the first preamble sequence is a frequency domain sequence, discrete fourier transform does not need to be performed on each first preamble sequence before subcarrier mapping is performed on the M first preamble sequences. Correspondingly, if the preamble sequence format used by the terminal device is "repeat X first preamble sequences for multiple times", the terminal device needs to repeat the M first preamble sequences according to the preamble sequence format after performing the inverse discrete fourier transform on the M first preamble sequences. It should be noted that, for how the terminal device performs discrete fourier transform, subcarrier mapping, inverse discrete fourier transform, repetition processing, cyclic prefix insertion, and the like on the first preamble sequence, reference may be made to the prior art, and details thereof are not described again.
After the terminal device performs the above processing on the M first preamble sequences, the terminal device may map the M first preamble sequences on the third time-frequency resource and send the third time-frequency resource to the network device. The third time frequency resource referred to here is different from the third time frequency resource referred to in the first mode. In this embodiment, the third time-frequency resource may include: m frequency domain resources allowing the first preamble sequence to be transmitted and 1 time domain resource allowing the first preamble sequence to be transmitted. For example, the terminal device may map M first preamble sequences on M RACH frequency domain resources, and generate 1 preamble symbol (symbol). Then, the terminal device may transmit the 1 preamble symbol on 1 RACH time-frequency symbol.
Since at least one preamble sequence subset is different between each preamble sequence set, even if a manner of generating the preamble sequence sets by using 64 ZC sequences in one cell in the LTE communication system is used, the number of the preamble sequence sets generated by the 64 ZC sequences is greater than 64. Therefore, the probability that a plurality of terminal devices use the same preamble sequence set to generate a preamble sequence requesting access to a cell to be accessed is reduced, that is, the probability that a plurality of terminal devices simultaneously use the same preamble sequence to request access to the cell (that is, the random access collision probability is reduced), so that the RACH capacity of the cell can be improved.
In addition, in this embodiment, when the network device generates the preamble sequence set, the network device may use a ZC root sequence having a length equal to one M of the length of the ZC root sequence in the LTE communication system, so that the length of each of M first preamble sequences generated by the terminal device based on the first preamble sequence set corresponding to the first preamble ID is one M of the length of the preamble sequence in the LTE communication system. Therefore, the terminal device can send the M first preamble sequences at the subcarrier intervals used when the terminal device sends the preamble sequences in the LTE communication system, so that the M first preamble sequences sent by the terminal device have better delay spread resistance and support a large cell radius.
When the terminal device sends the M first preamble sequences to the network device on the third time frequency resource shown in this mode, the network device may detect the M first random access sequences sent by the terminal device on the third time frequency resource. For example, the network device may detect at least one preamble sequence subset corresponding to the first preamble sequence received in each frequency domain in the manner shown in fig. 3B.
Then, the network device may perform incoherent combination on at least M preamble sequence subsets corresponding to the M first preamble sequences to obtain the received power of at least one preamble sequence set corresponding to the M first preamble sequences, and use the preamble sequence set with the maximum received power and greater than a preset third threshold as the preamble sequence set corresponding to the first random sequence. Then, the network device may use the preamble ID of the preamble sequence set corresponding to the first random sequence as the preamble ID corresponding to the first preamble sequence. Namely, the preamble ID of the preamble sequence set with the maximum received power and larger than the preset third threshold is used as the preamble ID corresponding to the first preamble sequence.
The processing flow of the network device after determining the preamble IDs corresponding to the X first preamble sequences may refer to the description of step S106, which is not described herein again.
The third mode is as follows: with reference to fig. 3C, the terminal device may use each preamble sequence in each subset of preamble sequences in the first preamble sequence set corresponding to the first preamble ID as a first preamble sequence. That is, X in the above X first random access sequences may be equal to the product of M and Y. In this implementation manner, the same first preamble sequence may exist in the X first preamble sequences, or any two preamble sequences in the X first preamble sequences are different from each other, and specifically, it may be determined whether M preamble sequence subsets included in the first preamble sequence set are the same.
After generating X first preamble sequences, the terminal device may perform subcarrier mapping on the first preamble sequences generated by using the preamble sequences in the same preamble sequence subset in the X first preamble sequences, respectively. Then, the terminal device may perform inverse discrete fourier transform, cyclic prefix insertion, and the like on the X first preamble sequences. Optionally, if the first preamble sequence is a time domain sequence, before subcarrier mapping is performed on the first preamble sequences generated by the preamble sequences in the same preamble sequence subset, discrete fourier transform needs to be performed on each first preamble sequence. If the first preamble sequence is a frequency domain sequence, before subcarrier mapping is performed on the first preamble sequences generated by the preamble sequences in the same preamble sequence subset, discrete fourier transform does not need to be performed on each first preamble sequence. Correspondingly, if the preamble sequence format used by the terminal device is "repeat X first preamble sequences for multiple times", the terminal device needs to repeat the X first preamble sequences according to the preamble sequence format after performing the inverse discrete fourier transform on the X first preamble sequences. It should be noted that, for how the terminal device performs discrete fourier transform, subcarrier mapping, inverse discrete fourier transform, repetition processing, cyclic prefix insertion, and the like on the first preamble sequence, reference may be made to the prior art, and details thereof are not described again.
After the terminal device performs the above processing on the X first preamble sequences, the terminal device may map the X first preamble sequences on the fourth time-frequency resource and send the fourth time-frequency resource to the network device. The fourth time-frequency resource here includes: m time domain resources allowing the first preamble sequence to be transmitted and Y frequency domain resources allowing the first preamble sequence to be transmitted. The first preamble sequences generated by using the preamble sequences in the same preamble sequence subset are mapped on different frequency domain resources of the same time domain resource. For example, the terminal device may map a first preamble sequence generated by using preamble sequences in the same preamble sequence subset on Y RACH frequency domain resources, to generate M preamble symbols (symbols). Then, the terminal device may transmit the M preamble symbols on M RACH time-frequency symbols.
Since at least one preamble sequence subset is different between each preamble sequence set, even if a manner of generating the preamble sequence sets by using 64 ZC sequences in one cell in the LTE communication system is used, the number of the preamble sequence sets generated by the 64 ZC sequences is greater than 64. Therefore, 1 preamble ID corresponds to Y preamble sequences, so that the probability that multiple terminal devices use the same preamble sequence set to request access to the preamble sequence of the cell to be accessed is reduced, that is, the probability that multiple terminal devices simultaneously use the same preamble sequence to request access to the cell (i.e., the random access collision probability is reduced), thereby increasing the RACH capacity of the cell.
In addition, since the terminal device needs to occupy M time domain resources to transmit X first preamble sequences, when the length of the M time domain resources is kept the same as the length of the time domain resource for the terminal device to transmit the preamble sequences in the LTE communication system, compared with the subcarrier interval used when the terminal device transmits the preamble sequences in the LTE communication system, the terminal device in this embodiment needs to increase the subcarrier interval used when transmitting the first preamble sequences, that is, reduce the length of the first preamble sequences. For example, the length of each first preamble sequence is M times smaller than the preamble sequence in the LTE communication system. That is to say, in this embodiment, when the network device generates the preamble sequence set, the network device may use a ZC root sequence having a length equal to M times of the ZC root sequence length in the LTE communication system, so that the length of each of M first preamble sequences generated by the terminal device based on the first preamble sequence set corresponding to the first preamble ID is M times of the preamble sequence in the LTE communication system. By the method, the M first preamble sequences sent by the terminal equipment have better frequency offset resistance.
When the terminal device sends the X first preamble sequences to the network device on the fourth time-frequency resource, the network device may detect the X first random access sequences sent by the terminal device on the fourth time-frequency resource. For example, the network device may detect at least one preamble sequence corresponding to the first preamble sequence received in each frequency domain of each time domain in the manner shown in fig. 3D.
Then, the network device may perform non-coherent combining on at least Y preamble sequences corresponding to the first preamble sequences in Y frequency domains of the same time domain, so as to use a preamble sequence subset with the maximum received power and greater than a preset second threshold as at least one preamble sequence subset corresponding to the Y first preamble sequences in the time domain.
Finally, the network device may perform non-coherent combining on at least M preamble sequence subsets in M time domains, so as to use a preamble sequence set with a maximum received power and larger than a preset third threshold as a preamble sequence set corresponding to the first random sequence. Then, the network device may use the preamble ID of the preamble sequence set corresponding to the first random sequence as the preamble ID corresponding to the first preamble sequence. Namely, the preamble ID of the preamble sequence set with the maximum received power and larger than the preset third threshold is used as the preamble ID corresponding to the first preamble sequence.
The processing flow of the network device after determining the preamble IDs corresponding to the X first preamble sequences may refer to the description of step S106, which is not described herein again.
A third structure: each preamble sequence set in the preamble sequence set group comprises M preamble sequence subsets, each preamble sequence subset comprises K preamble sequence sets, each preamble sequence set comprises Q preamble sequences, and M, K and Q are positive integers. At least one preamble sequence set is different between each preamble sequence set. The M preamble sequence subsets included in one preamble sequence set may be the same or different. Each subset of preamble sequences may include the same or different set of K preamble sequences. That is, the first set of preamble sequences comprises M subsets of preamble sequences, each subset of preamble sequences comprising K sets of preamble sequences, each set of preamble sequences comprising Q preamble sequences. In this scenario, each first preamble sequence is a preamble sequence obtained according to one preamble sequence set.
Taking the first preamble sequence set as an example, the first preamble sequence set can be shown in table 3, for example:
TABLE 3
In this scenario, the configuration information of the preamble sequence set broadcast by the network device may further include a value of M, a value of K, and a value of Q.
Wherein, each preamble sequence in the Q preamble sequences included in each preamble sequence group is a ZC sequence. That is, each preamble sequence set includes Q ZC sequences. The Q ZC sequences may be the same ZC sequence, may have at least one different ZC sequence, or may be all different ZC sequences. When the preamble sequence set includes different ZC sequences, the different ZC sequences may be sequences generated by the same ZC root sequence. I.e., different ZC sequences randomly selected from a set of cyclic shift sequences generated from a single ZC root sequence. In this implementation, any two of the different ZC sequences are orthogonal sequences. Alternatively, these different ZC sequences may be sequences generated by multiple ZC root sequences. That is, a different ZC sequence randomly selected from among a cyclic shift sequence group generated from a plurality of ZC root sequences. In this implementation, any two preamble sequences of these different ZC sequences are both quasi-orthogonal sequences.
When the first preamble sequence set is shown in table 3, the terminal device may generate one first preamble sequence by adding Q preamble sequences in each preamble sequence set in the first preamble sequence set. That is, X in the above X first random access sequences may be equal to the product of M and K. In this implementation manner, the same first preamble sequence may exist in the X first preamble sequences, or any two preamble sequences in the X first preamble sequences are different from each other, and specifically, it may be determined whether K set groups in a subset of M preamble sequences included in the first preamble sequence set are the same.
After generating X first preamble sequences, the terminal device may perform subcarrier mapping on the first preamble sequences generated by using the preamble sequences in the preamble sequence group in the same preamble sequence subset in the X first preamble sequences, respectively. Then, the terminal device may perform inverse discrete fourier transform, cyclic prefix insertion, and the like on the X first preamble sequences. Optionally, if the first preamble sequence is a time domain sequence, before subcarrier mapping is performed on the first preamble sequences generated by K preamble sequence groups in the same preamble sequence subset, discrete fourier transform needs to be performed on each first preamble sequence. If the first preamble sequence is a frequency domain sequence, before subcarrier mapping is performed on the first preamble sequences generated by the K preamble sequence groups in the same preamble sequence subset, discrete fourier transform does not need to be performed on each first preamble sequence. Correspondingly, if the preamble sequence format used by the terminal device is "repeat X first preamble sequences for multiple times", the terminal device needs to repeat the X first preamble sequences according to the preamble sequence format after performing the inverse discrete fourier transform on the X first preamble sequences. It should be noted that, for how the terminal device performs discrete fourier transform, subcarrier mapping, inverse discrete fourier transform, repetition processing, cyclic prefix insertion, and the like on the first preamble sequence, reference may be made to the prior art, and details thereof are not described again.
After the terminal device performs the above processing on the X first preamble sequences, the terminal device may map the X first preamble sequences on the fifth time-frequency resource and send the fifth time-frequency resource to the network device. The fifth time-frequency resource here includes: m time domain resources allowing the first preamble sequence to be transmitted and K frequency domain resources allowing the first preamble sequence to be transmitted. The first preamble sequence generated by using the preamble sequence group in the same preamble sequence subset is mapped on different frequency domain resources of the same time domain resource. For example, the terminal device may map a first preamble sequence generated by using a preamble sequence group in the same preamble sequence subset on the K RACH frequency domain resources, to generate M preamble symbols (symbols). Then, the terminal device may transmit the M preamble symbols on M RACH time-frequency symbols.
Since at least one preamble sequence subset is different between each preamble sequence set, even if a manner of generating the preamble sequence sets by using 64 ZC sequences in one cell in the LTE communication system is used, the number of the preamble sequence sets generated by the 64 ZC sequences is greater than 64. Therefore, the probability that a plurality of terminal devices use the preamble sequence generated by the same preamble sequence set to request access to the cell to be accessed is greatly reduced by multiplying K by Q preamble sequences corresponding to 1 preamble ID, that is, the probability that a plurality of terminal devices simultaneously use the same preamble sequence to request access to the cell (namely, the random access collision probability is reduced), so that the RACH capacity of the cell can be improved.
In addition, since the terminal device needs to occupy M time domain resources to transmit X first preamble sequences, when the length of the M time domain resources is kept the same as the length of the time domain resource for the terminal device to transmit the preamble sequences in the LTE communication system, compared with the subcarrier interval used when the terminal device transmits the preamble sequences in the LTE communication system, the terminal device in this embodiment needs to increase the subcarrier interval used when transmitting the first preamble sequences, that is, reduce the length of the first preamble sequences. For example, the length of each first preamble sequence is M times smaller than the preamble sequence in the LTE communication system. That is to say, in this embodiment, when the network device generates the preamble sequence set, the network device may use a ZC root sequence having a length equal to M times of the ZC root sequence length in the LTE communication system, so that the length of each of M first preamble sequences generated by the terminal device based on the first preamble sequence set corresponding to the first preamble ID is M times of the preamble sequence in the LTE communication system. By the method, the M first preamble sequences sent by the terminal equipment have better frequency offset resistance.
When the terminal device sends the X first preamble sequences to the network device on the fifth time-frequency resource, the network device may detect the X first random access sequences sent by the terminal device on the fifth time-frequency resource. For example, the network device may detect at least one preamble sequence set corresponding to the first preamble sequence received in each frequency domain of each time domain in the manner shown in fig. 3D.
Then, the network device may perform incoherent combination on at least Y preamble sequence groups corresponding to the first preamble sequences in Y frequency domains of the same time domain, so as to use a preamble sequence subset with the maximum received power and greater than a preset second threshold as at least one preamble sequence subset corresponding to the Y first preamble sequences in the time domain.
Finally, the network device may perform non-coherent combining on at least M preamble sequence subsets in M time domains, so as to use a preamble sequence set with a maximum received power and larger than a preset third threshold as a preamble sequence set corresponding to the first random sequence. Then, the network device may use the preamble ID of the preamble sequence set corresponding to the first random sequence as the preamble ID corresponding to the first preamble sequence. Namely, the preamble ID of the preamble sequence set with the maximum received power and larger than the preset third threshold is used as the preamble ID corresponding to the first preamble sequence.
The processing flow of the network device after determining the preamble IDs corresponding to the X first preamble sequences may refer to the description of step S106, which is not described herein again.
According to the random access method provided by the embodiment of the application, in a manner that one preamble ID corresponds to J preamble sequences in one preamble sequence set, the terminal device can obtain X first preamble sequences flexibly and variously according to the first preamble sequence set corresponding to the first preamble ID. Therefore, when the terminal device generates the preamble sequence requesting to access the cell to be accessed by adopting the above manner, the probability that a plurality of terminal devices simultaneously use the same preamble sequence to request to access the cell (i.e. the random access collision probability) can be reduced, so that the RACH capacity of the cell can be improved.
Fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present application. As shown in fig. 5, the terminal device may include: a processing module 11 and a sending module 12. Wherein,
a processing module 11, configured to obtain a first random access identifier, and select a first random access sequence set corresponding to the first random access identifier from a random access sequence set group, where the random access sequence set group includes L random access sequence sets, each random access sequence set includes J random access sequences, L and J are positive integers, and J is greater than or equal to 2;
a sending module 12, configured to send X first random access sequences to a network device, where X is a positive integer.
Wherein, each of the first random access sequences is a random access sequence obtained according to the first random access sequence set.
In one implementation, X is equal to 1, and the first random access sequence is: and J random access sequences in the first random access sequence set are added to generate a random access sequence. Wherein, the J random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences, and the transmission powers of the J random access sequences may be the same. In this implementation, the sending module 12 is specifically configured to map the first random access sequence on a first time-frequency resource and send the first random access sequence to the network device, where the first time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and 1 frequency domain resource allowing transmission of the first random access sequence.
In another implementation, X is equal to J, and each first random access sequence is: one random access sequence in the first set of random access sequences. A sending module, configured to map the X first random access sequences on a second time-frequency resource, where the second time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and X frequency domain resources allowing transmission of the first random access sequence.
In another implementation, the first set of random access sequences includes M subsets of random access sequences, each subset of random access sequences includes Y random access sequences, and M and Y are both positive integers; each first random access sequence is a random access sequence obtained according to a random access sequence subset.
In this implementation, X may be equal to M, and each first random access sequence is: y random access sequences in a subset of random access sequences are added to generate a random access sequence. Wherein, the Y random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences, and the transmission power of the Y random access sequences can be the same. The sending module 12 is specifically configured to map the X first random access sequences on a third time-frequency resource, where the third time-frequency resource includes: m time domain resources allowing the first random access sequence to be sent and 1 frequency domain resource allowing the first random access sequence to be sent; or, the third time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and M frequency domain resources allowing transmission of the first random access sequence. Alternatively, X may be equal to the product of Y and M, each first random access sequence being: one random access sequence of a subset of random access sequences. The sending module 12 is specifically configured to map the X first random access sequences on a fourth time-frequency resource and send the fourth time-frequency resource to the network device, where the fourth time-frequency resource includes: m time domain resources allowed to transmit the first random access sequence and Y frequency domain resources allowed to transmit the first random access sequence.
In another implementation manner, the first random access sequence set includes M random access sequence subsets, each random access sequence subset includes K random access sequence groups, each random access sequence group includes Q random access sequences, where M, K, and Q are positive integers; each first random access sequence is a random access sequence obtained according to a random access sequence group.
In this implementation, X may be equal to the product of M and K, and each first random access sequence is: and the Q random access sequences in one random access sequence group are added to generate a random access sequence. The Q random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences, and the transmission powers of the Q random access sequences may be the same. The sending module 12 is specifically configured to map the X first random access sequences on a fifth time-frequency resource, and send the fifth time-frequency resource to the network device, where the fifth time-frequency resource includes: m time domain resources allowing the first random access sequence to be transmitted and K frequency domain resources allowing the first random access sequence to be transmitted.
The terminal device provided in the embodiment of the present application may execute the actions on the terminal device side in the above method embodiments, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 6 is a schematic structural diagram of a network device according to an embodiment of the present application. As shown in fig. 6, the network device may include: a sending module 21, a receiving module 22 and a processing module 23. Wherein,
a sending module 21, configured to broadcast configuration information of a random access sequence set group, where the random access sequence set group includes L random access sequence sets, each random access sequence set includes J random access sequences, L and J are positive integers, and J is greater than or equal to 2;
a receiving module 22, configured to receive X first random access sequences sent by a terminal device;
the processing module 23 is configured to detect X first random access sequences, and determine random access identifiers corresponding to the X first random access sequences, where X is a positive integer.
Wherein, each of the first random access sequences is a random access sequence obtained according to the first random access sequence set.
In one implementation, X is equal to 1, and the first random access sequence is: and J random access sequences in the first random access sequence set are added to generate a random access sequence. Wherein, the J random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences, and the transmission powers of the J random access sequences may be the same.
In this implementation, the processing module 23 is specifically configured to detect X first random access sequences on a first time-frequency resource, where the first time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and 1 frequency domain resource allowing transmission of the first random access sequence. For example, the processing module 23 is specifically configured to screen at least one second random access sequence set from the random access sequence set group according to X first random access sequences received by the receiving module 22 on the first time-frequency resource, and determine a random access sequence set corresponding to the X first random access sequences according to the at least one second random access sequence set. Exemplarily, the processing module 23 is specifically configured to combine J random access sequences in each second random access sequence set, and use the second random access sequence set with the maximum receiving power and larger than a preset threshold as a random access sequence set corresponding to X first random sequences.
In one implementation, X is equal to J, and each first random access sequence is: one random access sequence in the first set of random access sequences. In this implementation, the processing module 23 is specifically configured to detect X first random access sequences on a second time-frequency resource, where the second time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and X frequency domain resources allowing transmission of the first random access sequence. For example, the processing module 23 is specifically configured to screen at least one third random access sequence set from the random access sequence set group according to X first random access sequences received by the receiving module 22 on X frequency domain resources, and determine a random access sequence set corresponding to the X first random access sequences according to the at least one third random access sequence set. Exemplarily, the processing module 23 is specifically configured to combine J random access sequences in each third random access sequence set, and use the third random access sequence set with the maximum receiving power and larger than a preset threshold as the random access sequence set corresponding to the first random sequence.
In another implementation, the first set of random access sequences includes M subsets of random access sequences, each subset of random access sequences includes Y random access sequences, and M and Y are both positive integers; each first random access sequence is a random access sequence obtained according to a random access sequence subset.
In this implementation, X may be equal to M, and each first random access sequence is: y random access sequences in a subset of random access sequences are added to generate a random access sequence. Wherein, the Y random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences, and the transmission power of the Y random access sequences can be the same. The processing module 23 is specifically configured to detect X first random access sequences on a third time-frequency resource, where the third time-frequency resource includes: m time domain resources allowing the first random access sequence to be sent and 1 frequency domain resource allowing the first random access sequence to be sent; or, the third time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and M frequency domain resources allowing transmission of the first random access sequence.
For example, when the third time-frequency resource includes M time-domain resources allowing to send the first random access sequence and 1 frequency-domain resource allowing to send the first random access sequence, the processing module 23 is specifically configured to screen at least X first random access sequence subsets from the random access sequence set group according to X first random access sequences received by the receiving module 22 on X time-domain resources; determining at least one second subset of random access sequences from the at least one first subset of random access sequences on each time domain resource; and determining a random access sequence set corresponding to the X first random sequences according to at least X second random access sequence subsets determined on the X time domain resources. Exemplarily, the processing module 23 is specifically configured to combine Y random access sequences in each first random access sequence subset on each time domain resource, and use the first random access sequence subset with the maximum receiving power and larger than a preset threshold as the second random access sequence subset. Correspondingly, the processing module 23 is specifically configured to combine at least X second random access sequence subsets according to X time domain resources, and use a random access sequence set with a maximum receiving power and greater than a preset threshold as a random access sequence set corresponding to the X first random sequences.
For example, X is equal to the product of Y and M, and each first random access sequence is: one random access sequence of a subset of random access sequences. The processing module 23 is specifically configured to detect X first random access sequences on a fourth time-frequency resource, where the fourth time-frequency resource includes: m time domain resources allowed to transmit the first random access sequence and Y frequency domain resources allowed to transmit the first random access sequence.
In another implementation manner, the first random access sequence set includes M random access sequence subsets, each random access sequence subset includes K random access sequence groups, each random access sequence group includes Q random access sequences, where M, K, and Q are positive integers; each first random access sequence is a random access sequence obtained according to a random access sequence group.
In this implementation, X is equal to the product of M and K, and each first random access sequence is: and the Q random access sequences in one random access sequence group are added to generate a random access sequence. The Q random access sequences are orthogonal ZC sequences or quasi-orthogonal ZC sequences, and the transmission powers of the Q random access sequences may be the same. The processing module 23 is specifically configured to detect X first random access sequences on a fifth time-frequency resource, where the fifth time-frequency resource includes: m time domain resources allowing the first random access sequence to be transmitted and K frequency domain resources allowing the first random access sequence to be transmitted.
Optionally, in each implementation manner described above, the processing module 23 is specifically configured to use the random access identifier of the random access sequence set corresponding to the X first random access sequences as the random access identifier corresponding to the X first random access sequences.
The network device provided in the embodiment of the present application may perform the actions on the network device side in the foregoing method embodiments, and the implementation principle and the technical effect are similar, which are not described herein again.
It should be noted that the above sending module may be a sender when actually implemented, and the receiving module may be a receiver when actually implemented. The processing module can be realized in the form of software called by the processing element; or may be implemented in hardware. For example, the processing module may be a processing element that is set up separately, or may be implemented by being integrated into a chip of the apparatus, or may be stored in a memory of the apparatus in the form of program code, and a function of the processing module may be called and executed by a processing element of the apparatus. In addition, all or part of the modules can be integrated together or can be independently realized. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
For example, the above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), etc. For another example, when some of the above modules are implemented in the form of a processing element scheduler code, the processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor that can call program code. As another example, these modules may be integrated together, implemented in the form of a system-on-a-chip (SOC).
Fig. 7 is a schematic structural diagram of another terminal device provided in the present application. As shown in fig. 7, the terminal device may include: a processor 31 (e.g., CPU), a memory 32, a transmitter 34; the transmitter 34 is coupled to the processor 31, and the processor 31 controls the transmitting action of the transmitter 34; the memory 32 may include a random-access memory (RAM) and may further include a non-volatile memory (NVM), such as at least one disk memory, and the memory 32 may store various instructions for performing various processing functions and implementing the method steps of the present application. Optionally, the terminal device related to the present application may further include: receiver 33, power supply 35, communication bus 36, and communication port 37. The receiver 33 and the transmitter 34 may be integrated in the transceiver of the terminal device or may be separate transceiving antennas on the terminal device. The communication bus 36 is used to implement communication connections between the elements. The communication port 37 is used for realizing connection and communication between the terminal device and other peripherals.
In the embodiment of the present application, the memory 32 is used for storing computer executable program codes, and the program codes comprise instructions; when the processor 31 executes the instruction, the instruction causes the processor 31 of the terminal device to execute the processing action of the terminal device in the foregoing method embodiment, cause the receiver 33 to execute the receiving action of the terminal device in the foregoing method embodiment, and cause the transmitter 34 to execute the transmitting action of the terminal device in the foregoing method embodiment, which has similar implementation principles and technical effects, and is not described again here.
Fig. 8 is a schematic structural diagram of another network device according to an embodiment of the present application. As shown in fig. 8, the network device may include: a processor 41 (e.g., CPU), a memory 42, a receiver 43, a transmitter 44; both the receiver 43 and the transmitter 44 are coupled to the processor 41, the processor 41 controlling the receiving action of the receiver 43, the processor 41 controlling the transmitting action of the transmitter 44; the memory 42 may comprise a high-speed RAM memory, and may also include a non-volatile memory NVM, such as at least one disk memory, in which various instructions may be stored for performing various processing functions and implementing the method steps of the present application. Optionally, the network device related to the present application may further include: a power supply 45, a communication bus 46, and a communication port 47. The receiver 43 and the transmitter 44 may be integrated in a transceiver of the network device or may be separate transceiving antennas on the network device. The communication bus 46 is used to enable communication connections between the elements. The communication port 47 is used for implementing connection communication between the network device and other peripherals.
In the present application, the memory 42 is used for storing computer executable program code, which includes instructions; when the processor 41 executes the instructions, the instructions cause the processor 41 of the network device to execute the processing actions of the network device in the foregoing method embodiment, cause the receiver 43 to execute the receiving actions of the network device in the foregoing method embodiment, and cause the transmitter 44 to execute the transmitting actions of the network device in the foregoing method embodiment, which implement similar principles and technical effects, and are not described herein again.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the present application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The term "plurality" herein means two or more. The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship; in the formula, the character "/" indicates that the preceding and following related objects are in a relationship of "division".
It is to be understood that the various numerical references referred to in the embodiments of the present application are merely for descriptive convenience and are not intended to limit the scope of the embodiments of the present application.
It should be understood that, in the embodiment of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiment of the present application.
Claims (28)
1. A random access method, comprising:
the terminal equipment acquires a first random access identifier;
the terminal equipment selects a first random access sequence set corresponding to a first random access identifier from a random access sequence set group, wherein the random access sequence set group comprises L random access sequence sets, each random access sequence set comprises J random access sequences, L and J are positive integers, and J is more than or equal to 2;
the terminal equipment sends X first random access sequences to network equipment, wherein X is a positive integer.
2. The method of claim 1, wherein each of the first random access sequences is a random access sequence derived from the first set of random access sequences.
3. The method according to claim 1 or 2, wherein X is equal to 1, and wherein the first random access sequence is: and J random access sequences in the first random access sequence set are added to generate a random access sequence.
4. The method of claim 3, wherein the terminal device sends X first random access sequences to the network device, and wherein the X first random access sequences comprise:
the terminal device maps the first random access sequence on a first time-frequency resource to send to the network device, where the first time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and 1 frequency domain resource allowing transmission of the first random access sequence.
5. The method according to claim 1 or 2, wherein X is equal to J, and each of the first random access sequences is: one random access sequence of the first set of random access sequences.
6. The method of claim 5, wherein the terminal device sends X first random access sequences to the network device, and wherein the X first random access sequences comprise:
the terminal device maps the X first random access sequences on a second time-frequency resource to send to the network device, wherein the second time-frequency resource comprises: 1 time domain resource allowing transmission of the first random access sequence and X frequency domain resources allowing transmission of the first random access sequence.
7. The method according to any of claims 1-6, wherein said first set of random access sequences comprises M subsets of random access sequences, each of said subsets of random access sequences comprising Y random access sequences, said M and said Y being positive integers;
each of the first random access sequences is a random access sequence obtained according to a random access sequence subset.
8. The method of claim 7, wherein X is equal to M, and wherein each of the first random access sequences is: y random access sequences in a subset of random access sequences are added to generate a random access sequence.
9. The method of claim 8, wherein the terminal device sends X first random access sequences to the network device, comprising:
the terminal device maps the X first random access sequences on a third time-frequency resource to send to the network device, where the third time-frequency resource includes: m time domain resources allowing the first random access sequence to be transmitted and 1 frequency domain resource allowing the first random access sequence to be transmitted; or, the third time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and M frequency domain resources allowing transmission of the first random access sequence.
10. The method of claim 7, wherein X is equal to a product of Y and M, and wherein each of the first random access sequences is: one random access sequence of a subset of random access sequences.
11. The method of claim 10, wherein the terminal device sends X first random access sequences to the network device, comprising:
the terminal device maps the X first random access sequences on a fourth time-frequency resource to send to the network device, where the fourth time-frequency resource includes: m time domain resources allowed to transmit the first random access sequence and Y frequency domain resources allowed to transmit the first random access sequence.
12. The method according to any of claims 1-11, wherein the first set of random access sequences comprises M subsets of random access sequences, each subset of random access sequences comprising K sets of random access sequences, each set of random access sequences comprising Q random access sequences, wherein M, K and Q are positive integers;
each first random access sequence is a random access sequence obtained according to a random access sequence group.
13. The method of claim 12, wherein X is a product of M and K, and wherein each of the first random access sequences is: and the Q random access sequences in one random access sequence group are added to generate a random access sequence.
14. The method of claim 13, wherein the terminal device sends X first random access sequences to the network device, comprising:
the terminal device maps the X first random access sequences on a fifth time-frequency resource to send to the network device, where the fifth time-frequency resource includes: m time domain resources allowed to transmit the first random access sequence and K frequency domain resources allowed to transmit the first random access sequence.
15. A random access method, comprising:
network equipment broadcasts configuration information of a random access sequence set group, wherein the random access sequence set group comprises L random access sequence sets, each random access sequence set comprises J random access sequences, L and J are positive integers, and J is more than or equal to 2;
the network equipment detects X first random access sequences sent by terminal equipment, wherein X is a positive integer;
and the network equipment determines the random access identification corresponding to the X first random access sequences.
16. The method of claim 15, wherein the network device detecting X first random access sequences sent by a terminal device comprises:
the network device detects the X first random access sequences on a first time-frequency resource, where the first time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and 1 frequency domain resource allowing transmission of the first random access sequence.
17. The method of claim 16, wherein the network device detects the X first random access sequences on a first time-frequency resource, comprising:
the network equipment screens out at least one second random access sequence set from the random access sequence set group according to the X first random access sequences received on the first time-frequency resource;
and the network equipment determines a random access sequence set corresponding to the X first random sequences according to the at least one second random access sequence set.
18. The method of claim 17, wherein the network device determines, according to the at least one second set of random access sequences, a set of random access sequences corresponding to the X first random sequences, including:
and the network equipment combines J random access sequences in each second random access sequence set, and takes the second random access sequence set with the maximum receiving power and larger than a preset threshold value as the random access sequence set corresponding to the X first random sequences.
19. The method according to any of claims 15-18, wherein the network device detecting X first random access sequences sent by a terminal device comprises:
the network device detects the X first random access sequences on a second time-frequency resource, where the second time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and X frequency domain resources allowing transmission of the first random access sequence.
20. The method of claim 19, wherein the network device detecting the first random access sequence on a second time-frequency resource comprises:
the network equipment screens out at least one third random access sequence set from the random access sequence set group according to the X first random access sequences received on the X frequency domain resources;
and the network equipment determines a random access sequence set corresponding to the X first random sequences according to the at least one third random access sequence set.
21. The method of claim 20, wherein the network device determines, according to the at least one third set of random access sequences, a set of random access sequences to which the X first random sequences correspond, including:
and the network equipment combines J random access sequences in each third random access sequence set, and takes the third random access sequence set with the maximum receiving power and larger than a preset threshold value as a random access sequence set corresponding to the first random sequence.
22. The method according to any of claims 15-21, wherein the network device detecting X first random access sequences sent by the terminal device comprises:
the network device detects the X first random access sequences on a third time-frequency resource, where the third time-frequency resource includes: m time domain resources allowing the first random access sequence to be transmitted and 1 frequency domain resource allowing the first random access sequence to be transmitted; or, the third time-frequency resource includes: 1 time domain resource allowing transmission of the first random access sequence and M frequency domain resources allowing transmission of the first random access sequence.
23. The method of claim 22, wherein when the third time-frequency resource comprises M time-domain resources allowing transmission of the first random access sequence and 1 frequency-domain resource allowing transmission of the first random access sequence, the network device detects the X first random access sequences on the third time-frequency resource, comprising:
the network equipment screens at least X first random access sequence subsets from the random access sequence set group according to the X first random access sequences received on the X time domain resources;
the network equipment determines at least one second random access sequence subset according to at least one first random access sequence subset on each time domain resource;
and the network equipment determines a random access sequence set corresponding to the X first random sequences according to at least X second random access sequence subsets determined on the X time domain resources.
24. The method of claim 23, wherein the network device determines at least one second subset of random access sequences from at least one first subset of random access sequences on each of the time domain resources, comprising:
and the network equipment combines Y random access sequences in each first random access sequence subset on each time domain resource, and takes the first random access sequence subset with the maximum receiving power and larger than a preset threshold value as a second random access sequence subset.
25. The method according to claim 23 or 24, wherein the network device determines, according to at least X second random access sequence subsets determined on the X time domain resources, a set of random access sequences to which the X first random sequences correspond, including:
and the network equipment combines the at least X second random access sequence subsets according to the X time domain resources, and takes a random access sequence set with the maximum receiving power and larger than a preset threshold value as a random access sequence set corresponding to the X first random sequences.
26. The method according to any of claims 17-18, 20-21, 23-25, wherein the determining, by the network device, the random access identities corresponding to the X first random access sequences comprises:
and the network equipment takes the random access identifier of the random access sequence set corresponding to the X first random access sequences as the random access identifier corresponding to the X first random access sequences.
27. A terminal device, characterized in that the terminal device comprises: a processor, a memory, a transmitter; the transmitter is coupled to the processor, and the processor controls the transmitting action of the transmitter;
wherein the memory is to store computer-executable program code, the program code comprising instructions; the instructions, when executed by the processor, cause the terminal device to perform the method of any of claims 1-14.
28. A network device, characterized in that the network device comprises: a processor, a memory, a receiver, a transmitter; the receiver is coupled to the processor, the processor controls the transmitting action of the transmitter, and the processor controls the receiving action of the receiver;
wherein the memory is to store computer-executable program code, the program code comprising instructions; the instructions, when executed by the processor, cause the network device to perform the method of any of claims 15-26.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810055552.0A CN110062473B (en) | 2018-01-19 | 2018-01-19 | Random access method, terminal equipment and network equipment |
PCT/CN2018/119624 WO2019141013A1 (en) | 2018-01-19 | 2018-12-06 | Random access method, apparatus, device, chip, storage medium, and program product |
PCT/CN2019/072373 WO2019141244A1 (en) | 2018-01-19 | 2019-01-18 | Random access method, apparatus and device, chip, storage medium, and program product |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810055552.0A CN110062473B (en) | 2018-01-19 | 2018-01-19 | Random access method, terminal equipment and network equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110062473A true CN110062473A (en) | 2019-07-26 |
CN110062473B CN110062473B (en) | 2023-02-24 |
Family
ID=67301306
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810055552.0A Active CN110062473B (en) | 2018-01-19 | 2018-01-19 | Random access method, terminal equipment and network equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110062473B (en) |
WO (2) | WO2019141013A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022160252A1 (en) * | 2021-01-29 | 2022-08-04 | 华为技术有限公司 | Information transmission method and apparatus |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090011769A1 (en) * | 2006-01-05 | 2009-01-08 | Sung-Jun Park | Transmitting Information in Mobile Communications System |
CN102469617A (en) * | 2010-11-19 | 2012-05-23 | 普天信息技术研究院有限公司 | Competition random access method |
US20120220325A1 (en) * | 2011-02-28 | 2012-08-30 | Samsung Electronics Co., Ltd. | Method for random access of machine to machine (m2m) terminals |
WO2016106496A1 (en) * | 2014-12-29 | 2016-07-07 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and devices for generating and detecting random access preambles |
WO2017005281A1 (en) * | 2015-07-03 | 2017-01-12 | Huawei Technologies Co., Ltd. | Device and method for transmitting and receiving emergency signals using a wireless communication network |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2269398B1 (en) * | 2008-04-28 | 2018-07-25 | LG Electronics Inc. | Random access channel preamble selection |
US9295083B2 (en) * | 2011-09-23 | 2016-03-22 | Lg Electronics Inc. | Method and apparatus for random-accessing in wireless communication system |
CN104349492B (en) * | 2013-07-24 | 2018-03-09 | 华为技术有限公司 | Accidental access method and device |
US20170099660A1 (en) * | 2015-10-01 | 2017-04-06 | Electronics And Telecommunications Research Institute | Method and apparatus for transmitting uplink data |
CN106961709B (en) * | 2016-01-11 | 2021-08-03 | 中兴通讯股份有限公司 | Method and device for generating access signal |
CN107026721B (en) * | 2016-01-29 | 2019-08-20 | 华为技术有限公司 | Method of sending and receiving, the apparatus and system of leader sequence |
CN107197529B (en) * | 2016-03-15 | 2021-01-12 | 华为技术有限公司 | Sequence signal sending method and terminal |
-
2018
- 2018-01-19 CN CN201810055552.0A patent/CN110062473B/en active Active
- 2018-12-06 WO PCT/CN2018/119624 patent/WO2019141013A1/en active Application Filing
-
2019
- 2019-01-18 WO PCT/CN2019/072373 patent/WO2019141244A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090011769A1 (en) * | 2006-01-05 | 2009-01-08 | Sung-Jun Park | Transmitting Information in Mobile Communications System |
US20120236810A1 (en) * | 2006-01-05 | 2012-09-20 | Lg Electronics Inc. | Allocating radio resources in mobile communications system |
CN102469617A (en) * | 2010-11-19 | 2012-05-23 | 普天信息技术研究院有限公司 | Competition random access method |
US20120220325A1 (en) * | 2011-02-28 | 2012-08-30 | Samsung Electronics Co., Ltd. | Method for random access of machine to machine (m2m) terminals |
WO2016106496A1 (en) * | 2014-12-29 | 2016-07-07 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and devices for generating and detecting random access preambles |
CN107113261A (en) * | 2014-12-29 | 2017-08-29 | 瑞典爱立信有限公司 | Method and apparatus for generating and detecting random access guiding |
WO2017005281A1 (en) * | 2015-07-03 | 2017-01-12 | Huawei Technologies Co., Ltd. | Device and method for transmitting and receiving emergency signals using a wireless communication network |
Non-Patent Citations (1)
Title |
---|
HUAWEI: "R5-176985 Introduction of Correct selection of RACH parameters / Random access preamble and PRACH resource explicitly signalled to the UE by RRC / Non-contention based random access procedure for high speed scenario in 7.1.2.1a", 《3GPP TSG-RAN5 MEETING #77》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022160252A1 (en) * | 2021-01-29 | 2022-08-04 | 华为技术有限公司 | Information transmission method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN110062473B (en) | 2023-02-24 |
WO2019141013A1 (en) | 2019-07-25 |
WO2019141244A1 (en) | 2019-07-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108988978B (en) | Scrambling code sequence generation method and device | |
US10819550B2 (en) | Signal sending method, network device, and terminal device | |
US8811309B2 (en) | Implicit resource allocation using shifted synchronization sequence | |
EP4044727A1 (en) | Method and apparatus for configuring bandwidth part in wireless communication system | |
CN108631816B (en) | Method and apparatus for transmitting data, and method and apparatus for receiving data | |
CN111133715B (en) | Method and device for transmitting random access preamble in TDD mode | |
EP4207818B1 (en) | Information transmission method, devices, and storage medium | |
CN108633104B (en) | Random access method, user equipment, base station and random access system | |
KR20240101775A (en) | Method and apparatus for transmitting synchronization signal for device to device communication in wireless communication system | |
US20240292464A1 (en) | Method and device for transmitting random access signal, and computer readable medium | |
CN116073967A (en) | Resource mapping method and device, terminal and network equipment | |
WO2020200056A1 (en) | Method and apparatus for generating demodulation reference signal | |
CN110062473B (en) | Random access method, terminal equipment and network equipment | |
CN111918404B (en) | Method for distributing resources, base station and terminal | |
CN108809579B (en) | Resource allocation method, device and system | |
WO2022002005A1 (en) | Sequence generation method and related device | |
EP3484220B1 (en) | Resource indication method and related device | |
CN106162816B (en) | Network discovery method, station and access point | |
CN106912055A (en) | A kind of method of information processing, terminal and base station | |
CN115915471A (en) | Random access method and device | |
CN109417819B (en) | Method for transmitting system information, network device, terminal device and storage medium | |
CN110972295B (en) | Communication method and device | |
US20240049146A1 (en) | Sounding reference signal (srs) enhancement for multi-transmission and reception point (trp) operation | |
WO2023143363A1 (en) | Communication method and apparatus | |
EP4369834A1 (en) | Random access method and apparatus based on network slicing, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |