CN110784873B - Information transmission method, terminal and network equipment of unauthorized frequency band - Google Patents

Information transmission method, terminal and network equipment of unauthorized frequency band Download PDF

Info

Publication number
CN110784873B
CN110784873B CN201810858467.8A CN201810858467A CN110784873B CN 110784873 B CN110784873 B CN 110784873B CN 201810858467 A CN201810858467 A CN 201810858467A CN 110784873 B CN110784873 B CN 110784873B
Authority
CN
China
Prior art keywords
channel
message
time window
frequency band
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810858467.8A
Other languages
Chinese (zh)
Other versions
CN110784873A (en
Inventor
刘思綦
潘学明
吴凯
孙鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810858467.8A priority Critical patent/CN110784873B/en
Publication of CN110784873A publication Critical patent/CN110784873A/en
Application granted granted Critical
Publication of CN110784873B publication Critical patent/CN110784873B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0808Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using carrier sensing, e.g. as in CSMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure

Abstract

The invention discloses an information transmission method, a terminal and a network device of an unauthorized frequency band, wherein the method comprises the following steps: monitoring the transmission resource of the unauthorized frequency band in a message time window corresponding to the message I to determine a target transmission channel; and sending a message I to the network equipment at the transmission opportunity RO of the physical random access channel in the target transmission channel, wherein a message time window corresponds to the message I in the random access process. The terminal of the embodiment of the invention monitors the transmission resource of the unauthorized frequency band in the message time window and sends the message I on the RO in the idle target transmission channel, thus the unauthorized frequency band is monitored in a targeted manner, the success rate of monitoring the idle channel can be improved, and the success rate of the random access process is improved.

Description

Information transmission method, terminal and network equipment of unauthorized frequency band
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an information transmission method, a terminal, and a network device for an unlicensed frequency band.
Background
In a mobile communication system, an unlicensed band (unlicensed band) may be used as a supplement to a licensed band (licensed band) to help an operator to expand the capacity of a service. Since the unlicensed frequency band is shared by multiple Radio Access Technologies (RATs), such as WiFi, radar, Long Term Evolution licensed Assisted Access (LTE-LAA), etc., the unlicensed frequency band must meet certain regulations (regulations) to ensure that all devices can fairly use the resources, such as Listen Before Talk (LBT), Maximum Channel Occupancy Time (MCOT), occupied bandwidth (OCB), etc.
In a mobile communication system, the processes of initial access, system information acquisition, link recovery and the like can be realized through a random access process. A Physical Random Access Channel transmission opportunity (RO) is defined as a time-frequency resource required for transmitting a given format (format) msg1, and a bandwidth occupied by one RO at different subcarrier intervals is shown in table 1:
TABLE 1
Figure BDA0001749126340000011
Figure BDA0001749126340000021
A maximum of 8 ROs FDM may be allowed in NR at one time point, and these ROs are consecutive in frequency domain. Each RO may be associated with one or more synchronization signal blocks (SS blocks) the terminal selects an SSB and selects an associated RO based on the SSB. In the non-contention RACH procedure, the terminal can select only one RO to transmit msg 1.
After the terminal sends msg1, the base station may not receive msg1 or receive msg but can not solve msg for reasons such as communication quality, the terminal can judge whether the base station successfully solves msg1 or not according to whether the corresponding RAR is received or not after the RAR window expires, if the terminal judges that the base station does not solve msg, the terminal retransmits msg1, and the terminal may not indicate a random access problem to an upper layer or consider that a random access process fails until the number of retransmissions of msg1 reaches a maximum limit.
In the unlicensed frequency band, the terminal needs to perform LBT first, and can use the channel after judging that the channel is idle, and the terminal can perform LBT according to the granularity of 20MHz, because multiple base stations or multiple terminals on the unlicensed frequency band compete for the resources of the unlicensed frequency band at the same time, at this time, some terminals may not successfully acquire the desired RO resources for a long time and cannot send msg1 for a long time.
Disclosure of Invention
The embodiment of the invention provides an information transmission method, a terminal and network equipment of an unauthorized frequency band, and aims to solve the problems of overlong time consumption and low success rate in a random access process in the unauthorized frequency band transmission.
In a first aspect, an embodiment of the present invention provides an information transmission method for an unlicensed frequency band, where the method is applied to a terminal, and includes:
monitoring the transmission resource of the unauthorized frequency band in a message time window to determine a target transmission channel, wherein the message time window corresponds to a random access process message I;
and sending a message I to the network equipment at the transmission opportunity RO of the physical random access channel in the target transmission channel.
In a second aspect, an embodiment of the present invention further provides a terminal, including:
the monitoring module is used for monitoring the transmission resource of the unauthorized frequency band in a message time window corresponding to the message I so as to determine a target transmission channel, wherein the message time window corresponds to the random access process message I;
and the sending module is used for sending a first message to the network equipment on the transmission opportunity RO of the physical random access channel in the target transmission channel.
In a third aspect, an embodiment of the present invention provides a terminal, where the terminal includes a processor, a memory, and a computer program stored in the memory and running on the processor, and when the computer program is executed by the processor, the steps of the information transmission method in the unlicensed frequency band are implemented.
In a fourth aspect, an embodiment of the present invention provides an information transmission method in an unlicensed frequency band, which is applied to a network device, and includes:
receiving a message I of a random access process on a transmission opportunity RO of a physical random access channel in a target transmission channel of an unauthorized frequency band; wherein, the RO is positioned in a message time window corresponding to the random access process message I;
and feeding back a response message to the terminal according to the message I.
In a fifth aspect, an embodiment of the present invention provides a network device, including:
the receiving module is used for receiving a message I in the random access process on a transmission opportunity RO of a physical random access channel in a target transmission channel of an unauthorized frequency band; wherein, the RO is positioned in a message time window corresponding to the random access process message I;
and the response module is used for feeding back a response message to the terminal according to the first message.
In a sixth aspect, an embodiment of the present invention further provides a network device, where the network device includes a processor, a memory, and a computer program stored in the memory and running on the processor, and when the processor executes the computer program, the steps of the information transmission method in the unlicensed frequency band are implemented.
In a seventh aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the information transmission method for an unlicensed frequency band on a terminal side or a network device side are implemented.
Therefore, the terminal of the embodiment of the invention monitors the transmission resource of the unauthorized frequency band in the message time window and sends the message I on the RO in the idle target transmission channel, thereby carrying out targeted monitoring on the unauthorized frequency band, improving the success rate of monitoring the idle channel and further improving the success rate of the random access process.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
Fig. 1 shows a block diagram of a mobile communication system to which an embodiment of the present invention is applicable;
fig. 2 is a flowchart illustrating an information transmission method of an unlicensed frequency band of a terminal according to an embodiment of the present invention;
fig. 3 is a schematic diagram of resource interception in scenario one according to the embodiment of the present invention;
fig. 4 is a schematic diagram of resource interception in scenario two according to the embodiment of the present invention;
fig. 5 shows a schematic view of resource interception in scenario three according to the embodiment of the present invention;
fig. 6 is a schematic block diagram of a terminal according to an embodiment of the present invention;
FIG. 7 shows a block diagram of a terminal of an embodiment of the invention;
fig. 8 is a flowchart illustrating an information transmission method of an unlicensed frequency band of a network device according to an embodiment of the present invention;
FIG. 9 is a block diagram of a network device according to an embodiment of the present invention;
fig. 10 shows a block diagram of a network device of an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention can be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. In the description and in the claims "and/or" means at least one of the connected objects.
The techniques described herein are not limited to Long Term Evolution (LTE)/LTE Evolution (LTE-Advanced) systems, and may also be used for various wireless communication systems, such as Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiple Access (OFDMA), Single-carrier Frequency-Division Multiple Access (SC-FDMA), and other systems. The terms "system" and "network" are often used interchangeably. CDMA systems may implement Radio technologies such as CDMA2000, Universal Terrestrial Radio Access (UTRA), and so on. UTRA includes Wideband CDMA (Wideband Code Division Multiple Access, WCDMA) and other CDMA variants. TDMA systems may implement radio technologies such as Global System for Mobile communications (GSM). The OFDMA system may implement radio technologies such as Ultra Mobile Broadband (UMB), evolved-UTRA (E-UTRA), IEEE 802.11(Wi-Fi), IEEE 802.16(WiMAX), IEEE 802.20, Flash-OFDM, etc. UTRA and E-UTRA are parts of the Universal Mobile Telecommunications System (UMTS). LTE and higher LTE (e.g., LTE-A) are new UMTS releases that use E-UTRA. UTRA, E-UTRA, UMTS, LTE-A, and GSM are described in documents from an organization named "third Generation Partnership Project" (3 GPP). CDMA2000 and UMB are described in documents from an organization named "third generation partnership project 2" (3GPP 2). The techniques described herein may be used for both the above-mentioned systems and radio technologies, as well as for other systems and radio technologies. However, the following description describes the NR system for purposes of example, and NR terminology is used in much of the description below, although the techniques may also be applied to applications other than NR system applications.
The following description provides examples and does not limit the scope, applicability, or configuration set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the spirit and scope of the disclosure. Various examples may omit, substitute, or add various procedures or components as appropriate. For example, the described methods may be performed in an order different than described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Referring to fig. 1, fig. 1 is a block diagram of a wireless communication system to which an embodiment of the present invention is applicable. The wireless communication system includes a terminal 11 and a network device 12. The terminal 11 may also be referred to as a terminal Device or a User Equipment (UE), where the terminal 11 may be a Mobile phone, a Tablet Personal Computer (Tablet Personal Computer), a Laptop Computer (Laptop Computer), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a Wearable Device (Wearable Device), or a vehicle-mounted Device, and the specific type of the terminal 11 is not limited in the embodiment of the present invention. The network device 12 may be a Base Station or a core network, wherein the Base Station may be a 5G or later-version Base Station (e.g., a gNB, a 5G NR NB, etc.), or a Base Station in other communication systems (e.g., an eNB, a WLAN access point, or other access points, etc.), wherein the Base Station may be referred to as a node B, an evolved node B, an access point, a Base Transceiver Station (BTS), a radio Base Station, a radio Transceiver, a Basic Service Set (BSS), an Extended Service Set (ESS), a node B, an evolved node B (eNB), a home node B, a home evolved node B, a WLAN access point, a WiFi node, or some other suitable terminology in the field, as long as the same technical effect is achieved, the Base Station is not limited to a specific technical vocabulary, it should be noted that, in the embodiment of the present invention, only the Base Station in the NR system is taken as an example, but does not limit the specific type of base station.
The base stations may communicate with the terminals 11 under the control of a base station controller, which may be part of the core network or some of the base stations in various examples. Some base stations may communicate control information or user data with the core network through a backhaul. In some examples, some of the base stations may communicate with each other, directly or indirectly, over backhaul links, which may be wired or wireless communication links. A wireless communication system may support operation on multiple carriers (waveform signals of different frequencies). A multi-carrier transmitter can transmit modulated signals on the multiple carriers simultaneously. For example, each communication link may be a multi-carrier signal modulated according to various radio technologies. Each modulated signal may be transmitted on a different carrier and may carry control information (e.g., reference signals, control channels, etc.), overhead information, data, and so on.
The base station may communicate wirelessly with the terminal 11 via one or more access point antennas. Each base station may provide communication coverage for a respective coverage area. The coverage area of an access point may be divided into sectors that form only a portion of the coverage area. A wireless communication system may include different types of base stations (e.g., macro, micro, or pico base stations). The base stations may also utilize different radio technologies, such as cellular or WLAN radio access technologies. The base stations may be associated with the same or different access networks or operator deployments. The coverage areas of different base stations (including coverage areas of base stations of the same or different types, coverage areas utilizing the same or different radio technologies, or coverage areas belonging to the same or different access networks) may overlap.
The communication links in a wireless communication system may comprise an Uplink for carrying Uplink (UL) transmissions (e.g., from terminal 11 to network device 12) or a Downlink for carrying Downlink (DL) transmissions (e.g., from network device 12 to terminal 11). The UL transmission may also be referred to as reverse link transmission, while the DL transmission may also be referred to as forward link transmission. Downlink transmissions may be made using licensed frequency bands, unlicensed frequency bands, or both. Similarly, uplink transmissions may be made using licensed frequency bands, unlicensed frequency bands, or both.
The embodiment of the invention provides information transmission of an unauthorized frequency band, which is applied to a terminal side, and as shown in figure 2, the method comprises the following steps:
step 21: and in a message time window corresponding to the message I, monitoring the transmission resources of the unauthorized frequency band to determine a target transmission channel.
The message time window corresponds to the random access process message one, the target transmission channel is an idle channel in an unlicensed frequency band, and the target transmission channel comprises at least one physical random access channel transmission opportunity (RO). The terminal monitors the channel in a message time window, the monitoring action is more targeted, and the success rate of monitoring the idle channel can be improved, so that the success rate of the random access process is improved.
Step 22: and sending a message I to the network equipment at the transmission opportunity RO of the physical random access channel in the target transmission channel.
Wherein the bandwidth occupied by the target transmission resource (here, the bandwidth range spanned by the target transmission resource) is greater than or equal to the preset percentage of the nominal channel bandwidth of the target transmission channel. The terminal sends a message I of a random access process to the network equipment through the target transmission resource of the target transmission channel on the unauthorized frequency band, so that the bandwidth span occupied by the target transmission channel can be ensured to exceed the preset percentage (such as 70 percent or 80 percent) of the nominal bandwidth of the target transmission channel, and the transmission of the unauthorized frequency band can be ensured to meet the OCB requirement.
The target transmission channel in the embodiment of the invention satisfies one of the following position relations:
when the target transport channel includes at least one physical random access channel transmission opportunity RO, the target transport resource includes at least one RO and at least one other channel, and the other channel is located in a frequency domain portion of the target transport channel except for all ROs. Assuming that the target transmission channel includes 4 ROs, such as RO1, RO2, RO3, and RO4, the target transmission resource includes RO1 and at least one other channel located in a frequency domain portion of the target transmission channel other than RO1, RO2, RO3, and RO 4. The selected RO may be predefined (e.g., agreed upon) or configured by the network device, and the other channels may be predefined or configured by the network device. Wherein both of the at least one other channel and the at least one RO in the target transmission resource having the farthest frequency domain location satisfy the OCB requirement.
Alternatively, when the at least two ROs are included in the target transmission channel, the target transmission resource includes a plurality of the at least two ROs. It is assumed that the target transmission channel includes 4 ROs, such as RO1, RO2, RO3, and RO4, and the target transmission resource includes RO1 and RO 4. Wherein the selected RO (e.g., the RO transmitting the message one and/or the RO transmitting the padding information) may be predefined or network device configured. And for the transmission scene of the unauthorized frequency band, the two channels with the farthest frequency domain positions in at least one other channel and at least one RO in the target transmission resource meet the OCB requirement.
Wherein the other channels comprise at least one of the following resources:
a first resource that is symmetric to the RO with respect to a frequency center frequency domain of the target transmission channel; the frequency domain symmetry referred to herein may be: the start position of the other channel is frequency domain symmetric with the start position of the selected RO, the end position of the other channel is frequency domain symmetric with the end position of the selected RO, the start position of the other channel is frequency domain symmetric with the end position of the selected RO, the end position of the other channel is frequency domain symmetric with the start position of the selected RO, the start and end positions of the other channel are frequency domain symmetric with the start and end positions of the selected RO, and the like.
A second resource offset from a high frequency boundary of the target transmission channel by the first offset amount; here, the start position of the other channel may be located at a position shifted from the high-frequency boundary of the target transmission channel by the first offset amount, or the end position of the other channel may be located at a position shifted from the high-frequency boundary of the target transmission channel by the first offset amount, or the center frequency point of the other channel may be located at a position shifted from the high-frequency boundary of the target transmission channel by the first offset amount. It should be noted that the values of the first offsets corresponding to the above three scenarios may be the same or different.
A second resource offset from a low frequency boundary of the target transmission channel by a second offset amount; here, the starting position of the other channel may be located at a position shifted from the low frequency boundary of the target transmission channel by the second offset amount, or the ending position of the other channel may be located at a position shifted from the low frequency boundary of the target transmission channel by the second offset amount, or the center frequency point of the other channel may be located at a position shifted from the low frequency boundary of the target transmission channel by the second offset amount. It should be noted that the values of the second offsets corresponding to the above three scenarios may be the same or different.
A fourth resource offset from a high frequency boundary of the RO by a third offset amount; here, the start position of the other channel may be located at a position shifted from the RO high frequency boundary by a third offset amount, or the end position of the other channel may be located at a position shifted from the RO high frequency boundary by the third offset amount, or the center frequency point of the other channel may be located at a position shifted from the RO high frequency boundary by the third offset amount. It should be noted that the values of the third offsets corresponding to the above three scenarios may be the same or different. The fourth resource may be located at a frequency domain position offset from the high frequency boundary of the selected RO by a third offset amount, 3, and by two third offset amounts, 3 x 2 … ….
A fifth resource offset from a low frequency boundary of the RO by a fourth offset amount; here, the start position of the other channel may be located at a position shifted from the RO low frequency boundary by a fourth shift amount, or the end position of the other channel may be located at a position shifted from the RO low frequency boundary by the fourth shift amount, or the center frequency point of the other channel may be located at a position shifted from the RO low frequency boundary by the fourth shift amount. It should be noted that the values of the fourth offsets corresponding to the above three scenarios may be the same or different. The fourth resource may be located at a frequency domain position offset from the low frequency boundary of the selected RO by a fourth offset amount, 4, by two fourth offset amounts, 4 x 2 … ….
Sixth resources uniformly distributed in the target transmission channel at a preset frequency domain interval from the RO; here, it is said that the alternative ROs are uniformly distributed in the target transport channel with other channels. For example, the preset frequency domain interval is the target transmission channel bandwidth/M, where M is a positive integer.
A seventh resource which deviates from the high frequency domain boundary of the activated uplink bandwidth part where the RO is located by a fifth deviation amount; here, the start position of the other channel may be located at a position shifted by a fifth offset from the high-frequency boundary of the activated upstream bandwidth portion where the RO is located, or the end position of the other channel may be located at a position shifted by a fifth offset from the high-frequency boundary of the activated upstream bandwidth portion where the RO is located, or the center frequency point of the other channel may be located at a position shifted by a fifth offset from the high-frequency boundary of the activated upstream bandwidth portion where the RO is located. It should be noted that the values of the fifth offsets corresponding to the above three scenarios may be the same or different.
And the eighth resource is offset from the low-frequency boundary of the activated uplink bandwidth part where the RO is located by a sixth offset, where the start position of the other channel may be located at a position offset from the low-frequency boundary of the activated uplink bandwidth part where the RO is located by the sixth offset, or the end position of the other channel may be located at a position offset from the low-frequency boundary of the activated uplink bandwidth part where the RO is located by the sixth offset, or the center frequency point of the other channel is located at a position offset from the low-frequency boundary of the activated uplink bandwidth part where the RO is located by the sixth offset. It should be noted that the values of the sixth offset corresponding to the above three scenarios may be the same or different.
The specific values of the first offset, the second offset, the third offset, the fourth offset, the fifth offset and the sixth offset may be the same or different. In addition, the embodiment of the present invention does not specifically limit the number of other channels, and the positions and the numbers of other channels may be predefined or configured by the network device. The number and location of the selected ROs may be predefined or network device configured.
In this embodiment of the present invention, the ROs in the target transmission Channel may respectively correspond to at least one piece of association Information, where the association Signal includes a Synchronization Signal Block (SSB) and a Channel State indication Reference Signal (CSI-RS). Step 21 comprises: intercepting at least one first RO of a first channel in an unlicensed frequency band within a message time window, wherein the at least one first RO corresponds to a first associated signal, and the first associated signal comprises at least one of a first Synchronization Signal Block (SSB) and a first channel state indication reference signal (CSI-RS); if the first RO is not sensed to be idle in the message time window or the first RO is sensed to be occupied for N consecutive times in the message time window, indicating failure indication information to an upper layer (of the terminal), wherein the failure indication information is used for indicating: a random access procedure failure, a message send failure, or a random access procedure (random access protocol) problem. Wherein N is a positive integer. That is, if the terminal fails to preempt a channel containing an RO at the point in time that the RO is present and the message time window has not expired, the terminal may continue LBT for the message time window in an attempt to preempt a channel of the first RO that is next available within the message time window. If the message time window has ended and the terminal fails to preempt the channel containing the available first RO to send msg1, or the number of failures for the message time window to end but preempt the channel containing the available first RO reaches a certain threshold (e.g., N times), the terminal indicates failure indication information to the upper layer. The starting point of the selected RO is the starting point of a message time window, that is, the message time window is opened from the starting point of the selected RO. The opening of the next message time window is not allowed to open a new message time window again after the end of the current message time window, that is, before the end of the current message time window. Wherein, a message time window can be ended in advance when a certain condition is satisfied (e.g. consecutive N times, it is sensed that the RO is occupied). The starting point of the selected RO may be a starting time domain symbol of the RO (e.g., an OFDM symbol) or a position of a time domain symbol 0 of a slot (slot) where the RO is located.
Further, the step of indicating the failure of the random access procedure to the upper layer further comprises: and listening at least one second RO of the first channel in the unlicensed frequency band within a next message time window, wherein the at least one second RO corresponds to a second associated signal, and the second associated signal comprises: at least one of a second SSB and a second CSI-RS, the second association signal being different from the first association signal. Wherein the second correlation signal being different from the first correlation signal means: the second SSB is different from the first SSB, the second CSI-RS is different from the first CSI-RS, the second associated signal is a CSI-RS and the first associated signal is an SSB, the second associated signal is an SSB and the first associated signal is a CSI-RS. Taking the first association signal and the second association signal as SSBs for example, after a channel fails to preempt a channel for an RO corresponding to a certain SSB, the terminal may replace the SSB used for selecting an available RO, and select an RO based on the SSB, and start a new random access process. Or, in the next message time window, intercepting the target RO of the second channel in the unauthorized frequency band; wherein the frequency domain range of the second channel is at least partially different from the frequency domain range of the first channel, and the target RO comprises: the first RO, the second RO or other ROs, the other ROs being ROs other than the first RO and the second RO, specifically, the associated signals corresponding to the other ROs being different from the first associated signal and the second associated signal; for example, after a channel fails to be preempted by a certain channel, the terminal may attempt to preempt other channels and select ROs on other channels, and start a new random access procedure.
Or, for N consecutive times of listening that the first RO is occupied within a time window of the message, the step of indicating to the upper layer that the random access procedure is failed further includes: if the message time window is not finished, at least one second RO of the first channel in the unauthorized frequency band is monitored continuously in the message time window; wherein the at least one second RO corresponds to a second associated signal comprising at least one of a second SSB and a second CSI-RS, the second associated signal being different from the first associated signal. Taking the first association signal and the second association signal as SSBs for example, after a channel fails to preempt a channel for an RO corresponding to a certain SSB, the terminal may replace the SSB used for selecting an available RO, and select an RO based on the SSB, and start a new random access process. Or if the message time window is not finished, continuing to listen to a target RO of a second channel in the unlicensed frequency band within the message time window, where a frequency domain range of the second channel is at least partially different from a frequency domain range of the first channel, and the target RO includes: the first RO, the second RO or other ROs, the other ROs being ROs other than the first RO and the second RO, specifically, the associated signals corresponding to the other ROs being different from the first associated signal and the second associated signal; for example, after a channel fails to be preempted by a certain channel, the terminal may attempt to preempt other channels and select ROs on other channels, and start a new random access procedure.
Further, the step of listening for at least one second RO for the first channel in the unlicensed frequency band comprises: and if the measurement result of the second associated signal in the first channel meets the preset condition, intercepting at least one second RO of the first channel in the unauthorized frequency band. Wherein, the measurement result satisfying the preset condition here may refer to: the measurement result indicates that the received power and/or quality of the second associated signal in the first channel is better, when the terminal listens to at least one second RO of the first channel. For example, at least one of a Reference Signal Received Power (RSRP), a Reference Signal Received Quality (RSRQ), and a Reference Signal Strength Indicator (RSSI) of the associated Signal respectively satisfies its corresponding threshold. Optionally, the measurement result of the second associated signal in the first channel does not satisfy the preset condition, and the listening may be suspended or the listening in other channels. Optionally, when the measurement results of the plurality of second correlation signals in the first channel satisfy the preset condition, the terminal may select an optimal second correlation signal and listen to the corresponding second RO, for example, RSRP of the SSB2 and the SSB3 in the second channel is greater than a threshold, and the quality of the SSB2 is optimal, then the terminal listens to the RO corresponding to the SSB 2.
Further, the step of listening for the target RO of the second channel in the unlicensed frequency band includes: and if the measurement result of the second channel meets the preset condition, intercepting the target RO of the second channel in the unauthorized frequency band. Wherein, the measurement result satisfying the preset condition here may refer to: when the measurement result indicates that the channel quality of the target RO in the second channel is better (for example, at least one of RSRP, RSRQ, and RSSI of the associated signal of the target RO in the second channel respectively satisfies its corresponding threshold, and/or the target RO in the second channel remains idle for a certain time window), the terminal listens to the target RO in the second channel. Optionally, when the measurement result of the second channel does not satisfy the preset condition, the listening may be suspended or switched to listening in other channels. Optionally, when the measurement results of the plurality of target RO associated signals in the second channel satisfy a preset condition (for example, RSRP of SSB1 and SSB2 in the second channel is greater than a threshold), the terminal may select an optimal target RO associated signal from the plurality of target RO associated signals, and listen to the corresponding target RO.
Wherein the threshold and/or the certain time window may be predefined by a protocol or configured by a network device.
Wherein the step of listening for at least one first RO of a first channel in the unlicensed frequency band within a message time window includes, but is not limited to: and intercepting at least one first RO of a first channel in the unlicensed frequency band according to a time domain sequence within a message time window, namely, preferably intercepting whether the nearest RO is idle within the message time window. Or, sequentially listening to the selected at least one first RO in the first channel in the unlicensed frequency band within a message time window. For example, the first RO includes RO1 and RO3 corresponding to SSB1, and the selected first RO is RO1, the terminal listens only to whether RO1 is idle for a message time window, and indicates to an upper layer of the terminal that the random access procedure has failed when it senses that all ROs 1 in the first channel are busy or that RO1 is continuously busy N times. Or randomly listening to at least one first RO of a first channel in the unlicensed frequency band within a message time window.
The channel listening mode in the unlicensed frequency band is briefly introduced above, and the following embodiment will further describe the channel listening mode in combination with different application scenarios.
In a scene one, at least one first RO of a first channel in an unauthorized frequency band is intercepted within a message time window; if the first RO is not sensed to be idle in the message time window, indicating failure indication information to an upper layer of the terminal; intercepting at least one second RO of a first channel in the unlicensed frequency band within a next message time window; at least one second RO corresponds to a second SSB. Wherein at least one first RO corresponds to a first SSB and the second SSB is different from the first SSB.
Assuming that a PRACH resource period is 10ms, a message time window (msg1 window) is 20ms in length, and there are 4 ROs (RO1, RO2, RO3, and RO4) in one PRACH resource period, where RO1 and RO3 are associated with SSB1, and RO2 and RO4 are associated with SSB2, respectively. The terminal selects the SSB1 and selects RACH resources based on the SSB 1. For example, the terminal is served by a downlink beam used when transmitting the SSB1, and thus the terminal can select an RO based on the SSB 1. As shown in fig. 3, assuming that the next available RO is RO1, the user opens LBT to attempt to preempt the channel containing RO1 and opens msg1 window from the beginning of RO1, if the current RO1 is sensed to be busy, continue sensing the RO3 closest to the current RO1, if the RO3 is also busy, continue sensing the RO1 closest to the RO3, and so on until no free RO is sensed within a message time window. Alternatively, msg1 window is opened from the beginning of RO1, if the current RO1 is sensed to be busy, the next RO1 is sensed, if the RO1 is also busy, the next RO1 is sensed, and so on until no free RO1 is sensed within a time window of the message. If there is no successful LBT and msg1 sent before the end of the message time window, the terminal indicates failure indication information to the upper layer.
Further, after the step of indicating the failure indication information to the upper layer of the terminal, the terminal may further switch the SSB for selecting the RO, e.g., when the terminal selects the RO based on the SSB2 and starts a new random access procedure within a next message time window when the measurement result RSRP of the SSB2 is not less than the corresponding threshold, assuming that the next available RO is RO2, the terminal starts msg1 window from the start point of RO2, and if the LBT succeeds and camps on the channel including RO2 at RO2, the terminal transmits msg1 on RO 2.
In a second scenario, at least one first RO of a first channel in an unauthorized frequency band is intercepted within a message time window; if the first RO is monitored to be occupied for N times continuously in the message time window, indicating failure indication information to an upper layer of the terminal; intercepting at least one second RO of a first channel in the unlicensed frequency band within a next message time window; at least one second RO corresponds to a second SSB. Wherein at least one first RO corresponds to a first SSB and the second SSB is different from the first SSB.
Assuming that a PRACH resource period is 10ms, a message time window (msg1 window) is 20ms in length, a maximum number of consecutive LBT failures within the message time window is 8, and there are 4 ROs (RO1, RO2, RO3, and RO4) within one PRACH resource period, where RO1 and RO3 are associated with SSB1, and RO2 and RO4 are associated with SSB2, respectively. The terminal selects the SSB1 and selects RACH resources based on the SSB 1. For example, the terminal is served by a downlink beam used when transmitting the SSB1, and thus the terminal can select an RO based on the SSB 1. As shown in fig. 4, assuming that the next available RO is RO1, the user opens LBT to try to seize the channel containing RO1 and opens msg1 window from the beginning of RO1, if the current RO1 is busy, continue to listen to the nearest RO3 to the RO1, if the RO3 is also busy, continue to listen to the nearest RO1 to the RO3, and so on until the number of times that the message is continuously listened to the occupied RO within a time window reaches 8. Alternatively, msg1 window is opened from the beginning of RO1, if the current RO1 is sensed to be busy, the next RO1 is sensed, if the RO1 is also busy, the next RO1 is sensed, and so on until the number of times that the RO1 is sensed to be occupied within a time window of the message reaches 8. If there is no successful LBT and msg1 sent before the end of the message time window, the terminal indicates failure indication information to the upper layer.
Further, after the step of indicating the failure indication information to the upper layer of the terminal, the terminal may further switch the SSB for selecting the RO, such as selecting the RO based on SSB2 in the next message time window and starting a new random access procedure, assuming that the next available RO is RO4, the terminal starts opening msg1 window from the start of RO4, if LBT fails at the first RO4, continues to listen to RO2 nearest to the first RO4, and if listening succeeds and seizes a channel including RO2, the terminal transmits msg1 on RO 2.
In a third scenario, at least one first RO of a first channel in an unauthorized frequency band is intercepted within a message time window; if the first RO is not sensed to be idle in the message time window, or the first RO is sensed to be occupied for N times continuously in the message time window, indicating failure indication information to an upper layer of the terminal; and in the next message time window, the first RO of the second channel in the unlicensed frequency band is intercepted. Wherein the at least one first RO corresponds to a first SSB; the frequency domain range of the second channel is at least partially different from the frequency domain range of the first channel.
Assuming that the PRACH resource period in the first channel (channel 1) is 10ms, the message time window (msg1 window) is 20ms in length, the maximum number of consecutive LBT failures in the message time window is 8, and there are 4 ROs (RO1, RO2, RO3, and RO4) in one PRACH resource period, where RO1 and RO3 are associated with SSB1, respectively, and RO2 and RO4 are associated with SSB2, respectively. The PRACH resource period in the second channel (channel 2) is 10ms, the length of a message time window (msg1 window) is 20ms, the maximum number of consecutive LBT failures in the message time window is 8, and there are 4 ROs (RO1, RO2, RO3, and RO4) in one PRACH resource period, where RO1 and RO3 are associated with SSB1, respectively, and RO2 and RO4 are associated with SSB3, respectively.
The terminal selects the SSB1 and selects RACH resources based on the SSB 1. For example, the terminal is served by a downlink beam used when transmitting the SSB1, and thus the terminal can select an RO based on the SSB 1. Assuming that the next available RO is RO1, the user opens LBT to try to seize the channel containing RO1 and starts opening msg1 window from the beginning of RO1, if the current RO1 is busy, continues listening to the RO3 closest to the RO1, if the RO3 is also busy, continues listening to the RO1 closest to the RO3, and so on until the number of times that the message has not listened to a free RO within a time window (as shown in fig. 5) or the RO is continuously listened to as occupied reaches 8 (not shown in the figure). Alternatively, msg1 window is opened from the beginning of RO1, if the current RO1 is sensed to be busy, the next RO1 is sensed, if the RO1 is also busy, the next RO1 is sensed, and so on until no idle RO1 is sensed within a time window of the message (as shown in fig. 5) or the number of times that RO1 is sensed to be occupied reaches 8 (not shown in the figure). If there is no successful LBT and msg1 sent before the end of the message time window, the terminal indicates failure indication information to the upper layer.
Further, after the step of indicating the failure indication information to the upper layer of the terminal, the terminal may further select another channel 2 containing the RACH resource in the LBT frequency domain, and initiate a new random access procedure on the channel 2. The terminal is served by the downlink beam used when transmitting the SSB1, and thus the terminal selects an RO on channel 2 based on the SSB 1. That is, after the step of indicating to the upper layer of the terminal that the random access procedure failed, the terminal may also switch channels, such as selecting an RO based on the SSB1 of the second channel (channel 2) within the next message time window and opening a new random access procedure, assuming that the next available RO is RO1 on channel 2, the terminal opens msg1 window from the start of RO1, and if LBT succeeds at the earliest RO1 and camps on channel 2 containing RO1, the terminal transmits msg1 on RO1 on channel 2.
Before the step of listening to the transmission resource of the unlicensed frequency band and determining the target transmission channel, the method further includes: acquiring Physical Random Access Channel (PRACH) configuration information; wherein the PRACH configuration information is used to indicate at least one of an RO identity, an RO frequency division multiplexing capability (PRACH-FDM), and an RO frequency domain interval (ROfreqoffset 1). The RO identities are used to distinguish different ROs, and the RO frequency division multiplexing capability refers to the maximum number of ROs that can be included in one PRACH resource, for example, the maximum number of FDM ROs in the PRACH resource is 16. The RO frequency domain interval is the interval of two ROs for the same time FDM. The PRACH configuration information described in this embodiment is predefined (e.g., agreed by a protocol) or configured by a network device.
Before the step of listening to the transmission resource of the unlicensed frequency band and determining the target transmission channel, the method further includes: acquiring message time window configuration information; wherein, the message time window configuration information is used to indicate at least one of a window start point, a window length (duration), a window period, a maximum listening failure number in the window, and a window time domain offset. The message time window configuration information mentioned in this embodiment is predefined (e.g., protocol convention), or configured by the network device.
In the information transmission method of the unauthorized frequency band, the terminal monitors the transmission resource of the unauthorized frequency band in a message time window and sends the message I on the RO in the idle target transmission channel, so that the unauthorized frequency band is monitored in a targeted manner, the success rate of monitoring the idle channel can be improved, and the success rate of the random access process is improved.
The above embodiments describe information transmission methods of unlicensed frequency bands in different scenarios, and a terminal corresponding to the method will be further described with reference to the accompanying drawings.
As shown in fig. 6, the terminal 600 according to the embodiment of the present invention can implement interception of transmission resources in an unlicensed frequency band within a message time window in the foregoing embodiment to determine a target transmission channel; the details of a method for sending a message to a network device at a transmission opportunity RO of a physical random access channel in a target transmission channel, and achieving the same effect, where a message time window corresponds to a random access procedure message, the terminal 600 specifically includes the following functional modules:
an interception module 610, configured to intercept, within a message time window corresponding to the random access procedure message, a transmission resource in an unlicensed frequency band to determine a target transmission channel;
a sending module 620, configured to send a message one to the network device at the transmission opportunity RO of the physical random access channel in the target transmission channel.
Wherein, the interception module 610 includes:
a first listening sub-module, configured to listen to at least one first RO of a first channel in an unlicensed frequency band within a message time window, where the at least one first RO corresponds to a first association signal, and the first association signal includes: at least one of a first synchronization signal block, SSB, and a first channel state indication reference signal, CSI-RS;
a first processing sub-module, configured to indicate failure indication information to an upper layer if the first RO is not sensed to be idle within the message time window, or if the first RO is sensed to be occupied N times within the message time window, where the failure indication information is used to indicate: a random access procedure failure, a message-send failure, or a random access procedure has a problem.
Wherein, the interception module 610 further comprises:
a second listening sub-module, configured to listen to at least one second RO of the first channel in the unlicensed frequency band within a next message time window, where the at least one second RO corresponds to a second associated signal, and the second associated signal includes: at least one of a second SSB and a second CSI-RS, the second association signal being different from the first association signal;
alternatively, the first and second electrodes may be,
a third listening sub-module, configured to listen to a target RO of a second channel in the unlicensed frequency band within a next message time window, where a frequency domain range of the second channel is at least partially different from a frequency domain range of the first channel, and the target RO includes: the first RO, the second RO, or other ROs, the other ROs corresponding to associated signals different from the first associated signal and the second associated signal.
Wherein, the interception module 610 further comprises: the fourth interception submodule is used for intercepting at least one second RO of the first channel in the unauthorized frequency band in the message time window if the message time window is not finished; wherein the at least one second RO corresponds to a second correlation signal comprising: at least one of a second SSB and a second CSI-RS, the second association signal being different from the first association signal;
alternatively, the first and second electrodes may be,
a fifth interception sub-module, configured to, if the message time window is not finished, continue to intercept, within the message time window, a target RO of a second channel in the unlicensed frequency band, where a frequency domain range of the second channel is at least partially different from a frequency domain range of the first channel, and the target RO includes: the first RO, the second RO, or other ROs, the other ROs corresponding to associated signals different from the first associated signal and the second associated signal.
Specifically, the interception module 610 is specifically configured to:
and if the measurement result of the second associated signal in the first channel meets the preset condition, intercepting at least one second RO of the first channel in the unauthorized frequency band.
The interception module 610 is further specifically configured to:
and if the measurement result of the second channel meets the preset condition, intercepting the target RO of the second channel in the unauthorized frequency band.
Wherein, the terminal 600 further includes:
the system comprises a first acquisition module, a second acquisition module and a first transmission module, wherein the first acquisition module is used for acquiring Physical Random Access Channel (PRACH) configuration information; wherein the PRACH configuration information is used for indicating at least one of an RO identification, an RO frequency division multiplexing capability and an RO frequency domain interval.
Wherein, the terminal 600 further includes:
the second acquisition module is used for acquiring message time window configuration information; the message time window configuration information is used for indicating at least one of a window starting point, a window length, a window period, the maximum interception failure times in the window and the window time domain offset.
And the bandwidth occupied by the target transmission resource is greater than or equal to the preset percentage of the nominal channel bandwidth of the target transmission channel.
It is worth pointing out that, the terminal in the embodiment of the present invention listens to the transmission resource of the unauthorized frequency band within the message time window, and sends the message one on the RO in the idle target transmission channel, so that the unauthorized frequency band is intercepted in a targeted manner, the success rate of intercepting the idle channel can be improved, and the success rate of the random access process can be improved.
To better achieve the above object, further, fig. 7 is a schematic diagram of a hardware structure of a terminal implementing various embodiments of the present invention, where the terminal 70 includes, but is not limited to: radio frequency unit 71, network module 72, audio output unit 73, input unit 74, sensor 75, display unit 76, user input unit 77, interface unit 78, memory 79, processor 710, and power supply 711. Those skilled in the art will appreciate that the terminal configuration shown in fig. 7 is not intended to be limiting, and that the terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 710 is configured to listen to a transmission resource in an unlicensed frequency band within a message time window, and determine a target transmission channel, where the message time window corresponds to a random access procedure message one;
a radio frequency unit 71, configured to send a first message to a network device at a transmission opportunity RO of a physical random access channel in a target transmission channel;
the terminal of the embodiment of the invention monitors the transmission resource of the unauthorized frequency band in the message time window and sends the message I on the RO in the idle target transmission channel, thus the unauthorized frequency band is monitored in a targeted manner, the success rate of monitoring the idle channel can be improved, and the success rate of the random access process is improved.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 71 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, the processor 710 is configured to receive downlink data from a base station and process the received downlink data; in addition, the uplink data is transmitted to the base station. Typically, the radio frequency unit 71 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 71 can also communicate with a network and other devices through a wireless communication system.
The terminal provides wireless broadband internet access to the user via the network module 72, such as to assist the user in sending and receiving e-mails, browsing web pages, and accessing streaming media.
The audio output unit 73 may convert audio data received by the radio frequency unit 71 or the network module 72 or stored in the memory 79 into an audio signal and output as sound. Also, the audio output unit 73 may also provide audio output related to a specific function performed by the terminal 70 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 73 includes a speaker, a buzzer, a receiver, and the like.
The input unit 74 is for receiving an audio or video signal. The input Unit 74 may include a Graphics Processing Unit (GPU) 741 and a microphone 742, and the Graphics processor 741 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 76. The image frames processed by the graphic processor 741 may be stored in the memory 79 (or other storage medium) or transmitted via the radio frequency unit 71 or the network module 72. The microphone 742 may receive sounds and may be capable of processing such sounds into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 71 in case of the phone call mode.
The terminal 70 also includes at least one sensor 75, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that adjusts the brightness of the display panel 761 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 761 and/or a backlight when the terminal 70 moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 75 may also include a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, etc., which are not described in detail herein.
The display unit 76 is used to display information input by the user or information provided to the user. The Display unit 76 may include a Display panel 761, and the Display panel 761 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 77 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal. Specifically, the user input unit 77 includes a touch panel 771 and other input devices 772. The touch panel 771, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 771 (e.g., operations by a user on or near the touch panel 771 using a finger, stylus, or any suitable object or attachment). The touch panel 771 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 710, receives a command from the processor 710, and executes the command. In addition, the touch panel 771 can be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 771, the user input unit 77 may also include other input devices 772. In particular, other input devices 772 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 771 may be overlaid on the display panel 761, and when the touch panel 771 detects a touch operation thereon or nearby, the touch operation is transmitted to the processor 710 to determine the type of the touch event, and then the processor 710 provides a corresponding visual output on the display panel 761 according to the type of the touch event. Although the touch panel 771 and the display panel 761 are shown as two separate components in fig. 7 to implement the input and output functions of the terminal, in some embodiments, the touch panel 771 and the display panel 761 may be integrated to implement the input and output functions of the terminal, and is not limited herein.
The interface unit 78 is an interface for connecting an external device to the terminal 70. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 78 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the terminal 70 or may be used to transmit data between the terminal 70 and an external device.
The memory 79 may be used to store software programs as well as various data. The memory 79 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 79 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 710 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, performs various functions of the terminal and processes data by operating or executing software programs and/or modules stored in the memory 79 and calling data stored in the memory 79, thereby performing overall monitoring of the terminal. Processor 710 may include one or more processing units; preferably, the processor 710 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 710.
The terminal 70 may further include a power supply 711 (e.g., a battery) for supplying power to various components, and preferably, the power supply 711 may be logically connected to the processor 710 through a power management system, so as to manage charging, discharging, and power consumption management functions through the power management system.
In addition, the terminal 70 includes some functional modules that are not shown, and will not be described in detail herein.
Preferably, an embodiment of the present invention further provides a terminal, including a processor 710, a memory 79, and a computer program stored in the memory 79 and capable of running on the processor 710, where the computer program is executed by the processor 710 to implement each process of the information transmission method embodiment of the unlicensed frequency band, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. A terminal may be a wireless terminal or a wired terminal, and a wireless terminal may be a device providing voice and/or other service data connectivity to a user, a handheld device having a wireless connection function, or other processing devices connected to a wireless modem. Wireless terminals, which may be mobile terminals such as mobile telephones (or "cellular" telephones) and computers having mobile terminals, such as portable, pocket, hand-held, computer-included, or vehicle-mounted mobile devices, may communicate with one or more core networks via a Radio Access Network (RAN), which may exchange language and/or data with the RAN. Examples of such devices include Personal Communication Service (PCS) phones, cordless phones, Session Initiation Protocol (SIP) phones, Wireless Local Loop (WLL) stations, and Personal Digital Assistants (PDAs). A wireless Terminal may also be referred to as a system, a Subscriber Unit (Subscriber Unit), a Subscriber Station (Subscriber Station), a Mobile Station (Mobile), a Remote Station (Remote Station), a Remote Terminal (Remote Terminal), an Access Terminal (Access Terminal), a User Terminal (User Terminal), a User Agent (User Agent), and a User Device or User Equipment (User Equipment), which are not limited herein.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the information transmission method embodiment of the unlicensed frequency band, and can achieve the same technical effect, and is not described herein again to avoid repetition. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
The above embodiment describes the information transmission method of the unlicensed frequency band of the present invention from the terminal side, and the following embodiment further describes the information transmission method of the unlicensed frequency band of the network device side with reference to the accompanying drawings.
As shown in fig. 8, the information transmission method of the unlicensed frequency band according to the embodiment of the present invention is applied to a network device side, and the method includes the following steps:
step 81: and receiving a message I of a random access process on a transmission opportunity RO of a physical random access channel in a target transmission channel of the unlicensed frequency band.
Wherein the RO is located within a message time window corresponding to the random access procedure message one. The bandwidth occupied by the target transmission resource (here, the bandwidth range spanned by the target transmission resource) is greater than or equal to a preset percentage (e.g., 70% or 80%) of the nominal channel bandwidth of the target transmission channel, so that it can be ensured that the transmission of the unlicensed frequency band meets the OCB requirement.
Step 82: and feeding back a response message to the terminal according to the message I.
Wherein, the response message includes but is not limited to message two, and the network device feeds back the response message to the terminal to complete the random access procedure.
The target transmission channel in the embodiment of the invention satisfies one of the following position relations:
when the target transport channel includes at least one physical random access channel transmission opportunity RO, the target transport resource includes at least one RO and at least one other channel, and the other channel is located in a frequency domain portion of the target transport channel except for all ROs. Assuming that the target transmission channel includes 4 ROs, such as RO1, RO2, RO3, and RO4, the target transmission resource includes RO1 and at least one other channel located in a frequency domain portion of the target transmission channel other than RO1, RO2, RO3, and RO 4. Wherein both of the at least one other channel and the at least one RO in the target transmission resource having the farthest frequency domain location satisfy the OCB requirement.
Or, when the target transmission channel includes at least two ROs, the target transmission resource includes at least two of the at least two ROs. It is assumed that the target transmission channel includes 4 ROs, such as RO1, RO2, RO3, and RO4, and the target transmission resource includes RO1 and RO 4. And for the transmission scene of the unauthorized frequency band, the two channels with the farthest frequency domain positions in at least one other channel and at least one RO in the target transmission resource meet the OCB requirement.
Before step 81, the method further comprises: configuring Physical Random Access Channel (PRACH) configuration information for a terminal; wherein the PRACH configuration information is used for indicating at least one of an RO identification, an RO frequency division multiplexing capability and an RO frequency domain interval.
Before step 81, the method further comprises: configuring message time window configuration information for a terminal; wherein, the message time window configuration information is used to indicate at least one of a window start point, a window length (duration), a window period, a maximum listening failure number in the window, and a window time domain offset.
In the information transmission method of the unauthorized frequency band, the network equipment receives the message I of the random access process on the RO of the target transmission channel of the unauthorized frequency band, so as to complete the subsequent random access process according to the message I, wherein the RO is positioned on a message time window and is determined by the terminal aiming at the message time window, thus the unauthorized frequency band is intercepted in a targeted manner, the success rate of intercepting the idle channel can be improved, and the success rate of the random access process is improved.
The above embodiments respectively describe in detail the information transmission methods of the unlicensed frequency band in different scenarios, and the following embodiments further describe the corresponding network device with reference to the accompanying drawings.
As shown in fig. 9, the network device 900 according to the embodiment of the present invention can receive a first message in a random access procedure at a transmission opportunity RO of a physical random access channel in a target transmission channel of an unlicensed frequency band in the foregoing embodiment; wherein, the RO is positioned in a message time window corresponding to the random access process message I; according to the first message, the details of the response message method are fed back to the terminal, and the same effect is achieved, the network device 900 specifically includes the following functional modules:
a receiving module 910, configured to receive a first message in a random access procedure at a transmission time RO of a physical random access channel in a target transmission channel in an unlicensed frequency band; wherein, the RO is positioned in a message time window corresponding to the random access process message I;
and a response module 920, configured to feed back a response message to the terminal according to the message one.
Wherein, the network device 900 further includes: the first configuration module is used for configuring Physical Random Access Channel (PRACH) configuration information for the terminal; wherein the PRACH configuration information is used for indicating at least one of an RO identification, an RO frequency division multiplexing capability and an RO frequency domain interval.
Wherein, the network device 900 further includes: the second configuration module is used for configuring message time window configuration information for the terminal; the message time window configuration information is used for indicating at least one of a window starting point, a window length, a window period, the maximum interception failure times in the window and the window time domain offset.
And the bandwidth occupied by the target transmission resource is greater than or equal to the preset percentage of the nominal channel bandwidth of the target transmission channel.
It is worth pointing out that, the network device in the embodiment of the present invention receives the first message of the random access process on the RO of the target transmission channel in the unlicensed frequency band, and thereby completes the subsequent random access process according to the first message, where the RO is located on the time window of the message and is determined by the terminal for the interception of the time window of the message, so that the unlicensed frequency band is intercepted in a targeted manner, the success rate of intercepting the idle channel can be improved, and the success rate of the random access process is improved.
It should be noted that the division of the modules of the network device and the terminal is only a logical division, and the actual implementation may be wholly or partially integrated into one physical entity, or may be physically separated. And these modules can be realized in the form of software called by processing element; or may be implemented entirely in hardware; and part of the modules can be realized in the form of calling software by the processing element, and part of the modules can be realized in the form of hardware. For example, the determining module may be a processing element separately set up, or may be implemented by being integrated in a chip of the apparatus, or may be stored in a memory of the apparatus in the form of program code, and the function of the determining module is called and executed by a processing element of the apparatus. Other modules are implemented similarly. In addition, all or part of the modules can be integrated together or can be independently realized. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
For example, the above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), etc. For another example, when some of the above modules are implemented in the form of a Processing element scheduler code, the Processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor that can invoke the program code. As another example, these modules may be integrated together, implemented in the form of a system-on-a-chip (SOC).
In order to better achieve the above object, an embodiment of the present invention further provides a network device, which includes a processor, a memory, and a computer program stored in the memory and running on the processor, and when the processor executes the computer program, the steps in the information transmission method of the unlicensed frequency band are implemented. An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the information transmission method for an unlicensed frequency band are implemented as described above.
Specifically, the embodiment of the invention also provides a network device. As shown in fig. 10, the network device 1000 includes: antenna 101, radio frequency device 102, baseband device 103. Antenna 101 is connected to radio frequency device 102. In the uplink direction, rf device 102 receives information via antenna 101 and sends the received information to baseband device 103 for processing. In the downlink direction, the baseband device 103 processes information to be transmitted and transmits the information to the rf device 102, and the rf device 102 processes the received information and transmits the processed information through the antenna 101.
The above-mentioned band processing means may be located in the baseband apparatus 103, and the method performed by the network device in the above embodiment may be implemented in the baseband apparatus 103, where the baseband apparatus 103 includes the processor 104 and the memory 105.
The baseband apparatus 103 may include, for example, at least one baseband board, on which a plurality of chips are disposed, as shown in fig. 10, where one of the chips, for example, the processor 104, is connected to the memory 105 to call up a program in the memory 105 to perform the network device operations shown in the above method embodiments.
The baseband device 103 may further include a network interface 106, such as a Common Public Radio Interface (CPRI), for exchanging information with the radio frequency device 102.
The processor may be a single processor or a combination of multiple processing elements, for example, the processor may be a CPU, an ASIC, or one or more integrated circuits configured to implement the methods performed by the network devices, for example: one or more microprocessors DSP, or one or more field programmable gate arrays FPGA, or the like. The storage element may be a memory or a combination of a plurality of storage elements.
The memory 105 may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic random access memory (ddr Data Rate SDRAM, ddr SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The memory 105 described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
Specifically, the network device of the embodiment of the present invention further includes: a computer program stored in the memory 105 and operable on the processor 104, the processor 104 calling the computer program in the memory 105 to execute the method performed by each module shown in fig. 9.
In particular, the computer program, when invoked by the processor 104, is operable to perform: receiving a message I of a random access process on a transmission opportunity RO of a physical random access channel in a target transmission channel of an unauthorized frequency band; wherein, the RO is positioned in a message time window corresponding to the random access process message I; and feeding back a response message to the terminal according to the message I.
The network equipment in the embodiment of the invention receives the message I of the random access process on the RO of the target transmission channel of the unauthorized frequency band, thereby completing the subsequent random access process according to the message I, wherein the RO is positioned on the message time window and is determined by the terminal aiming at the message time window, thus intercepting the unauthorized frequency band in a targeted manner, improving the success rate of intercepting the idle channel and further improving the success rate of the random access process.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
Furthermore, it is to be noted that in the device and method of the invention, it is obvious that the individual components or steps can be decomposed and/or recombined. These decompositions and/or recombinations are to be regarded as equivalents of the present invention. Also, the steps of performing the series of processes described above may naturally be performed chronologically in the order described, but need not necessarily be performed chronologically, and some steps may be performed in parallel or independently of each other. It will be understood by those skilled in the art that all or any of the steps or elements of the method and apparatus of the present invention may be implemented in any computing device (including processors, storage media, etc.) or network of computing devices, in hardware, firmware, software, or any combination thereof, which can be implemented by those skilled in the art using their basic programming skills after reading the description of the present invention.
Thus, the objects of the invention may also be achieved by running a program or a set of programs on any computing device. The computing device may be a general purpose device as is well known. The object of the invention is thus also achieved solely by providing a program product comprising program code for implementing the method or the apparatus. That is, such a program product also constitutes the present invention, and a storage medium storing such a program product also constitutes the present invention. It is to be understood that the storage medium may be any known storage medium or any storage medium developed in the future. It is further noted that in the apparatus and method of the present invention, it is apparent that each component or step can be decomposed and/or recombined. These decompositions and/or recombinations are to be regarded as equivalents of the present invention. Also, the steps of executing the series of processes described above may naturally be executed chronologically in the order described, but need not necessarily be executed chronologically. Some steps may be performed in parallel or independently of each other.
While the preferred embodiments of the present invention have been described, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention as defined in the following claims.

Claims (25)

1. An information transmission method of an unlicensed frequency band is applied to a terminal, and is characterized by comprising the following steps:
monitoring transmission resources of an unauthorized frequency band within a message time window to determine a target transmission channel, wherein the message time window corresponds to a random access process message I;
sending the first message to network equipment on a transmission opportunity RO of a physical random access channel in the target transmission channel;
and the bandwidth occupied by the transmission resource is greater than or equal to the preset percentage of the nominal channel bandwidth of the target transmission channel.
2. The method as claimed in claim 1, wherein the step of listening for the transmission resource of the unlicensed frequency band within a message time window comprises:
listening for at least one first RO of a first channel in an unlicensed frequency band within the message time window, wherein the at least one first RO corresponds to a first association signal comprising: at least one of a first synchronization signal block, SSB, and a first channel state indication reference signal, CSI-RS;
if the first RO is not sensed to be idle in the message time window, or if the first RO is sensed to be occupied for N consecutive times in the message time window, indicating failure indication information to an upper layer, wherein the failure indication information is used for indicating: a random access procedure failure, a message-send failure, or a random access procedure has a problem.
3. The method as claimed in claim 2, wherein after the step of indicating the failure indication information to the upper layer, the method further comprises:
listening for at least one second RO of the first channel in an unlicensed frequency band for a next message time window, wherein the at least one second RO corresponds to a second association signal comprising: at least one of a second SSB and a second CSI-RS, the second association signal being different from the first association signal;
alternatively, the first and second electrodes may be,
and intercepting a target RO of a second channel in an unlicensed frequency band within a next message time window, wherein the frequency domain range of the second channel is at least partially different from the frequency domain range of the first channel, and the target RO comprises: a first RO, a second RO, or other ROs, the other ROs corresponding to associated signals that are different from the first associated signal and the second associated signal.
4. The method as claimed in claim 2, wherein after the step of indicating the failure indication information to the upper layer, the method further comprises:
if the message time window is not finished, continuing to listen to at least one second RO of the first channel in the unlicensed frequency band within the message time window, where the at least one second RO corresponds to a second associated signal, and the second associated signal includes: at least one of a second SSB and a second CSI-RS, the second association signal being different from the first association signal;
alternatively, the first and second electrodes may be,
if the message time window is not finished, continuing to monitor a target RO of a second channel in an unlicensed frequency band within the message time window, where a frequency domain range of the second channel is at least partially different from a frequency domain range of the first channel, and the target RO includes: a first RO, a second RO, or other ROs, the other ROs corresponding to associated signals that are different from the first associated signal and the second associated signal.
5. The method as claimed in claim 3 or 4, wherein the step of listening for at least one second RO of the first channel in the unlicensed band comprises:
and if the measurement result of the second associated signal in the first channel meets a preset condition, intercepting at least one second RO of the first channel in an unauthorized frequency band.
6. The method according to claim 3 or 4, wherein the step of listening for the target RO of the second channel in the unlicensed frequency band comprises:
and if the measurement result of the second channel meets the preset condition, intercepting the target RO of the second channel in the unauthorized frequency band.
7. The method according to claim 1 or 2, wherein the step of listening for the transmission resource of the unlicensed frequency band within a message time window further comprises:
acquiring Physical Random Access Channel (PRACH) configuration information; wherein the PRACH configuration information is used for indicating at least one of an RO identification, an RO frequency division multiplexing capability and an RO frequency domain interval.
8. The method according to claim 1 or 2, wherein the step of listening for the transmission resource of the unlicensed frequency band within a message time window further comprises:
acquiring message time window configuration information; the message time window configuration information is used for indicating at least one of a window starting point, a window length, a window period, the maximum interception failure times in the window and window time domain offset.
9. A terminal, comprising:
the monitoring module is used for monitoring the transmission resources of the unauthorized frequency band within a message time window to determine a target transmission channel, wherein the message time window corresponds to a random access process message I;
a sending module, configured to send the first message to a network device on a transmission opportunity RO of a physical random access channel in the target transmission channel;
and the bandwidth occupied by the transmission resource is greater than or equal to the preset percentage of the nominal channel bandwidth of the target transmission channel.
10. The terminal of claim 9, wherein the listening module comprises:
a first listening sub-module, configured to listen to at least one first RO of a first channel in an unlicensed frequency band within the message time window, where the at least one first RO corresponds to a first association signal, and the first association signal includes: at least one of a first synchronization signal block, SSB, and a first channel state indication reference signal, CSI-RS;
a first processing sub-module, configured to indicate failure indication information to an upper layer if it is not sensed that the first RO is idle within the message time window, or if it is sensed that the first RO is occupied N consecutive times within the message time window, where the failure indication information is used to indicate: a random access procedure failure, a message-send failure, or a random access procedure has a problem.
11. The terminal of claim 10, wherein the listening module further comprises:
a second listening sub-module, configured to listen to at least one second RO of the first channel in an unlicensed frequency band within a next message time window, where the at least one second RO corresponds to a second associated signal, and the second associated signal includes: at least one of a second SSB and a second CSI-RS, the second association signal being different from the first association signal;
alternatively, the first and second electrodes may be,
a third listening sub-module, configured to listen to a target RO of a second channel in an unlicensed frequency band within a next message time window, where a frequency domain range of the second channel is at least partially different from a frequency domain range of the first channel, and the target RO includes: a first RO, a second RO, or other ROs, the other ROs corresponding to associated signals that are different from the first associated signal and the second associated signal.
12. The terminal of claim 10, wherein the listening module further comprises:
a fourth listening sub-module, configured to, if the message time window is not ended, continue listening to at least one second RO of the first channel in an unlicensed frequency band within the message time window, where the at least one second RO corresponds to a second associated signal, and the second associated signal includes: at least one of a second SSB and a second CSI-RS, the second association signal being different from the first association signal;
alternatively, the first and second electrodes may be,
a fifth listening sub-module, configured to, if the message time window is not finished, continue listening, within the message time window, to a target RO of a second channel in an unlicensed frequency band, where a frequency domain range of the second channel is at least partially different from a frequency domain range of the first channel, and the target RO includes: a first RO, a second RO, or other ROs, the other ROs corresponding to associated signals that are different from the first associated signal and the second associated signal.
13. The terminal according to claim 11 or 12, wherein the listening module is specifically configured to:
and if the measurement result of the second associated signal in the first channel meets a preset condition, intercepting at least one second RO of the first channel in an unauthorized frequency band.
14. The terminal according to claim 11 or 12, wherein the listening module is specifically configured to:
and if the measurement result of the second channel meets the preset condition, intercepting the target RO of the second channel in the unauthorized frequency band.
15. The terminal according to claim 9 or 10, characterized in that the terminal further comprises:
the system comprises a first acquisition module, a second acquisition module and a first transmission module, wherein the first acquisition module is used for acquiring Physical Random Access Channel (PRACH) configuration information; wherein the PRACH configuration information is used for indicating at least one of an RO identification, an RO frequency division multiplexing capability and an RO frequency domain interval.
16. The terminal according to claim 9 or 10, characterized in that the terminal further comprises:
the second acquisition module is used for acquiring message time window configuration information; the message time window configuration information is used for indicating at least one of a window starting point, a window length, a window period, the maximum interception failure times in the window and window time domain offset.
17. A terminal, characterized in that the terminal comprises a processor, a memory and a computer program stored on the memory and running on the processor, and that the computer program, when executed by the processor, implements the steps of the method for information transmission in unlicensed frequency band according to any one of claims 1 to 8.
18. An information transmission method of an unlicensed frequency band is applied to network equipment, and is characterized by comprising the following steps:
receiving a message I of a random access process on a transmission opportunity RO of a physical random access channel in a target transmission channel of an unauthorized frequency band; wherein the RO is located within a message time window corresponding to a random access procedure message one;
feeding back a response message to the terminal according to the first message;
and the bandwidth occupied by the transmission resources of the unauthorized frequency band is greater than or equal to the preset percentage of the nominal channel bandwidth of the target transmission channel.
19. The method as claimed in claim 18, wherein before the step of receiving the first message of the random access procedure at the transmission opportunity RO of the physical random access channel in the target transmission channel of the unlicensed frequency band, the method further comprises:
configuring Physical Random Access Channel (PRACH) configuration information for a terminal; wherein the PRACH configuration information is used for indicating at least one of an RO identification, an RO frequency division multiplexing capability and an RO frequency domain interval.
20. The method as claimed in claim 18, wherein before the step of receiving the first message of the random access procedure at the transmission opportunity RO of the physical random access channel in the target transmission channel of the unlicensed frequency band, the method further comprises:
configuring message time window configuration information for a terminal; the message time window configuration information is used for indicating at least one of a window starting point, a window length, a window period, the maximum interception failure times in the window and window time domain offset.
21. A network device, comprising:
the receiving module is used for receiving a message I in the random access process on a transmission opportunity RO of a physical random access channel in a target transmission channel of an unauthorized frequency band; wherein the RO is located within a message time window corresponding to a random access procedure message one;
the response module is used for feeding back a response message to the terminal according to the first message;
and the bandwidth occupied by the transmission resources of the unauthorized frequency band is greater than or equal to the preset percentage of the nominal channel bandwidth of the target transmission channel.
22. The network device of claim 21, wherein the network device further comprises:
the first configuration module is used for configuring Physical Random Access Channel (PRACH) configuration information for the terminal; wherein the PRACH configuration information is used for indicating at least one of an RO identification, an RO frequency division multiplexing capability and an RO frequency domain interval.
23. The network device of claim 21, wherein the network device further comprises:
the second configuration module is used for configuring message time window configuration information for the terminal; the message time window configuration information is used for indicating at least one of a window starting point, a window length, a window period, the maximum interception failure times in the window and window time domain offset.
24. A network device comprising a processor, a memory, and a computer program stored on the memory and running on the processor, wherein the processor executes the computer program to implement the steps of the method for information transmission in unlicensed frequency band according to any one of claims 18 to 20.
25. A computer-readable storage medium, having a computer program stored thereon, wherein the computer program when executed by a processor implements the steps of the method for information transmission in unlicensed frequency band according to any one of claims 1 to 8 and 18 to 20.
CN201810858467.8A 2018-07-31 2018-07-31 Information transmission method, terminal and network equipment of unauthorized frequency band Active CN110784873B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810858467.8A CN110784873B (en) 2018-07-31 2018-07-31 Information transmission method, terminal and network equipment of unauthorized frequency band

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810858467.8A CN110784873B (en) 2018-07-31 2018-07-31 Information transmission method, terminal and network equipment of unauthorized frequency band

Publications (2)

Publication Number Publication Date
CN110784873A CN110784873A (en) 2020-02-11
CN110784873B true CN110784873B (en) 2022-01-07

Family

ID=69383143

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810858467.8A Active CN110784873B (en) 2018-07-31 2018-07-31 Information transmission method, terminal and network equipment of unauthorized frequency band

Country Status (1)

Country Link
CN (1) CN110784873B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113677012A (en) * 2020-05-15 2021-11-19 维沃移动通信有限公司 Transmission method and terminal of random access signal
CN111935831B (en) * 2020-07-14 2023-04-11 RealMe重庆移动通信有限公司 Frequency band allocation method, device, storage medium, network equipment and terminal

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107431986A (en) * 2015-04-09 2017-12-01 英特尔Ip公司 The random access procedure supported for enhanced covering

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10085283B2 (en) * 2014-12-31 2018-09-25 Qualcomm Incorporated Antenna subset and directional channel access in a shared radio frequency spectrum band

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107431986A (en) * 2015-04-09 2017-12-01 英特尔Ip公司 The random access procedure supported for enhanced covering

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Discussion on RACH procedure for NR-U;vivo;《3GPP TSG RAN WG1 Meeting #93 R1-1806087》;20180525;全文 *
RACH configuration of Multiple Msg1 transmissions before then end of a monitored RAR window;InterDigital, Inc.;《3GPP TSG RAN WG1 Meeting #91 R1-1720550》;20171201;正文第1-2节 *

Also Published As

Publication number Publication date
CN110784873A (en) 2020-02-11

Similar Documents

Publication Publication Date Title
CN110784933B (en) Information transmission method, terminal and network equipment
CN111106907B (en) Indication method and terminal for Transmission Configuration Indication (TCI) state
JP7369782B2 (en) Hybrid automatic repeat request HARQ feedback method, terminal and network equipment
CN110474745B (en) Quasi co-location configuration method, terminal and network equipment
CN110971322B (en) Information transmission method, network equipment and terminal
CN111148268B (en) Random access resource determination method, terminal and network equipment
CN111148232B (en) Information transmission method and communication equipment
CN111182648B (en) Random access transmission method and terminal
CN110611948B (en) Transmission method of synchronous signal block, network equipment and terminal
WO2019214664A1 (en) Transmission resource indication method, network device, and terminal
CN113225832B (en) Data transmission method and device of unauthorized frequency band and communication equipment
CN111278123B (en) Information transmission method, terminal and network equipment of unauthorized frequency band
CN111148125B (en) Monitoring method, configuration method, terminal and network equipment for downlink information
CN110545582B (en) Random access resource determination method and terminal
CN111436154B (en) Uplink transmission method, terminal and network device for unlicensed frequency band
CN111182635B (en) Unlicensed frequency band information transmission method, terminal and network equipment
CN110611954B (en) Method for processing bandwidth part, terminal and network equipment
CN110784873B (en) Information transmission method, terminal and network equipment of unauthorized frequency band
CN111278121B (en) Random access transmission method and terminal
CN110708764B (en) Information transmission method, network equipment and terminal
CN110691389B (en) Uplink data rate matching method, configuration method, terminal and network equipment
CN110611955B (en) Bandwidth part processing method and terminal
CN113452488B (en) Configuration method and device of transmission node and communication equipment
CN111315015B (en) Unlicensed frequency band information transmission method, terminal and network equipment
CN113543158A (en) Method and device for determining data transmission layer number and communication equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant