CN110547034A - Data transmission method, equipment and system - Google Patents

Data transmission method, equipment and system Download PDF

Info

Publication number
CN110547034A
CN110547034A CN201780089928.3A CN201780089928A CN110547034A CN 110547034 A CN110547034 A CN 110547034A CN 201780089928 A CN201780089928 A CN 201780089928A CN 110547034 A CN110547034 A CN 110547034A
Authority
CN
China
Prior art keywords
message
terminal
physical layer
user data
access network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201780089928.3A
Other languages
Chinese (zh)
Other versions
CN110547034B (en
Inventor
李军
铁晓磊
花梦
金哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN110547034A publication Critical patent/CN110547034A/en
Application granted granted Critical
Publication of CN110547034B publication Critical patent/CN110547034B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]

Abstract

The embodiment of the application provides a data transmission method, equipment and a system, which are used for reducing data transmission delay. The method comprises the following steps: sending a first message to access network equipment, wherein the first message comprises a preamble sequence used by a terminal; receiving a second message sent by the access network equipment, wherein the second message comprises the preamble sequence confirmed by the access network equipment; responding to the second message, and sending a third message to the access network equipment, wherein the third message comprises the identification of the terminal; receiving a fourth message sent by the access network equipment, wherein the fourth message comprises competition resolving information used for indicating that the terminal is successfully accessed; wherein any one of the second message or the fourth message further includes physical layer downlink scheduling information or downlink user data of the terminal; or further receiving the physical layer downlink scheduling information of the terminal sent by the access network equipment after receiving the second message.

Description

Data transmission method, equipment and system Technical Field
The present application relates to the field of communications technologies, and in particular, to a data transmission method, device, and system.
Background
The Internet of things (IoT) is a Machine-Type Communications (MTC) -oriented network, and is mainly applied to the fields of intelligent meter reading, medical detection and monitoring, logistics detection, industrial detection and monitoring, automobile networking, intelligent communities, wearable devices and the like in the future. Due to the wide application scenarios, including outdoor to indoor, above ground to underground, etc., many special requirements are placed on the design of the internet of things, such as coverage enhancement, support of a large number of low-rate devices, very low cost, low energy consumption, etc.
To meet these special requirements, the Mobile Communication standardization organization third Generation Partnership Project (3 GPP) has passed a new research topic on Global System for Mobile Communication (GSM) or Enhanced Data Rate for GSM Evolution (EDGE) Radio Access Network (GSM/EDGE Radio Access Network, GERAN) #62 sessions to research a method for supporting an internet of things with extremely low complexity and low cost in a cellular Network, and has established a Narrow Band (NB) -IoT topic on Radio Access Network (RAN) #69 sessions.
In the current NB-IoT topic research, before an NB-IoT terminal is connected to a network, a Physical Random Access Channel (PRACH) is used to complete a Random access procedure, and normal data communication with the network can be performed only after the NB-IoT terminal enters a connected state. However, in the Release (Rel) -13 or 14 protocol, the NB-IoT terminal takes too long to complete the random access procedure, resulting in an increase in data transmission delay. Therefore, how to reduce the data transmission delay becomes a problem to be solved urgently by the Rel-15 protocol.
Disclosure of Invention
Embodiments of the present application provide a data transmission method, device, and system, which are used to reduce data transmission delay.
In order to achieve the above purpose, the embodiment of the present application adopts the following technical solutions:
in a first aspect, a data transmission method is provided, where the method includes: sending a first message to access network equipment, wherein the first message comprises a preamble sequence used by a terminal; receiving a second message sent by the access network equipment, wherein the second message comprises the preamble sequence confirmed by the access network equipment; responding to the second message, and sending a third message to the access network equipment, wherein the third message comprises the identification of the terminal; receiving a fourth message sent by the access network equipment, wherein the fourth message comprises competition resolving information used for indicating that the terminal is successfully accessed; wherein any one of the second message or the fourth message further includes physical layer downlink scheduling information or downlink user data of the terminal; or further receiving the physical layer downlink scheduling information of the terminal sent by the access network equipment after receiving the second message. Based on the scheme, at least part of user data transmission or scheduling can be performed in advance in the random access process, so that the data transmission delay can be reduced.
In one possible design, the second message further includes physical layer downlink scheduling information of the terminal; after receiving the second message, the method further comprises: and receiving the downlink user data sent by the access network equipment on the physical layer resource indicated by the physical layer downlink scheduling information. Based on the scheme, the downlink user data can be transmitted between the second message and the third message in the random access process, so that at least part of user data transmission or scheduling can be executed in advance in the random access process, and the data transmission delay can be reduced.
Optionally, the physical layer resource in the embodiment of the present application specifically refers to the number of subframes, the position of the subframe, the number of repetitions, a modulation and coding scheme MCS, and the like, which is not specifically limited in the embodiment of the present application.
In one possible design, after receiving the physical layer downlink scheduling information of the terminal, the method further includes: and receiving the downlink user data sent by the access network equipment on the physical layer resource indicated by the physical layer downlink scheduling information. Based on the scheme, the downlink user data can be transmitted between the second message and the third message in the random access process, so that at least part of user data transmission or scheduling can be executed in advance in the random access process, and the data transmission delay can be reduced.
Optionally, the second message further includes indication information for indicating that there is downlink user data transmission between the second message and the third message. In this way, after receiving the second message, the terminal continues to receive the physical layer downlink scheduling information and the downlink user data of the terminal between the second message and the third message.
Optionally, the downlink scheduling information of the physical layer is scrambled by the identifier of the terminal. Therefore, only the terminal can receive the physical layer downlink scheduling information, and other terminals cannot receive the physical layer downlink scheduling information, so that the power consumption of other terminals is reduced.
Optionally, in the possible design, the downlink user data is scrambled by the identifier of the terminal. Therefore, only the terminal can receive the downlink user data, and other terminals cannot receive the downlink user data, so that the power consumption of other terminals is reduced.
Optionally, in the above possible design, the identifier of the terminal includes a cell radio network temporary identifier C-RNTI of the terminal, or the identifier of the terminal includes an access stratum identifier mapped by a non-access stratum NAS identifier of the terminal.
In one possible design, the second message further includes downlink user data, and the fourth message further includes information indicating that the downlink user data belongs to the terminal. Based on the scheme, the downlink user data can be transmitted in the second message in the random access process, so that at least part of user data transmission or scheduling can be performed in advance in the random access process, and therefore, the data transmission delay can be reduced.
Optionally, in the possible design above, before sending the first message, the method further includes: and receiving a command which is sent by the access network equipment and indicates the preamble sequence. That is, the preamble sequence used by the terminal may be indicated to the terminal by the access network device. The access network equipment sends the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information only when detecting the preamble sequence, thereby reducing the probability of the access network equipment blindly sending the downlink user data.
In one possible design, the fourth message further includes physical layer downlink scheduling information of the terminal; after receiving the fourth message, the method further comprises: and receiving the downlink user data sent by the access network equipment on the physical layer resource indicated by the physical layer downlink scheduling information. Based on the scheme, the physical layer downlink scheduling information of the terminal can be transmitted in the fourth message in the random access process, and then the downlink user data is transmitted after the fourth message, so that at least part of user data transmission or scheduling can be performed in advance in the random access process, and therefore, the data transmission delay can be reduced.
In one possible design, the fourth message further includes downlink user data. Based on the scheme, the downlink user data can be transmitted in the fourth message in the random access process, so that at least part of user data transmission or scheduling can be performed in advance in the random access process, and therefore, the data transmission delay can be reduced.
In a second aspect, a data transmission method is provided, which includes: receiving a first message sent by a terminal, wherein the first message comprises a preamble sequence used by the terminal; sending a second message to the terminal in response to the first message, the second message comprising the preamble sequence acknowledged by the access network device; receiving a third message sent by the terminal, wherein the third message comprises an identifier of the terminal; responding to the third message, and sending a fourth message to the terminal, wherein the fourth message comprises competition resolving information used for indicating that the terminal is successfully accessed; wherein any one of the second message or the fourth message further includes physical layer downlink scheduling information or downlink user data of the terminal; or further sending the physical layer downlink scheduling information of the terminal sent by the terminal after sending the second message. Based on the scheme, at least part of user data transmission or scheduling can be performed in advance in the random access process, so that the data transmission delay can be reduced.
In one possible design, the second message further includes physical layer downlink scheduling information of the terminal; after sending the second message, the method further comprises: and transmitting the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information. Based on the scheme, the downlink user data can be transmitted between the second message and the third message in the random access process, so that at least part of user data transmission or scheduling can be executed in advance in the random access process, and the data transmission delay can be reduced.
Optionally, the physical layer resource in the embodiment of the present application specifically refers to the number of subframes, the position of the subframe, the number of repetitions, a modulation and coding scheme MCS, and the like, which is not specifically limited in the embodiment of the present application.
In one possible design, after sending the physical layer downlink scheduling information of the terminal, the method further includes: and transmitting the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information. Based on the scheme, the downlink user data can be transmitted between the second message and the third message in the random access process, so that at least part of user data transmission or scheduling can be executed in advance in the random access process, and the data transmission delay can be reduced.
Optionally, the second message further includes indication information for indicating that there is downlink user data transmission between the second message and the third message. In this way, after receiving the second message, the terminal continues to receive the physical layer downlink scheduling information and the downlink user data of the terminal between the second message and the third message.
Optionally, the downlink scheduling information of the physical layer is scrambled by the identifier of the terminal. Therefore, only the terminal can receive the physical layer downlink scheduling information, and other terminals cannot receive the physical layer downlink scheduling information, so that the power consumption of other terminals is reduced.
Optionally, in the possible design, the downlink user data is scrambled by the identifier of the terminal. Therefore, only the terminal can receive the downlink user data, and other terminals cannot receive the downlink user data, so that the power consumption of other terminals is reduced.
Optionally, in the above possible design, the identifier of the terminal includes a cell radio network temporary identifier C-RNTI of the terminal, or the identifier of the terminal includes an access stratum identifier mapped by a non-access stratum NAS identifier of the terminal.
In one possible design, the second message further includes downlink user data, and the fourth message further includes information indicating that the downlink user data belongs to the terminal. Based on the scheme, the downlink user data can be transmitted in the second message in the random access process, so that at least part of user data transmission or scheduling can be performed in advance in the random access process, and therefore, the data transmission delay can be reduced.
Optionally, in the possible design above, before receiving the first message, the method further includes: a command indicating the preamble sequence is transmitted to the terminal. That is, the preamble sequence used by the terminal may be indicated to the terminal by the access network device. The access network equipment sends the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information only when detecting the preamble sequence, thereby reducing the probability of the access network equipment blindly sending the downlink user data.
In one possible design, the fourth message further includes physical layer downlink scheduling information of the terminal; after sending the fourth message, the method further comprises: and transmitting the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information. Based on the scheme, the physical layer downlink scheduling information of the terminal can be transmitted in the fourth message in the random access process, and then the downlink user data is transmitted after the fourth message, so that at least part of user data transmission or scheduling can be performed in advance in the random access process, and therefore, the data transmission delay can be reduced.
In one possible design, the fourth message further includes downlink user data. Based on the scheme, the downlink user data can be transmitted in the fourth message in the random access process, so that at least part of user data transmission or scheduling can be performed in advance in the random access process, and therefore, the data transmission delay can be reduced.
In a third aspect, a terminal is provided, which includes: a transmitting module and a receiving module; a sending module, configured to send a first message to an access network device, where the first message includes a preamble sequence used by a terminal; a receiving module, configured to receive a second message sent by an access network device, where the second message includes the preamble sequence acknowledged by the access network device; a sending module, configured to send, in response to the second message, a third message to the access network device, where the third message includes an identifier of the terminal; the receiving module is further configured to receive a fourth message sent by the access network device, where the fourth message includes contention resolution information used to indicate that the terminal is successfully accessed; wherein any one of the second message or the fourth message further includes physical layer downlink scheduling information or downlink user data of the terminal; or, after receiving the second message, the receiving module further receives the physical layer downlink scheduling information of the terminal sent by the access network device. Based on the terminal, at least a part of user data transmission or scheduling can be performed in advance in the random access process, so that the data transmission delay can be reduced.
In one possible design, the second message further includes physical layer downlink scheduling information of the terminal; and the receiving module is further configured to receive, after receiving the second message, downlink user data sent by the access network device on the physical layer resource indicated by the physical layer downlink scheduling information. Based on the terminal, the downlink user data can be transmitted between the second message and the third message in the random access process, so that at least part of user data transmission or scheduling can be executed in advance in the random access process, and the data transmission delay can be reduced.
Optionally, the physical layer resource in the embodiment of the present application specifically refers to the number of subframes, the position of the subframe, the number of repetitions, a modulation and coding scheme MCS, and the like, which is not specifically limited in the embodiment of the present application.
In a possible design, the receiving module is further configured to receive, after receiving the physical layer downlink scheduling information of the terminal, downlink user data sent by the access network device on a physical layer resource indicated by the physical layer downlink scheduling information. Based on the terminal, the downlink user data can be transmitted between the second message and the third message in the random access process, so that at least part of user data transmission or scheduling can be executed in advance in the random access process, and the data transmission delay can be reduced.
Optionally, the second message further includes indication information for indicating that there is downlink user data transmission between the second message and the third message. In this way, after receiving the second message, the terminal continues to receive the physical layer downlink scheduling information and the downlink user data of the terminal between the second message and the third message.
Optionally, the downlink scheduling information of the physical layer is scrambled by the identifier of the terminal. Therefore, only the terminal can receive the physical layer downlink scheduling information, and other terminals cannot receive the physical layer downlink scheduling information, so that the power consumption of other terminals is reduced.
Optionally, in the possible design, the downlink user data is scrambled by the identifier of the terminal. Therefore, only the terminal can receive the downlink user data, and other terminals cannot receive the downlink user data, so that the power consumption of other terminals is reduced.
Optionally, in the above possible design, the identifier of the terminal includes a cell radio network temporary identifier C-RNTI of the terminal, or the identifier of the terminal includes an access stratum identifier mapped by a non-access stratum NAS identifier of the terminal.
In one possible design, the second message further includes downlink user data, and the fourth message further includes information indicating that the downlink user data belongs to the terminal. Based on the scheme, the downlink user data can be transmitted in the second message in the random access process, so that at least part of user data transmission or scheduling can be performed in advance in the random access process, and therefore, the data transmission delay can be reduced.
Optionally, in the possible design, the receiving module is further configured to receive, before the sending module sends the first message, a command indicating the preamble sequence sent by the access network device. That is, the preamble sequence used by the terminal may be indicated to the terminal by the access network device. The access network equipment sends the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information only when detecting the preamble sequence, thereby reducing the probability of the access network equipment blindly sending the downlink user data.
In one possible design, the fourth message further includes physical layer downlink scheduling information of the terminal; and the receiving module is further configured to receive, after receiving the fourth message, downlink user data sent by the access network device on the physical layer resource indicated by the physical layer downlink scheduling information. Based on the terminal, the physical layer downlink scheduling information of the terminal can be transmitted in the fourth message in the random access process, and then the downlink user data is transmitted after the fourth message, so that at least part of user data transmission or scheduling can be executed in advance in the random access process, and therefore, the data transmission delay can be reduced.
In one possible design, the fourth message further includes downlink user data. Based on the scheme, the downlink user data can be transmitted in the fourth message in the random access process, so that at least part of user data transmission or scheduling can be performed in advance in the random access process, and therefore, the data transmission delay can be reduced.
In a fourth aspect, an access network device is provided, which includes: the receiving module also comprises a sending module; a receiving module, configured to receive a first message sent by a terminal, where the first message includes a preamble sequence used by the terminal; a sending module, configured to send a second message to the terminal in response to the first message, where the second message includes the preamble sequence acknowledged by the access network device; the receiving module is further configured to receive a third message sent by the terminal, where the third message includes an identifier of the terminal; a sending module, configured to send, in response to the third message, a fourth message to the terminal, where the fourth message includes contention resolution information indicating that the terminal is successfully accessed; wherein any one of the second message or the fourth message further includes physical layer downlink scheduling information or downlink user data of the terminal; or, the sending module is further configured to send the physical layer downlink scheduling information of the terminal sent by the terminal after sending the second message. Based on the access network equipment, at least part of user data transmission or scheduling can be performed in advance in the random access process, so that the data transmission delay can be reduced.
In one possible design, the second message further includes physical layer downlink scheduling information of the terminal; and the sending module is further configured to send the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information after sending the second message. Based on the access network equipment, the downlink user data can be transmitted between the second message and the third message in the random access process, so that at least part of user data transmission or scheduling can be executed in advance in the random access process, and the data transmission delay can be reduced.
Optionally, the physical layer resource in the embodiment of the present application specifically refers to the number of subframes, the position of the subframe, the number of repetitions, a modulation and coding scheme MCS, and the like, which is not specifically limited in the embodiment of the present application.
In a possible design, the sending module is further configured to send, after sending the physical layer downlink scheduling information of the terminal, the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information. Based on the access network equipment, the downlink user data can be transmitted between the second message and the third message in the random access process, so that at least part of user data transmission or scheduling can be executed in advance in the random access process, and the data transmission delay can be reduced.
Optionally, the second message further includes indication information for indicating that there is downlink user data transmission between the second message and the third message. In this way, after receiving the second message, the terminal continues to receive the physical layer downlink scheduling information and the downlink user data of the terminal between the second message and the third message.
Optionally, the downlink scheduling information of the physical layer is scrambled by the identifier of the terminal. Therefore, only the terminal can receive the physical layer downlink scheduling information, and other terminals cannot receive the physical layer downlink scheduling information, so that the power consumption of other terminals is reduced.
Optionally, in the possible design, the downlink user data is scrambled by the identifier of the terminal. Therefore, only the terminal can receive the downlink user data, and other terminals cannot receive the downlink user data, so that the power consumption of other terminals is reduced.
Optionally, in the above possible design, the identifier of the terminal includes a cell radio network temporary identifier C-RNTI of the terminal, or the identifier of the terminal includes an access stratum identifier mapped by a non-access stratum NAS identifier of the terminal.
In one possible design, the second message further includes downlink user data, and the fourth message further includes information indicating that the downlink user data belongs to the terminal. Based on the scheme, the downlink user data can be transmitted in the second message in the random access process, so that at least part of user data transmission or scheduling can be performed in advance in the random access process, and therefore, the data transmission delay can be reduced.
Optionally, in the possible design, the sending module is further configured to send a command indicating the preamble sequence to the terminal before the receiving module receives the first message. That is, the preamble sequence used by the terminal may be indicated to the terminal by the access network device. The access network equipment sends the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information only when detecting the preamble sequence, thereby reducing the probability of the access network equipment blindly sending the downlink user data.
In one possible design, the fourth message further includes physical layer downlink scheduling information of the terminal; and the sending module is further configured to send the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information after sending the fourth message. Based on the scheme, the physical layer downlink scheduling information of the terminal can be transmitted in the fourth message in the random access process, and then the downlink user data is transmitted after the fourth message, so that at least part of user data transmission or scheduling can be performed in advance in the random access process, and therefore, the data transmission delay can be reduced.
In one possible design, the fourth message further includes downlink user data. Based on the scheme, the downlink user data can be transmitted in the fourth message in the random access process, so that at least part of user data transmission or scheduling can be performed in advance in the random access process, and therefore, the data transmission delay can be reduced.
In a fifth aspect, a data transmission method is provided, where the method includes: sending a first message to access network equipment, wherein the first message comprises a preamble sequence used by a terminal; receiving a second message sent by the access network equipment, wherein the second message comprises the leader sequence confirmed by the access network equipment and the physical layer uplink scheduling information of the terminal; responding to the second message, and sending a third message to the access network equipment, wherein the third message comprises the identification of the terminal; receiving a fourth message sent by the access network equipment, wherein the fourth message comprises competition resolving information used for indicating that the terminal is successfully accessed; wherein, the third message also includes uplink user data, and the uplink user data is sent on the physical layer resource indicated by the physical layer uplink scheduling information; or, after sending the third message, further sending uplink user data on the physical layer resource indicated by the physical layer uplink scheduling information. Based on the scheme, at least part of user data transmission or scheduling can be performed in advance in the random access process, so that the data transmission delay can be reduced.
In a sixth aspect, a data transmission method is provided, which includes: receiving a first message sent by a terminal, wherein the first message comprises a preamble sequence used by the terminal; responding to the first message, and sending a second message to the terminal, wherein the second message comprises the leader sequence confirmed by the access network equipment and the physical layer uplink scheduling information of the terminal; receiving a third message sent by the terminal, wherein the third message comprises an identifier of the terminal; responding to the third message, and sending a fourth message to the terminal, wherein the fourth message comprises competition resolving information used for indicating the terminal to access successfully; wherein, the third message also includes uplink user data, and the uplink user data is sent on the physical layer resource indicated by the physical layer uplink scheduling information; or, after receiving the third message, further receiving uplink user data on the physical layer resource indicated by the physical layer uplink scheduling information. Based on the scheme, at least part of user data transmission or scheduling can be performed in advance in the random access process, so that the data transmission delay can be reduced.
In a seventh aspect, a terminal is provided, including: a transmitting module and a receiving module; a sending module, configured to send a first message to an access network device, where the first message includes a preamble sequence used by a terminal; a receiving module, configured to receive a second message sent by an access network device, where the second message includes the preamble sequence confirmed by the access network device and physical layer uplink scheduling information of the terminal; a sending module, configured to send, in response to the second message, a third message to the access network device, where the third message includes an identifier of the terminal; the receiving module is further configured to receive a fourth message sent by the access network device, where the fourth message includes contention resolution information used to indicate that the terminal is successfully accessed; wherein, the third message also includes uplink user data, and the uplink user data is sent on the physical layer resource indicated by the physical layer uplink scheduling information; or, the sending module is further configured to send the uplink user data on the physical layer resource indicated by the physical layer uplink scheduling information after sending the third message. Based on the terminal, at least a part of user data transmission or scheduling can be performed in advance in the random access process, so that the data transmission delay can be reduced.
In an eighth aspect, an access network device is provided, which includes: the device comprises a receiving module and a sending module; a receiving module, configured to receive a first message sent by a terminal, where the first message includes a preamble sequence used by the terminal; a sending module, configured to send a second message to the terminal in response to the first message, where the second message includes the preamble sequence confirmed by the access network device and physical layer uplink scheduling information of the terminal; the receiving module is further used for receiving a third message sent by the terminal, wherein the third message comprises the identifier of the terminal; a sending module, configured to send, in response to the third message, a fourth message to the terminal, where the fourth message includes contention resolution information indicating that the terminal access is successful; wherein, the third message also includes uplink user data, and the uplink user data is sent on the physical layer resource indicated by the physical layer uplink scheduling information; or the receiving module is further configured to further receive uplink user data on the physical layer resource indicated by the physical layer uplink scheduling information after receiving the third message. Based on the access network equipment, at least part of user data transmission or scheduling can be performed in advance in the random access process, so that the data transmission delay can be reduced.
With reference to any one of the fifth aspect to the eighth aspect, in a possible design, the uplink user data is scrambled by a temporary cell radio network temporary identity C-RNTI of the terminal.
With reference to any one of the fifth aspect to the eighth aspect, in a possible design, the first message further includes first indication information, where the first indication information indicates that the terminal supports uplink user data transmission in a random access process or indicates a size of uplink user data to be transmitted; wherein the physical layer uplink scheduling information is determined according to the first indication information. That is, the number of bits occupied by the physical layer uplink scheduling information (UL Grant) in the embodiment of the present application is variable.
With reference to any one of the fifth aspect to the eighth aspect, in a possible design, the indicating information indicates that the terminal supports uplink user data transmission in a random access procedure, and the indicating information includes: the first indication message is determined by the location of the random access resource used by the first message, where the location of the random access resource used by the first message is used to indicate that the terminal supports uplink user data transmission in a random access process.
With reference to any one of the fifth aspect to the eighth aspect, in a possible design, the indicating information indicates a size of uplink user data to be transmitted, and includes: the first indication message is determined by the location of the random access resource used by the first message, where the location of the random access resource used by the first message is used to indicate that the size of the uplink user data exceeds a preset threshold.
With reference to any of the fifth aspect to the eighth aspect, in one possible design, the physical layer uplink scheduling information includes a first physical layer resource and a second physical layer resource; the first physical layer resource is used for sending the uplink user data, and the second physical layer resource is used for sending other information except the uplink user data in the third message.
With reference to any one of the fifth aspect to the eighth aspect, in a possible design, the second message further includes second indication information, where the second indication information is used to indicate that the first physical layer resource and the second physical layer resource are discontinuous. Therefore, when the terminal sending the uplink user data in the random access process collides with the terminal not sending the uplink user data in the random access process, the probability that the terminal not sending the uplink user data is correctly received by the access network equipment is not reduced, and the performance of the terminal not sending the uplink user data is not influenced.
With reference to any one of the fifth aspect to the eighth aspect, in a possible design, the third message further includes third indication information, and the third indication information indicates that there is uplink user data transmission between the third message and the fourth message. In this way, after receiving the third message, the access network device continues to receive the terminal uplink user data between the third message and the fourth message.
In a ninth aspect, an embodiment of the present application provides a terminal, including: a processor, a memory, and a bus; the memory is used for storing computer execution instructions, the processor is connected with the memory through the bus, and when the terminal runs, the processor executes the computer execution instructions stored in the memory, so that the terminal executes the data transmission method according to any one of the first aspect or the fifth aspect.
In a tenth aspect, embodiments of the present application provide a computer-readable storage medium, which stores instructions that, when executed on a computer, enable the computer to perform the data transmission method of any one of the first aspect or the fifth aspect.
In an eleventh aspect, embodiments of the present application provide a computer program product containing instructions, which when run on a computer, enable the computer to perform the data transmission method of any one of the first aspect or the fifth aspect.
For technical effects brought by any one of the design manners of the ninth aspect to the eleventh aspect, reference may be made to the technical effects brought by different design manners of the first aspect or the fifth aspect, and details are not repeated here.
In a twelfth aspect, an embodiment of the present application provides an access network device, including: a processor, a memory, and a bus; the memory is used for storing computer execution instructions, the processor is connected with the memory through the bus, and when the access network device runs, the processor executes the computer execution instructions stored by the memory, so that the access network device executes the data transmission method according to any one of the second aspect or the sixth aspect.
In a thirteenth aspect, the present application provides a computer-readable storage medium, which stores instructions that, when executed on a computer, enable the computer to execute the data transmission method of any one of the second aspect and the sixth aspect.
In a fourteenth aspect, embodiments of the present application provide a computer program product containing instructions, which when run on a computer, enable the computer to perform the data transmission method of any one of the second aspect or the sixth aspect.
For technical effects brought by any one of the design manners in the twelfth aspect to the fourteenth aspect, reference may be made to technical effects brought by different design manners in the second aspect or the sixth aspect, and details are not repeated here.
In a fifteenth aspect, an embodiment of the present application provides a data transmission system, where the data transmission system includes a terminal as described in the third aspect and an access network device as described in the fourth aspect; alternatively, the data transmission system comprises the terminal according to the seventh aspect and the access network device according to the eighth aspect; alternatively, the data transmission system comprises a terminal as described in the above ninth aspect and an access network device as described in the above twelfth aspect.
These and other aspects of the present application will be more readily apparent from the following description of the embodiments.
Drawings
Fig. 1 is a schematic architecture diagram of a data transmission system according to an embodiment of the present application;
fig. 2 is a schematic hardware structure diagram of an access network device 20 and a terminal 30 according to an embodiment of the present application;
fig. 3 is a first flowchart of a data transmission method according to an embodiment of the present application;
fig. 4 is a first schematic diagram illustrating a message format and transmission of a second message according to an embodiment of the present application;
fig. 5 is a schematic flow chart of a data transmission method according to an embodiment of the present application;
fig. 6 is a schematic flow chart of a data transmission method according to an embodiment of the present application;
fig. 7 is a second schematic diagram of a message format and transmission of a second message according to an embodiment of the present application;
fig. 8 is a fourth schematic flowchart of a data transmission method according to an embodiment of the present application;
fig. 9 is a fifth flowchart of a data transmission method according to an embodiment of the present application;
fig. 10 is a sixth schematic flowchart of a data transmission method according to an embodiment of the present application;
fig. 11 is a first schematic diagram illustrating a message format and transmission of a third message according to an embodiment of the present application;
fig. 12 is a seventh flowchart of a data transmission method according to an embodiment of the present application;
fig. 13 is a schematic grouping diagram of random access resources according to an embodiment of the present application;
fig. 14 is a second schematic diagram of a message format and transmission of a third message according to an embodiment of the present application;
fig. 15 is a schematic diagram illustrating transmission of a third message and uplink user data according to an embodiment of the present application;
fig. 16 is a first schematic structural diagram of a terminal according to an embodiment of the present application;
fig. 17 is a schematic structural diagram of a terminal according to an embodiment of the present application;
fig. 18 is a first schematic structural diagram of an access network device according to an embodiment of the present application;
fig. 19 is a schematic structural diagram of an access network device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. "plurality" means two or more than two unless otherwise specified. In addition, for the convenience of clearly describing the technical solutions of the embodiments of the present application, in the embodiments of the present application, the words "first", "second", and the like are used to distinguish the same items or similar items with basically the same functions and actions, and those skilled in the art can understand that the words "first", "second", and the like do not limit the quantity and execution order.
The network architecture and the service scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided in the embodiment of the present application, and as a person of ordinary skill in the art knows that along with the evolution of the network architecture and the appearance of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems.
Fig. 1 shows a data transmission system 10 according to an embodiment of the present application. The data transmission system 10 includes an access network device 20 and one or more terminals 30 coupled to the access device 20.
Wherein the access network device 20 may be a device capable of communicating with the terminal 30. For example, the access network device 20 may be a base station, a relay station, an access point, or the like. The base station may be a Base Transceiver Station (BTS) in a global system for mobile communication (GSM) or Code Division Multiple Access (CDMA) network, may also be an NB (nodeb) in a Wideband Code Division Multiple Access (WCDMA), may also be an eNB or enodeb (evolved nodeb) in a Long Term Evolution (LTE), or may be an eNB in an IoT or NB-IoT, which is not particularly limited in this embodiment. Of course, the access Network device 20 may also be a Network device in other networks, for example, a Network device in a fifth generation (5th generation, 5G) Mobile communication Network or a Public Land Mobile Network (PLMN) of a future evolution, which is not specifically limited in this embodiment of the present invention
The terminal 30 may be a User Equipment (UE), an access terminal, a terminal unit, a terminal station, a mobile station, a remote terminal, a mobile device, a wireless communication device, a terminal agent, or a terminal device, etc. The access terminal may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device with wireless communication function, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device, a wearable device, a terminal in a future 5G network or a terminal in a future evolved PLMN network, and the like, and this is not particularly limited in this embodiment of the present application.
Fig. 2 is a schematic diagram of a hardware structure of an access network device 20 and a terminal 30 according to an embodiment of the present application.
The terminal 30 comprises at least one processor 301, at least one memory 302, at least one transceiver 303. Optionally, the terminal 30 may also include an output device 304 and an input device 305.
The processor 301, the memory 302 and the transceiver 303 are connected by a bus. The processor 301 may be a general-purpose Central Processing Unit (CPU), a microprocessor, an Application-Specific Integrated Circuit (ASIC), or one or more ics for controlling the execution of programs in accordance with the present invention. The processor 301 may also include multiple CPUs, and the processor 301 may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, or processing cores that process data (e.g., computer program instructions).
The Memory 302 may be a Read-Only Memory (ROM) or other type of static storage device that can store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that can store information and instructions, an Electrically Erasable Programmable Read-Only Memory (EEPROM), a Compact Disc Read-Only Memory (CD-ROM) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to such. The memory 302 may be a separate device and connected to the processor 301 through a bus. The memory 302 may also be integrated with the processor 301. The memory 302 is used for storing application program codes for executing the scheme of the application, and the processor 301 controls the execution. The processor 301 is configured to execute the computer program code stored in the memory 302, thereby implementing the method for data transmission described in the embodiments of the present application.
The transceiver 303 may use any transceiver or other communication Network for communicating with other devices or communication Networks, such as ethernet, Radio Access Network (RAN), Wireless Local Area Network (WLAN), etc. The transceiver 303 includes a transmitter Tx and a receiver Rx.
The output device 304 is in communication with the processor 301 and may display information in a variety of ways. For example, the output device 304 may be a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) Display device, a Cathode Ray Tube (CRT) Display device, a projector (projector), or the like. The input device 305 is in communication with the processor 301 and may accept user input in a variety of ways. For example, the input device 305 may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
The access network equipment 20 comprises at least one processor 201, at least one memory 202, at least one transceiver 203 and at least one network interface 204. The processor 201, memory 202, transceiver 203 and network interface 204 are connected by a bus. The network interface 204 is configured to connect with a core network device through a link (e.g., an S1 interface), or connect with a network interface of another access network device through a wired or wireless link (not shown in the figure), which is not specifically limited in this embodiment of the application. In addition, the description of the processor 201, the memory 202 and the transceiver 203 may refer to the description of the processor 301, the memory 302 and the transceiver 303 in the terminal 30, and will not be repeated herein.
The following will describe the data transmission method provided in the embodiment of the present application, by taking the application of the data transmission system 10 shown in fig. 1 in NB-IoT as an example, in conjunction with the access network device 20 and the terminal 30 shown in fig. 2.
First, three typical application scenarios of NB-IoT random access procedure are given, which are respectively as follows:
in a first scenario, when the access network device has data to send to a terminal, or after the access network device sends data to a terminal, the access network device does not receive feedback of the terminal, the access network device sends a Narrowband Physical Downlink Control Channel (NPDCCH) command to the terminal, and the NPDCCH command carries a Downlink Control Information (DCI) for allowing the terminal to perform random access. The DCI is scrambled using a unique identity of the terminal, i.e., a Cell radio network temporary identifier (C-RNTI), so that only the terminal can detect the NPDCCH command.
In a second scenario, when the terminal receives a Paging message sent to the terminal by the access network device, it is known that the access network device will have data to send to the terminal, and therefore random access is performed.
And in a third scenario, when the terminal has data to be sent to the access network equipment or the terminal is just started and needs to be connected with the access network, random access is needed.
That is, there is downlink user data to be transmitted in the scenario one and the scenario two, and there is uplink user data to be transmitted in the scenario three.
Next, a method for uplink user data transmission provided in the embodiment of the present application will be described with reference to fig. 3 to 9.
As shown in fig. 3, a data transmission method provided in this embodiment of the present application, taking interaction between an access network device and a terminal as an example, includes the following steps S301 to S310:
s301, the terminal sends a first message to the access network equipment, wherein the first message comprises a preamble sequence used by the terminal.
The resources occupied by the leader sequence are randomly selected by the terminal or indicated by the access network equipment. If multiple terminals transmit the same preamble sequence on the same resource, collision may occur, which requires a subsequent contention scheme.
S302, the access network equipment receives a first message sent by the terminal.
S303, in response to the first message, the access network device sends a second message to the terminal, where the second message includes a preamble sequence used by the terminal and physical layer downlink scheduling information of the terminal, which are confirmed by the access network device.
The message format of the second message is as shown in fig. 4, and includes a Media Access Control (MAC) header, n Random Access Responses (RARs) and padding (padding) bits, where the n RARs may be, for example, RAR1, RAR2, … …, and RARn.
The MAC header includes n Random Access Preamble Index (RAPID) sub-headers corresponding to the n RARs one to one, and the n RAPID sub-headers may be, for example, a RAPID sub-header 1, a RAPID sub-header 2, … …, and a RAPID sub-header n. The RAPID subheader is used for indicating the preamble sequence detected by the access network device.
The RAR includes information such as a timing alignment command, an initial uplink resource (UL grant) for which transmission is permitted by the third message, and a Temporary Cell Radio Network Temporary Identifier (C-RNTI). The timing alignment instruction is used for uplink synchronization between different terminals and access network equipment.
The second message in this embodiment of the application includes a preamble sequence used by the terminal and physical layer downlink scheduling information of the terminal, which are confirmed by the access network device, so that the MAC header of the second message shown in fig. 4 includes a RAPID subheader used for indicating the preamble sequence used by the terminal, and the n RARs include RARs corresponding to the first message. Physical layer DownLink (DL) scheduling (grant) information may be padded in the MAC header, as shown in fig. 4. Optionally, the physical layer downlink scheduling information may also be filled in the padding bits or the RAR corresponding to the preamble sequence of the terminal, which is not specifically limited in this embodiment of the present application. If the physical layer downlink scheduling information is placed in an MAC header or a padding bit, the terminals with the same RA-RNTI can receive the downlink user data; if the physical layer downlink scheduling information is placed in the RAR corresponding to the preamble sequence of the terminal, only if the RA-RNTI is the same and the terminal that sends the preamble sequence used by the terminal can receive the physical layer downlink scheduling information.
In addition, a transmission schematic of the second message is also given in fig. 4. As shown in fig. 4, the MAC layer of the access network device transmits a MAC Protocol Data Unit (PDU) carrying the second message to a Physical layer of the access network device, the Physical layer of the access network device fills the MAC PDU into a transmission block of the Physical layer, and the MAC PDU is carried on a Narrowband Physical Downlink Shared Channel (NPDSCH) and transmitted through processing such as Channel coding and modulation of the Physical layer. Meanwhile, the access network device also sends Downlink Control Information (DCI) to the terminal, where the DCI is used to schedule the NPDSCH. As shown in fig. 4, the DCI bearer is transmitted on NPDCCH. In order to identify that the RAR carried by the NPDSCH carried by the DCI scheduled by the NPDCCH is a reply to the preamble sequence transmitted on which time resource and frequency resource, the Access Network device calculates a scrambling sequence using a Random Access Radio Network Temporary Identifier (RA-RNTI), scrambles the NPDCCH, and the RA-RNTI is obtained by the Access Network device according to a PRACH combination formula (1) of the preamble sequence detected by the bearer:
RA-RNTI ═ 1+ floor (SFN _ id/4) equation (1)
Where SFN _ id is an index of the first radio frequency frame specifying PRACH resource, floor () represents a downward integer. As can be seen from formula (1), if the preamble sequences sent by different terminals use the same time resource, the RA-RNTIs are also the same, and the corresponding NPDSCH for carrying RAR is scheduled by the same DCI of NPDCCH, and RAR is transmitted on the same NPDSCH, as shown in fig. 4.
It should be noted that fig. 4 is only a transmission diagram of the second message. Of course, when the MAC layer data is particularly large, if the transmission in the NPDCCH + NPDSCH is incomplete, a plurality of NPDCCHs + NPDSCH may be needed for transmission, which is not specifically limited in the embodiment of the present application.
S304, the access network equipment sends the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information.
The physical layer resource in the embodiment of the present application specifically refers to the number of subframes, the position of the subframe, the number of repetitions, a Modulation and Coding Scheme (MCS), and the like, and this is not specifically limited in the embodiment of the present application.
Optionally, the downlink user data in step S304 is scrambled by the identifier of the terminal.
It should be noted that, since data is usually carried on the NPDSCH for transmission, the downlink user data is scrambled, and actually, the NPDSCH carrying the downlink user data is scrambled, which is described in a unified manner herein and will not be described in detail below.
In the first scenario, at this time, the access network device knows the unique identity C-RNTI of the terminal, and therefore the identity of the terminal that scrambles the downlink user data is the C-RNTI of the terminal. In this case, only the terminal can receive the downlink user data, and other terminals cannot receive the downlink user data.
In the second scenario, at this time, the Access network device only knows the Non Access Stratum (NAS) identifier of the paged terminal carried in the paging message, but does not know the Access Stratum identifier of the terminal in the physical layer, and therefore the Access network device does not know which sequence is used to scramble the downlink user data. If a common RNTI (e.g., Paging-RNTI) is used for scrambling, terminals that do not want to receive the downlink user data will receive the downlink user data, which results in a large amount of power consumption. Therefore, in the embodiment of the present application, the NAS identifier of the terminal is mapped to the access stratum identifier of the terminal through a certain rule. For example, the mapping rule may be: the last two bits "00" of the NAS identity of the terminal correspond to the access stratum identity 0, "01" corresponds to the access stratum identity 1, "10" corresponds to the access stratum identity 2, and "11" corresponds to the access stratum identity 3. Thus, the access network equipment can scramble the downlink user data by using the access layer identification, the paged terminal also decodes the downlink user data by using the corresponding sequence according to the mapping rule, and can receive the downlink user data, and other terminals can not receive the downlink user data, thereby reducing the power consumption of other terminals. The NAS identifier in this embodiment may specifically include a core network identifier, where the core network identifier may be, for example, an International Mobile Subscriber Identity (IMSI) or a system architecture evolution temporary Mobile Subscriber Identity (S-temporary Mobile Subscriber Identity, S-TMSI), and this is not specifically limited in this embodiment of the present application.
It should be noted that the mapping rule in the foregoing example is only one mapping rule provided schematically in the embodiment of the present application, and of course, the access network device may also map the NAS identifier of the terminal to the access stratum identifier of the terminal according to other mapping rules, which is not specifically limited in the embodiment of the present application.
S305, the terminal receives a second message sent by the access network equipment.
Specifically, the terminal calculates an RA-RNTI according to the time-frequency resources occupied by the preamble sequence. After the terminal sends the leader sequence, the terminal uses RA-RNTI to blindly check whether DCI exists in an RAR window, if the terminal detects that the DCI exists, the terminal receives an NPDSCH channel according to the DCI, thereby obtaining a second message; if the terminal does not detect the DCI, the terminal indicates that the second message is not received. The blind detection is performed in a Common Search Space (CSS) with a frequency domain of 180kHz, and resources of the common search space are notified to the terminal through a System Information Block Narrow-band (SIB-NB) Block.
S306, the terminal receives the downlink user data sent by the access network device on the physical layer resource indicated by the physical layer downlink scheduling information.
In this embodiment, the transmission deadline of the downlink user data does not exceed the sending time of the third message, which is described herein in a unified manner and is not described in detail below.
S307, responding to the second message, the terminal sends a third message to the access network equipment, wherein the third message comprises the identifier of the terminal.
Specifically, after the terminal successfully receives the RAR of itself in the RAR window, the terminal sends a third message in the random access process, such as a Radio Resource Control (RRC) link request or tracking area update, to the access network device through the NPUSCH in a certain subframe after receiving the RAR. And the third message is scrambled according to the temporary C-RNTI contained in the RAR and contains the identifier of the terminal in the cell for contention resolution. The identifier of the terminal included in the third message is not specifically limited in this embodiment of the application. Exemplarily, in the first scenario, the identifier of the terminal included in the third message is a C-RNTI of the terminal; in the second scenario, the identifier of the terminal included in the third message is a C-RNTI or an S-TMSI of the terminal, which is not specifically limited in this embodiment of the present application.
S308, the access network equipment receives a third message sent by the terminal.
As shown in step 301, in the contention random access procedure, a plurality of terminals may transmit the same preamble sequence on the same resource. In this case, different terminals may receive the same RAR to obtain the same temporary C-RNTI, and therefore, the third message is sent on the same time resource and frequency resource according to the same temporary C-RNTI, thereby causing a collision of the third message transmission, if the access network device cannot successfully decode the third message, the terminal needs to retransmit the third message, and when the terminal reaches the maximum retransmission number, a new random access process may be started. If the access network device can successfully decode the third message, step 309 is performed.
S309, in response to the third message, the access network device sends a fourth message to the terminal, where the fourth message includes contention resolution information for indicating that the terminal is successfully accessed.
And S310, the terminal receives a fourth message sent by the access network equipment.
Optionally, as shown in fig. 3, before step S301, steps S311 and S312 may be further included:
s311, the access network device sends a command indicating a preamble sequence used by the terminal to the terminal.
And S312, the terminal receives the preamble sequence which is sent by the access network equipment and indicates the terminal to use.
That is, the preamble sequence used by the terminal in step S301 may be indicated to the terminal by the access network device. The access network device executes step S304 only when detecting the preamble sequence, that is, the access network device sends the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information, so that the probability that the access network device blindly sends the downlink user data is reduced. The blind sending in this embodiment refers to sending downlink user data to the terminal regardless of whether the access network device detects the preamble sequence of the terminal, which is described herein in a unified manner and is not described in detail below.
For example, in the scenario one described above, the command indicating the preamble sequence used by the terminal is included in the NPDCCH command, and since the NPDCCH command is scrambled by using the C-RNTI of the terminal, only the terminal can receive the command indicating the preamble sequence used by the terminal. And then the terminal uses the preamble sequence to perform random access, and the access network device only detects the preamble sequence and then executes step S304, that is, the downlink user data is sent on the physical layer resource indicated by the physical layer downlink scheduling information, so that the probability that the access network device blindly sends the downlink user data is reduced.
For example, in the second scenario, the command indicating the preamble sequence used by the terminal is contained in the paging message, although the paging message is not scrambled by using the identifier of the terminal, the command indicating the preamble sequence used by the terminal may be received by other terminals, and further the preamble sequence used by the terminal may be used by other terminals, the access network device only detects the preamble sequence and then executes step S304, that is, the access network device sends the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information, and also reduces the probability that the access network device blindly sends the downlink user data.
The data transmission method provided by the embodiment of the application can transmit downlink user data between the second message and the third message in the random access process, so that at least part of user data transmission or scheduling can be performed in advance in the random access process, and thus, the data transmission delay can be reduced.
The actions of the terminal in S312, S301, S305, S306, S307 and S310 may be executed by the processor 301 of the terminal 30 shown in fig. 2 calling the computer program code stored in the memory 302, which is not limited in this embodiment of the present application.
The actions of the access network device in S311, S302, S303, S304, S308, and S309 may be executed by the processor 201 in the access network device 20 shown in fig. 2 calling the computer program code stored in the memory 202, which is not limited in this embodiment of the present application.
Optionally, as shown in fig. 5, taking the interaction between the access network device and a terminal as an example, the data transmission method provided in the embodiment of the present application includes the following steps S501 to S510:
S501-S502, and S301-S302, refer to the embodiment shown in fig. 3, and are not described herein again.
S503, in response to the first message, the access network device sends a second message to the terminal, where the second message includes a preamble sequence used by the terminal and confirmed by the access network device.
Fig. 4 may be referred to for a message format of the second message and a transmission schematic of the second message, which are not described herein again. The difference is that the second message shown in fig. 4 includes the physical layer downlink scheduling information of the terminal, and the second message in this embodiment does not include the physical layer downlink scheduling information of the terminal.
S504, the access network equipment sends the physical layer downlink scheduling information of the terminal to the terminal.
Optionally, the physical layer downlink scheduling information in step S504 is scrambled by the identifier of the terminal.
It should be noted that, because the physical layer downlink scheduling information is usually carried on the NPDCCH for transmission, the physical layer downlink scheduling information is scrambled, and actually, the NPDCCH carrying the physical layer downlink scheduling information is scrambled, which is described herein in a unified manner and is not described in detail below.
In the first scenario, at this time, the access network device knows the unique identity C-RNTI of the terminal, and therefore the identity of the terminal that scrambles the physical layer downlink scheduling information is the C-RNTI of the terminal. In this case, only the terminal can receive the physical layer downlink scheduling information, and other terminals cannot receive the physical layer downlink scheduling information.
In the second scenario, at this time, the access network device only knows the NAS identifier of the paged terminal carried in the paging message, but does not know the access stratum identifier of the terminal in the physical layer, and therefore the access network device does not know which sequence is used to scramble the physical layer downlink scheduling information. If a common RNTI (e.g., Paging-RNTI) is used for scrambling, terminals that do not want to receive the physical layer downlink scheduling information will receive the physical layer downlink scheduling information, which results in a large amount of waste of power consumption. Therefore, in the embodiment of the present application, the NAS identifier of the terminal is mapped to the access stratum identifier of the terminal through a certain rule. For example, the mapping rule may be: the last two bits "00" of the NAS identity of the terminal correspond to the access stratum identity 0, "01" corresponds to the access stratum identity 1, "10" corresponds to the access stratum identity 2, and "11" corresponds to the access stratum identity 3. Thus, the access network equipment can scramble the physical layer downlink scheduling information by using the access layer identification, the paged terminal also decodes the DL Grant by using the corresponding sequence according to the mapping rule, and can receive the physical layer downlink scheduling information, and other terminals cannot receive the physical layer downlink scheduling information, so that the power consumption of other terminals is reduced. The NAS identifier in this embodiment may specifically include a core network identifier, where the core network identifier may be, for example, an IMSI or an S-TMSI, and this is not specifically limited in this embodiment of the present application.
It should be noted that the mapping rule in the foregoing example is only one mapping rule provided schematically in the embodiment of the present application, and of course, the access network device may also map the NAS identifier of the terminal to the access stratum identifier of the terminal according to other mapping rules, which is not specifically limited in the embodiment of the present application.
And S505, the access network equipment sends the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information.
Step S304 may be referred to for related implementation of step S505, and is not described herein again.
S506, the terminal receives a second message sent by the access network equipment.
Step S305 can be referred to for implementation of step S506, and is not described herein again.
And S507, the terminal receives the physical layer downlink scheduling information sent by the access network equipment.
Optionally, in this embodiment of the present application, the terminal may also receive the physical layer downlink scheduling information sent by the access network device by using a manner of receiving the second message, that is, detect the physical layer downlink scheduling information by using a blind detection manner, which is not specifically limited in this embodiment of the present application. The blind detection of the physical layer downlink scheduling information may be performed in a time period after the RAR window, or may be performed in a time period after the RAR window is received, which is not specifically limited in this embodiment of the present application.
S508, the terminal receives the downlink user data sent by the access network device on the physical layer resource indicated by the physical layer downlink scheduling information.
Step S306 can be referred to for implementation of step S508, and is not described herein again.
In this embodiment, the transmission deadline of the downlink user data does not exceed the sending time of the third message, which is described herein in a unified manner and is not described in detail below.
Optionally, the second message in this embodiment of the application may further include indication information that downlink user data is transmitted between the second message and the third message, so that the terminal continues to receive the physical layer downlink scheduling information and the downlink user data of the terminal between the second message and the third message after receiving the second message, which is not specifically limited in this embodiment of the application.
S509-S512 are similar to S307-S310, and reference may be made to the embodiment shown in fig. 3 for details, which are not repeated herein.
Optionally, as shown in fig. 5, before step S501, steps S514 and S515 may be further included:
and S514, the access network equipment sends a command indicating the preamble sequence used by the terminal to the terminal.
And S515, the terminal receives a preamble sequence which is sent by the access network equipment and indicates the terminal to use.
That is, the preamble sequence used by the terminal in step S501 may be indicated to the terminal by the access network device. The access network device executes step S504 only when detecting the preamble sequence, that is, the physical layer downlink scheduling information of the terminal is sent to the terminal, and then the downlink user data is sent on the physical layer resource indicated by the physical layer downlink scheduling information, so that the probability that the access network device blindly sends the downlink user data is reduced.
For example, in the scenario one described above, the command indicating the preamble sequence used by the terminal is included in the NPDCCH command, and since the NPDCCH command is scrambled by using the C-RNTI of the terminal, only the terminal can receive the command indicating the preamble sequence used by the terminal. And then the terminal uses the preamble sequence to perform random access, and the access network device only detects the preamble sequence and then executes step S504, that is, sends the physical layer downlink scheduling information of the terminal to the terminal, and then sends the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information, thereby reducing the probability that the access network device blindly sends the downlink user data.
For example, in the second scenario, the command indicating the preamble sequence used by the terminal is contained in the paging message, although the paging message is not scrambled by using the identifier of the terminal, the command indicating the preamble sequence used by the terminal may be received by other terminals, and further the preamble sequence used by the terminal may be used by other terminals, the access network device only detects the preamble sequence and performs step S504, that is, sends the physical layer downlink scheduling information of the terminal to the terminal, and further sends the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information, and also reduces the probability that the access network device blindly sends the downlink user data.
The data transmission method provided by the embodiment of the application can transmit downlink user data between the second message and the third message in the random access process, so that at least part of user data transmission or scheduling can be performed in advance in the random access process, and thus, the data transmission delay can be reduced.
The actions of the terminal in S514, S501, S506, S507, S508, S509 and S512 may be executed by the processor 301 of the terminal 30 shown in fig. 2 calling the computer program code stored in the memory 302, which is not limited in this embodiment of the present application.
The actions of the access network device in S513, S502, S503, S504, S505, S510 and S511 may be executed by the processor 201 in the access network device 20 shown in fig. 2 calling the computer program code stored in the memory 202, which is not limited in this embodiment of the present application.
Optionally, as shown in fig. 6, taking the interaction between the access network device and a terminal as an example, the data transmission method provided in the embodiment of the present application includes the following steps S601 to S608:
S601-S602, like S301-S302, refer to the embodiment shown in fig. 3, and are not described herein again.
S603, in response to the first message, the access network device sends a second message to the terminal, where the second message includes a preamble sequence used by the terminal and downlink user data of the terminal, which are confirmed by the access network device.
The message format of the second message is shown in fig. 7, and includes a MAC header, n RARs, and padding bits. The n RARs may be, for example, RAR1, RAR2, … …, RARn.
The description of the MAC header, the n RARs, and the padding bits in the second message shown in fig. 4 may be referred to for the description of the MAC header, the n RARs, and the padding bits, which is not described herein again. The difference from the embodiment shown in fig. 4 is that the MAC header in the embodiment shown in fig. 4 includes physical layer downlink scheduling information of the terminal, and the MAC header in the embodiment shown in fig. 7 includes downlink user data of the terminal.
Optionally, the downlink user data of the terminal may also be filled in padding bits or RARs corresponding to a preamble sequence of the terminal, which is not specifically limited in this embodiment of the present application. If the downlink user data is placed in the MAC header or the padding bits, the terminals with the same RA-RNTI can receive the downlink user data; if the downlink user data is placed in the RAR corresponding to the leader sequence of the terminal, only the RA-RNTI is the same, and the terminal which sends the leader sequence used by the terminal can receive the downlink user data.
In addition, fig. 7 also shows a transmission schematic of the second message, and the related description may refer to the description of the transmission schematic of the second message shown in fig. 4, which is not repeated herein.
S604, the terminal receives a second message sent by the access network equipment.
Step S305 can be referred to for related implementation of step S604, and is not described herein again.
S605-S606, and S307-S308, refer to the embodiment shown in fig. 3, and are not described herein again.
S607, in response to the third message, the access network device sends a fourth message to the terminal, where the fourth message includes contention resolution information for indicating that the terminal has successfully accessed and information for indicating that downlink user data belongs to the terminal.
Optionally, if the terminal that wins the contention is not the terminal, the fourth message sent by the access network device to the terminal may include information for indicating that the downlink user data does not belong to the terminal or belongs to another terminal. Furthermore, the terminal that fails in the contention may discard the downlink user data according to the indication information, which is not specifically limited in this embodiment of the application.
And S608, the terminal receives the fourth message sent by the access network equipment.
Optionally, as shown in fig. 6, before step S601, steps S609 and S610 may further be included:
s609, the access network device sends a command indicating a preamble sequence used by the terminal to the terminal.
S610, the terminal receives a preamble sequence which is sent by the access network equipment and indicates the terminal to use.
That is, the preamble sequence used by the terminal in step S601 may be indicated to the terminal by the access network device. The access network device sends downlink user data to the terminal only when detecting the preamble sequence, that is, the second message in step S603 includes the downlink user data of the terminal, so that the probability that the access network device blindly sends the downlink user data is reduced.
For example, in the scenario one described above, the command indicating the preamble sequence used by the terminal is included in the NPDCCH command, and since the NPDCCH command is scrambled by using the C-RNTI of the terminal, only the terminal can receive the command indicating the preamble sequence used by the terminal. And then the terminal uses the preamble sequence to perform random access, and the access network device sends downlink user data to the terminal only when detecting that the preamble sequence, that is, the second message in step S603 includes the downlink user data of the terminal, so that the probability that the access network device blindly sends the downlink user data is reduced.
For example, in the second scenario, the command indicating the preamble sequence used by the terminal is contained in the paging message, although the paging message is not scrambled by using the identifier of the terminal, the command indicating the preamble sequence used by the terminal may be received by other terminals, and further the preamble sequence used by the terminal may be used by other terminals, the access network device only sends downlink user data to the terminal when detecting the preamble sequence, that is, the second message in step S603 contains the downlink user data of the terminal, and the probability that the access network device blindly sends the downlink user data is also reduced.
The data transmission method provided by the embodiment of the application can transmit the downlink user data in the second message in the random access process, so that at least part of user data transmission or scheduling can be executed in advance in the random access process, and therefore, the data transmission delay can be reduced.
The actions of the terminal in S610, S601, S604, S605 and S608 may be executed by the processor 301 of the terminal 30 shown in fig. 2 calling the computer program code stored in the memory 302, which is not limited in this embodiment of the present application.
The actions of the access network device in S609, S602, S603, S606 and S607 may be executed by the processor 201 in the access network device 20 shown in fig. 2 calling the computer program code stored in the memory 202, which is not limited in this embodiment of the present application.
Optionally, as shown in fig. 8, taking the interaction between the access network device and a terminal as an example, the data transmission method provided in the embodiment of the present application includes the following steps S801 to S808:
s801 to S803, and S501 to S503, refer to the embodiment shown in fig. 5, and are not described herein again.
S804 and S506 may refer to the embodiment shown in fig. 5, which is not described herein again.
S805-S806, like S509-S510, refer to the embodiment shown in fig. 5, and are not described herein again.
S807, in response to the third message, the access network device sends a fourth message to the terminal, where the fourth message includes contention resolution information for indicating that the terminal is successfully accessed and downlink user data of the terminal.
Optionally, the fourth message in step S807 may be scrambled by using the C-RNTI of the terminal, or may be scrambled by using the temporary C-RNTI, which is not specifically limited in this embodiment of the application. If the fourth message is scrambled by using the temporary C-RNTI, other terminals that send the preamble sequence used by the terminal may also receive the downlink user data, and then only the terminal that successfully competes will acquire the downlink user data.
And S808, the terminal receives a fourth message sent by the access network equipment.
The data transmission method provided by the embodiment of the application can transmit the downlink user data in the fourth message in the random access process, so that at least part of user data transmission or scheduling can be executed in advance in the random access process, and therefore, the data transmission delay can be reduced.
The actions of the terminal in S801, S804, S805, and S808 above may be executed by the processor 301 of the terminal 30 shown in fig. 2 calling the computer program code stored in the memory 302, which is not limited in this embodiment of the present application.
The actions of the access network device in S802, S803, S806, and S807 described above may be executed by the processor 201 in the access network device 20 shown in fig. 2 invoking the computer program code stored in the memory 202, which is not limited in this embodiment of the present application.
Optionally, as shown in fig. 9, taking the interaction between the access network device and a terminal as an example, the data transmission method provided in the embodiment of the present application includes the following steps S901 to S910:
S901-S906, like S801-S806, may refer to the embodiment shown in fig. 8, and are not described herein again.
S907, in response to the third message, the access network device sends a fourth message to the terminal, where the fourth message includes contention resolution information for indicating that the terminal is successfully accessed and physical layer downlink scheduling information of the terminal.
S908, the access network device sends the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information.
The downlink user data in step S908 may be scrambled by using the C-RNTI of the terminal, because the access network device knows the unique identity C-RNTI of the terminal.
And S909, the terminal receives the fourth message sent by the access network equipment.
S910, the terminal receives the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information.
The data transmission method provided by the embodiment of the application can transmit the downlink user data in the fourth message in the random access process, so that at least part of user data transmission or scheduling can be executed in advance in the random access process, and therefore, the data transmission delay can be reduced.
Compared with the embodiment shown in fig. 8, in the embodiment of the present application, the physical layer downlink scheduling information of the terminal is carried in the fourth message, and after the fourth message, the access network device sends the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information, so that it is possible to avoid the possibility that the downlink user data in the fourth message may be acquired by another terminal whose preamble sequence is used by the terminal if the fourth message is scrambled by using the temporary C-RNTI of the terminal, so that power consumption can be saved.
The actions of the terminal in S901, S904, S905, S909 and S910 described above can be executed by the processor 301 of the terminal 30 shown in fig. 2 calling the computer program code stored in the memory 302, and the embodiment of the present application does not limit this.
The actions of the access network device in S902, S903, S906, S907, and S908 may be executed by the processor 201 in the access network device 20 shown in fig. 2 invoking the computer program code stored in the memory 202, which is not limited in this embodiment of the present application.
The method for uplink user data transmission according to the embodiment of the present application will be described below with reference to fig. 10 to 15.
As shown in fig. 10, a data transmission method provided in this embodiment of the present application, taking interaction between an access network device and a terminal as an example, includes the following steps S1001 to S1008:
S1001-S1002 are the same as S301-S302.
S1003, responding to the first message, the access network equipment sends a second message to the terminal, wherein the second message comprises a leader sequence used by the terminal and physical layer uplink scheduling information of the terminal, and the leader sequence is confirmed by the access network equipment.
Fig. 4 may be referred to for a message format of the second message and a transmission schematic of the second message, which are not described herein again. The difference is that the second message shown in fig. 4 includes the physical layer downlink scheduling information of the terminal, and the second message in this embodiment does not include the physical layer downlink scheduling information of the terminal.
And S1004, the terminal receives the second message sent by the access network equipment.
Step S305 can be referred to for related implementation of step S1004, and is not described herein again.
S1005, in response to the second message, the terminal sends a third message to the access network device, where the third message includes the identifier of the terminal and the uplink user data of the terminal. Wherein the uplink user data is transmitted on the physical layer resource indicated by the physical layer uplink scheduling information.
Specifically, after the terminal successfully receives the RAR of itself in the RAR window, the terminal sends a third message in the random access process, such as an RRC link request or tracking area update, to the access network device through the NPUSCH in a certain subframe after receiving the RAR. And the third message is scrambled according to the temporary C-RNTI contained in the RAR, and contains the identifier of the terminal in the cell and the uplink user data of the terminal, and is used for contention resolution. The identifier of the terminal included in the third message is not specifically limited in this embodiment of the application. Exemplarily, in the first scenario, the identifier of the terminal included in the third message is a C-RNTI of the terminal; in the second scenario, the identifier of the terminal included in the third message is a C-RNTI or an S-TMSI of the terminal, which is not specifically limited in this embodiment of the present application.
Fig. 11 illustrates transmission of a third message in the embodiment of the present application. As shown in fig. 11, the MAC layer of the terminal transmits the MAC PDU carrying the third message to the Physical layer of the terminal, the Physical layer of the terminal fills the MAC PDU into the transport block of the Physical layer, and the MAC PDU is carried on a Narrowband Physical Uplink Shared Channel (npshare) and transmitted after processing such as Channel coding and modulation of the Physical layer.
It should be noted that, in the conventional random access procedure, the Transport Block Size (TBS) of the third message is fixed and 88 bits, but in this embodiment of the present application, since uplink user data is to be transmitted in the third message, the TBS is to be adjusted according to the physical layer uplink scheduling information in the second message, and the TBS is not specifically limited in this embodiment of the present application.
And S1006, the access network equipment receives a third message sent by the terminal.
Step S308 may be referred to for implementation of step S1006, and is not described herein again.
S1007-S1008 are similar to S309-S310, and reference may be made to the embodiment shown in fig. 3, which is not described herein again.
The data transmission method provided by the embodiment of the application can transmit uplink user data in the third message in the random access process, so that at least part of user data transmission or scheduling can be performed in advance in the random access process, and therefore, the data transmission delay can be reduced.
The actions of the terminal in S1001, S1004, S1005 and S1008 can be executed by the processor 301 of the terminal 30 shown in fig. 2 calling the computer program code stored in the memory 302, which is not limited in this embodiment of the present application.
The actions of the access network device in S1002, S1003, S1006 and S1007 may be executed by the processor 201 in the access network device 20 shown in fig. 2 calling the computer program code stored in the memory 202, which is not limited in this embodiment of the present application.
Optionally, as shown in fig. 12, taking the interaction between the access network device and a terminal as an example, the data transmission method provided in the embodiment of the present application includes the following steps S1201-S1210:
S1201-S1204, similar to S1101-S1104.
And S1205, in response to the second message, the terminal sends a third message to the access network device, where the third message includes the identifier of the terminal.
Step S307 is referred to for implementation related to step S1205, and is not described herein again.
Optionally, in this embodiment of the application, the third message further includes third indication information, where the third indication information indicates that there is uplink user data transmission between the third message and the fourth message, so that the access network device continues to receive the terminal uplink user data between the third message and the fourth message after receiving the third message, which is not specifically limited in this embodiment of the application.
S1206, the terminal sends the uplink user data on the physical resource indicated by the physical layer uplink scheduling information.
S1207, the access network equipment receives the third message sent by the terminal.
Step S308 may be referred to for implementation of step S1207, and details are not repeated herein.
S1208, the access network equipment receives the uplink user data on the physical resource indicated by the physical layer uplink scheduling information.
In this embodiment, the transmission deadline of the uplink user data does not exceed the sending time of the fourth message, which is described herein in a unified manner and is not described in detail below.
S1209-S1210, like S309-S310, may refer to the embodiment shown in fig. 3, and are not described herein again.
The data transmission method provided by the embodiment of the application can transmit uplink user data between the third message and the fourth message in the random access process, so that at least part of user data transmission or scheduling can be performed in advance in the random access process, and therefore, the data transmission delay can be reduced.
The actions of the terminal in S1201, S1204, S1205, S1206 and S1210 may be executed by the processor 301 of the terminal 30 shown in fig. 2 calling the computer program code stored in the memory 302, which is not limited in this embodiment of the present application.
The actions of the access network device in S1202, S1203, S1207, and S1209 may be executed by the processor 201 in the access network device 20 shown in fig. 2 calling the computer program code stored in the memory 202, which is not limited in this embodiment of the present application.
Optionally, in the embodiment shown in fig. 10 or 12, the first message further includes first indication information, where the first indication information indicates that the terminal supports uplink user data transmission in a random access process or indicates a size of uplink user data to be transmitted. Furthermore, the physical layer uplink scheduling information in the second message is determined by the access network device according to the first indication information. That is, the number of bits occupied by the physical layer uplink scheduling information (UL Grant) in the embodiment of the present application is variable, and may be increased from 15 bits in fig. 4 to X bits, which is not specifically limited in the embodiment of the present application. Wherein X is a positive integer greater than 15.
Optionally, in this embodiment of the application, the indicating that the terminal supports uplink user data transmission in the random access process includes: the first indication message is determined by the location of the random access resource used by the first message, wherein the location of the random access resource used by the first message can be used to indicate whether the terminal supports uplink user data transmission in the random access process.
That is to say, in the embodiments of the present application, the random access resources used by each terminal in the system are grouped in consideration of the backward compatibility problem. For example, as shown in fig. 13(a), for a terminal supporting uplink user data transmission in the random access procedure (e.g., a Rel-15NB-IoT terminal), when it uses the first random access resource, it indicates that the terminal supports uplink user data transmission in the random access procedure, otherwise, the terminal does not support uplink user data transmission in the random access procedure. Alternatively, as shown in fig. 13(b), for a terminal supporting uplink user data transmission in the random access procedure, such as a Rel-15NB-IoT terminal, when it uses the first random access resource, it means that the terminal supports uplink user data transmission in the random access procedure, otherwise, the terminal does not support uplink user data transmission in the random access procedure. Compared with fig. 13(a), in fig. 13(b), the first random access resource is dedicated for uplink user data transmission in the random access procedure, and a terminal supporting the uplink user data transmission in the random access procedure may use a relatively independent resource, that is, the first random access resource, and is not affected by a terminal (such as a Rel-13 or 14NB-IoT terminal) that does not support the uplink user data transmission in the random access procedure, but if no terminal supports the uplink user data transmission in the random access procedure, the resource is wasted.
Optionally, in this embodiment of the application, the indicating information indicates a size of uplink user data to be transmitted, including: the first indication message is determined by the position of the random access resource used by the first message, wherein the position of the random access resource used by the first message is used for indicating that the size of the uplink user data exceeds a preset threshold value.
That is to say, in the embodiment of the present application, the problem of the size of uplink user data is also considered, and the random access resources used by each terminal in the system are grouped. For example, the random access resource includes a first random access resource and a second random access resource. In a possible implementation manner, when the terminal uses the first random access resource, it indicates that the size of the uplink user data to be transmitted by the terminal exceeds a preset threshold, and otherwise, indicates that the size of the uplink user data to be transmitted by the terminal does not exceed the preset threshold.
Optionally, the physical layer uplink scheduling information includes a first physical layer resource and a second physical layer resource; the first physical layer resource is used for sending uplink user data, and the second physical layer resource is used for sending other information except the uplink user data in the third message.
Optionally, the second message further includes second indication information, where the second indication information is used to indicate that the first physical layer resource and the second physical layer resource are discontinuous. Therefore, when the terminal sending the uplink user data in the random access process collides with the terminal not sending the uplink user data in the random access process, the probability that the terminal not sending the uplink user data is correctly received by the access network equipment is not reduced, and the performance of the terminal not sending the uplink user data is not influenced.
For example, in the embodiment shown in fig. 10, the transmission of the third message may be schematically shown in fig. 14. Wherein, in fig. 14, the first physical layer resource and the second physical layer resource are not contiguous. As shown in fig. 14, the MAC layer of the terminal transmits the MAC PDU carrying the other information except the uplink user data in the third message to the physical layer of the terminal, the physical layer of the terminal fills the MAC PDU into the transport block of the physical layer, and the MAC PDU is carried on NPUSCH1 and transmitted after the channel coding, modulation and other processing of the physical layer. And the MAC layer of the terminal transmits the MAC PDU carrying the uplink user data in the third message to the physical layer of the terminal, the physical layer of the terminal fills the MAC PDU into a transmission block of the physical layer, and the MAC PDU is carried on the NPUSCH2 and is sent after the processing of channel coding, modulation and the like of the physical layer. In this way, after receiving the third message, the access network device can separately decode the uplink user data and other information except the uplink user data in the third message.
Alternatively, for example, in the embodiment shown in fig. 12, the transmission of the third message and the uplink user data may also be shown in fig. 15. Wherein, in fig. 15, the first physical layer resource and the second physical layer resource are not contiguous. As shown in fig. 15, the MAC layer of the terminal transmits the MAC PDU carrying the third message to the physical layer of the terminal, the physical layer of the terminal fills the MAC PDU into a transport block of the physical layer, and the MAC PDU is carried on NPUSCH1 and transmitted after the processing of channel coding, modulation and the like of the physical layer. The MAC layer of the terminal transmits the MAC PDU carrying the uplink user data to the physical layer of the terminal, the physical layer of the terminal fills the MAC PDU into a transmission block of the physical layer, and the MAC PDU is carried on the NPUSCH2 and is transmitted after the processing of channel coding, modulation and the like of the physical layer. In this way, the access network device can decode the third message and the uplink user data separately.
The above-mentioned scheme provided by the embodiment of the present application is introduced mainly from the perspective of interaction between a terminal and an access network device. It is understood that the above described access network device and terminal, in order to implement the above described functions, include corresponding hardware structures or software modules for performing the respective functions. Those of skill in the art would readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the access network device and the terminal may be divided into the functional modules according to the above method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation.
For example, in the case of dividing each functional module by corresponding functions, fig. 16 shows a possible structural diagram of the terminal 160 in the above embodiment. As shown in fig. 16, the terminal 160 includes: a transmitting module 1601 and a receiving module 1602.
Wherein, the sending module 1601 is configured to support the terminal 160 to execute steps S301 and S307 in fig. 3; the receiving module 1602 is used to support the terminal 160 to execute steps S305, S306 and S310 in fig. 3. Optionally, the receiving module 1602 is further configured to support the terminal 160 to execute step S312 in fig. 3.
Alternatively, the transmitting module 1601 is configured to support the terminal 160 to perform steps S501 and S509 in fig. 5; the receiving module 1602 is used to support the terminal 160 to execute steps S506, S507, S508 and S512 in fig. 5. Optionally, the receiving module 1602 is further configured to support the terminal 160 to execute step S514 in fig. 5.
Alternatively, the transmitting module 1601 is used to support the terminal 160 to execute steps S601 and S605 in fig. 6; the receiving module 1602 is used to support the terminal 160 to execute steps S604 and S608 in fig. 6. Optionally, the receiving module 1602 is further configured to support the terminal 160 to execute step S610 in fig. 6.
Alternatively, the transmitting module 1601 is used to support the terminal 160 to execute steps S801 and S805 in fig. 8; the receiving module 1602 is used to support the terminal 160 to execute steps S804 and S808 in fig. 8.
Alternatively, the transmitting module 1601 is configured to support the terminal 160 to execute steps S901 and S905 in fig. 9; the receiving module 1602 is used to support the terminal 160 to execute steps S904, S909 and S910 in fig. 9.
Alternatively, the transmitting module 1601 is used to support the terminal 160 to execute steps S1001 and S1005 in fig. 10; the receiving module 1602 is used to support the terminal 160 to execute steps S1004 and S1008 in fig. 10.
Alternatively, the sending module 1601 is configured to support the terminal 160 to perform steps S1201, S1205, and S1206 in the figure; the receiving module 1602 is used to support the terminal 160 to execute steps S1204 and S1210 in the figure.
All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
In the case where the functional modules are divided in an integrated manner, fig. 17 shows a possible structural diagram of the terminal 170 involved in the above-described embodiment. As shown in fig. 17, the terminal 170 includes a communication module 1701. The communication module 1701 is configured to execute the actions of the sending module 1601 and the receiving module 1602 in fig. 16, which may specifically refer to the embodiment shown in fig. 16 and is not described herein again.
All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
In the embodiment of the present application, the terminal is presented in a form of dividing each functional module corresponding to each function, or the terminal is presented in a form of dividing each functional module in an integrated manner. A "module" herein may include an Application-Specific Integrated Circuit (ASIC), an electronic Circuit, a processor and memory that execute one or more software or firmware programs, an Integrated logic Circuit, or other devices that provide the described functionality. In a simple embodiment, those skilled in the art will appreciate that either terminal 160 or terminal 170 may take the form of terminal 30 shown in FIG. 2. For example, the transmitting module 1601 and the receiving module 1602 in fig. 16 may be implemented by the processor 301 and the memory 302 in the terminal 30 of fig. 2. Specifically, the sending module 1601 and the receiving module 1602 may be executed by the processor 301 calling an application program code stored in the memory 302, which is not limited in this embodiment. Alternatively, for example, the communication module 1701 in fig. 17 may be implemented by the processor 301 and the memory 302 in the terminal 30 in fig. 2, and specifically, the communication module 1701 may be executed by the processor 301 invoking the application program code stored in the memory 302, which is not limited in this embodiment of the present application.
Since the terminal provided in the embodiment of the present application can be used to execute the data transmission method, the technical effect obtained by the terminal can refer to the method embodiment described above, and the embodiment of the present application is not described herein again.
For example, in the case of dividing each functional module by corresponding functions, fig. 18 shows a possible structural diagram of the access network device 180 in the above embodiment. As shown in fig. 18, the access network device 180 includes: a sending module 1801 and a receiving module 1802.
The sending module 1801 is configured to support the access network device 180 to perform steps S303, S304, and S309 in fig. 3, and the receiving module 1802 is configured to support the access network device 180 to perform steps S302 and S308 in fig. 3. Optionally, the sending module 1801 is further configured to support the access network device 180 to execute step S311 in fig. 3.
Alternatively, the sending module 1801 is configured to support the access network device 180 to perform steps S503, S504, S505, and S511 in fig. 5, and the receiving module 1802 is configured to support the access network device 180 to perform steps S502 and S510 in fig. 5. Optionally, the sending module 1801 is further configured to support the access network device 180 to execute step S513 in fig. 5.
Alternatively, the sending module 1801 is configured to support the access network device 180 to perform steps S603 and S607 in fig. 6, and the receiving module 1802 is configured to support the access network device 180 to perform steps S602 and S606 in fig. 6. Optionally, the sending module 1801 is further configured to support the access network device 180 to perform step S609 in fig. 6.
Alternatively, the sending module 1801 is configured to support the access network device 180 to perform steps S803 and S807 in fig. 8, and the receiving module 1802 is configured to support the access network device 180 to perform steps S802 and S806 in fig. 8.
Alternatively, the sending module 1801 is configured to support the access network device 180 to perform steps S903, S907, and S908 in fig. 9, and the receiving module 1802 is configured to support the access network device 180 to perform steps S902 and S906 in fig. 9.
Alternatively, the sending module 1801 is configured to support the access network device 180 to perform steps S1003 and S1007 in fig. 10, and the receiving module 1802 is configured to support the access network device 180 to perform steps S1002 and S1006 in fig. 10.
Alternatively, the sending module 1801 is configured to support the access network device 180 to perform steps S1203 and S1209 in fig. 12, and the receiving module 1802 is configured to support the access network device 180 to perform steps S1202, S1207, and S1208 in fig. 12.
In the case of dividing the functional modules in an integrated manner, fig. 19 shows a possible structural diagram of the access network device 190 involved in the above embodiment. As shown in fig. 19, the access network device 190 includes a communication module 1901. The communication module 1901 is configured to execute actions of the sending module 1801 and the receiving module 1802 in fig. 18, which may specifically refer to the embodiment shown in fig. 18 and is not described herein again.
In the embodiment of the present application, the access network device is presented in a form of dividing each functional module corresponding to each function, or the access network device is presented in a form of dividing each functional module in an integrated manner. A "module" herein may include an Application-Specific Integrated Circuit (ASIC), an electronic Circuit, a processor and memory that execute one or more software or firmware programs, an Integrated logic Circuit, or other devices that provide the described functionality. In a simple embodiment, those skilled in the art will appreciate that the access network device 180 or the access network device 190 may take the form of the access network device 20 shown in FIG. 2. For example, the sending module 1801 and the receiving module 1802 in fig. 18 may be implemented by the processor 201 and the memory 202 in the access network device 20 in fig. 2. Specifically, the sending module 1801 and the receiving module 1802 may be executed by the processor 201 calling an application program code stored in the memory 202, which is not limited in this embodiment of the present application. Alternatively, for example, the communication module 1901 in fig. 19 may be implemented by the processor 201 and the memory 202 in the access network device 20 in fig. 2, specifically, the communication module 1901 may be executed by the processor 201 invoking an application program code stored in the memory 202, which is not limited in this embodiment of the present application.
Since the access network device provided in the embodiment of the present application may be configured to execute the data transmission method, reference may be made to the method embodiment for obtaining technical effects, and details of the embodiment of the present application are not repeated herein.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented using a software program, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the present application are all or partially generated upon loading and execution of computer program instructions on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or can comprise one or more data storage devices, such as a server, a data center, etc., that can be integrated with the medium. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
While the present application has been described in connection with various embodiments, other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed application, from a review of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Although the present application has been described in conjunction with specific features and embodiments thereof, it will be evident that various modifications and combinations can be made thereto without departing from the spirit and scope of the application. Accordingly, the specification and figures are merely exemplary of the present application as defined in the appended claims and are intended to cover any and all modifications, variations, combinations, or equivalents within the scope of the present application. It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (45)

  1. A method of data transmission, the method comprising:
    sending a first message to access network equipment, wherein the first message comprises a preamble sequence used by a terminal;
    receiving a second message sent by the access network device, the second message including the preamble sequence acknowledged by the access network device;
    responding to the second message, and sending a third message to the access network equipment, wherein the third message comprises the identification of the terminal;
    receiving a fourth message sent by the access network device, where the fourth message includes contention resolution information used to indicate that the terminal is successfully accessed; wherein the content of the first and second substances,
    any one of the second message or the fourth message further includes physical layer downlink scheduling information or downlink user data of the terminal; or, after receiving the second message, further receiving physical layer downlink scheduling information of the terminal sent by the access network device.
  2. The method of claim 1, wherein the second message further includes physical layer downlink scheduling information of the terminal;
    after receiving the second message, the method further comprises:
    and receiving the downlink user data sent by the access network equipment on the physical layer resource indicated by the physical layer downlink scheduling information.
  3. The method of claim 1, wherein after receiving the physical layer downlink scheduling information of the terminal, the method further comprises:
    and receiving the downlink user data sent by the access network equipment on the physical layer resource indicated by the physical layer downlink scheduling information.
  4. The method of claim 3, wherein the second message further comprises indication information indicating that there is downlink user data transmission between the second message and the third message.
  5. The method of claim 3 or 4, wherein the physical layer downlink scheduling information is scrambled by an identifier of the terminal.
  6. The method according to any of claims 2-5, wherein the downlink user data is scrambled by an identity of the terminal.
  7. The method according to claim 5 or 6, characterized in that the identity of the terminal comprises a cell radio network temporary identity, C-RNTI, of the terminal or the identity of the terminal comprises an access stratum identity mapped to by a non-access stratum, NAS, identity of the terminal.
  8. The method of claim 1, wherein the second message further includes downlink user data, and wherein the fourth message further includes information indicating that the downlink user data belongs to the terminal.
  9. The method of any of claims 2-8, wherein prior to sending the first message, the method further comprises:
    and receiving a command which is sent by the access network equipment and indicates the preamble sequence.
  10. The method of claim 1, wherein the fourth message further includes physical layer downlink scheduling information of the terminal;
    after receiving the fourth message, the method further comprises:
    and receiving the downlink user data sent by the access network equipment on the physical layer resource indicated by the physical layer downlink scheduling information.
  11. The method of claim 1, wherein the fourth message further comprises downlink user data.
  12. A method of data transmission, the method comprising:
    sending a first message to access network equipment, wherein the first message comprises a preamble sequence used by a terminal;
    receiving a second message sent by the access network device, where the second message includes the preamble sequence confirmed by the access network device and physical layer uplink scheduling information of the terminal;
    responding to the second message, and sending a third message to the access network equipment, wherein the third message comprises the identification of the terminal;
    receiving a fourth message sent by the access network device, where the fourth message includes contention resolution information used to indicate that the terminal is successfully accessed; wherein the content of the first and second substances,
    the third message further includes uplink user data, and the uplink user data is sent on the physical layer resource indicated by the physical layer uplink scheduling information; or, after sending the third message, further sending uplink user data on the physical layer resource indicated by the physical layer uplink scheduling information.
  13. The method of claim 12, wherein the uplink user data is scrambled by a temporary cell radio network temporary identity (C-RNTI) of the terminal.
  14. The method according to claim 12 or 13, wherein the first message further includes first indication information, and the first indication information indicates that the terminal supports uplink user data transmission in a random access process or indicates a size of uplink user data to be transmitted;
    wherein the physical layer uplink scheduling information is determined according to the first indication information.
  15. The method of claim 14, wherein the first indication information indicates that the terminal supports uplink user data transmission in a random access procedure, and comprises:
    the first indication message is determined by the location of the random access resource used by the first message, where the location of the random access resource used by the first message is used to indicate that the terminal supports uplink user data transmission in a random access process.
  16. The method of claim 14, wherein the first indication information indicates a size of uplink user data to be transmitted, and wherein the method comprises:
    the first indication message is determined by the location of the random access resource used by the first message, wherein the location of the random access resource used by the first message is used for indicating that the size of the uplink user data exceeds a preset threshold.
  17. The method according to any of claims 12-16, wherein the physical layer uplink scheduling information comprises a first physical layer resource and a second physical layer resource; the first physical layer resource is used for sending the uplink user data, and the second physical layer resource is used for sending other information except the uplink user data in the third message.
  18. The method of claim 17, further comprising second indication information in the second message, wherein the second indication information is used to indicate that the first physical layer resource and the second physical layer resource are discontinuous.
  19. The method according to any of claims 12-18, wherein the third message further comprises third indication information, and the third indication information indicates that there is uplink user data transmission between the third message and the fourth message.
  20. A method of data transmission, the method comprising:
    receiving a first message sent by a terminal, wherein the first message comprises a preamble sequence used by the terminal;
    sending a second message to the terminal in response to the first message, the second message comprising the preamble sequence acknowledged by an access network device;
    receiving a third message sent by the terminal, wherein the third message comprises an identifier of the terminal;
    responding to the third message, and sending a fourth message to the terminal, wherein the fourth message comprises competition resolving information used for indicating that the terminal is successfully accessed; wherein the content of the first and second substances,
    any one of the second message or the fourth message further includes physical layer downlink scheduling information or downlink user data of the terminal; or further sending the physical layer downlink scheduling information of the terminal sent by the terminal after sending the second message.
  21. The method of claim 20, wherein the second message further comprises physical layer downlink scheduling information of the terminal;
    after sending the second message, the method further comprises:
    and sending the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information.
  22. The method of claim 20, wherein after transmitting the physical layer downlink scheduling information of the terminal, the method further comprises:
    and sending the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information.
  23. The method of claim 22, wherein the second message further comprises indication information indicating that there is a downlink user data transmission between the second message and the third message.
  24. The method according to claim 22 or 23, wherein the physical layer downlink scheduling information is scrambled by an identity of the terminal.
  25. The method according to any of claims 21-24, wherein the downlink user data is scrambled by an identity of the terminal.
  26. The method according to claim 24 or 25, wherein the identity of the terminal comprises a cell radio network temporary identity, C-RNTI, of the terminal or the identity of the terminal comprises an access stratum identity mapped to by a non-access stratum, NAS, identity of the terminal.
  27. The method of claim 20, wherein the second message further includes downlink user data, and wherein the fourth message further includes information indicating that the downlink user data belongs to the terminal.
  28. The method of any of claims 21-27, wherein prior to receiving the first message, the method further comprises:
    and sending a command indicating the preamble sequence to the terminal.
  29. The method of claim 20, wherein the fourth message further includes physical layer downlink scheduling information of the terminal;
    after sending the fourth message, the method further comprises:
    and sending the downlink user data on the physical layer resource indicated by the physical layer downlink scheduling information.
  30. The method of claim 20, wherein the fourth message further comprises downlink user data.
  31. A method of data transmission, the method comprising:
    receiving a first message sent by a terminal, wherein the first message comprises a preamble sequence used by the terminal;
    responding to the first message, and sending a second message to the terminal, wherein the second message comprises the leader sequence confirmed by the access network equipment and the physical layer uplink scheduling information of the terminal;
    receiving a third message sent by the terminal, wherein the third message comprises an identifier of the terminal;
    responding to the third message, and sending a fourth message to the terminal, wherein the fourth message comprises competition resolving information used for indicating that the terminal is successfully accessed; wherein the content of the first and second substances,
    the third message further includes uplink user data, and the uplink user data is sent on the physical layer resource indicated by the physical layer uplink scheduling information; or, after receiving the third message, further receiving uplink user data on the physical layer resource indicated by the physical layer uplink scheduling information.
  32. The method of claim 31, wherein the uplink user data is scrambled by a temporary cell radio network temporary identity (C-RNTI) of the terminal.
  33. The method according to claim 31 or 32, wherein the first message further includes first indication information, and the first indication information indicates that the terminal supports uplink user data transmission in a random access process or indicates a size of uplink user data to be transmitted;
    wherein the physical layer uplink scheduling information is determined according to the first indication information.
  34. The method of claim 33, wherein the first indication information indicates that the terminal supports uplink user data transmission in a random access procedure, and wherein the method comprises:
    the first indication message is determined by the location of the random access resource used by the first message, where the location of the random access resource used by the first message is used to indicate that the terminal supports uplink user data transmission in a random access process.
  35. The method of claim 33, wherein the first indication information indicates a size of uplink user data to be transmitted, and wherein the method comprises:
    the first indication message is determined by the location of the random access resource used by the first message, wherein the location of the random access resource used by the first message is used for indicating that the size of the uplink user data exceeds a preset threshold.
  36. The method according to any of claims 31-35, wherein the physical layer uplink scheduling information comprises a first physical layer resource and a second physical layer resource; the first physical layer resource is used for sending the uplink user data, and the second physical layer resource is used for sending other information except the uplink user data in the third message.
  37. The method of claim 36, further comprising second indication information in the second message, wherein the second indication information is used to indicate that the first physical layer resource and the second physical layer resource are discontinuous.
  38. The method according to any of claims 31-37, wherein the third message further comprises third indication information, and the third indication information indicates that there is uplink user data transmission between the third message and the fourth message.
  39. A terminal, characterized in that the terminal comprises: a transmitting module and a receiving module;
    the sending module is configured to send a first message to an access network device, where the first message includes a preamble sequence used by a terminal;
    the receiving module is configured to receive a second message sent by the access network device, where the second message includes the preamble sequence acknowledged by the access network device;
    the sending module is further configured to send, in response to the second message, a third message to the access network device, where the third message includes an identifier of the terminal;
    the receiving module is further configured to receive a fourth message sent by the access network device, where the fourth message includes contention resolution information used to indicate that the terminal is successfully accessed; wherein the content of the first and second substances,
    any one of the second message or the fourth message further includes physical layer downlink scheduling information or downlink user data of the terminal; or, the receiving module is further configured to further receive, after receiving the second message, physical layer downlink scheduling information of the terminal sent by the access network device.
  40. A terminal, characterized in that the terminal comprises: a transmitting module and a receiving module;
    the sending module is configured to send a first message to an access network device, where the first message includes a preamble sequence used by a terminal;
    the receiving module is configured to receive a second message sent by the access network device, where the second message includes the preamble sequence confirmed by the access network device and physical layer uplink scheduling information of the terminal;
    the sending module is further configured to send, in response to the second message, a third message to the access network device, where the third message includes an identifier of the terminal;
    the receiving module is further configured to receive a fourth message sent by the access network device, where the fourth message includes contention resolution information used to indicate that the terminal is successfully accessed; wherein the content of the first and second substances,
    the third message further includes uplink user data, and the uplink user data is sent on the physical layer resource indicated by the physical layer uplink scheduling information; or, the sending module is further configured to send uplink user data on the physical layer resource indicated by the physical layer uplink scheduling information after sending the third message.
  41. An access network device, characterized in that the access network device comprises: the device comprises a receiving module and a sending module;
    the receiving module is configured to receive a first message sent by a terminal, where the first message includes a preamble sequence used by the terminal;
    the sending module is configured to send a second message to the terminal in response to the first message, where the second message includes the preamble sequence acknowledged by the access network device;
    the receiving module is further configured to receive a third message sent by the terminal, where the third message includes an identifier of the terminal;
    the sending module is further configured to send, in response to the third message, a fourth message to the terminal, where the fourth message includes contention resolution information used to indicate that the terminal is successfully accessed; wherein the content of the first and second substances,
    any one of the second message or the fourth message further includes physical layer downlink scheduling information or downlink user data of the terminal; or, the sending module is further configured to send, after sending the second message, physical layer downlink scheduling information of the terminal sent by the terminal.
  42. An access network device, characterized in that the access network device comprises: the device comprises a receiving module and a sending module;
    the receiving module is configured to receive a first message sent by a terminal, where the first message includes a preamble sequence used by the terminal;
    the sending module is configured to send a second message to the terminal in response to the first message, where the second message includes the preamble sequence confirmed by the access network device and physical layer uplink scheduling information of the terminal;
    the receiving module is further configured to receive a third message sent by the terminal, where the third message includes an identifier of the terminal;
    the sending module is further configured to send, in response to the third message, a fourth message to the terminal, where the fourth message includes contention resolution information used to indicate that the terminal is successfully accessed; wherein the content of the first and second substances,
    the third message further includes uplink user data, and the uplink user data is sent on the physical layer resource indicated by the physical layer uplink scheduling information; or, the receiving module is further configured to further receive uplink user data on the physical layer resource indicated by the physical layer uplink scheduling information after receiving the third message.
  43. A terminal, comprising: a processor, a memory, and a bus;
    the memory is used for storing computer execution instructions, the processor is connected with the memory through the bus, and when the terminal runs, the processor executes the computer execution instructions stored by the memory so as to enable the terminal to execute the data transmission method according to any one of claims 1-11; or to cause the terminal to perform a data transmission method according to any one of claims 12-19.
  44. An access network device, comprising: a processor, a memory, and a bus;
    the memory is used for storing computer-executable instructions, the processor is connected with the memory through the bus, and when the access network equipment runs, the processor executes the computer-executable instructions stored by the memory to enable the access network equipment to execute the data transmission method according to any one of claims 20-30; or to cause the access network device to perform the data transmission method according to any of claims 31-38.
  45. A data transmission system, characterized in that the data transmission system comprises a terminal according to claim 39 and an access network device according to claim 41;
    alternatively, the data transmission system comprises the terminal according to claim 40 and the access network device according to claim 42;
    alternatively, the data transmission system comprises a terminal according to claim 43 and an access network device according to claim 44.
CN201780089928.3A 2017-04-26 2017-04-26 Data transmission method, equipment and system Active CN110547034B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/082035 WO2018195823A1 (en) 2017-04-26 2017-04-26 Data transmission method, device and system

Publications (2)

Publication Number Publication Date
CN110547034A true CN110547034A (en) 2019-12-06
CN110547034B CN110547034B (en) 2022-07-29

Family

ID=63917868

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780089928.3A Active CN110547034B (en) 2017-04-26 2017-04-26 Data transmission method, equipment and system

Country Status (2)

Country Link
CN (1) CN110547034B (en)
WO (1) WO2018195823A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111885735B (en) * 2020-06-30 2023-10-31 广东小天才科技有限公司 Uplink scheduling indication method, terminal equipment and network equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123516A (en) * 2011-03-31 2011-07-13 电信科学技术研究院 Random access method and equipment based on multiple uplink timing advances
CN103458528A (en) * 2012-05-29 2013-12-18 华为技术有限公司 Contention-based random access method and contention-based random access equipment
CN103796315A (en) * 2012-11-02 2014-05-14 中兴通讯股份有限公司 PRB (Physical Resource Block) configuration method and device of USS (UE specific Search Space)
WO2015139318A1 (en) * 2014-03-21 2015-09-24 华为技术有限公司 Random access response method, base station, and terminal
CN105101223A (en) * 2014-05-16 2015-11-25 北京三星通信技术研究有限公司 Method and device for transmitting data on unlicensed frequency range
CN106385712A (en) * 2015-07-27 2017-02-08 中兴通讯股份有限公司 Data transmission method and system thereof
CN106470381A (en) * 2015-08-14 2017-03-01 中兴通讯股份有限公司 The processing method and processing device of Stochastic accessing

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200694B (en) * 2012-01-09 2017-04-12 华为技术有限公司 Random access method and device in communication system
CN105611646B (en) * 2014-11-07 2021-11-02 夏普株式会社 Base station, user equipment and method thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123516A (en) * 2011-03-31 2011-07-13 电信科学技术研究院 Random access method and equipment based on multiple uplink timing advances
CN103458528A (en) * 2012-05-29 2013-12-18 华为技术有限公司 Contention-based random access method and contention-based random access equipment
CN103796315A (en) * 2012-11-02 2014-05-14 中兴通讯股份有限公司 PRB (Physical Resource Block) configuration method and device of USS (UE specific Search Space)
WO2015139318A1 (en) * 2014-03-21 2015-09-24 华为技术有限公司 Random access response method, base station, and terminal
CN105101223A (en) * 2014-05-16 2015-11-25 北京三星通信技术研究有限公司 Method and device for transmitting data on unlicensed frequency range
CN106385712A (en) * 2015-07-27 2017-02-08 中兴通讯股份有限公司 Data transmission method and system thereof
CN106470381A (en) * 2015-08-14 2017-03-01 中兴通讯股份有限公司 The processing method and processing device of Stochastic accessing

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ERICSSON: "Early data transmission for NB-IoT", 《3GPP TSG RAN1#88BIS,R1-1706527》 *
HUAWEI, HISILICON: "Transmission of data during random access procedure", 《3GPP TSG RAN WG1 MEETING #88BIS,R1-1705121》 *
LG ELECTRONICS: "Data transmission during random access procedure in NB-IoT", 《3GPP TSG RAN WG1 MEETING #88BIS,R1-1704853》 *

Also Published As

Publication number Publication date
CN110547034B (en) 2022-07-29
WO2018195823A1 (en) 2018-11-01

Similar Documents

Publication Publication Date Title
US10849163B2 (en) Random access procedure for enhanced coverage support
US20220070938A1 (en) Method and apparatus for performing communication in wireless communication system
US11889565B2 (en) Method and system for handling random access response in wireless communication system
US10708922B2 (en) Method for enhanced transmission of control information, user equipment, base station, and communications system
US10912076B2 (en) Physical downlink control channel transmission method and apparatus
JP6535813B2 (en) Method and apparatus for transmitting physical downlink control channel
WO2017024998A1 (en) Data transmission method and device
KR102239712B1 (en) Techniques for multiple HARQ transmissions
JP2018518089A (en) Random Access Response Location Indicator for Coverage Extended Low Complexity Machine Type Communication
EP3703295A1 (en) Monitoring method and relevant apparatus for downlink control channel
US20160127092A1 (en) Contention based uplink transmission for coverage enhancement
JP6930022B2 (en) Network devices, terminal devices and related methods
US11297596B2 (en) Paging occasion start determination
EP3217755A1 (en) Transmission random access response method, and base station and user equipment
US20220022248A1 (en) Channel occupancy time indication for nr based unlicensed operation
CN105191458A (en) Method and device for transmitting and receiving system information
CN114391235A (en) Method of performing hybrid automatic repeat request process for non-prioritized uplink grants and related apparatus
US20230354404A1 (en) Method and apparatus for determining number of coded modulation symbols, and communications device
CN110547034B (en) Data transmission method, equipment and system
CN112399618B (en) Communication method and device
US20230189294A1 (en) Communication method and communication apparatus
CN114402657A (en) Communication method, device and system
EP3843488A1 (en) Method for transmitting data, and method and device for sending control information
EP3745631A1 (en) Wireless communication method, apparatus, and system
EP4138475A1 (en) Method, apparatus and system for determining resource

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant