CN110831227A - Random access method, network equipment and terminal - Google Patents

Random access method, network equipment and terminal Download PDF

Info

Publication number
CN110831227A
CN110831227A CN201810903668.5A CN201810903668A CN110831227A CN 110831227 A CN110831227 A CN 110831227A CN 201810903668 A CN201810903668 A CN 201810903668A CN 110831227 A CN110831227 A CN 110831227A
Authority
CN
China
Prior art keywords
terminal
random access
identification information
information
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810903668.5A
Other languages
Chinese (zh)
Other versions
CN110831227B (en
Inventor
马玥
吴昱民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810903668.5A priority Critical patent/CN110831227B/en
Publication of CN110831227A publication Critical patent/CN110831227A/en
Application granted granted Critical
Publication of CN110831227B publication Critical patent/CN110831227B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/006Transmission of channel access control information in the downlink, i.e. towards the terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a random access method, network equipment and a terminal, relates to the field of communication, and solves the problem that the terminal cannot be identified in the conventional two-step random access process. The random access method of the network equipment side comprises the following steps: in the configuration process of the two-step random access process, configuration information is sent to a terminal, wherein the configuration information comprises: identification information for identifying the terminal. The scheme of the invention configures the identification information for identifying the terminal for the terminal, thereby realizing the identification of the terminal based on the identification information in the subsequent 2-step RACH flow execution process.

Description

Random access method, network equipment and terminal
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a random access method, a network device, and a terminal.
Background
As shown in fig. 1, the two-Step Random Access Channel (2-Step RACH) includes: a configuration process and an execution process;
the configuration process of the two-step random access process comprises the following steps: step 0 (configuration process of two-step random access procedure): a network device (e.g., a next generation node B, gNB) on a network side configures configuration information of two-step random access to a terminal or a User Equipment (UE), where the configuration information includes: and the Msg1 and Msg2 correspond to the sending resource information.
The two-step random access procedure execution process comprises the following steps:
step 1: the UE triggers a 2-step RACH procedure, and sends an access request message (Msg1) to the gNB on the network side, where the Msg1 may be sent through a Physical Uplink Shared Channel (PUSCH).
Step 2: the gNB on the network side sends a response message (Msg2) to the UE. If the UE fails to receive Msg2, the UE resends Msg 1.
In the 2-step RACH procedure, the terminal cannot be identified at present.
Disclosure of Invention
The embodiment of the invention provides a random access method, network equipment and a terminal, and solves the problem that terminal identification cannot be performed in a 2-stepACH flow in the prior art.
In a first aspect, an embodiment of the present invention provides a random access method, which is applied to a network device, and the method includes:
in the configuration process of the two-step random access process, configuration information is sent to a terminal, wherein the configuration information comprises: identification information for identifying the terminal.
In a second aspect, an embodiment of the present invention provides a random access method, which is applied to a terminal, and the method includes:
receiving configuration information from a network device in a configuration process of a two-step random access procedure, the configuration information comprising: identification information for identifying the terminal;
and performing the execution process of the two-step random access process according to the identification information.
In a third aspect, an embodiment of the present invention further provides a network device, including:
a transceiver module, configured to send configuration information to a terminal in a configuration process of a two-step random access procedure, where the configuration information includes: identification information for identifying the terminal.
In a fourth aspect, an embodiment of the present invention further provides a terminal, including:
a transceiver module, configured to receive configuration information from a network device, where the configuration information includes: identification information for identifying the terminal; and executing the execution process of the two-step random access process according to the identification information.
In a fifth aspect, an embodiment of the present invention further provides a communication device, where the communication device includes a processor, a memory, and a computer program stored in the memory and executable on the processor, and when executed by the processor, the computer program implements the steps of the random access method described above.
In a sixth aspect, the embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when being executed by a processor, the computer program implements the steps of the random access method as described above.
Thus, in the 2-step RACH process, the network equipment configures the identification information for identifying the terminal for the terminal, so that the identification of the terminal can be realized based on the identification information in the subsequent 2-step RACH process.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
Fig. 1 is a flowchart illustrating a random access method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an algorithm for performing short MAC-I check according to identification information configured for a terminal in a random access method according to an embodiment of the present invention;
FIG. 3 is a block diagram of a network device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the embodiments of the present invention will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
The terms first, second and the like in the description and in the claims of the present invention are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. In the description and in the claims "and/or" means at least one of the connected objects.
The techniques described herein are not limited to Long Time Evolution (LTE)/LTE Evolution (LTE-Advanced) systems, and may also be used for various wireless communication systems, such as Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiple Access (OFDMA), Single-carrier Frequency Division Multiple Access (SC-FDMA), and other systems. The terms "system" and "network" are often used interchangeably. CDMA systems may implement Radio technologies such as CDMA2000, Universal Terrestrial Radio Access (UTRA), and so on. UTRA includes Wideband CDMA (Wideband code division Multiple Access, WCDMA) and other CDMA variants. TDMA systems may implement radio technologies such as Global System for Mobile communications (GSM). The OFDMA system may implement radio technologies such as Ultra Mobile Broadband (UMB), evolved-UTRA (E-UTRA), IEEE 802.11(Wi-Fi), IEEE 802.16(WiMAX), IEEE 802.20, Flash-OFDM, etc. UTRA and E-UTRA are parts of the Universal Mobile Telecommunications System (UMTS). LTE and higher LTE (e.g., LTE-A) are new UMTS releases that use E-UTRA. UTRA, E-UTRA, UMTS, LTE-A, and GSM are described in documents from an organization named "third Generation partnership project" (3 GPP). CDMA2000 and UMB are described in documents from an organization named "third generation partnership project 2" (3GPP 2). The techniques described herein may be used for both the above-mentioned systems and radio technologies, as well as for other systems and radio technologies. However, the following description describes the NR system for purposes of example, and in much of the description below NR terminology is used, taking the NR system as an example for illustration, although the techniques may also be applied to applications other than NR system applications. Those skilled in the art will recognize that the words are not to be construed as limiting the scope of the invention.
The following description provides examples and does not limit the scope, applicability, or configuration set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the spirit and scope of the disclosure. Various examples may omit, substitute, or add various procedures or components as appropriate. For example, the described methods may be performed in an order different than described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
The network device in the following embodiments of the present invention may be a base station, such as a gNB in an NR system, or may be another access device on the network side; the terminal may be any user equipment accessing the system.
As shown in fig. 1, an embodiment of the present invention provides a random access method, applied to a network device, where the method includes:
step 0: in the configuration process of the two-step random access process, configuration information is sent to a terminal, wherein the configuration information comprises: identification information for identifying the terminal.
The identification information for identifying the terminal here includes: and grouping the terminals according to the characteristics of the terminals or distributing the terminals to the terminals. Wherein the characteristic of the terminal comprises at least one of: service characteristics of the terminal, the location of the terminal and the terminal-attached beam. For example, a group of terminals includes N terminals, where N is a positive integer, the N terminals have the same terminal identifier, and the terminal identifier is the same as the group identifier. When the identification information identifying the terminal includes a terminal identification allocated to the terminal, the terminal identifications of each terminal are different from each other, and the terminal identification uniquely identifies the terminal.
In this embodiment, the identification information for identifying the terminal may be: a Temporary Mobile Subscriber Identity (S-TMSI) allocated by a core network system, wherein the S-TMSI can be a truncated S-TMSI or an un-truncated S-TMSI;
the identification information for identifying the terminal may also be: an Inactive radio Network Temporary Identifier (I-RNTI), wherein the I-RNTI can be a truncated I-RNTI or an unpunctured I-RNTI;
the identification information for identifying the terminal may also be: a radio network Temporary Identity (C-RNTI) of a Cell, wherein the C-RNTI can be a truncated C-RNTI or an unpunctured C-RNTI;
the identification information for identifying the terminal may also be: a non-orthogonal access identity (i.e., a non-orthogonal access ID), where the non-orthogonal access ID is determined according to at least one of time domain, frequency domain, code domain, space domain, and power domain resources of the terminal. When a terminal accesses, time domain resources, frequency domain resources, code domain resources, space domain resources, and power domain resources allocated to the terminal may all be used to identify the terminal, and thus, one or more of these resources may also be used to identify the terminal.
In this embodiment of the present invention, in the configuration step of the 2-step RACH, the network device sends a system message or a release message (release message) or a dedicated message to the terminal, where the dedicated message is, for example, a Radio Resource Control (RRC) message or the like, and the system message or the release message or the dedicated message carries the configuration information, that is, terminals with different characteristics are grouped by the system message or the release message or the dedicated message, where the different characteristics may include a service characteristic of the terminal, a location of the terminal, a terminal attachment beam, and the like, different group IDs are used to identify different groups of terminals, and a unique ID may also be allocated to the terminal by the system message or the release message or the dedicated message for the terminal to initiate connection establishment or data transmission next time, the identification of the terminal can be achieved based on the identification information.
As further shown in fig. 1, the random access method according to the embodiment of the present invention may further include: and performing the execution process of the two-step random access process according to the identification information. The execution process of the two-step random access process specifically includes:
step 1: receiving an access request message (namely Msg1) sent by a terminal, wherein the access request message carries the identification information; of course other information for access may be included;
step 2: and sending a response message (namely Msg2) of the access request message to the terminal.
The response message herein includes: contention resolution messages and/or reconfiguration messages for the terminal, etc. A competition resolving message is returned to the terminal which is successfully accessed, so that the access of the terminal can be realized; and feeding back the reconfiguration message to the terminal, so that the terminal can reinitiate the access request message based on the reconfiguration message.
In one implementation of this embodiment, when the terminal is in an inactive state, receiving the access request message sent by the terminal may further include:
step 100, sending a request message for acquiring context information of the terminal to an original cell according to the identification information, wherein the original cell is a cell in which the terminal in the inactive state works before being switched to the inactive state;
step 101, receiving the context information of the terminal sent by the cell.
The terminal is in an inactive state and adopts 2-step RACH, the terminal carries the identification information for identifying the terminal in the Msg1 and reports the identification information to the network equipment;
after the network equipment resolves the identification information, the network equipment uses the identification information to request the context information of the terminal from the network equipment which correspondingly releases the terminal;
and after the network equipment releasing the terminal verifies that the terminal is legal, transmitting the context information of the terminal to the network equipment initiating the request.
In another implementation of this embodiment, the access request message further carries short MAC-I information, and after receiving the access request message sent by the terminal, the method further includes:
step 110, calculating short MAC-I information according to the identification information to obtain a calculation result; here, MAC-I is a bit sequence generated by IK and a transmission direction, a transmission frame number, a random number through F9 algorithm, IK is one of authentication quintuple generated by an authentication center, a signaling message needs to obtain an Integrity Key (IK) parameter no matter it is received or transmitted, and short MAC I-I is an expression form of the sequence.
Specifically, a preset input parameter may be calculated by using a preset algorithm to obtain the calculation result; the preset input parameters at least comprise: the current cell identity (cellIdentity), the identification information (i.e. the identification information UE ID for identifying the terminal), the identity of the physical cell (physcellld), and the resume discriminator parameter (resumeistrimenter).
As shown in fig. 2, the preset algorithm may be an encryption algorithm, such as an EIA algorithm, and the calculation of Short MAC-I requires a plurality of sets of Input parameters (VarShortMAC-Input/varshortresummemac-Input) including: cellIdentity, UE ID (which may be C-RNTI or New 2-step ID or truncated 16 bit New 2-step ID), physcellld, and resummercimmunomator. Of course, other parameters, such as Count parameter, Direction parameter and/or beer parameter, may be included in the algorithm. The Count parameter is a Packet Data Convergence Protocol (PDCP) counter, the Direction parameter is indicated uplink/downlink Data, and the Bearer parameter is information such as a Bearer ID.
And step 111, if the calculation result is the same as the short MAC-I carried in the request message, determining that the terminal is legal.
In addition, in the above-described embodiments of the present invention, the valid range of the identification information (group identification or terminal identification) for identifying the terminal may be at least one of: a cell, a notification Area (RNA) of a radio access network, and a Tracking Area (TA); of course, the method can also be effective in all areas; the validation here means: the identification information for identifying the terminal may be recognized in the above-mentioned area, and the terminal considers the identification information to be invalid beyond the area.
In the embodiment of the invention, in the configuration process of the 2-step RACH flow, the network equipment configures the identification information for identifying the terminal for the terminal, so that the identification of the terminal can be realized based on the identification information in the subsequent execution of the 2-step RACH flow, and the problem that the terminal cannot be identified in the prior art is solved.
The embodiment of the invention further performs the execution process of the two-step random access process based on the identification information, and can perform contention resolution, acquire the context information of the terminal, perform check calculation of the short MAC-I and enable the terminal to uniquely receive the response message (including the contention resolution message and/or the reconfiguration message and the like) belonging to the terminal according to the identification information.
As further shown in fig. 1, an embodiment of the present invention further provides a random access method, which is applied to a terminal, and the method includes:
step 21 (equivalent to step 0), in the configuration process of the two-step random access procedure, receiving configuration information from the network device, where the configuration information includes: identification information for identifying the terminal; specifically, a system message or a release message (release message) may be received from the network device, where the system message or the release message carries the configuration information.
Step 22 (equivalent to steps 1 and 2) performs a two-step random access procedure according to the identification information.
The identification information for identifying the terminal here includes: and grouping the terminals according to the characteristics of the terminals or distributing the terminals to the terminals. The characteristics of the terminal include at least one of: the traffic characteristics of the terminal, the location and the attached beam.
The identification information for identifying the terminal is: the temporary mobile user identification distributed by the core network system, or the radio network temporary identification in an inactive state, or the radio network temporary identification of a cell, or the non-orthogonal access identification. The non-orthogonal access identifier is determined according to at least one of time domain, frequency domain, code domain, space domain and power domain resources of the terminal.
The temporary mobile subscriber identity (S-TMSI) can be a truncated S-TMSI or an un-truncated S-TMSI; the radio network temporary identifier (I-RNTI) in the non-activated state can be truncated I-RNTI or non-truncated I-RNTI; the radio network temporary identity (C-RNTI) of the cell can be a truncated C-RNTI or an unpunctured C-RNTI; here, the non-orthogonal access identifier (i.e., non-orthogonal access ID) is determined according to at least one of time domain, frequency domain, code domain, space domain and power domain resources of the terminal. When a terminal accesses, time domain resources, frequency domain resources, code domain resources, space domain resources, and power domain resources allocated to the terminal may all be used to identify the terminal, and thus, one or more of these resources may also be used to identify the terminal.
In the embodiment of the invention, in the configuration process of the 2-step RACH, the network equipment configures the identification information for identifying the terminal for the terminal, so that the identification of the terminal can be realized based on the identification information in the subsequent execution process of the 2-step RACH flow.
In this embodiment of the present invention, step 22 may specifically include:
step 221, sending an access request message to the network device, where the access request message carries the identification information;
step 222, a response message is received from the network device.
The response message herein includes: contention resolution messages and/or reconfiguration messages for the terminal, etc. Wherein, the competition resolving message is returned to the terminal which is successfully accessed, so that the access of the terminal can be realized; and feeding back the reconfiguration message to the terminal, so that the terminal can reinitiate the access request message based on the reconfiguration message.
In one implementation of this embodiment, the terminal may be a terminal in an inactive state, where the terminal is in the inactive state and uses a 2-step RACH, and the terminal carries the identification information for identifying the terminal in the Msg1 and reports the identification information to the network device;
after the network equipment resolves the identification information, the network equipment uses the identification information to request the context information of the terminal from the network equipment which correspondingly releases the terminal;
and after the network equipment which correspondingly releases the terminal verifies that the terminal is legal, transmitting the context information of the terminal to the network equipment which initiates the request.
In another implementation of this embodiment, the access request message also carries short MAC-I information, and the terminal obtains the short MAC-I information according to the identification information before sending the access request message; here, MAC-I is a bit sequence generated by IK and a transmission direction, a transmission frame number, a random number through F9 algorithm, IK is one of authentication quintuple generated by an authentication center, and a signaling message needs to obtain an Integrity Key (IK) parameter whether receiving or transmitting. Specifically, a preset input parameter can be calculated by using a preset algorithm to obtain the short MAC-I information; the preset input parameters at least comprise: the current cell identity (cellIdentity), the identification information (i.e. the identification information UE ID for identifying the terminal), the identity of the physical cell (physcellld), and the resume discriminator parameter (resumeistrimenter).
As shown in fig. 2, the preset algorithm may be an encryption algorithm, such as an EIA algorithm, and the calculation of Short MAC-I requires a plurality of sets of Input parameters (VarShortMAC-Input/varshortresummemac-Input) including: cellIdentity, UE ID (which may be C-RNTI or New 2-step ID or truncated 16 bit New 2-step ID), physcellld, and resummercimmunomator. Of course, other parameters, such as Count parameter, Direction parameter and/or beer parameter, may be included in the algorithm. The Count parameter is a Packet Data Convergence Protocol (PDCP) counter, the Direction parameter is indicated uplink/downlink Data, and the Bearer parameter is information such as a Bearer ID.
In the embodiment of the invention, in the configuration process of the 2-step RACH flow, the network equipment configures the identification information for identifying the terminal for the terminal, so that the identification of the terminal can be realized based on the identification information in the subsequent execution process of the 2-step RACH flow, and the problem that the terminal cannot be identified in the prior art is solved. The embodiment of the invention further performs the execution process of the two-step random access process based on the identification information, and can perform contention resolution, acquire the context information of the terminal, perform check calculation of the short MAC-I and enable the terminal to uniquely receive the response message (including the contention resolution message and/or the reconfiguration message and the like) belonging to the terminal according to the identification information.
An embodiment of the present invention further provides a network device, including:
a transceiver module, configured to send configuration information to a terminal in a configuration process of a two-step random access procedure, where the configuration information includes: identification information for identifying the terminal.
Wherein sending the configuration information to the terminal comprises: and sending a system message or a release message or a special message to the terminal, wherein the system message or the release message or the special message carries the configuration information.
Wherein the identification information for identifying the terminal includes: and grouping the terminals according to the characteristics of the terminals or distributing the terminals to the terminals.
Wherein the characteristic of the terminal comprises at least one of: the traffic characteristics of the terminal, the location and the attached beam.
Wherein the identification information for identifying the terminal is: the temporary mobile user identification distributed by the core network system, or the radio network temporary identification in an inactive state, or the radio network temporary identification of a cell, or the non-orthogonal access identification.
Wherein the non-orthogonal access identifier is determined according to at least one of time domain, frequency domain, code domain, space domain and power domain resources of the terminal.
Further, the transceiver module is further configured to perform an execution process of a two-step random access procedure according to the identification information.
Specifically, according to the identification information, the execution process of the two-step random access procedure is performed, which includes:
receiving an access request message sent by a terminal, wherein the access request message carries the identification information;
and sending a response message of the access request message to the terminal.
Wherein the response message includes: a contention resolution message and/or a reconfiguration message of the terminal.
Wherein, when the terminal is in an inactive state, the transceiver module is further configured to, after receiving an access request message sent by the terminal: sending a request message for acquiring the context information of the terminal to an original cell according to the identification information, wherein the original cell is a cell in which the terminal in the non-activated state works before being switched into the non-activated state; and receiving the context information of the terminal sent by the cell.
Wherein, the access request message also carries short MAC-I information, and after receiving the access request message sent by the terminal, the transceiver module is further configured to: calculating the short MAC-I information according to the identification information to obtain a calculation result; and if the calculation result is the same as the short MAC-I carried in the request message, determining that the terminal is legal.
Wherein, according to the identification information, calculating the short MAC-I information to obtain a calculation result, comprising: calculating preset input parameters by using a preset algorithm to obtain a calculation result; the preset input parameters at least comprise: a current cell identity, the identity information, an identity ID of a physical cell and a recovery discriminator parameter.
The effective area range of the identification information of the identification terminal comprises at least one of the following items: cell, notification area RNA of radio access network and tracking area TA. Of course, the method can also be effective in all areas; the validation here means: the identification information for identifying the terminal may be recognized in the above-mentioned area.
It should be noted that the network device is an apparatus corresponding to the method on the network device side, and all implementation manners in the method embodiments are applicable to the embodiment of the network device, and the same technical effect can be achieved.
An embodiment of the present invention further provides a terminal, including:
a transceiver module, configured to receive configuration information from a network device in a configuration process of a two-step random access procedure, where the configuration information includes: identification information for identifying the terminal; and executing the execution process of the two-step random access process according to the identification information.
Wherein receiving configuration information from the network device comprises:
and receiving a system message or a release message or a dedicated message from the network equipment, wherein the system message or the release message or the dedicated message carries the configuration information.
Wherein the identification information for identifying the terminal includes: and grouping the terminals according to the characteristics of the terminals or distributing the terminals to the terminals.
Wherein the characteristic of the terminal comprises at least one of: the traffic characteristics of the terminal, the location and the attached beam.
Wherein the identification information for identifying the terminal is: the temporary mobile user identification distributed by the core network system, or the radio network temporary identification in an inactive state, or the radio network temporary identification of a cell, or the non-orthogonal access identification.
Wherein the non-orthogonal access identifier is determined according to at least one of time domain, frequency domain, code domain, space domain and power domain resources of the terminal.
The transceiver module performs a two-step random access procedure execution process according to the identification information, including:
sending an access request message to the network equipment, wherein the access request message carries the identification information; a response message is received from the network device.
The response message here includes: contention resolution messages and/or reconfiguration messages for the terminal, etc. Wherein, the competition resolving message is returned to the terminal which is successfully accessed, so that the access of the terminal can be realized; and feeding back the reconfiguration message to the terminal, so that the terminal can reinitiate the access request message based on the reconfiguration message.
In one implementation of this embodiment, the terminal may be a terminal in an inactive state, where the terminal is in the inactive state and uses a 2-step RACH, and the terminal carries the identification information for identifying the terminal in the Msg1 and reports the identification information to the network device; after the network equipment resolves the identification information, the network equipment uses the identification information to request the context information of the terminal from the network equipment which correspondingly releases the terminal; and after the network equipment which correspondingly releases the terminal verifies that the terminal is legal, transmitting the context information of the terminal to the network equipment which initiates the request.
In another implementation of this embodiment, the access request message also carries short MAC-I information, and a transceiver module of the terminal obtains the short MAC-I information according to the identification information before sending the access request message; here, MAC-I is a bit sequence generated by IK and a transmission direction, a transmission frame number, a random number through F9 algorithm, IK is one of authentication quintuple generated by an authentication center, and a signaling message needs to obtain an Integrity Key (IK) parameter whether receiving or transmitting. Specifically, a preset input parameter can be calculated by using a preset algorithm to obtain the short MAC-I information; the preset input parameters at least comprise: the current cell identity (cellIdentity), the identification information (i.e. the identification information UEID for identifying the terminal), the identity of the physical cell (physcellld), and the resume discriminator parameter (resumeistriomator).
As shown in fig. 2, the preset algorithm may be an encryption algorithm, such as an EIA algorithm, and the calculation of Short MAC-I requires a plurality of sets of Input parameters (VarShortMAC-Input/varshortresummemac-Input) including: cellIdentity, UE ID (which may be C-RNTI or New 2-step ID or truncated 16 bit New 2-step ID), physcellld, and resummercimmunomator. Of course, other parameters, such as Count parameter, Direction parameter and/or beer parameter, may be included in the algorithm. The Count parameter is a Packet Data Convergence Protocol (PDCP) counter, the Direction parameter is indicated uplink/downlink Data, and the Bearer parameter is information such as a Bearer ID.
It should be noted that the terminal is an apparatus corresponding to the method on the terminal side, and all implementation manners in the above method embodiments are applicable to the embodiment of the terminal, and the same technical effect can be achieved.
In addition, it should be understood that the division of the modules of the network device and the terminal is only a division of logical functions, and the actual implementation may be wholly or partially integrated into one physical entity or may be physically separated. And these modules can be realized in the form of software called by processing element; or may be implemented entirely in hardware; and part of the modules can be realized in the form of calling software by the processing element, and part of the modules can be realized in the form of hardware. For example, the receiving module may be a processing element separately set up, or may be implemented by being integrated into a chip of the apparatus, or may be stored in a memory of the apparatus in the form of program code, and the function of the module may be called and executed by a processing element of the apparatus. Other modules are implemented similarly. In addition, all or part of the modules can be integrated together or can be independently realized. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
For example, the above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), etc. For another example, when some of the above modules are implemented in the form of a processing element scheduler code, the processing element may be a general purpose processor, such as a Central Processing Unit (CPU) or other processor that can invoke the program code. As another example, these modules may be integrated together, implemented in the form of a system-on-a-chip (SOC).
Embodiments of the present invention also provide a communication device comprising a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the random access method as described above.
The communication device may be the network device or the terminal, and if the communication device is a network device, the processor performs the steps of the method on the network device side as described above, and if the communication device is a terminal, the processor performs the steps of the method on the terminal side as described above.
As shown in fig. 3, when the communication device is a network device, the network device 300 may further include: antenna 33, transceiver 32, baseband device. The antenna 33 is connected to the transceiver 32. In the uplink direction, the transceiver 32 receives information via the antenna 33 and transmits the received information to the baseband device for processing. In the downlink direction, the baseband device processes the information to be transmitted and transmits it to the transceiver 32, and the transceiver 32 processes the received information and transmits it via the antenna 33.
The method performed by the communication device in the above embodiments may be implemented in a baseband apparatus comprising a processor 35 and a memory 36.
The baseband apparatus may comprise at least one baseband board, for example, and a plurality of chips are disposed on the baseband board, as shown in fig. 3, wherein one chip, for example, the processor 35, is connected to the memory 36 to call the program in the memory 66 to perform the network device operation shown in the above method embodiment.
The baseband device may further include a bus interface 34, such as a Common Public Radio Interface (CPRI), coupled to the processor 35, memory 36, etc. via the bus 31, and also communicatively coupled to the transceiver 32 for communicating information with the transceiver 32.
The processor may be a single processor or a combination of multiple processing elements, for example, the processor may be a CPU, an ASIC, or one or more integrated circuits configured to implement the methods performed by the network devices, for example: one or more microprocessors DSP, or one or more field programmable gate arrays FPGA, or the like. The storage element may be a memory or a combination of a plurality of storage elements.
The memory 36 may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, but not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic random access memory (ddr Data Rate SDRAM, ddr SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchronous link SDRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The memory 36 described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
The network device may be a base Station (BTS) in Global System for mobile communications (GSM) or Code Division Multiple Access (CDMA), a base Station (NodeB, NB) in Wideband Code Division Multiple Access (WCDMA), an evolved Node B (eNB, eNodeB) in LTE, a relay Station or an Access point, or a base Station in a future 5G network, and the like, which is not limited herein.
As shown in fig. 4, when the communication device is a terminal, the terminal 40 includes but is not limited to: radio frequency unit 41, network module 42, audio output unit 43, input unit 44, sensor 45, display unit 46, user input unit 47, interface unit 48, memory 49, processor 410, and power supply 411. Those skilled in the art will appreciate that the terminal configuration shown in fig. 4 is not intended to be limiting, and that the terminal may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The radio frequency unit 41 is configured to receive configuration information from a network device in a configuration process of a two-step random access procedure, where the configuration information includes: identification information for identifying the terminal; and executing the execution process of the two-step random access process according to the identification information.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 41 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 410; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 41 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 41 can also communicate with a network and other devices through a wireless communication system.
The terminal provides wireless broadband internet access to the user via the network module 42, such as assisting the user in sending and receiving e-mails, browsing web pages, and accessing streaming media.
The audio output unit 43 may convert audio data received by the radio frequency unit 41 or the network module 42 or stored in the memory 49 into an audio signal and output as sound. Also, the audio output unit 43 may also provide audio output related to a specific function performed by the terminal 40 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 43 includes a speaker, a buzzer, a receiver, and the like.
The input unit 44 is for receiving an audio or video signal. The input Unit 44 may include a Graphics Processing Unit (GPU) 441 and a microphone 442, and the Graphics processor 441 processes image data of still pictures or videos obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 46. The image frames processed by the graphic processor 441 may be stored in the memory 49 (or other storage medium) or transmitted via the radio frequency unit 41 or the network module 42. The microphone 442 may receive sound and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 41 in case of the phone call mode.
The terminal 40 also includes at least one sensor 45, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that adjusts the brightness of the display panel 461 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 461 and/or a backlight when the terminal 40 moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 45 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 46 is used to display information input by the user or information provided to the user. The Display unit 46 may include a Display panel 461, and the Display panel 461 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 47 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal. Specifically, the user input unit 47 includes a touch panel 471 and other input devices 472. The touch panel 471, also referred to as a touch screen, may collect touch operations by a user (e.g., operations by a user on or near the touch panel 471 using a finger, a stylus, or any other suitable object or accessory). The touch panel 471 can include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 410, receives a command from the processor 410, and executes the command. In addition, the touch panel 471 can be implemented by various types, such as resistive, capacitive, infrared, and surface acoustic wave. The user input unit 47 may include other input devices 472 in addition to the touch panel 471. Specifically, the other input devices 472 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a track ball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 471 can be overlaid on the display panel 461, and when the touch panel 471 detects a touch operation on or near the touch panel 471, the touch panel transmits the touch operation to the processor 410 to determine the type of the touch event, and then the processor 410 provides a corresponding visual output on the display panel 461 according to the type of the touch event. Although the touch panel 471 and the display panel 461 are shown as two separate components in fig. 4, in some embodiments, the touch panel 471 and the display panel 461 may be integrated to implement the input and output functions of the terminal, and are not limited herein.
The interface unit 48 is an interface for connecting an external device to the terminal 40. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 48 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the terminal 40 or may be used to transmit data between the terminal 40 and external devices.
The memory 49 may be used to store software programs as well as various data. The memory 49 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 49 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 410 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, performs various functions of the terminal and processes data by operating or executing software programs and/or modules stored in the memory 49 and calling data stored in the memory 49, thereby performing overall monitoring of the terminal. Processor 410 may include one or more processing units; preferably, the processor 410 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 410.
The terminal 40 may further include a power supply 411 (e.g., a battery) for supplying power to various components, and preferably, the power supply 411 may be logically connected to the processor 410 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system.
In addition, the terminal 40 includes some functional modules that are not shown, and are not described in detail herein.
Preferably, in the embodiment of the present invention, the terminal may be a wireless terminal or a wired terminal, and the wireless terminal may be a device providing voice and/or other service data connectivity to a user, a handheld device having a wireless connection function, or another processing device connected to a wireless modem. Wireless terminals, which may be mobile terminals such as mobile telephones (or "cellular" telephones) and computers having mobile terminals, such as portable, pocket, hand-held, computer-included, or vehicle-mounted mobile devices, may communicate with one or more core networks via a Radio Access Network (RAN), and may exchange language and/or data with the RAN. Examples of such devices include Personal Communication Service (PCS) phones, cordless phones, SIP (session initiation Protocol) phones, Wireless Local Loop (WLL) stations, and Personal Digital Assistants (PDAs). A wireless Terminal may also be referred to as a system, a Subscriber Unit (Subscriber Unit), a Subscriber Station (Subscriber Station), a Mobile Station (Mobile), a Remote Station (Remote Station), a Remote Terminal (Remote Terminal), an access Terminal (access Terminal), a User Terminal (User Terminal), a User Agent (User Agent), and a User Equipment (User device User Equipment), which are not limited herein.
Embodiments of the present invention also provide a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the random access method as described above.
In the embodiment of the invention, in the configuration process of the 2-step RACH flow, the network equipment configures the identification information for identifying the terminal for the terminal, so that the identification of the terminal can be realized based on the identification information in the subsequent execution process of the 2-step RACH flow, and the problem that the terminal cannot be identified in the prior art is solved. The embodiment of the invention further performs the execution process of the two-step random access process based on the identification information, and can perform contention resolution, acquire the context information of the terminal, perform check calculation of the short MAC-I and enable the terminal to uniquely receive the response message (including the contention resolution message and/or the reconfiguration message and the like) belonging to the terminal according to the identification information.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (32)

1. A random access method applied to a network device, the method comprising:
in the configuration process of the two-step random access process, configuration information is sent to a terminal, wherein the configuration information comprises: identification information for identifying the terminal.
2. The random access method of claim 1, wherein sending configuration information to the terminal comprises:
and sending a system message or a release message or a special message to a terminal, wherein the system message or the release message or the special message carries the configuration information.
3. The random access method according to claim 1, wherein the identification information for identifying the terminal comprises: and grouping the terminals according to the characteristics of the terminals or distributing the terminals to the terminals.
4. The random access method according to claim 3, wherein the characteristic of the terminal comprises at least one of: the traffic characteristics of the terminal, the location and the attached beam.
5. The random access method according to claim 1, wherein the identification information for identifying the terminal is:
the temporary mobile user identification distributed by the core network system, or the radio network temporary identification in an inactive state, or the radio network temporary identification of a cell, or the non-orthogonal access identification.
6. The random access method of claim 5, wherein the non-orthogonal access identifier is determined according to at least one of time domain, frequency domain, code domain, space domain, and power domain resources of a terminal.
7. The random access method of claim 1, further comprising:
and performing the execution process of the two-step random access process according to the identification information.
8. The random access method according to claim 7, wherein the performing of the two-step random access procedure according to the identification information comprises:
receiving an access request message sent by a terminal, wherein the access request message carries the identification information;
and sending a response message of the access request message to the terminal.
9. The random access method of claim 8, wherein the response message comprises: a contention resolution message and/or a reconfiguration message of the terminal.
10. The random access method according to claim 8, wherein when the terminal is in an inactive state, after receiving the access request message sent by the terminal, the method further comprises:
sending a request message for acquiring the context information of the terminal to an original cell according to the identification information, wherein the original cell is a cell in which the terminal in the non-activated state works before being switched into the non-activated state;
and receiving the context information of the terminal sent by the cell.
11. The random access method according to claim 8, wherein the access request message further carries short MAC-I information, and after receiving the access request message sent by the terminal, the method further comprises:
calculating the short MAC-I information according to the identification information to obtain a calculation result;
and if the calculation result is the same as the short MAC-I carried in the request message, determining that the terminal is legal.
12. The random access method of claim 11, wherein the calculating the short MAC-I information according to the identification information to obtain a calculation result comprises:
calculating preset input parameters by using a preset algorithm to obtain a calculation result; the preset input parameters at least comprise: a current cell identity, the identity information, an identity of a physical cell and a recovery discriminator parameter.
13. The random access method according to claim 1, wherein the effective area range of the identification information identifying the terminal includes at least one of:
cell, notification area RNA of radio access network and tracking area TA.
14. A random access method is applied to a terminal, and the method comprises the following steps:
receiving configuration information from a network device in a configuration process of a two-step random access procedure, the configuration information comprising: identification information for identifying the terminal;
and performing the execution process of the two-step random access process according to the identification information.
15. The random access method of claim 14, wherein receiving configuration information from a network device comprises:
receiving a system message or a release message or a dedicated message from the network device, where the system message or the release message or the dedicated message carries the configuration information.
16. The random access method of claim 14,
the identification information for identifying the terminal includes: and grouping the terminals according to the characteristics of the terminals or distributing the terminals to the terminals.
17. The random access method according to claim 16, wherein the characteristic of the terminal comprises at least one of: the traffic characteristics of the terminal, the location and the attached beam.
18. The random access method according to claim 14, wherein the identification information for identifying the terminal is:
the temporary mobile user identification distributed by the core network system, or the radio network temporary identification in an inactive state, or the radio network temporary identification of a cell, or the non-orthogonal access identification.
19. The random access method of claim 18, wherein the non-orthogonal access identifier is determined according to at least one of time domain, frequency domain, code domain, spatial domain, and power domain resources of a terminal.
20. The random access method according to claim 14, wherein the performing of the two-step random access procedure according to the identification information comprises:
sending an access request message to the network equipment, wherein the access request message carries the identification information;
a response message is received from the network device.
21. The random access method of claim 20, wherein the response message comprises: a contention resolution message and/or a reconfiguration message of the terminal.
22. The random access method of claim 20, wherein before sending the access request message to the network device, the method further comprises:
obtaining short MAC-I information according to the identification information; wherein, the access request message also carries the short MAC-I information.
23. The random access method of claim 22, wherein obtaining short MAC-I information according to the identification information comprises:
calculating preset input parameters by using a preset algorithm to obtain the short MAC-I information; the preset input parameters at least comprise: a current cell identity, the identity information, an identity of a physical cell and a recovery discriminator parameter.
24. The random access method according to claim 14, wherein the effective area range of the identification information identifying the terminal includes at least one of:
cell, notification area RNA of radio access network and tracking area TA.
25. A network device, comprising:
a transceiver module, configured to send configuration information to a terminal in a configuration process of a two-step random access procedure, where the configuration information includes: identification information for identifying the terminal.
26. The network device of claim 25, wherein the configuration information comprises: and grouping the terminals according to the characteristics of the terminals or distributing the terminals to the terminals.
27. The network device of claim 25, wherein the transceiver module is further configured to: and performing the execution process of the two-step random access process according to the identification information.
28. A terminal, comprising:
a transceiver module, configured to receive configuration information from a network device in a configuration process of a two-step random access procedure, where the configuration information includes: identification information for identifying the terminal; and executing the execution process of the two-step random access process according to the identification information.
29. The terminal of claim 28, wherein the configuration information comprises: and grouping the terminals according to the characteristics of the terminals or distributing the terminals to the terminals.
30. The terminal according to claim 28, wherein when the transceiver module performs the execution process of the two-step random access procedure according to the identification information, the transceiver module is specifically configured to: sending an access request message to the network equipment, wherein the access request message carries the identification information; a response message is received from the network device.
31. A communication device, characterized in that the communication device comprises a processor, a memory and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the random access method according to any one of claims 1 to 13 or carries out the steps of the random access method according to any one of claims 14 to 24.
32. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the random access method according to one of the claims 1 to 13 or carries out the steps of the random access method according to one of the claims 14 to 24.
CN201810903668.5A 2018-08-09 2018-08-09 Random access method, network equipment and terminal Active CN110831227B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810903668.5A CN110831227B (en) 2018-08-09 2018-08-09 Random access method, network equipment and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810903668.5A CN110831227B (en) 2018-08-09 2018-08-09 Random access method, network equipment and terminal

Publications (2)

Publication Number Publication Date
CN110831227A true CN110831227A (en) 2020-02-21
CN110831227B CN110831227B (en) 2022-02-11

Family

ID=69540978

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810903668.5A Active CN110831227B (en) 2018-08-09 2018-08-09 Random access method, network equipment and terminal

Country Status (1)

Country Link
CN (1) CN110831227B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021170118A1 (en) * 2020-02-27 2021-09-02 华为技术有限公司 Access method and apparatus
WO2021175188A1 (en) * 2020-03-02 2021-09-10 上海朗帛通信技术有限公司 Method and device used for wireless communication
WO2022002035A1 (en) * 2020-07-03 2022-01-06 大唐高鸿数据网络技术股份有限公司 Access method and apparatus, terminal node, and management node
WO2022117021A1 (en) * 2020-12-04 2022-06-09 维沃移动通信有限公司 Random access method and apparatus, terminal and network side device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180110074A1 (en) * 2016-10-19 2018-04-19 Qualcomm Incorporated Enhanced random access channel (rach) procedure
WO2018098826A1 (en) * 2016-12-02 2018-06-07 广东欧珀移动通信有限公司 Random access method, terminal device, and network device
US20180198646A1 (en) * 2017-01-09 2018-07-12 Mediatek Inc. Method for Data Transmission and Reception of Random Access Procedure
CN108282903A (en) * 2017-01-06 2018-07-13 电信科学技术研究院 A kind of information transferring method, UE and access network entity
CN108282899A (en) * 2017-01-05 2018-07-13 电信科学技术研究院 Two step competitive random access methods of one kind and device
CN108353432A (en) * 2015-11-05 2018-07-31 华为技术有限公司 A kind of random access equipment, method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108353432A (en) * 2015-11-05 2018-07-31 华为技术有限公司 A kind of random access equipment, method and system
US20180110074A1 (en) * 2016-10-19 2018-04-19 Qualcomm Incorporated Enhanced random access channel (rach) procedure
WO2018098826A1 (en) * 2016-12-02 2018-06-07 广东欧珀移动通信有限公司 Random access method, terminal device, and network device
CN108282899A (en) * 2017-01-05 2018-07-13 电信科学技术研究院 Two step competitive random access methods of one kind and device
CN108282903A (en) * 2017-01-06 2018-07-13 电信科学技术研究院 A kind of information transferring method, UE and access network entity
US20180198646A1 (en) * 2017-01-09 2018-07-12 Mediatek Inc. Method for Data Transmission and Reception of Random Access Procedure

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ASUSTEK: ""Consideration on use cases of 2-step RACH procedure"", 《3GPP TSG-RAN WG2 MEETING #NR AD HOC R2-1700023》 *
AT&T: ""2-Step RA Procedure for NR"", 《3GPP TSG RAN1 NR AD HOC MEETING R1-1700311》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021170118A1 (en) * 2020-02-27 2021-09-02 华为技术有限公司 Access method and apparatus
WO2021175188A1 (en) * 2020-03-02 2021-09-10 上海朗帛通信技术有限公司 Method and device used for wireless communication
WO2022002035A1 (en) * 2020-07-03 2022-01-06 大唐高鸿数据网络技术股份有限公司 Access method and apparatus, terminal node, and management node
CN113965905A (en) * 2020-07-03 2022-01-21 大唐高鸿智联科技(重庆)有限公司 Access method, device, terminal node and management node
CN113965905B (en) * 2020-07-03 2024-03-26 中信科智联科技有限公司 Access method, device, terminal node and management node
WO2022117021A1 (en) * 2020-12-04 2022-06-09 维沃移动通信有限公司 Random access method and apparatus, terminal and network side device

Also Published As

Publication number Publication date
CN110831227B (en) 2022-02-11

Similar Documents

Publication Publication Date Title
CN111106907B (en) Indication method and terminal for Transmission Configuration Indication (TCI) state
CN111278001B (en) Terminal capability negotiation method, terminal equipment and network side equipment
CN109788546B (en) Transmission method of timing advance information, network equipment and terminal
CN110831227B (en) Random access method, network equipment and terminal
US11963027B2 (en) Measurement method, terminal and network side device
CN110719628B (en) Transmission method, terminal equipment and network equipment
CN110958653A (en) Dual-connection switching method, terminal and network equipment
CN111836211B (en) Method and device for acquiring MBMS configuration information and communication equipment
CN110868240A (en) Frequency hopping method, terminal and network equipment during PUSCH (physical uplink shared channel) repeated transmission
CN112788783B (en) Relay connection establishment method and device
JP2021521739A (en) Bearer setting method for reestablishing RRC connection, terminals and network equipment
CN109587704B (en) Information transmission method, terminal, network device and computer readable storage medium
US20220141802A1 (en) Paging method and apparatus, terminal, and network side device
CN111277998A (en) Wireless communication method and terminal equipment
WO2020156395A1 (en) Random access method and device
CN112770409B (en) Radio link failure processing method and device
CN111800794B (en) Method and equipment for determining demodulation reference signal position
WO2020011081A1 (en) Information transmission method, network device and terminal
WO2020164515A1 (en) Signal transmitting method, device and system
US20220141734A1 (en) Network switching method
WO2021088783A1 (en) Method and apparatus for detecting physical downlink control channel
CN111263438B (en) Method and equipment for transmitting paging signal
CN113452488B (en) Configuration method and device of transmission node and communication equipment
CN111132331B (en) Mode switching method and device
CN110621081B (en) Random access method and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant