CN110611960A - Access method and device - Google Patents

Access method and device Download PDF

Info

Publication number
CN110611960A
CN110611960A CN201810615839.4A CN201810615839A CN110611960A CN 110611960 A CN110611960 A CN 110611960A CN 201810615839 A CN201810615839 A CN 201810615839A CN 110611960 A CN110611960 A CN 110611960A
Authority
CN
China
Prior art keywords
message
terminal device
identifier
terminal
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810615839.4A
Other languages
Chinese (zh)
Inventor
邝奕如
姚楚婷
王键
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201810615839.4A priority Critical patent/CN110611960A/en
Priority to PCT/CN2019/091208 priority patent/WO2019238110A1/en
Publication of CN110611960A publication Critical patent/CN110611960A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • H04W74/0841Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure with collision treatment
    • H04W74/085Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure with collision treatment collision avoidance

Abstract

The embodiment of the application discloses an access method and equipment, relates to the field of communication, and can completely solve the problem of competition in the random access process of a plurality of terminal equipment and ensure that the terminal equipment can carry out normal communication. The method comprises the following steps: the terminal equipment sends a first message to the network equipment, wherein the first message comprises a first part of the identifier of the terminal equipment; the terminal equipment receives a second message sent by the network equipment, wherein the second message indicates whether the terminal equipment can solve the competition; the terminal equipment determines that competition can be solved according to the second message, and then sends a third message to the network equipment, wherein the third message comprises a second part of the identifier of the terminal equipment, and the first part of the identifier of the terminal equipment and the second part of the identifier of the terminal equipment form the identifier of the terminal equipment; the terminal equipment receives a fourth message sent by the network equipment, wherein the fourth message indicates whether the terminal equipment can solve the competition; and the terminal equipment determines that the competition can be solved according to the fourth message, and then accesses the network equipment.

Description

Access method and device
Technical Field
The embodiment of the application relates to the field of communication, in particular to an access method and equipment.
Background
A terminal equipment (UE) generally needs to perform a random access procedure to access the network device. In the Contention based (Contention based) random access procedure, each terminal device needs to send its identifier to the network device through the message 3, and the network device can resolve Contention based on the identifier of each terminal device. Specifically, the network device sends a message 4 to the terminal device, where the message 4 carries an identifier of the terminal device that successfully competes.
In a New Radio (NR) system of the fifth Generation (5Generation, 5G), a 5G core network may allocate a 5G SAE Temporary Mobile subscription identity (5G-Temporary Mobile subscription identity, 5G-S-TMSI) to each terminal device as an identity of the terminal, where the length of the 5G-S-TMSI is 48 bits, and since a message 3 in a Long Term Evolution (Long Term Evolution, LTE) can only accommodate an identity of 40 bits, the terminal device sends 40 bits of the 5G-S-TMSI to the network device through the message 3, and sends the remaining 8 bits of the 5G-S-TMSI to the network device through the message 5.
However, the message 4 cannot completely solve the contention during the random access of each terminal device, and there may be a plurality of terminal devices after the message 4 without solving the contention. Illustratively, two terminal devices have different 5G-S-TMSIs, but the first 40 bits of the 5G-S-TMSIs of the two terminal devices are the same, and it is assumed that the first 40 bits of the 5G-S-TMSIs of the two terminal devices are included in message 4, so both terminal devices consider themselves contending for successful access to the network after message 4 and would use the same configuration information (e.g., the same C-RNTI), causing confusion in subsequent scheduling. Therefore, the prior art cannot completely solve the problem of competition in the random access process of a plurality of terminal devices.
Disclosure of Invention
The embodiment of the application provides an access method and equipment, which can completely solve the problem of competition in the random access process of a plurality of terminal equipment and ensure that the terminal equipment can carry out normal communication.
In order to achieve the above purpose, the embodiment of the present application adopts the following technical solutions:
in a first aspect, an access method is disclosed, which includes: the terminal equipment firstly sends a first message to the network equipment, wherein the first message comprises a first part of an identifier of the terminal equipment; subsequently, the terminal device receives a second message sent by the network device, wherein the second message indicates whether the terminal device can solve the competition; the terminal device may determine, according to the second message, that contention can be resolved, and send a third message to the network device, where the third message includes a second part of the identifier of the terminal device, and the complete identifier of the terminal device is composed of the first part of the identifier of the terminal device and the second part of the identifier of the terminal device. Further, the terminal device receives a fourth message sent by the network device, the fourth message indicating whether the terminal device can resolve the contention, and if the terminal device determines that the contention can be resolved according to the fourth message, the terminal device accesses the network device.
In the access method provided by the embodiment of the invention, the terminal equipment sends part of the identification (such as 5G-S-TMSI) of the terminal equipment to the network equipment through the first message, the network equipment cannot completely distinguish different terminal equipment after receiving the first message sent by each terminal equipment, and then the network equipment sends the second message to the terminal equipment, and at the moment, the competition of the terminal equipment is not actually solved. Further, the rest part of the 5G-S-TMSI is put in a third message and sent to the network device, the network device can completely distinguish different terminal devices until receiving the rest part of the 5G-S-TMSI sent by the terminal device, and further sends a fourth message to the terminal device to indicate whether the contention is resolved, specifically, to indicate the identifier of the terminal where the contention is resolved, so that the terminal device can determine whether to resolve the contention by identifying the identifier in the fourth message after receiving the fourth message. So far, the contention of the terminal device random access can be completely solved.
With reference to the first aspect, in a first possible implementation manner of the first aspect, if the terminal device determines that the contention cannot be resolved according to the fourth message, the terminal device releases the connection with the network device.
In the embodiment of the present invention, the terminal device may determine that the contention fails according to the fourth message, and the terminal device cannot successfully access the network, and may further release the connection with the network device, and may then initiate the random access again.
With reference to the first aspect or the first possible implementation manner of the first aspect, in a second possible implementation manner of the first aspect, the fourth message includes a first media access control MAC control element CE, where the first MAC CE includes a second part of an identifier of the terminal device, or the first MAC CE includes the identifier of the terminal device, or the first MAC CE includes a part of content or all content of a third message, where the part of content of the third message at least includes the second part of the identifier of the terminal device.
In the embodiment of the present invention, the network device may not completely distinguish the terminal devices until receiving the third message sent by each terminal device, and therefore, the network device may indicate, through the MAC CE, the second part of the identifier of the terminal device whose contention is completely resolved or the identifier of the terminal device whose contention is completely resolved, and further, after receiving the fourth message, the terminal device may determine whether the contention is completely resolved according to the MAC CE therein.
With reference to the second possible implementation manner of the first aspect, in a third possible implementation manner of the first aspect, the fourth message further includes a first logical channel identifier value, and the first logical channel identifier value is used to indicate the first MAC CE.
The embodiment of the invention also designates a special logical channel identification value to indicate the MAC CE included in the fourth message, so that the terminal equipment can identify the fourth message according to the logical channel identification value, and further judge whether the competition can be completely solved.
With reference to the first aspect or the first possible implementation manner of the first aspect, in a fourth possible implementation manner of the first aspect, the fourth message is a radio resource control, RRC, message, and the RRC message includes a second part of the identifier of the terminal device, or the RRC message includes a part of content or all content of the third message, where the part of content of the third message at least includes the second part of the identifier of the terminal device.
In the embodiment of the present invention, the network device can completely distinguish each terminal device after receiving the third message sent by each terminal device, so that the network device can indicate the second part of the identifier of the terminal device whose contention is completely resolved or the identifier of the terminal device whose contention is completely resolved through the RRC message, and the terminal device can determine whether the contention can be completely resolved after receiving the RRC message sent by the network device.
With reference to the first aspect, in a fifth possible implementation manner of the first aspect, the indicating, by the second message, whether the terminal device can resolve the contention specifically includes: the second message comprises a second MAC CE comprising part or all of the content of the first message, wherein the part of the content of the first message comprises at least a first part of the identity of the terminal device.
In the embodiment of the present invention, the network device may indicate the first part of the identifier of the terminal device for resolving the contention through the MAC CE, and the terminal device may determine whether the contention can be resolved after receiving the RRC message sent by the network device. The contention resolution mentioned here is not completely resolved because the first parts of the plurality of terminal devices may be the same, the network device may not completely distinguish all the terminal devices after receiving the first message sent by each terminal, the identifier indicated by the second message may correspond to the plurality of terminal devices, and the terminal devices may not completely resolve the contention after receiving the second message.
With reference to the first aspect or any one of the first to fifth possible implementation manners of the first aspect, in a sixth possible implementation manner of the first aspect, an identifier of the terminal device is X bits, a first part of the identifier of the terminal device is Y bits, a second part of the identifier of the terminal device is Z bits, and X is equal to Y plus Z.
In the embodiment of the present invention, the identifier of the terminal device may be divided into two parts, each part includes a plurality of bits, and the two parts of bits are sent to the network device through the first message and the third message, respectively.
With reference to the first aspect or any one of the first to sixth possible implementation manners of the first aspect, in a seventh possible implementation manner of the first aspect, before the terminal device sends the first message to the network device, the method further includes: the terminal equipment sends a fifth message to the network equipment, wherein the fifth message comprises a random access lead code; and the terminal equipment receives a sixth message sent by the network equipment, wherein the sixth message comprises a random access response.
In the embodiment of the invention, the terminal equipment sends the random access lead code to the network equipment, so that the network equipment can calculate the transmission delay between the network equipment and the terminal equipment according to the random access lead code, the network equipment can send the transmission delay to the terminal equipment through the random access response, and the terminal equipment can calibrate the uplink timing according to the transmission delay.
With reference to the seventh possible implementation manner of the first aspect, in an eighth possible implementation manner of the first aspect, the random access response includes a temporary cell radio network temporary identity TC-RNTI, and the method further includes: and after the terminal equipment determines that the competition can be solved according to the fourth message, the terminal equipment sets the value of the TC-RNTI as the value of the cell radio network temporary identifier C-RNTI.
In the embodiment of the invention, after the terminal equipment receives the fourth message, the terminal equipment determines that the competition can be solved, and then sets the TC-RNT sent by the network equipment through the sixth message as the C-RNTI, and the TC-RNT can be used for communication with the network equipment subsequently.
In a second aspect, an access method is disclosed, which includes: the network equipment firstly receives a first message sent by the terminal equipment, wherein the first message comprises a first part of an identifier of the terminal equipment; subsequently, the network device sends a second message to the terminal device, wherein the second message indicates whether the terminal device can solve the competition; the network device may further receive a third message sent by the terminal device, where the third message is sent to the network device after the terminal device determines that contention resolution can be performed according to the second message, the third message includes a second part of the identifier of the terminal device, and the first part of the identifier of the terminal device and the second part of the identifier of the terminal device form the identifier of the terminal device. And finally, the network equipment sends a fourth message to the terminal equipment, wherein the fourth message indicates whether the terminal equipment can solve the competition, so that the terminal equipment can judge whether the terminal equipment can be accessed to the network equipment according to the fourth message.
In the access method provided by the embodiment of the invention, the terminal equipment sends part of the identification (such as 5G-S-TMSI) of the terminal equipment to the network equipment through the first message, the network equipment cannot completely distinguish different terminal equipment after receiving the first message sent by each terminal equipment, and then the network equipment sends the second message to the terminal equipment, and at the moment, the competition of the terminal equipment is not actually solved. Further, the rest part of the 5G-S-TMSI is put in a third message and sent to the network device, the network device can completely distinguish different terminal devices until receiving the rest part of the 5G-S-TMSI sent by the terminal device, and further sends a fourth message to the terminal device to indicate whether the contention is resolved, specifically, to indicate the identifier of the terminal where the contention is resolved, so that the terminal device can determine whether to resolve the contention by identifying the identifier in the fourth message after receiving the fourth message. So far, the contention of the terminal device random access can be completely solved.
With reference to the second aspect, in a first possible implementation manner of the second aspect, the fourth message includes a first medium access control MAC control element CE, and the first MAC CE includes a second part of the identifier of the terminal device, or the first MAC CE includes a part of content or all content of a third message, where the part of content of the third message at least includes the second part of the identifier of the terminal device.
With reference to the first possible implementation manner of the second aspect, in a second possible implementation manner of the second aspect, the fourth message further includes a first logical channel identifier value, and the first logical channel identifier value is used to indicate the first MAC CE.
With reference to the second aspect, in a third possible implementation manner of the second aspect, the fourth message is a radio resource control, RRC, message, and the RRC message includes a second part of the identifier of the terminal device, or the RRC message includes a part of content or all content of the third message, where the part of content of the third message at least includes the second part of the identifier of the terminal device.
With reference to the second aspect, in a fourth possible implementation manner of the second aspect, the indicating, by the second message, whether the terminal device can resolve the contention specifically includes: the second message comprises a second MAC CE comprising part or all of the content of the first message, wherein the part of the content of the first message comprises at least a first part of the identity of the terminal device.
With reference to the second aspect or any one of the first to fourth possible implementation manners of the second aspect, in a fifth possible implementation manner of the second aspect, an identifier of the end device is X bits, a first part of the identifier of the terminal device is Y bits, a second part of the identifier of the terminal device is Z bits, and X is equal to Y plus Z.
With reference to the second aspect or any one of the first to fifth possible implementation manners of the second aspect, in a sixth possible implementation manner of the second aspect, before the network device receives the first message sent by the terminal device, the method further includes: the network equipment receives a fifth message sent by the terminal equipment, wherein the fifth message comprises a random access lead code; and the network equipment sends a sixth message to the terminal equipment, wherein the sixth message comprises a random access response.
In a third aspect, a terminal device is disclosed, which includes: a sending unit, configured to send a first message to a network device, where the first message includes a first part of an identifier of a terminal device; a receiving unit, configured to receive a second message sent by a network device, where the second message indicates whether a terminal device can solve contention; a processing unit for determining that the contention can be resolved according to the second message; the sending unit is further configured to send a third message to the network device when the processing unit determines that the contention resolution can be performed according to the second message, where the third message includes a second part of the identifier of the terminal device, and the complete identifier of the terminal device is composed of the first part of the identifier of the terminal device and the second part of the identifier of the terminal device. Further, the receiving unit is further configured to receive a fourth message sent by the network device, where the fourth message indicates whether the terminal device can resolve the contention, and if the terminal device determines that the contention can be resolved according to the fourth message, the terminal device accesses the network device.
The terminal device provided by the embodiment of the invention sends a part of the identifier (such as 5G-S-TMSI) of the terminal device to the network device through the first message, the network device cannot completely distinguish different terminal devices after receiving the first message sent by each terminal device, and then the network device sends the second message to the terminal device, and at the moment, the competition of the terminal device is not actually solved. Further, the rest part of the 5G-S-TMSI is put in a third message and sent to the network device, the network device can completely distinguish different terminal devices until receiving the rest part of the 5G-S-TMSI sent by the terminal device, and further sends a fourth message to the terminal device to indicate whether the contention is resolved, specifically, to indicate the identifier of the terminal where the contention is resolved, so that the terminal device can determine whether to resolve the contention by identifying the identifier in the fourth message after receiving the fourth message. So far, the contention of the terminal device random access can be completely solved.
With reference to the third aspect, in a first possible implementation manner of the third aspect, the processing unit is further configured to release the connection with the network device if it is determined that the contention cannot be resolved according to the fourth message.
With reference to the third aspect or the first possible implementation manner of the third aspect, in a second possible implementation manner of the third aspect, the fourth message includes a first media access control MAC control element CE, where the first MAC CE includes a second part of the identifier of the terminal device, or the first MAC CE includes a part of content or all content of the third message, where the part of content of the third message at least includes the second part of the identifier of the terminal device.
With reference to the second possible implementation manner of the third aspect, in a third possible implementation manner of the third aspect, the fourth message further includes a first logical channel identification value, and the first logical channel identification value is used to indicate the first MAC CE.
With reference to the third aspect or the first possible implementation manner of the third aspect, in a fourth possible implementation manner of the third aspect, the fourth message is a radio resource control, RRC, message, and the RRC message includes a second part of the identifier of the terminal device, or the RRC message includes a part of content or all content of the third message, where the part of content of the third message at least includes the second part of the identifier of the terminal device.
With reference to the third aspect, in a fifth possible implementation manner of the third aspect, the indicating, by the second message, whether the terminal device can resolve the contention specifically includes: the second message comprises a second MAC CE comprising part or all of the content of the first message, wherein the part of the content of the first message comprises at least a first part of the identity of the terminal device.
With reference to the third aspect or any one of the first to fifth possible implementation manners of the third aspect, in a sixth possible implementation manner of the third aspect, the identifier of the terminal device is X bits, the first part of the identifier of the terminal device is Y bits, the second part of the identifier of the terminal device is Z bits, and X is equal to Y plus Z.
With reference to the third aspect or any one of the first to sixth possible implementation manners of the third aspect, in a seventh possible implementation manner of the third aspect, the sending unit is further configured to send a fifth message to the network device before sending the first message to the network device, where the fifth message includes a random access preamble; the receiving unit is further configured to receive a sixth message sent by the network device, where the sixth message includes a random access response.
With reference to the seventh possible implementation manner of the third aspect, in an eighth possible implementation manner of the third aspect, the random access response includes a temporary cell radio network temporary identity TC-RNTI, and the processing unit is further configured to set a value of the TC-RNTI to a value of the cell radio network temporary identity C-RNTI after determining that contention can be resolved according to the fourth message.
In a fourth aspect, a network device is disclosed, comprising: the terminal equipment comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving a first message sent by the terminal equipment, and the first message comprises a first part of an identifier of the terminal equipment; the processing unit generates a second message, and the second message indicates whether the terminal equipment can solve the competition; a sending unit, configured to send a second message to the terminal device; the receiving unit is further configured to receive a third message sent by the terminal device, where the third message is sent to the network device after the terminal device determines that contention can be resolved according to the second message, the third message includes a second part of the identifier of the terminal device, and the first part of the identifier of the terminal device and the second part of the identifier of the terminal device form the identifier of the terminal device. The sending unit is further configured to send a fourth message to the terminal device, where the fourth message indicates whether the terminal device can solve the contention, so that the terminal device determines whether the terminal device can access the network device according to the fourth message.
The network device provided by the embodiment of the invention receives the first message sent by the terminal device, acquires a part of the identifier (such as 5G-S-TMSI) of the terminal device, the network device cannot completely distinguish different terminal devices after receiving the first message sent by each terminal device, and then the network device sends the second message to the terminal device, and at the moment, the competition of the terminal device is not actually solved. Further, the rest part of the 5G-S-TMSI is put in a third message and sent to the network device, the network device can completely distinguish different terminal devices until receiving the rest part of the 5G-S-TMSI sent by the terminal device, and further sends a fourth message to the terminal device to indicate whether the contention is resolved, specifically, to indicate the identifier of the terminal where the contention is resolved, so that the terminal device can determine whether to resolve the contention by identifying the identifier in the fourth message after receiving the fourth message. So far, the contention of the terminal device random access can be completely solved.
With reference to the fourth aspect, in a first possible implementation manner of the fourth aspect, the fourth message includes a first medium access control MAC control element CE, and the first MAC CE includes the second part of the identifier of the terminal device, or the first MAC CE includes a part of content or all content of the third message, where the part of content of the third message at least includes the second part of the identifier of the terminal device.
With reference to the first possible implementation manner of the fourth aspect, in a second possible implementation manner of the fourth aspect, the fourth message further includes a first logical channel identifier value, and the first logical channel identifier value is used to indicate the first MAC CE.
With reference to the fourth aspect, in a third possible implementation manner of the fourth aspect, the fourth message is a radio resource control, RRC, message, and the RRC message includes the second part of the identifier of the terminal device, or the RRC message includes part of or all of the content of the third message, where the part of the content of the third message at least includes the second part of the identifier of the terminal device.
With reference to the fourth aspect, in a fourth possible implementation manner of the fourth aspect, the indicating, by the second message, whether the terminal device can resolve the contention specifically includes: the second message comprises a second MAC CE comprising part or all of the content of the first message, wherein the part of the content of the first message comprises at least a first part of the identity of the terminal device.
With reference to the fourth aspect or any one of the first to fourth possible implementation manners of the fourth aspect, in a fifth possible implementation manner of the fourth aspect, an identifier of the end device is X bits, a first part of the identifier of the terminal device is Y bits, a second part of the identifier of the terminal device is Z bits, and X is equal to Y plus Z.
With reference to the fourth aspect or any one of the first to fifth possible implementation manners of the fourth aspect, in a sixth possible implementation manner of the fourth aspect, the receiving unit is further configured to receive a fifth message sent by the terminal device before receiving the first message sent by the terminal device, where the fifth message includes a random access preamble; the sending unit is further configured to send a sixth message to the terminal device, where the sixth message includes the random access response.
In a fifth aspect, a terminal device is disclosed, which includes: a transceiver for transmitting a first message to the network device, the first message comprising a first part of an identity of the terminal device; the transceiver is used for receiving a second message sent by the network equipment, and the second message indicates whether the terminal equipment can solve the competition or not; a processor configured to determine from the second message that contention can be resolved; the transceiver is further configured to send a third message to the network device when the processor determines that the contention resolution can be performed according to the second message, where the third message includes a second part of the identifier of the terminal device, and the complete identifier of the terminal device is composed of the first part of the identifier of the terminal device and the second part of the identifier of the terminal device. Further, the transceiver is further configured to receive a fourth message sent by the network device, where the fourth message indicates whether the terminal device can resolve the contention, and if the terminal device determines that the contention can be resolved according to the fourth message, the terminal device accesses the network device.
The terminal device provided by the embodiment of the invention sends a part of the identifier (such as 5G-S-TMSI) of the terminal device to the network device through the first message, the network device cannot completely distinguish different terminal devices after receiving the first message sent by each terminal device, and then the network device sends the second message to the terminal device, and at the moment, the competition of the terminal device is not actually solved. Further, the rest part of the 5G-S-TMSI is put in a third message and sent to the network device, the network device can completely distinguish different terminal devices until receiving the rest part of the 5G-S-TMSI sent by the terminal device, and further sends a fourth message to the terminal device to indicate whether the contention is resolved, specifically, to indicate the identifier of the terminal where the contention is resolved, so that the terminal device can determine whether to resolve the contention by identifying the identifier in the fourth message after receiving the fourth message. So far, the contention of the terminal device random access can be completely solved.
With reference to the fifth aspect, in a first possible implementation manner of the fifth aspect, the processor is further configured to release the connection with the network device if it is determined that the contention cannot be resolved according to the fourth message.
With reference to the fifth aspect or the first possible implementation manner of the fifth aspect, in a second possible implementation manner of the fifth aspect, the fourth message includes a first medium access control MAC control element CE, where the first MAC CE includes a second part of the identifier of the terminal device, or the first MAC CE includes a part of content or all content of a third message, where the part of content of the third message at least includes the second part of the identifier of the terminal device.
With reference to the second possible implementation manner of the fifth aspect, in a third possible implementation manner of the fifth aspect, the fourth message further includes a first logical channel identifier value, and the first logical channel identifier value is used to indicate the first MAC CE.
With reference to the fifth aspect or the first possible implementation manner of the fifth aspect, in a fourth possible implementation manner of the fifth aspect, the fourth message is a radio resource control, RRC, message, and the RRC message includes a second part of the identifier of the terminal device, or the RRC message includes a part of content or all content of a third message, where the part of content of the third message at least includes the second part of the identifier of the terminal device.
With reference to the fifth aspect, in a fifth possible implementation manner of the fifth aspect, the indicating, by the second message, whether the terminal device can resolve the contention specifically includes: the second message comprises a second MAC CE comprising part or all of the content of the first message, wherein the part of the content of the first message comprises at least a first part of the identity of the terminal device.
With reference to the fifth aspect or any one of the first to fifth possible implementation manners of the fifth aspect, in a sixth possible implementation manner of the fifth aspect, the identifier of the terminal device is X bits, the first part of the identifier of the terminal device is Y bits, the second part of the identifier of the terminal device is Z bits, and X is equal to Y plus Z.
With reference to the fifth aspect or any one of the first to sixth possible implementation manners of the fifth aspect, in a seventh possible implementation manner of the fifth aspect, the transceiver is further configured to send a fifth message to the network device before sending the first message to the network device, where the fifth message includes a random access preamble; the transceiver is further configured to receive a sixth message sent by the network device, where the sixth message includes a random access response.
With reference to the seventh possible implementation manner of the fifth aspect, in an eighth possible implementation manner of the fifth aspect, the random access response includes a temporary cell radio network temporary identity TC-RNTI, and the processor is further configured to set a value of the TC-RNTI to a value of the cell radio network temporary identity C-RNTI after determining that contention resolution is possible according to the fourth message.
In a sixth aspect, a network device is disclosed, comprising: the transceiver is used for receiving a first message sent by the terminal equipment, wherein the first message comprises a first part of the identification of the terminal equipment; a processor which generates a second message indicating whether the terminal device can resolve the contention; a transceiver for transmitting a second message to the terminal device; the transceiver is further configured to receive a third message sent by the terminal device, where the third message is sent to the network device after the terminal device determines that contention can be resolved according to the second message, the third message includes a second part of the identifier of the terminal device, and the first part of the identifier of the terminal device and the second part of the identifier of the terminal device form the identifier of the terminal device. The transceiver is further configured to send a fourth message to the terminal device, where the fourth message indicates whether the terminal device is capable of resolving contention, so that the terminal device determines whether the terminal device is capable of accessing the network device according to the fourth message.
The network device provided by the embodiment of the invention receives the first message sent by the terminal device, acquires a part of the identifier (such as 5G-S-TMSI) of the terminal device, the network device cannot completely distinguish different terminal devices after receiving the first message sent by each terminal device, and then the network device sends the second message to the terminal device, and at the moment, the competition of the terminal device is not actually solved. Further, the rest part of the 5G-S-TMSI is put in a third message and sent to the network device, the network device can completely distinguish different terminal devices until receiving the rest part of the 5G-S-TMSI sent by the terminal device, and further sends a fourth message to the terminal device to indicate whether the contention is resolved, specifically, to indicate the identifier of the terminal where the contention is resolved, so that the terminal device can determine whether to resolve the contention by identifying the identifier in the fourth message after receiving the fourth message. So far, the contention of the terminal device random access can be completely solved.
With reference to the sixth aspect, in a first possible implementation manner of the sixth aspect, the fourth message includes a first medium access control MAC control element CE, and the first MAC CE includes the second part of the identifier of the terminal device, or the first MAC CE includes a part of content or all content of the third message, where the part of content of the third message at least includes the second part of the identifier of the terminal device.
With reference to the first possible implementation manner of the sixth aspect, in a second possible implementation manner of the sixth aspect, the fourth message further includes a first logical channel identifier value, and the first logical channel identifier value is used to indicate the first MAC CE.
With reference to the sixth aspect, in a third possible implementation manner of the sixth aspect, the fourth message is a radio resource control, RRC, message, and the RRC message includes the second part of the identifier of the terminal device, or the RRC message includes part of or all of the content of the third message, where the part of the content of the third message at least includes the second part of the identifier of the terminal device.
With reference to the sixth aspect, in a fourth possible implementation manner of the sixth aspect, the indicating, by the second message, whether the terminal device can resolve the contention specifically includes: the second message comprises a second MAC CE comprising part or all of the content of the first message, wherein the part of the content of the first message comprises at least a first part of the identity of the terminal device.
With reference to the sixth aspect or any one of the first to fourth possible implementation manners of the sixth aspect, in a fifth possible implementation manner of the sixth aspect, the identifier of the end device is X bits, the first part of the identifier of the terminal device is Y bits, the second part of the identifier of the terminal device is Z bits, and X is equal to Y plus Z.
With reference to the sixth aspect or any one of the first to fifth possible implementation manners of the sixth aspect, in a sixth possible implementation manner of the sixth aspect, the transceiver is further configured to receive a fifth message sent by the terminal device before receiving the first message sent by the terminal device, where the fifth message includes a random access preamble; the transceiver is further configured to send a sixth message to the terminal device, the sixth message including the random access response.
In a seventh aspect, a computer-readable storage medium is disclosed, comprising: the computer readable storage medium has instructions stored therein; when the computer-readable storage medium runs on the terminal device according to any one of the implementation manners of the third aspect and the third aspect, the fifth aspect and the fifth aspect, the terminal device is caused to perform the access method according to any one of the implementation manners of the first aspect and the first aspect, the second aspect and the second aspect.
In an eighth aspect, a computer-readable storage medium is disclosed, comprising: the computer readable storage medium has instructions stored therein; when the computer-readable storage medium is run on the network device according to any one of the above-mentioned fourth aspect and any one of the above-mentioned implementation manners of the fourth aspect, and the above-mentioned sixth aspect and any one of the above-mentioned implementation manners of the sixth aspect, the network device is caused to perform the access method according to any one of the above-mentioned implementation manners of the first aspect and any one of the above-mentioned implementation manners of the first aspect, the second aspect and the second aspect.
In a ninth aspect, a wireless communications apparatus is disclosed that includes: instructions are stored in the wireless communication device; when the wireless communication apparatus runs on the terminal device according to any one of the implementation manners of the third aspect and the third aspect, the fifth aspect and the fifth aspect, the terminal device is caused to perform the access method according to any one of the implementation manners of the first aspect and the first aspect, the second aspect and the second aspect, and the wireless communication apparatus is a chip.
In a tenth aspect, a wireless communications apparatus is disclosed that includes: instructions are stored in the wireless communication device; when the wireless communication apparatus is operated on the network device according to any one of the foregoing implementation manners of the fourth aspect and the fourth implementation manner of the sixth aspect, and the foregoing implementation manners of the sixth aspect and the sixth aspect, the network device is caused to perform the access method according to any one of the foregoing implementation manners of the first aspect and the first aspect, the second aspect, and the wireless communication apparatus is a chip.
Drawings
Fig. 1 is an architecture diagram of a communication network provided by an embodiment of the present invention provided in the present application;
fig. 2 is a flow chart illustrating a random access procedure in the prior art;
fig. 3 is a block diagram of a network device according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating an access method according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a first MAC CE included in a fourth message according to an embodiment of the present invention;
fig. 6 is another schematic diagram of a first MAC CE included in a fourth message according to an embodiment of the present invention;
fig. 7 is another schematic diagram of a first MAC CE included in a fourth message according to an embodiment of the present invention;
fig. 8 is another flowchart of an access method according to an embodiment of the present invention;
fig. 9 is another block diagram of a network device according to an embodiment of the present invention;
fig. 10 is another block diagram of a network device according to an embodiment of the present invention;
fig. 11 is a block diagram of a terminal device according to an embodiment of the present invention;
fig. 12 is another block diagram of a terminal device according to an embodiment of the present invention;
fig. 13 is another block diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
As shown in fig. 1, which is an architecture diagram of a communication network provided in an embodiment of the present invention, a network device is connected to a 5G core network, and the network device may be a 4G network device or a 5G network device. When a terminal device in a Radio Resource Control (RRC) idle state has uplink data to be sent, or receives a paging message sent by a network device, where the paging message indicates that the terminal device needs to receive downlink data, the terminal device first needs to access the network device before performing operations such as making a call, receiving a call, uploading data, or downloading data with the network device in advance. Different terminal devices can establish connection with the network device through a competitive random access mode. Referring to fig. 1, a terminal device with contention resolution may establish a connection with a network device, that is, may further communicate with the network device, and a terminal device with contention resolution may temporarily fail to establish a connection with the network device, may initiate random access again, and may establish a connection with the network device only after contention resolution.
Specifically, the network device may broadcast a System information (System information), and the terminal device may obtain a Random Access Preamble (Random Access Preamble) according to the System information broadcast by the network device, so as to initiate Random Access. Referring to fig. 2, a random access procedure of the related art is described by taking a terminal device 1, a terminal device 2, and a terminal device 3 as examples. Specifically, the random access procedure in the prior art includes the following 5 steps:
step 201: the terminal device sends a random access request to the network device, the random access request including a random access preamble.
Specifically, there may be a plurality of terminal devices sending random access requests to the network device, such as: terminal device 1, terminal device 2, and terminal device 3 in fig. 2. The random access preamble in the random access request is used to notify the network device of a random access request, and at the same time, the network device can estimate the transmission delay between the network device and the terminal device and calibrate the uplink timing. In the embodiment of the present invention, the random access request may be referred to as message 1.
It should be noted that, because each terminal device randomly selects a Random Access preamble and a Physical Random Access Control Channel (PRACH) resource, multiple terminal devices may select the same Random Access preamble and PRACH resource, that is, multiple terminal devices collide or compete, so that the network device cannot distinguish different terminal devices from the message 1, and therefore, the contention resolution needs to be performed on the message 3 and the message 4 in the subsequent step. The PRACH resources are physical resources used for transmitting the random access preamble.
Step 202: the network device sends a Random Access Response (RAR) to the terminal device.
Specifically, the network device replies a random access response to a plurality of terminal devices that send random access requests, such as: terminal device 1, terminal device 2, and terminal device 3 in fig. 2.
In the embodiment of the present invention, the random access response may be referred to as message 2. Specifically, the message 2 may include a MAC sub-Protocol Data Unit (sub-pdu) composed of a Medium Access Control (MAC) sub-header (sub-header) and a MAC RAR, and one or more MAC sub-pdus may constitute one MAC pdu. The MAC RAR may include at least one of a Timing advance command (Timing advance command), an uplink resource allocated to the message 3, and a Temporary Cell Radio network Temporary Identifier (TC-RNTI) allocated to the terminal device.
The terminal device receiving the RAR may perform uplink synchronization according to the TA, or may send the message 3 to the network device using the uplink resource allocated to the message 3. In addition, after the terminal contention is resolved, the terminal device may change the TC-RNTI to a Cell Radio Network Temporary Identifier (C-RNTI).
After the terminal device sends the message 1 to the network device, the message 2 sent by the network device is received in an RAR time window (RA Response window). If the terminal device does not receive the message 2 replied by the network device within the RAR time window, the terminal device considers that the random access process fails. If the terminal device receives the message 2 replied by the network device within the RAR time window, step 203 is executed.
Step 203: the terminal device sends a message 3 to the network device, and the message 3 needs to contain the identifier of each terminal device.
Specifically, the terminal device receiving the random access response sends a message 3 to the network device, such as: terminal device 1, terminal device 2, and terminal device 3 in fig. 2.
It should be noted that the content of the message 3 may also be different according to different states of the terminal device and different application scenarios. For example: if the access scenario is the initial access scenario, the message 3 is an RRC Connection Request message (RRC Connection Request), and the unique identifier of the terminal device carried in the message 3 may be an SAE temporary mobile subscription identifier (SAE-temporary mobile Subscriber Identity, S-TMSI) or a random number.
It should be noted that, referring to fig. 1, the network device that the terminal device requests to access is connected to the 5G core network. In the 5G NR system, the 5G core network allocates 5G-S-TMSI to each terminal device as an identifier of the terminal, and as long as the network device to which the terminal device requests to access is connected to the 5G core network, the identifier of the terminal device is the 5G-S-TMSI with a length of 48 bits.
When the network device requested to access by the terminal device is a 4G network device, the message 3 needs to satisfy the requirement of the 4G network, and the size of the message 3 in the 4G network is 56 bits, which can only accommodate an identifier with a length of 40 bits, such as an SAE-Temporary Mobile subscription identifier (S-TMSI) of the 4G network.
When the network device requested to be accessed by the terminal device is a 5G network device, the message 3 sent by the terminal device to the network device may follow the message 3 in the 4G network, and the length and format of the message cannot be changed, and only the identifier with the length of 40 bits, such as the S-TMSI of the 4G network, can be accommodated.
It can be seen that since the length of the 5G-S-TMSI is 8 bits more than that of the S-TMSI, message 3 cannot send the complete 5G-S-TMSI, and only a part of the 5G-S-TMSI can be sent to the network device via message 3, for example, 40 bits of the 5G-S-TMSI are sent, and the rest of the 5G-S-TMSI can be sent to the network device via other messages, for example, 8 bits of the rest of the 5G-S-TMSI are sent.
Step 204: and the network equipment sends a message 4 to the terminal equipment, wherein the message 4 carries the identification of the terminal equipment for solving the competition.
Specifically, the network device replies with a message 4 to the plurality of terminal devices that sent the message 3, indicating contention resolution, such as: in fig. 2 the network device sends a message 4 to the terminal device 1, the terminal device 2 and the terminal device 3.
After receiving the message 4, each terminal device can determine whether the competition can be resolved by comparing the identifier in the message 4 with its own identifier. If the terminal device determines that the identifier in the message 4 is the same as the corresponding part of the identifier of the terminal device, it is determined that the contention can be resolved, that is, the terminal device successfully contends and can access the network device. If the identifier in the message 4 is different from the corresponding part of the identifier of the terminal device, that is, the terminal device cannot solve the contention, that is, the terminal device fails to compete and cannot access the network device, the terminal device may re-initiate the random access.
It should be noted that, since only a part of the 5G-S-TMSI is carried in the message 3, a part of the 5G-S-TMSI is also carried in the message 4 to specify the terminal device that successfully accesses the network device for contention resolution. For example, the message 3 carries 40 rightmost bits of the 5G-S-TMSI of the contention resolution terminal device, and after receiving the message 4, each terminal device determines whether the identifier of the 40 bits is the same as the rightmost 40 bits of its own 5G-S-TMSI, and if the identifier of the 40 bits is the same as the rightmost 40 bits of its own 5G-S-TMSI, the terminal device considers contention resolution and can successfully access the network. Otherwise, if the two are different, the terminal device considers that the contention is not solved and cannot successfully access the network.
Step 205: after receiving the message 4, the terminal device for contention resolution needs to send a message 5 to the network device, and notify the rest of its 5G-S-TMSI to the network device.
Referring to fig. 2, the terminal devices for contention resolution after receiving the message 4 may be the terminal device 2 and the terminal device 3, and certainly, the terminal devices for contention resolution are not limited to the terminal device 2 and the terminal device 3, which is only used as an example, and the terminal devices for contention resolution are not limited in the embodiment of the present invention.
That is, the terminal device sends a part of the 5G-S-TMSI to the network device in message 3 and sends the remaining part of the 5G-S-TMSI to the network device in message 5, so that after the terminal device sends message 5, the network device or the core network can know the complete 5G-S-TMSI of the terminal device.
Since message 3 only comprises a part of the 5G-S-TMSI, message 4 does not fully resolve contention for random access for all terminal devices, and there may be a plurality of terminal devices that do not resolve contention after message 4. For example, two terminal devices have different 5G-S-TMSIs, but a part of the 5G-S-TMSI may be the same, if the same part of the 5G-S-TMSI of the two terminal devices is carried in the message 4 sent by the network device, the two terminals both consider themselves to have resolved the contention, successfully access the network, and use the same configuration information, such as: the same cell radio network temporary identity C-RNTI causes confusion of subsequent scheduling.
The embodiment of the invention provides an access method, wherein a terminal device sends a part of own 5G-S-TMSI to a network device through a first message, the network device cannot completely distinguish different terminal devices after receiving the first message sent by each terminal device, and then the network device sends a second message to the terminal device, and at the moment, the competition of the terminal device is not actually solved. Further, the rest part of the 5G-S-TMSI is put in a third message and sent to the network device, the network device can completely distinguish different terminal devices until receiving the rest part of the 5G-S-TMSI sent by the terminal device, and further sends a fourth message to the terminal device to indicate whether the contention is resolved, specifically, to indicate the identifier of the terminal where the contention is resolved, so that the terminal device can determine whether to resolve the contention by identifying the identifier in the fourth message after receiving the fourth message. So far, the contention of the terminal device random access can be completely solved.
An embodiment of the present invention provides a network device 30, as shown in fig. 3, where the network device 30 includes the network device shown in fig. 3, and the access method provided in the embodiment of the present invention is applicable. As shown in fig. 3, the terminal device may include at least one processor 301, memory 302, transceiver 303, and communication bus 304.
The following describes each constituent component of the terminal device in detail with reference to fig. 3:
the processor 301 is a control center of the terminal device, and may be a single processor or a collective term for a plurality of processing elements. For example, the processor 301 is a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement embodiments of the present invention, such as: one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs).
The processor 301 may perform various functions of the terminal device by running or executing software programs stored in the memory 302 and calling data stored in the memory 302, among other things.
In particular implementations, processor 301 may include one or more CPUs such as CPU0 and CPU1 shown in fig. 3 for one embodiment.
In particular implementations, a terminal device may include multiple processors, such as processor 301 and processor 305 shown in FIG. 3, for example, as an example. Each of these processors may be a single-Core Processor (CPU) or a multi-Core Processor (CPU). A processor herein may refer to one or more terminal devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
The Memory 302 may be a Read-Only Memory (ROM) or other types of static storage terminal devices that can store static information and instructions, a Random Access Memory (RAM) or other types of dynamic storage terminal devices that can store information and instructions, an Electrically Erasable Programmable Read-Only Memory (EEPROM), a compact disc Read-Only Memory (CD-ROM) or other optical disc storage, optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage terminal devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to such. The memory 302 may be self-contained and coupled to the processor 301 through a communication bus 304. The memory 302 may also be integrated with the processor 301.
The memory 302 is used for storing software programs for implementing the scheme of the present invention, and is controlled by the processor 301 to execute.
The transceiver 303 uses any transceiver-like terminal device for communication between other terminal devices. Of course, the transceiver 303 may also be used for communicating with a communication network, such as an ethernet, a Radio Access Network (RAN), a Wireless Local Area Network (WLAN), and so on. The transceiver 303 may include a receiving unit implementing a receiving function and a transmitting unit implementing a transmitting function.
The communication bus 304 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 3, but this does not mean only one bus or one type of bus.
The terminal device architecture shown in fig. 3 does not constitute a limitation of the terminal device and may include more or fewer components than those shown, or some of the components may be combined, or a different arrangement of components.
In this embodiment of the present invention, the network device 30 receives a first message sent by the terminal device, where the first message includes a first part of an identifier of the terminal device. Further, the network device 30 sends a second message to the terminal device, the second message indicating whether the terminal device is capable of resolving the contention. It should be noted that, after receiving the first message sent by each terminal device, the network device 30 cannot completely distinguish different terminal devices, so that the second message cannot completely solve the random access contention of each terminal device, and the contention of some terminal devices is still not solved. After that, the network device 30 may further receive a third message sent by the terminal device, where the third message includes the second part of the identifier of the terminal device, and the first part of the identifier of the terminal device and the second part of the identifier of the terminal device constitute the identifier of the terminal device. In addition, the third message is sent to the network device after the terminal device determines that the contention can be resolved according to the second message. The network device 30 may further send a fourth message to the terminal device, where the fourth message indicates whether the terminal device can resolve the contention, so that the terminal device determines whether the terminal device can access the network device according to the fourth message. The network device 30 can completely distinguish different terminal devices after receiving the third message sent by the terminal device, and further send a fourth message to the terminal device to indicate whether the contention is resolved, specifically, to indicate an identifier of the terminal where the contention is resolved, so that the terminal device can determine whether to resolve the contention by recognizing the identifier in the fourth message after receiving the fourth message. So far, the contention of the terminal device random access can be completely solved.
An embodiment of the present invention provides an access method, as shown in fig. 4, the method includes the following steps:
step 401, the terminal device sends a fifth message to the network device, where the fifth message includes a random access preamble.
It should be noted that, the fifth message according to the embodiment of the present invention may be the message 1 shown in fig. 2 according to the embodiment of the present invention, and the random access preamble is carried to notify the network device of the random access request of the terminal device.
Step 402, the network device sends a sixth message to the terminal device, where the sixth message includes a random access response.
The sixth message according to the embodiment of the present invention may be the message 2 shown in fig. 2. Specifically, the sixth message may include a MAC sub-PDU consisting of a MAC subheader and a MAC RAR, and one or more MAC sub-PDUs constitute one MAC PDU. The MAC RAR may include at least one of a Timing advance command (Timing advance command), an uplink resource allocated to the first message, and a Temporary Cell Radio network Temporary Identifier (TC-RNTI) allocated to the terminal device.
After the terminal device sends the fifth message to the network device, the sixth message sent by the network device is received within an RAR time window (RA Response window). If the terminal device does not receive the sixth message replied by the network device within the RAR time window, the terminal device considers that the random access process fails. If the terminal device receives the sixth message replied by the network device within the RAR time window, step 403 is executed.
Step 403, the terminal device sends a first message to the network device, where the first message includes a first part of the identifier of the terminal device.
The first message in the embodiment of the present invention may be the message 3 shown in fig. 2 in the embodiment of the present invention. Specifically, in the initial access scenario, the first message is an RRC Connection Request message (RRC Connection Request), and the first message includes a first part of the identifier of the terminal device, for example, the first part of the identifier of the terminal device may be a part of the 5G-S-TMSI of the terminal device. In addition, the first message may further include an establishment cause (initialization cause) for indicating a reason for initiating the RRC connection request.
In the embodiment of the invention, the network equipment is connected with a 5G core network, and the identifier of the terminal equipment can be 5G-S-TMSI with the length of 48 bits. Generally, a network device is an LTE network device or an NR network device, and a first message sent by a terminal device to the network device can only carry a terminal device identifier of 40 bits, so that the first message cannot carry a complete 5G-S-TMSI, and in the embodiment of the present invention, a part of the identifier of the terminal device may be sent to the network device through the first message, for example: in the first part of the identifier of the terminal device according to the embodiment of the present invention, the length of the first part of the identifier of the terminal device is, of course, less than or equal to 40 bits, that is, the first part of the identifier of the terminal device needs to be within the first message accommodation range. Illustratively, the identifier of the terminal device is X bits, the first part of the identifier of the terminal device is Y bits, Y is an integer less than or equal to 40, the second part of the identifier of the terminal device is Z bits, and X is equal to Y plus Z.
It should be noted that the first part of the identifier of the terminal device may be Y consecutive bits, or Y discontinuous bits. Likewise, the second part of the identity of the terminal device may be Z consecutive bits, or may be Z discontinuous bits. The embodiment of the present invention is not limited by the comparison, and the first part of the identifier of the terminal device and the second part of the identifier of the terminal device may form the identifier of the terminal device. For example, the first part of the identity of the terminal device may be the rightmost 40 bits of the 5G-S-TMSI and the second part of the identity of the terminal device may be the remaining 8 bits of the 5G-S-TMSI. Taking a simple example, the identification of the terminal device is "1101101", the length is 7 bits, the first part of the identification of the terminal device may be the rightmost 4 bits "1101", and the second part of the identification of the terminal device may be the remaining 3 bits "110".
In the embodiment of the present invention, the identifier of the terminal device may be different according to the different states of the terminal device and the different application scenarios. For example: if the access scene is the initial access scene, the first message is an RRC connection request message, and the identifier of the terminal equipment can be 5G-S-TMSI or a random number; if the scene is an RRC connection reestablishment scene, the first message is an RRC connection reestablishment message, and if the scene is other scenes in which the terminal device is in an RRC connection state, the identifier of the terminal device can also be a C-RNTI.
404. And the network equipment sends a second message to the terminal equipment, wherein the second message indicates whether the terminal equipment can solve the competition.
The second message in the embodiment of the present invention may be message 4 shown in fig. 2. The second message includes a second Medium Access Control (MAC) Control Element (CE), and the second MAC CE includes a part of or all of the content of the first message, where the part of the content of the first message at least includes a first part of the identifier of the terminal device. In the embodiment of the present invention, since the terminal device only sends a part of the 5G-S-TMSI to the network device through the first message, after receiving the first message sent by each terminal device, the network device can only know a part of the identifier of each terminal sending the first message, and cannot completely distinguish all terminal devices. That is, the partial identifier carried in the second message by the network device may correspond to a plurality of terminal devices, such as: the rightmost 40 bits of the 5G-S-TMSI of the plurality of terminal devices are identical and the second message carries these 40 bits. Therefore, the terminal device can only solve the contention of random access of a part of terminal devices by sending the second message.
After receiving the second message sent by the network device, the terminal device may parse the second message to obtain the identifier therein. Further, the obtained identifier may be compared with the identifier of the terminal device, and if the identifier in the second message is the same as the corresponding part of the identifier of the terminal device, the contention is considered to be resolved, and step 405 is executed; if the identifier in the second message is different from the corresponding part of the identifier of the terminal device, the contention is not solved, the network device cannot be successfully accessed, and the random access can be restarted. It should be noted that, the part of the second message corresponding to the identifier of the terminal device itself may be understood as: the terminal device carries which bits of the identifier of the terminal device itself in the first message, and after receiving the second message, the terminal device also needs to compare with the bits accordingly. Illustratively, the first message carries 40 rightmost bits of the 5G-S-TMSI, and after the terminal device parses the identifier in the second message, the terminal device needs to compare the identifier with the 40 rightmost bits of the 5G-S-TMSI, and if the identifier is the same as the identifier in the second message, the terminal device considers that the contention is resolved, and then step 405 is executed. Otherwise, if different, the contention is considered unresolved.
Step 405, the terminal device determines that the contention can be resolved, and then sends a third message to the network device, where the third message includes a second part of the identifier of the terminal device.
The third message in the embodiment of the present invention may be a message 5 shown in fig. 2, where the message 5 needs to include the remaining part of the identifier of the terminal device, such as: the first message carries the rightmost 40 bits of the 5G-S-TMSI and the third carries the remaining 8 bits of the 5G-S-TMSI. Because the second part of the identifier of the terminal device and the first part of the identifier of the terminal device constitute the identifier of the terminal device, the network device can know all the contents of the 5G-S-TMSI of each terminal device after receiving the third message sent by each terminal device, and can completely distinguish each terminal device sending the third message.
406. And the network equipment sends a fourth message to the terminal equipment, wherein the fourth message indicates whether the terminal equipment can solve the competition.
In the embodiment of the present invention, the network device may specify, in the fourth message, a terminal device that successfully accesses the network, that is, a terminal device for contention resolution. Since the network device can completely distinguish each terminal device that sends the third message after receiving the third message sent by the terminal device, further, the identifier carried by the fourth message can correspond to only one terminal device, that is, only one terminal device that is to be solved through the contention specified by the fourth message, so that the contention of random access of all terminal devices can be completely solved.
In a specific implementation, the fourth message may include a first media access control MAC control element CE, where the first MAC CE includes the second part of the identifier of the terminal device, or the first MAC CE includes part of or all of the content of the third message, where the part of the content of the third message at least includes the second part of the identifier of the terminal device.
Several possible implementations of the fourth message are described below in conjunction with the figures, including in particular:
(1) the fourth message includes a first MAC CE, which includes a second part of the identifier of the terminal device for contention resolution specified by the network device. Illustratively, the first part of the identification of the terminal device is the rightmost 40 bits of the 5G-S-TMSI of the terminal device, and the second part of the identification of the terminal device is the remaining 8 bits of the 5G-S-TMSI of the terminal device, and one possible format of the MAC CE is shown in fig. 5, and the MAC CE has a length of one byte (Octet, Oct), and the one MAC CE includes the remaining 8 bits of the 5G-S-TMSI.
(2) The fourth message includes a first MAC CE including the first part of the identity of the terminal device and the second part of the identity of the terminal device, i.e. including the complete 5G-S-TMSI. One possible format of the MAC CE is shown in fig. 6, the MAC CE has a length of 8 bytes, the MAC CE includes 48 bits of complete 5G-S-TMSI, the 48 bits of complete 5G-S-TMSI are sequentially divided into 8 parts, each part has a length of 8 bits, the 8 bytes included in the MAC CE include the 8 parts of the 5G-S-TMSI, respectively, the first byte of the MAC CE includes the first 8 bits of the 5G-S-TMSI, the second byte of the MAC CE includes the second 8 bits of the 5G-S-TMSI, the third byte of the MAC CE includes the third 8 bits of the 5G-S-TMSI, the fourth byte of the MAC CE includes the fourth 8 bits of the 5G-S-TMSI, the fifth byte of the MAC CE includes the fifth 8 bits of the 5G-S-si, the sixth byte of the MAC CE comprises the sixth 8 bits of the 5G-S-TMSI, the seventh byte of the MAC CE comprises the seventh 8 bits of the 5G-S-TMSI, and the eighth byte of the MAC CE comprises the eighth 8 bits of the 5G-S-TMSI.
(3) The fourth message includes a first MAC CE including a part or all of the contents of the third message. Specifically, the MAC CE includes q bits of the third message, or q bits of a Dedicated Control Channel (DCCH) Service Data Unit (SDU) of the third message, that is, the fourth message includes only a part of the content of the third message. It should be noted that, according to the embodiment of the present invention, q bits may refer to q rightmost bits. The q bits at least need to include the second part of the identifier of the terminal device, so that the terminal device can determine whether it can resolve the contention after receiving the fourth message. Of course, if q is large enough, the MAC CE may also contain the entire contents of the third message. It should be noted that if a different 5G-S-TMSI can be indicated by a part of the content of the third message to indicate a different terminal device, the fourth message needs to be able to embody the part of the content of the third message.
Taking the second part of the identity of the terminal device as the rightmost 8 bits of the 5G-S-TMSI of the terminal device, q ═ 16 as an example, one possible format of the MAC CE is shown in fig. 7. The length of the MAC CE may be 2 bytes, and the MAC CE includes the first 16 bits of the third message, i.e., the rightmost 16 bits of the third message. The first 16 bits of the third message are sequentially divided into 2 parts according to the sequence from right to left, each part is 8 bits in length, the 2 bytes included in the MAC CE respectively include the division into 2 parts, each part includes 8 bits, and the division from right to left is sequentially referred to as the first 8 bits and the second 8 bits. The first byte of the MAC CE includes the first 8 bits, i.e., the rightmost 8 bits of the third message, and the second byte of the MAC CE includes the second 8 bits, i.e., 8 bits of the rightmost 16 bits of the third message, excluding the first 8 bits.
In some embodiments, the fourth message may further include a first Logical Channel Identification value (LCID) indicating the first MAC CE in the fourth message, such as the first MAC CE shown in fig. 5, 6, or 7. Referring to table 1, different logical channel identifier values may indicate different MACCEs, and in the embodiment of the present invention, the logical channel identifier value corresponding to the first MAC CE in the fourth message is one of the originally reserved LCID values, for example, the logical channel identifier value corresponding to the first MAC CE is one of the originally reserved LCID values 100010 and 110101.
TABLE 1
Specifically, the first logical channel identifier value is in a MAC subheader in a MAC sub-PDU in the MAC PDU of the fourth message, and when the MAC subheader in the MAC sub-PDU includes the first logical channel identifier value, it indicates that the MAC sub-PDU includes the first MAC CE, where a format of the first MAC CE may be the format of the first MAC CE shown in fig. 5, fig. 6, or fig. 7.
In some embodiments, the fourth message may also be an RRC message, where the RRC message includes the second part of the identifier of the terminal device, or the RRC message includes part of or all of the content of the third message, where the part of the content of the third message includes at least the second part of the identifier of the terminal device. Similarly, the RRC message includes q bits of the third message, or the MAC CE includes q bits of a Dedicated Control Channel (DCCH) Service Data Unit (SDU) of the third message, that is, the fourth message includes only a part of the content of the third message. It should be noted that, in the embodiment of the present invention, q bits may refer to q rightmost bits. The q bits at least need to include the second part of the identifier of the terminal device, so that the terminal device can determine whether it can resolve the contention after receiving the fourth message. Of course, if q is large enough, the RRC message may also contain the entire contents of the third message. It should be noted that if a different 5G-S-TMSI can be indicated by a part of the content of the third message to indicate a different terminal device, the RRC message needs to be able to embody the part of the content of the third message.
407. And the terminal equipment determines that the competition can be solved according to the fourth message, and then accesses the network equipment.
After receiving the fourth message, the terminal device may parse the fourth message to obtain the identifier or the content therein.
Optionally, further, the obtained identifier may be compared with the identifier of the terminal device, and if the identifier in the second message is the same as the corresponding part of the identifier of the terminal device, it is determined that the contention can be resolved, and the network device may be successfully accessed; if the identifier in the fourth message is different from the corresponding part of the identifier of the terminal device, it is determined that the contention is not resolved, the network device cannot be successfully accessed, and the random access can be reinitiated. It should be noted that, the part of the fourth message corresponding to the identifier of the terminal device itself may be understood as: the terminal device carries which bits of the identifier of the terminal device in the fourth message, and the terminal device needs to compare with the bits of the identifier of the terminal device accordingly. For example, the fourth message carries remaining 8 bits of the 5G-S-TMSI, and the terminal device needs to compare the remaining 8 bits with its own after parsing the identifier in the fourth message, or the fourth message carries 48 bits of the complete 5G-S-TMSI, and the terminal device needs to compare the remaining 48 bits with its own 5G-S-TMSI after parsing the identifier in the fourth message.
Optionally, further, the terminal device may compare the content obtained through the fourth message with a part of or all of the content of the third message sent by the terminal device. If the content in the second message is the same as part or all of the content of the third message sent by the terminal device, the competition can be solved, and the network device can be successfully accessed; if the content in the fourth message is different from part or all of the content of the third message sent by the terminal device, the contention is not solved, the network device cannot be successfully accessed, and random access can be reinitiated. Illustratively, q bits in the third message are carried in the fourth message, and after the terminal device parses the content in the fourth message, the terminal device needs to compare the content with q bits in the third message sent by the terminal device.
It should be noted that the contention resolution in this step is complete contention resolution, that is, contention resolution is performed on the message 5, after the contention resolution in this step, two conflicting terminal devices do not occur, and the network device can correctly identify each terminal device.
After the contention resolution of the terminal device in step 407, the terminal device may continue to communicate with the network device in the RRC connected state.
In some embodiments, after step 407, the terminal device may further change the value of TC-RNTI in message 2 to the value of C-RNTI, that is, the TC-RNTI is changed to the C-RNTI, in a subsequent process, the network device may scramble the downlink message using the C-RNTI, and the terminal device may descramble using the C-RNTI after receiving the downlink message, so as to ensure normal communication with the network device.
The access method provided by the embodiment of the present invention is described below by taking terminal devices to be accessed as UE1, UE2, and UE3 as examples, and with reference to fig. 8, the method includes the following steps:
and S1, UE1, UE2 and UE3 receive the broadcast message of the base station and acquire the random access preamble in the broadcast message.
It should be noted that the identities of the UE1, the UE2, and the UE3 are 0001111, 0011111, and 0111010, respectively, where the UE1, the UE2, and the UE3 all select the same random access preamble and PRACH resource.
S2, UE1, UE2, UE3 send message 1 to the base station, including the random access preamble.
S3, the base station sends message 2 to UE1, UE2 and UE3, wherein the message 2 comprises a random access response.
S4, UE1, UE2 and UE3 send message 3 to the base station, each carrying the rightmost 4 bits of the respective identity.
Specifically, "1111" is carried in the message 3 sent by the UE1, "1111" is carried in the message 3 sent by the UE2, and "1010" is carried in the message 3 sent by the UE 3.
S5, the base station sends message 4 to UE1, UE2 and UE3, carrying "1111".
Specifically, the base station designates the terminal device corresponding to "1111" as the terminal device that resolves the contention, and therefore, the message 4 sent by the base station to the UE1, the UE2, and the UE3 all carries "1111".
S6, UE1, and UE2 send message 5 to the base station, carrying "000" and "001", respectively.
Specifically, after the UE1 receives the message 4, it parses the message 4 to obtain the identifier "1111", "1111" which is the same as the first four bits of the own identifier "1111000", determines that it can resolve the contention, and indicates the remaining part "000" of its own identifier to the base station. After receiving the message 4, the UE2 parses the message 4 to obtain the identifier "1111", "1111" identical to the rightmost four bits of the identifier "1111001", determines that it can resolve the contention, and indicates the remaining part "001" of the identifier to the base station. After receiving the message 4, the UE3 parses the message 4 to obtain the identifier "1111", "1111" different from the rightmost four bits of the identifier "1010011" of the UE, determines that the UE cannot resolve the contention, and then can re-initiate the random access.
S7, the base station sends message 6 to UE1 and UE2, carrying "000".
Specifically, the base station designates the terminal device corresponding to "000" as the terminal device that resolves the contention, and therefore, the messages 6 sent by the base station to the UE1, the UE2, and the UE3 all carry "000".
S8, the UE1 determines that the competition can be resolved and the network equipment is successfully accessed.
Specifically, after the UE1 receives the message 6, it parses the message 6 to obtain the identifier "000" of the message, where "000" is the same as the remaining 3 bits "000" of the identifier "1111000" and determines that it can resolve the contention.
An embodiment of the present invention provides a network device, which may be the network device related to the embodiment of the present invention, such as the network device in the communication system shown in fig. 1. Fig. 5 shows a schematic diagram of a possible structure of the network device in the case of dividing each functional module according to each function. As shown in fig. 9, the network device includes a receiving unit 901, a processing unit 902, and a transmitting unit 903.
A receiving unit 901, configured to enable the network device to perform step 401 in the foregoing embodiments, and/or other processes for the technology described herein.
A processing unit 902 configured to enable the network device to generate the second message, the fourth message, and the sixth message according to the embodiments of the present invention, and/or other processes for the techniques described herein;
a sending unit 903, configured to support the network device to perform step 402, step 404, and step 406 in the foregoing embodiments, and/or other processes for the technology described herein;
it should be noted that all relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
For example, in the case of using an integrated unit, a schematic structural diagram of a network device provided in an embodiment of the present application is shown in fig. 10. In fig. 10, the network device includes: a processing module 1001 and a communication module 1002. The processing module 1001 is used to control and manage the actions of the network device, e.g., to perform the steps performed by the processing unit 902 described above, and/or to perform other processes for the techniques described herein. The communication module 1002 is configured to support interaction between a network device and other devices, for example, execute the steps executed by the receiving unit 901 and the sending unit 903. As shown in fig. 10, the network device may further include a storage module 1003, and the storage module 1003 is used for storing program codes and data of the network device.
When the processing module 1001 is a processor, the communication module 1002 is a transceiver, and the storage module 1003 is a memory, the network device may be the network device shown in fig. 3.
Fig. 11 shows a possible structure diagram of the terminal device according to the above embodiment, in the case of dividing each functional module according to each function. As shown in fig. 11, the terminal device includes a transmitting unit 1101, a receiving unit 1102, and a processing unit 1103.
A receiving unit 1101, configured to enable the terminal device to perform steps 402, 404, and 406 in the foregoing embodiments, and/or other processes for the technology described herein;
a sending unit 1102, configured to enable the terminal device to perform the sending procedures in step 401, step 403, and step 405 in the foregoing embodiments, and/or other processes for the technology described herein;
a processing unit 1103 configured to enable the terminal device to perform the procedure of determining that the contention can be resolved in step 405 in the above embodiments, and/or other procedures for the techniques described herein.
It should be noted that all relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
Illustratively, in the case of using an integrated unit, a schematic structural diagram of a terminal device provided in the embodiment of the present application is shown in fig. 12. In fig. 12, the terminal device includes: a processing module 1201 and a communication module 1202. The processing module 1201 is configured to control and manage actions of the terminal device, for example, perform the steps performed by the processing unit 1103 described above, and/or perform other processes for performing the techniques described herein. The communication module 1202 is configured to support interaction between the terminal device and other devices, such as performing the steps performed by the receiving unit 1101 and the sending unit 1102, and various interactions with a network device. As shown in fig. 12, the terminal device may further include a storage module 1203, and the storage module 1203 is configured to store program codes and data of the terminal device.
When the processing module 1201 is a processor, the communication module 1202 is a transceiver, and the storage module 1203 is a memory, the terminal device is the terminal device shown in fig. 13. Referring to fig. 13, the terminal device may include at least one processor 1301, a memory 1302, a transceiver 1303, and a communication bus 1304. The processor 1301, the memory 1302, and the transceiver 1303 are connected by a communication bus 1304.
The following describes each component of the terminal device in detail with reference to fig. 13:
the processor 1301 is a control center of the terminal device, wherein the processor 1301 can execute various functions of the terminal device by running or executing a software program stored in the memory 1302 and calling data stored in the memory 1302.
In particular implementations, processor 1301 may include one or more CPUs, such as CPU0 and CPU1 shown in fig. 13, as one embodiment.
The terminal device may include multiple processors, such as processor 1301 and processor 1305 shown in fig. 13. Each of these processors may be a single-Core Processor (CPU) or a multi-Core Processor (CPU). A processor herein may refer to one or more terminal devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
The transceiver 1303 is a terminal device using any transceiver or the like, and is used for communication with other devices, such as a terminal device. Of course, the transceiver 1303 may also be used to communicate with a communication network.
The terminal device structure shown in fig. 13 does not constitute a limitation of the terminal device, and may include more or less components than those shown, or combine some components, or a different arrangement of components.
The embodiment of the invention also provides a computer readable storage medium, wherein the computer readable storage medium stores instructions; the computer readable storage medium, when run on the network device shown in fig. 9, 10 and 3, causes the terminal device to perform the access method shown in fig. 4.
The embodiment of the invention also provides a computer readable storage medium, wherein the computer readable storage medium stores instructions; the method comprises the following steps: the computer readable storage medium has instructions stored therein; the computer readable storage medium, when run on the terminal device shown in fig. 11, 12, and 13, causes the terminal device to perform the access method shown in fig. 4.
The embodiment of the invention also discloses a wireless communication device, wherein the wireless communication device is stored with instructions; when the wireless communication apparatus operates on the network device shown in fig. 9, 10 and 3, the wireless communication apparatus is caused to perform the access method shown in fig. 4. The wireless communication device may be a chip.
The embodiment of the invention also provides a wireless communication device, wherein the wireless communication device is stored with instructions; when the wireless communication apparatus operates on the terminal device shown in fig. 11, 12, and 13, the wireless communication apparatus is caused to execute the access method shown in fig. 4. The wireless communication device may be a chip.
Through the description of the above embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above functions may be distributed by different functional modules according to needs, that is, the internal structure of the database access apparatus may be divided into different functional modules to complete all or part of the above described functions.
In the several embodiments provided in the present application, it should be understood that the disclosed database access apparatus and method may be implemented in other ways. For example, the above-described database access device embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, multiple units or components may be combined or integrated into another device, or some features may be omitted, or not executed. In addition, the shown or discussed coupling or direct coupling or communication connection between each other may be an indirect coupling or communication connection through some interfaces, database access devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may be one physical unit or a plurality of physical units, that is, may be located in one place, or may be distributed in a plurality of different places. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributed to by the prior art, or all or part of the technical solutions may be embodied in the form of a software product, where the software product is stored in a storage medium and includes several instructions to enable a device (which may be a single chip microcomputer, a chip, or the like) or a processor to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (20)

1. An access method, comprising:
a terminal device sends a first message to a network device, wherein the first message comprises a first part of an identifier of the terminal device;
the terminal equipment receives a second message sent by the network equipment, wherein the second message indicates whether the terminal equipment can solve the competition or not;
the terminal device determines that competition can be solved according to the second message, and then sends a third message to the network device, wherein the third message comprises a second part of the identifier of the terminal device, and the first part of the identifier of the terminal device and the second part of the identifier of the terminal device form the identifier of the terminal device;
the terminal equipment receives a fourth message sent by the network equipment, wherein the fourth message indicates whether the terminal equipment can solve the competition or not;
and the terminal equipment determines that the competition can be solved according to the fourth message, and then accesses the network equipment.
2. The access method according to claim 1, wherein the terminal device determines that contention cannot be resolved according to the fourth message, and releases the connection with the network device.
3. The access method according to claim 1 or 2, wherein the fourth message comprises a first media access control, MAC, control element, CE, and the first MAC CE comprises the second part of the identity of the terminal device, or the first MAC CE comprises part or all of the content of the third message, wherein the part of the content of the third message comprises at least the second part of the identity of the terminal device.
4. The access method according to claim 3, wherein the fourth message further comprises a first logical channel identification value indicating the first MAC CE.
5. The access method according to claim 1 or 2, wherein the fourth message is a radio resource control, RRC, message, and the RRC message includes the second part of the identifier of the terminal device, or the RRC message includes part of or all of the content of the third message, and wherein the part of the content of the third message includes at least the second part of the identifier of the terminal device.
6. The access method according to claim 1, wherein the second message indicating whether the terminal device is capable of resolving contention specifically comprises:
the second message comprises a second MAC CE, and the second MAC CE comprises a part of or the entire content of the first message, wherein the part of the content of the first message at least comprises a first part of the identifier of the terminal device.
7. The access method according to any of claims 1-6, wherein the identity of the terminal device is X bits, the first part of the identity of the terminal device is Y bits, the second part of the identity of the terminal device is Z bits, and X is equal to Y plus Z.
8. The access method according to any of claims 1-7, wherein before the terminal device sends the first message to the network device, the method further comprises:
the terminal equipment sends a fifth message to the network equipment, wherein the fifth message comprises a random access lead code;
and the terminal equipment receives a sixth message sent by the network equipment, wherein the sixth message comprises a random access response.
9. The access method according to claim 8, wherein the random access response includes a temporary cell radio network temporary identity, TC-RNTI, and wherein the method further comprises:
and after the terminal equipment determines that the competition can be solved according to the fourth message, the terminal equipment sets the value of the TC-RNTI as the value of a cell radio network temporary identifier C-RNTI.
10. An access method, comprising:
the method comprises the steps that network equipment receives a first message sent by terminal equipment, wherein the first message comprises a first part of an identifier of the terminal equipment;
the network equipment sends a second message to the terminal equipment, wherein the second message indicates whether the terminal equipment can solve the competition;
the network device receives a third message sent by the terminal device, wherein the third message is sent to the network device after the terminal device determines that competition can be solved according to the second message, the third message comprises a second part of the identifier of the terminal device, and the first part of the identifier of the terminal device and the second part of the identifier of the terminal device form the identifier of the terminal device;
and the network equipment sends a fourth message to the terminal equipment, wherein the fourth message indicates whether the terminal equipment can solve competition or not, so that the terminal equipment can judge whether the terminal equipment can be accessed to the network equipment or not according to the fourth message.
11. The access method according to claim 10, wherein the fourth message comprises a first media access control, MAC, control element, CE, and wherein the first MAC CE comprises a second part of the identity of the terminal device, or wherein the first MAC CE comprises part or all of the content of the third message, and wherein the part of the content of the third message comprises at least the second part of the identity of the terminal device.
12. The access method according to claim 11, wherein the fourth message further comprises a first logical channel identification value indicating the first MAC CE.
13. The access method according to claim 10, wherein the fourth message is a radio resource control, RRC, message, and the RRC message includes the second part of the identifier of the terminal device, or the RRC message includes part or all of the content of the third message, and wherein the part of the content of the third message includes at least the second part of the identifier of the terminal device.
14. The access method according to claim 10, wherein the second message indicating whether the terminal device is capable of resolving contention specifically comprises:
the second message comprises a second MAC CE, and the second MAC CE comprises a part of or the entire content of the first message, wherein the part of the content of the first message at least comprises a first part of the identifier of the terminal device.
15. The access method according to any of claims 10-14, characterised in that the identity of the terminal device is X bits, the first part of the identity of the terminal device is Y bits, the second part of the identity of the terminal device is Z bits, X equals Y plus Z.
16. The access method according to any of claims 10-15, wherein before the network device receives the first message sent by the terminal device, the method further comprises:
the network equipment receives a fifth message sent by the terminal equipment, wherein the fifth message comprises a random access lead code;
and the network equipment sends a sixth message to the terminal equipment, wherein the sixth message comprises a random access response.
17. A computer-readable storage medium, comprising: the computer readable storage medium has instructions stored therein; the computer readable storage medium, when run on a terminal device, causes the terminal device to perform the access method of any one of claims 1-16.
18. A wireless communications apparatus, comprising: instructions are stored in the wireless communication device; the wireless communication apparatus, when operating on a terminal device, is caused to perform the access method of any one of claims 1-16, the wireless communication apparatus being a chip.
19. A terminal device, comprising: one or more processors and one or more memories;
the one or more memories coupled to the one or more processors for storing computer program code comprising computer instructions which, when executed by the one or more processors, cause the terminal device to perform the access method of any of claims 1-16.
20. A network device, comprising: one or more processors and one or more memories;
the one or more memories coupled to the one or more processors for storing computer program code comprising computer instructions which, when executed by the one or more processors, cause the network device to perform the access method of any of claims 1-16.
CN201810615839.4A 2018-06-14 2018-06-14 Access method and device Pending CN110611960A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810615839.4A CN110611960A (en) 2018-06-14 2018-06-14 Access method and device
PCT/CN2019/091208 WO2019238110A1 (en) 2018-06-14 2019-06-14 Access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810615839.4A CN110611960A (en) 2018-06-14 2018-06-14 Access method and device

Publications (1)

Publication Number Publication Date
CN110611960A true CN110611960A (en) 2019-12-24

Family

ID=68841695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810615839.4A Pending CN110611960A (en) 2018-06-14 2018-06-14 Access method and device

Country Status (2)

Country Link
CN (1) CN110611960A (en)
WO (1) WO2019238110A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023082067A1 (en) * 2021-11-09 2023-05-19 Oppo广东移动通信有限公司 Communication method and communication apparatus

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155382A (en) * 2006-09-25 2008-04-02 北京三星通信技术研究有限公司 Device and method for sending user's set identification and user information
WO2016197656A1 (en) * 2015-06-09 2016-12-15 电信科学技术研究院 Random access method and equipment
WO2018030711A1 (en) * 2016-08-10 2018-02-15 Samsung Electronics Co., Ltd. Method and apparatus for supporting flexible ue bandwidth in next generation communication system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103546981B (en) * 2012-07-16 2018-08-24 普天信息技术研究院有限公司 The implementation method and device of competitive mode random access
CN107231700B (en) * 2016-03-25 2019-07-05 大唐移动通信设备有限公司 A kind of method and device of competitive mode random access

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155382A (en) * 2006-09-25 2008-04-02 北京三星通信技术研究有限公司 Device and method for sending user's set identification and user information
WO2016197656A1 (en) * 2015-06-09 2016-12-15 电信科学技术研究院 Random access method and equipment
WO2018030711A1 (en) * 2016-08-10 2018-02-15 Samsung Electronics Co., Ltd. Method and apparatus for supporting flexible ue bandwidth in next generation communication system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ERICSSON: "Message 3.5 in LTE connected to 5GC", 《3GPP TSG-RAN WG2 #100 TDOC R2-1713273》 *
HUAWEI等: "Size of UE contention resolution identity MAC CE", 《3GPP TSG-RAN WG2 MEETING #101BIS R2-1804643》 *
INTEL CORPORATION: "Extending 5G-S-TMSI to 48 bits", 《3GPP TSG-RAN WG2 MEETING #101BIS R2-1805049》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023082067A1 (en) * 2021-11-09 2023-05-19 Oppo广东移动通信有限公司 Communication method and communication apparatus

Also Published As

Publication number Publication date
WO2019238110A1 (en) 2019-12-19

Similar Documents

Publication Publication Date Title
EP3606266B1 (en) Method and device for random access and instruction after random access rollback
US11503643B2 (en) Random access method and device
CN106793148B (en) Random access method and device
WO2010121446A1 (en) Random access method and terminal
CN107690172B (en) Access method and device in wireless network
US11382142B2 (en) Random access method and device, storage medium, and electronic device
CN110300455B (en) Random access resource indication, random access method, base station, terminal and device
EP3005806A1 (en) Telecommunications apparatus and method relating to a random access procedure
CN113228766A (en) Communication between a terminal and a radio network node
JP7197648B2 (en) Access control methods and related products
US20150312938A1 (en) Mtc rach procedure
CN108141895B (en) Method for accessing User Equipment (UE) to network, network equipment and first UE
CN110611960A (en) Access method and device
CN111465112B (en) Method and device for processing access control signaling
CN112218381A (en) Random access response method and device
US20220167395A1 (en) Information indication method and apparatus, device, and storage medium
CN113424641A (en) Random access in a wireless communication network
WO2018086472A1 (en) Service-oriented method and apparatus for dynamic access controlof mtc device
CN116981071A (en) Random access method and equipment
CN111819902B (en) Random access method and device
JP2022542426A (en) Information reception method, information transmission method, terminal and network equipment
CN111526582A (en) Random access method, equipment and device
CN113645648B (en) Abnormal terminal equipment detection method and device
JP2022549398A (en) Two-step random access method, device, terminal and storage medium
WO2020164700A1 (en) Random access in wireless communication networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191224

RJ01 Rejection of invention patent application after publication