CN110999502A - Random access configuration - Google Patents

Random access configuration Download PDF

Info

Publication number
CN110999502A
CN110999502A CN201780093825.4A CN201780093825A CN110999502A CN 110999502 A CN110999502 A CN 110999502A CN 201780093825 A CN201780093825 A CN 201780093825A CN 110999502 A CN110999502 A CN 110999502A
Authority
CN
China
Prior art keywords
message
time
determining
receive window
random access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201780093825.4A
Other languages
Chinese (zh)
Inventor
陈中明
张峻峰
黄河
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Publication of CN110999502A publication Critical patent/CN110999502A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/002Transmission of channel access control information
    • H04W74/006Transmission of channel access control information in the downlink, i.e. towards the terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure

Abstract

One or more apparatuses, systems, and/or methods are provided for facilitating performance of a random access procedure. A command corresponding to a random access procedure may be received from a node. The command may be used to determine a set of resources. One or more messages corresponding to a random access procedure may be sent to the node based on the set of resources.

Description

Random access configuration
Background
One or more uplink carriers may be used as a communication link between wireless nodes, such as between a User Equipment (UE) and a Base Station (BS). For example, the UE may access the BS through an uplink carrier and transmit data to and/or through the BS using the uplink carrier. However, the UE may need to achieve uplink synchronization with the BS to maintain access to the BS over the uplink carrier. Such uplink synchronization may be achieved by performing a random access procedure.
Disclosure of Invention
In accordance with the present disclosure, one or more apparatuses and/or methods are provided for facilitating performance of a random access procedure. In one example, a command corresponding to a random access procedure may be received from a node. A set of resources including a first time and a second time may be determined based on the command. A first message corresponding to the random access procedure may be sent to the node at a first time. A second message corresponding to the random access procedure may be sent to the node at a second time.
In one example, a configuration corresponding to a plurality of messages may be sent to a node. A command corresponding to a random access procedure may be sent to the node. A first message corresponding to the random access procedure may be received from the node. A second message corresponding to the random access procedure may be received from the node. A response message corresponding to at least one of the first message or the second message may be generated. The response message may be sent to the node.
Drawings
Although the techniques presented herein may be embodied in alternate forms, the specific embodiments shown in the drawings are merely some examples that are supplementary to the description provided herein. These examples should not be construed in a limiting sense, such as to limit the appended claims.
Fig. 1A is a flow diagram illustrating an example method for facilitating performance of a random access procedure.
Fig. 1B is a flow diagram illustrating an example method for facilitating performance of a random access procedure.
Fig. 2 is a diagram illustrating an example system that facilitates performance of a random access procedure.
Fig. 3 is a diagram illustrating an example system that facilitates performance of a random access procedure.
Fig. 4 is a diagram illustrating an example system that facilitates performance of a random access procedure.
Fig. 5 is a diagram illustrating an example system that facilitates performance of a random access procedure.
Fig. 6 is a diagram illustrating an example system that facilitates performance of a random access procedure.
Fig. 7 is a diagram illustrating an example system that facilitates performance of a random access procedure.
Fig. 8 is a diagram illustrating an example system that facilitates performance of a random access procedure.
Fig. 9 is an illustration of a scenario involving one example configuration of a Base Station (BS) that may utilize and/or implement at least a portion of the techniques presented herein.
Fig. 10 is an illustration of a scenario involving one example configuration of a User Equipment (UE) that may utilize and/or implement at least a portion of the techniques presented herein.
Fig. 11 is an illustration of a scenario featuring an example non-transitory computer-readable medium in accordance with one or more of the provisions set forth herein.
Detailed Description
The subject matter now will be described more fully hereinafter with reference to the accompanying drawings, which form a part hereof, and which show, by way of illustration, specific example embodiments. This description is not intended to be an extensive or detailed discussion of known concepts. Details that are generally known to those of ordinary skill in the relevant art may have been omitted or may be processed in a summarized manner.
The following subject matter can be implemented in various forms, such as methods, apparatus, components and/or systems. Thus, the subject matter is not intended to be construed as limited to any of the example embodiments set forth herein. Rather, the example embodiments are provided for illustration only. Such embodiments may take the form of, for example, hardware, software, firmware, or any combination thereof.
One or more computing devices and/or techniques are provided for facilitating performance of a random access procedure. For example, a User Equipment (UE) may connect to (e.g., wireless communication) a network via a Base Station (BS) of the network. The UE may use one or more uplink carriers for data transmission to the BS and/or the network. To this end, the UE may (e.g., need to) obtain and/or maintain uplink synchronization with the BS, e.g., via a random access procedure. However, the UE may lose uplink synchronization with the BS (e.g., associated with a timeout). Thus, the UE may need to acquire and/or recover uplink synchronization with the BS. Systems that cannot maintain uplink synchronization between the UE and the BS may be limited by (e.g., low) data rates, efficiency, and the like. Thus, according to one or more techniques presented herein, multiple messages and/or receive windows may be used to facilitate performance of a random access procedure that may enable establishment and/or maintenance of uplink synchronization, thus improving success rates and/or access speeds, data rates, efficiency, and/or the like.
It will be appreciated that the propagation characteristics of the high frequency band will be significantly weaker than the propagation characteristics of the low frequency band, since the propagation loss of the high frequency band will be greater than the propagation loss of the low frequency band. To enhance the coverage of the high frequency band, beamforming techniques are often used to narrow the wireless signal energy and focus on the devices that need to communicate with each other. An exemplary system may not be able to transmit and/or receive portions of beams simultaneously because it may not be able to traverse one or more (e.g., all) of the beams at a point in time due to the limitations of the corresponding channels. Thus, beam scanning may be required for initial access. The process of beam sweep traversal may be time sequential. The exemplary system may have only a first number (e.g., two) of radio frequency channels, but may need to form a second number (e.g., seven) of beams. To traverse all beams, a first number (e.g., two) of beams may need to be scanned for a group.
Fig. 1A illustrates an example 100A that facilitates random access procedure execution between a first wireless node and a second wireless node. The first wireless node may be a network and/or a BS and the second wireless node may be a UE. The second wireless node may (e.g., need to) transmit one or more data packets to the first wireless node using the uplink carrier. To this end, the second wireless node may (e.g., need to) obtain and/or maintain uplink synchronization with the first wireless node via, for example, a random access procedure. Thus, at 105A, the second wireless node may receive a command corresponding to a random access procedure from the first wireless node.
The command may include instructions and/or time domain information. The instructions may include an indication that one or more messages should be sent. Alternatively and/or additionally, a (e.g., implicit) determination may be made that more messages should be sent if time domain information is included in the command and an indication is not included in the command. If the command includes neither instructions nor time domain information, the second wireless node may determine whether one or more messages should be sent based on one or more factors, such as the capabilities of the second wireless node. For example, the time domain information may include configuration information that may be used to determine a time to transmit a message related to a random access procedure (e.g., from the second wireless node and/or to the first wireless node).
The command may include a preamble. For example, one or more messages may be generated with and/or including a preamble and may be transmitted (e.g., from the second wireless node and/or to the first wireless node). In some examples, the command may not include a preamble.
At 110A, a set of resources can be determined based on the command. The set of resources may include a first time, a second time, and/or one or more other times at which one or more messages related to the random access procedure may be sent. For example, the first time, the second time, and/or one or more other times may be determined based on time domain information in the command. In some examples, the first time may correspond to a first subframe, the second time may correspond to a second subframe, and/or the one or more other times may correspond to one or more other subframes. In some examples, the resource set may include a preamble resource set, which may include one or more preambles.
In some examples, the configuration may be received by the second wireless node and/or from the first wireless node. The configuration may include information relating to settings of the first wireless node (e.g. base station). A threshold number of messages may be determined based on the configuration. For example, the threshold number of messages may be a (e.g., maximum) number of messages to be sent as part of a first set of messages related to a random access procedure.
A first message corresponding to a random access procedure may be generated (e.g., as part of a first batch of messages). A second message corresponding to the random access procedure may also be generated (e.g., as part of the first batch of messages). One or more other messages may also be generated (e.g., as part of the first batch of messages) depending on the threshold number of messages. The first message, the second message, and/or the one or more messages may be generated using and/or include a preamble.
At 115A, a first message may be transmitted to the first wireless node and/or from the second wireless node at a first time (e.g., and/or a first subframe) using a first power. At 120A, a second message may be transmitted to the first wireless node and/or from the second wireless node at a second time (e.g., and/or a second subframe) using the first power (e.g., the power for 115A).
In some examples, each of the one or more other messages may be transmitted to the first wireless node and/or from the second wireless node at a time (e.g., and/or subframe) determined based on the ordered set of resources. In some examples, the first message, the second message, and/or the one or more messages may be sent sequentially. For example, messages may be sent one after the other. In the example of sequential transmission, when a first message is transmitted and a first receive window is determined and/or executed, a second message may not be transmitted until the first receive window has closed. In some examples, the first message, the second message, and/or the one or more messages may be sent in parallel. For example, messages may be sent independently of each other. In an example of parallel transmission, when the first message is sent and the first receive window is determined and/or executed, the second message may be sent before or after the first receive window has closed.
In some examples, a first receive window may be determined (e.g., generated) based on the first time and/or the first message. The first reception window may cover a first time period and/or a first number of subframes. A second receive window may be determined (e.g., generated) based on the second time and/or the second message. The second receive window may cover a second time period and/or a second number of subframes. Each of the one or more receive windows may be determined (e.g., generated) based on the one or more other times and/or the one or more other messages. It may be appreciated that the second wireless node may monitor for receipt of a response to the first message, the second message, and/or the one or more other messages during the first receive window, the second receive window, and/or the one or more receive windows. In some examples, the first receive window, the second receive window, and/or the one or more receive windows may be Random Access Response (RAR) windows.
In some examples, determining the first receive window may include: a start time of the first receive window is determined and/or an end time of the first receive window is determined. The start time may be at or after the first time. The end time may be at or after the start time. In some examples, determining the second receive window may include: a second start time of the second receive window is determined and/or a second end time of the second receive window is determined. The second start time may be at or after the second time. The second end time may be at or after the second start time.
In some examples, a random access procedure may be established and/or determined to be completed in response to determining that a response message corresponding to the first message, the second message, and/or the one or more messages is received within the first receive window, the second receive window, and/or the one or more receive windows (e.g., determined to be responsive to the messages). After the random access procedure is completed, the first receive window, the second receive window, and/or the one or more receive windows may be closed (e.g., terminated). In some examples, completion of the random access procedure may correspond to uplink synchronization. It is to be understood that the response message may be a random access response message.
In some examples, the random access procedure is determined to be completed in response to determining that the first identifier in the response message matches the second identifier in the set of resources (e.g., when comparing a portion of the response message to a portion of the set of resources). The first identifier and/or the second identifier may comprise a random access preamble identifier.
In some examples, the second set of resources may be determined based on the command in response to determining that no response messages corresponding to the first message, the second message, and/or the one or more messages are received within the first receive window, the second receive window, and/or the one or more receive windows (e.g., determined as responses to the messages). For example, the second set of resources may be determined in response to determining that the one or more responses received (e.g., from the first wireless node) do not include the first identifier (e.g., related to the first message, the second message, and/or the one or more messages). The second set of resources may include a third time and/or one or more other times at which one or more messages related to the random access procedure may be transmitted. For example, the third time may be determined based on time domain information in the command. In some examples, the third time may correspond to a third subframe. In some examples, the second set of resources may include a second set of preamble resources, which may include one or more second preambles. In some examples, the first set of resources may be the same as the second set of resources. In some examples, the first set of resources may be different from the second set of resources.
In some examples, a third message corresponding to the random access procedure may be generated (e.g., as part of the second batch of messages). A third message may be transmitted to the first wireless node and/or from the second wireless node using the second power at a third time of the second set of resources. The second power may be the same as or different from the first power. The second power may correspond to a power based on the first power ramp.
In some examples, the transmission attempt may be increased (e.g., incremented) in response to determining that no response messages corresponding to the first message, the second message, and/or the one or more messages are received within the first receive window, the second receive window, and/or the one or more receive windows (e.g., determined to be responsive to the messages). For example, a batch of messages corresponding to a random access procedure may additionally be attempted to be transmitted to the first wireless node and/or from the second wireless node.
In some examples, the second threshold number of messages may be determined based on the configuration. For example, the second threshold number of messages may be a (e.g., maximum) number of messages to be sent as part of a second batch of messages related to the random access procedure. The threshold number of messages may be the same as the second threshold number of messages. Alternatively and/or additionally, the threshold number of messages may be different from the second threshold number of messages.
A third receive window may be determined (e.g., generated) based on the third time and/or the third message. The third receive window may cover a third time period and/or a third number of subframes.
In some examples, determining the third receive window may include determining a third start time of the third receive window and/or determining a third end time of the third receive window. The third start time may be at or after the end time of the first receive window and/or the second end time of the second receive window. The third end time may be at or after the third start time.
In some examples, a random access procedure may be established and/or determined to be completed in response to determining that a response message corresponding to (e.g., determined to be a response to) the third message was received within the third receive window.
In some examples, the random access procedure is determined to be complete in response to determining that the third identifier in the response message matches the fourth identifier in the second set of resources (e.g., when comparing a portion of the response message to a portion of the set of resources). The third identifier and/or the fourth identifier may comprise a random access preamble identifier.
In some examples, a first receive window may be determined (e.g., generated) based on the first time and/or the first message. The first reception window may cover a first time period and/or a first number of subframes. The first receive window may be modified (e.g., regenerated) based on the second time and/or the second message to generate a modified first receive window. The modified first receive window may cover a second time period (e.g., greater than the first time period) and/or a second number of subframes (e.g., greater than the first number of subframes).
In some examples, determining the first receive window may include determining a start time of the first receive window and/or determining an end time of the first receive window. The start time may be at or after the first time. The end time may be at or after the start time. In some examples, modifying the first receive window may include determining a modified end time at which the modified first receive window may be defined. For example, the modified end time may be after the end time, and/or the modified first receive window may have a start time and a modified end time of the first receive window. For example, modifying the first receive window may include increasing (e.g., or decreasing) a window length of the first receive window to generate a modified first receive window.
In some examples, a random access procedure may be established and/or determined to be completed in response to determining that a response message corresponding to (e.g., determined to be a response to) the first message and/or the second message was received within the modified first receive window.
In some examples, the random access procedure is determined to be complete in response to determining that the third identifier in the response message matches the second identifier in the set of resources and/or the fourth identifier in the second set of resources (e.g., when comparing a portion of the response message to a portion of the set of resources). The third identifier and/or the fourth identifier may comprise a random access preamble identifier.
In some examples, the second set of resources may be determined based on the command in response to determining that a response message corresponding to (e.g., determined to be a response to) the first message, the second message, and/or the one or more messages has not been received within the modified first receive window. For example, the second set of resources may be determined in response to determining that the received one or more responses (e.g., from the first wireless node) do not include the first identifier (e.g., related to the first message, the second message, and/or the one or more messages). The second set of resources may include a third time and/or one or more other times at which one or more messages related to the random access procedure may be sent. For example, the third time may be determined based on time domain information in the command. In some examples, the third time may correspond to a third subframe. In some examples, the second set of resources may include a second set of preamble resources, which may include one or more second preambles. In some examples, the set of resources may be the same as the second set of resources. In some examples, the set of resources may be different from the second set of resources.
In some examples, a third message corresponding to the random access procedure may be generated (e.g., as part of the second batch of messages). A third message may be transmitted to the first wireless node and/or from the second wireless node at a third time of the second set of resources.
In some examples, the transmission attempt may be increased (e.g., incremented) in response to determining that no response message corresponding to (e.g., determined to be a response to) the first message, the second message, and/or the one or more messages is received within the modified first receive window. For example, a batch of messages corresponding to a random access procedure may additionally be attempted to be transmitted to the first wireless node and/or from the second wireless node.
In some examples, the modified first receive window may be modified (e.g., regenerated) based on the third time and/or the third message to generate a regenerated modified first receive window. The re-modified first receive window may cover a third time period (e.g., greater than the second time period) and/or a third number of subframes (e.g., greater than the third number of subframes).
In some examples, modifying the modified first receive window may include determining a re-modified end time at which the re-modified first receive window may be defined. For example, the revised end time may be after the revised end time, and/or the revised first receive window may have a modified start time and a revised end time for the first receive window. For example, modifying the modified first receive window may include increasing (e.g., or decreasing) a modified window length of the modified first receive window to generate a re-modified first receive window.
In some examples, the re-modified first receive window may be generated based on the third time and/or the third message. The re-modified first receive window may be independent of the modified first receive window. For example, the re-modified first receive window may be generated after the modified first receive window has closed. Alternatively and/or additionally, the re-modified first receive window may be generated while the modified first receive window is still open.
In some examples, completion of the random access procedure may be established and/or determined in response to determining that a response message corresponding to (e.g., determined as a response to) the third message was received within the re-modified first receive window.
In some examples, the random access procedure is determined to be complete in response to determining that the third identifier in the response message matches the second identifier in the set of resources and/or the fourth identifier in the second set of resources (e.g., when comparing a portion of the response message to a portion of the set of resources). The third identifier and/or the fourth identifier may comprise a random access preamble identifier.
An example 100B that facilitates performance of a random access procedure between a first wireless node and a second wireless node is shown in fig. 1B. The first wireless node may be a network node and/or a BS and the second wireless node may be a UE. The second wireless node may (e.g., need to) transmit one or more data packets to the first wireless node using the uplink carrier. To this end, the second wireless node may (e.g., need to) obtain and/or maintain uplink synchronization with the first wireless node via, for example, a random access procedure. Thus, at 105B, the first wireless node may send a configuration corresponding to the plurality of messages to the second wireless node.
The configuration may include information relating to settings of the first wireless node (e.g. base station). The configuration may define a threshold number of messages. For example, the threshold number of messages may be a (e.g., maximum) number of messages to be sent as part of a first set of messages related to a random access procedure.
At 110B, the first wireless node may send a command corresponding to a random access procedure to the second wireless node.
In some examples, the command may include time domain information. For example, the time domain information may include configuration information that may be used to determine a time (e.g., from the second wireless node and/or to the first wireless node) to transmit a message related to a random access procedure. In some examples, the command may include a preamble.
In some examples, the second wireless node may determine the set of resources based on the command. The set of resources may include a first time, a second time, and/or one or more other times at which one or more messages related to the random access procedure may be sent. For example, the second wireless node may determine the first time, the second time, and/or the one or more other times based on time domain information in the command.
In some examples, the second wireless node may generate a first message corresponding to a random access procedure (e.g., as part of the first batch of messages). The second wireless node may also generate a second message (e.g., as part of the second batch of messages) corresponding to the random access procedure. One or more other messages may also be generated (e.g., as part of the first batch of messages) depending on the threshold number of messages. The first message, the second message, and/or the one or more messages may be generated using and/or include a preamble.
At 115B, a first message may be received by the first wireless node and/or from the second wireless node at a first time (e.g., and/or a first subframe). At 120B, a second message may be received by the first wireless node and/or from the second wireless node at a second time (e.g., and/or a second subframe).
In some examples, each of the one or more other messages may be received by the first wireless node and/or from the second wireless node at a time (e.g., and/or subframe) determined based on the ordered set of resources. In some examples, the first message, the second message, and/or the one or more messages may be received sequentially. In some examples, the first message, the second message, and/or the one or more messages may be received in parallel.
At 125B, a response message corresponding to (e.g., determined to be a response to) the first message, the second message, and/or the one or more messages may be generated. It is to be understood that the response message may be a random access response message.
At 130B, a response message may be sent to the second wireless node and/or from the first wireless node.
In some examples, completion of the random access procedure may be established and/or determined based on a response message (e.g., sent to the second wireless node within one or more receive windows related to the first message, the second message, etc.). In some examples, completion of the random access procedure may correspond to uplink synchronization.
In some examples, based on the response message (e.g., not sent to the second wireless node within one or more receive windows related to the first message, the second message, etc.), the second wireless node may determine the second set of resources based on the command. For example, the second set of resources may be determined in response to determining that one or more responses transmitted (e.g., from the first wireless node and/or to the second wireless node) do not include the first identifier (related to the first message, the second message, and/or the one or more messages). The second set of resources may include a third time and/or one or more other times at which one or more messages related to a random access procedure may be received (e.g., by the first wireless node and/or from the second wireless node). The third time may be determined, for example, based on time domain information in the command. In some examples, the third time may correspond to a third subframe. In some examples, the second set of resources may include a second set of preamble resources, which may include one or more second preambles. In some examples, the first set of resources may be the same as the second set of resources. In some examples, the first set of resources may be different from the second set of resources.
In some examples, based on the response message (e.g., not sent to the second wireless node within one or more receive windows related to the first message, the second message, etc.), the second wireless node may generate a third message corresponding to the random access procedure (e.g., as part of the second batch of messages). A third message may be received by the first wireless node and/or from the second wireless node at a third time of the second set of resources.
In some examples, a second response message corresponding to (e.g., determined to be a response to) the third message may be generated. It is to be appreciated that the second response message can be a random access response message.
In some examples, the second response message may be transmitted to the second wireless node and/or from the first wireless node.
In some examples, completion of the random access procedure may be established and/or determined based on the second response message (e.g., sent to the second wireless node within one or more receive windows associated with the third message, etc.). In some examples, completion of the random access procedure may correspond to uplink synchronization.
Fig. 2 illustrates an example of a system 200 for facilitating performance of a random access procedure between a first wireless node 210 and a second wireless node 205, e.g., in a Long Term Evolution (LTE) system. The first wireless node 210 may be a network and/or a BS and the second wireless node 205 may be a UE. The second wireless node 205 may (e.g., need to) transmit one or more data packets to the first wireless node 210 using the uplink carrier. To this end, the second wireless node 205 may (e.g., need to) obtain and/or maintain uplink synchronization with the first wireless node 210, e.g., via a random access procedure. Thus, the first wireless node 210 may send a command 215 corresponding to a random access procedure to the second wireless node 205. The command 215 may include an instruction to initiate a random access procedure and may correspond to Physical Downlink Control Channel (PDCCH) signaling, Medium Access Control (MAC) layer, Radio Resource Control (RRC) signaling, System Information (SI), and/or paging of the second wireless node 205.
The second wireless node 205 may select the random access preamble 220 and/or transmit the random access preamble 220 to the first wireless node 210 in response to and/or based on the command 215. The first wireless node 210 may generate a random access response 225 in response to and/or based on the random access preamble 220 and/or transmit the random access response 225 to the second wireless node 205. The second wireless node 205 may generate and/or transmit a scheduled transmission 230 to the first wireless node 210 in response to and/or based on the random access response 225.
The scheduled transmission 230 may be based on a determination of a collision, for example. The first wireless node 210 may generate a conflict resolution 235 and/or send the conflict resolution 235 to the second wireless node 205 in response to and/or based on the scheduled transmission 230. For example, a conflict resolution scheme 235 may be generated to resolve conflicts determined in connection with scheduling the transmission 230. In some examples, in response to the second wireless node 205 not receiving the random access response 225 and/or receiving a second random access response whose preamble does not match the random access preamble 220, the random access preamble 220 may be retransmitted and/or a counter corresponding to the transmission of the preamble may be incremented.
Fig. 3 illustrates an example of a system 300 for facilitating performance of a random access procedure between a first wireless node 210 and a second wireless node 205. In some examples, system 300 may be implemented in place of system 200 and/or as an improvement on system 200. The first wireless node 210 may be a network and/or a BS and the second wireless node 205 may be a UE. The second wireless node 205 may (e.g., need to) transmit one or more data packets to the first wireless node 210 using the uplink carrier. To this end, the second wireless node 205 may (e.g., need to) obtain and/or maintain uplink synchronization with the first wireless node 210, e.g., via a random access procedure. Accordingly, the first wireless node 210 may send a configuration 315 corresponding to the random access procedure to the second wireless node 205.
The second wireless node 205 may determine the threshold number of messages based on the configuration. For example, the threshold number of messages may be the (maximum) number of messages to be sent as part of the first batch of messages related to the random access procedure.
The first wireless node 210 may alternatively and/or additionally send a command 320 corresponding to the random access procedure to the second wireless node 205.
The second wireless node 205 may determine (e.g., generate) a set of resources based on the command. The set of resources may include a first time, a second time, and/or one or more other times at which one or more messages related to the random access procedure may be sent.
The second wireless node 205 may determine (e.g., generate) a first message 325 corresponding to a random access procedure and/or a second message 330 corresponding to the random access procedure (e.g., as part of the first batch of messages). One or more other messages may also be generated (e.g., as part of the first batch of messages) depending on the threshold number of messages.
The second wireless node 205 may send a first message 325 to the first wireless node 210 at a first time. The second wireless node 205 may send a second message 330 to the first wireless node 210 at a second time. In some examples, each of the one or more other messages may be transmitted to the first wireless node and/or from the second wireless node at a time (e.g., and/or a subframe) determined based on the ordered set of resources. In some examples, the first message, the second message, and/or the one or more messages may be sent sequentially. In some examples, the first message, the second message, and/or the one or more messages may be sent in parallel.
In some examples, the second wireless node 205 may determine (e.g., generate) the first receive window based on the first time and/or the first message. The second wireless node 205 may determine (e.g., generate) a second receive window based on the second time and/or the second message. The second wireless node 205 may determine (e.g., generate) one or more receive windows based on the one or more other times and/or the one or more other messages. It is to be appreciated that the second wireless node 205 can monitor for receipt of the first message, the second message, and/or the one or more other messages during the first receive window, the second receive window, and/or the one or more receive windows.
The first wireless node 210 may generate a response message 335 based on the first message and/or the second message. The first wireless node 210 may send a response message 335 to the second wireless node 205.
In some examples, completion of the random access procedure may be established and/or determined in response to determining that a response message 335 corresponding to (e.g., determined to be a response to) the first message, the second message, and/or the one or more messages was sent by the first wireless node 210 within the first receive window, the second receive window, and/or the one or more receive windows and/or received by the second wireless node 205. In some examples, completion of the random access procedure may correspond to uplink synchronization.
Fig. 4 illustrates an example of a system 400 for facilitating performance of a random access procedure between a first wireless node 210 and a second wireless node 205. The first wireless node 210 may be a network and/or a BS and the second wireless node 205 may be a UE. The second wireless node 205 may (e.g., need to) transmit one or more data packets to the first wireless node 210 using the uplink carrier. To this end, the second wireless node 205 may (e.g., need to) obtain and/or maintain uplink synchronization with the first wireless node 210, e.g., via a random access procedure. Accordingly, the second wireless node 205 may determine (e.g., generate) the first message 405.
The second wireless node 205 may send the first message 405 to the first wireless node 210 at a first time (e.g., time 3). The second wireless node 205 may determine (e.g., generate) a first receive window 410 based on the first time and/or the first message 405. The first receive window 410 may have a start time at or after the first time (e.g., time 4) and/or an end time after the start time (e.g., time 13).
The second wireless node 205 may determine (e.g., generate) the second message 415. The second wireless node 205 may send a second message 415 to the first wireless node 210 at a second time (e.g., time 5). The second wireless node 205 may determine (e.g., generate) a second receive window 420 based on the second time and/or the second message 415. The second receive window 420 may have a second start time (e.g., time 6) at or after the second time and/or a second end time (e.g., time 15) after the second start time.
The first wireless node 210 may determine (e.g., generate) a response message 425 based on the first message 405 and/or the second message 415. The first wireless node 210 may send a response message 425 to the second wireless node 205.
In response to determining that a response message 425 corresponding to (e.g., determined as a response to) the first message 405 and/or the second message 415 is received by the second wireless node 205 within the first reception window 410 and/or the second reception window 420 (e.g., between a start time of the first reception window 410 and/or a second end time of the second reception window 420), the random access procedure 430 may be established and/or determined to be completed. In some examples, completion of the random access procedure 430 may correspond to uplink synchronization.
It is to be appreciated that "time" as used herein can relate to, correspond to, and/or be represented by one or more subframes, one or more slots, and/or one or more symbols.
Fig. 5 illustrates an example of a system 500 for facilitating performance of a random access procedure between a first wireless node 210 and a second wireless node 205. The first wireless node 210 may be a network and/or a BS and the second wireless node 205 may be a UE. The second wireless node 205 may (e.g., need to) transmit one or more data packets to the first wireless node 210 using the uplink carrier. To this end, the second wireless node 205 may (e.g., need to) obtain and/or maintain uplink synchronization with the first wireless node 210, e.g., via a random access procedure. Thus, the second wireless node 205 may determine (e.g., generate) the first message 505 (e.g., as part of a first set of messages related to a random access procedure).
The second wireless node 205 may send the first message 505 to the first wireless node 210 at a first time (e.g., time 1). The second wireless node 205 may determine (e.g., generate) a first receive window 510 based on the first time and/or the first message 505. The first receive window 510 may have a start time (e.g., time 2) at or after the first time and/or an end time (e.g., time 11) after the start time.
The second wireless node 205 may determine (e.g., generate) the second message 515 (e.g., as part of the first set of messages related to the random access procedure). The second wireless node 205 may send a second message 515 to the first wireless node 210 at a second time (e.g., time 3). The second wireless node 205 may determine (e.g., generate) a second receive window 520 based on the second time and/or the second message 515. The second receive window 520 may have a second start time (e.g., time 4) at or after the second time and/or a second end time (e.g., time 13) after the second start time.
The second wireless node 205 may determine (e.g., generate) the third message 525 (e.g., as part of the first set of messages related to the random access procedure). Alternatively and/or additionally, the second wireless node 205 may determine (e.g., generate) the third message 525 (e.g., as part of a second batch of messages related to the random access procedure) in response to determining that a response message corresponding to (e.g., determined as a response to) the first message 505 and/or the second message 515 has not been received by the second wireless node 205 within the first reception window 510 and/or the second reception window 520 (e.g., between a start time of the first reception window 510 and/or a second end time of the second reception window 520). The second wireless node 205 may send a third message 525 to the first wireless node 210 at a third time (e.g., time 7). In some examples (e.g., not shown), the third time may be time 12 and/or after the end time of the first receive window 510 and/or before the second end time of the second receive window 520. The second wireless node 205 may determine (e.g., generate) the third receive window 530 based on the third time and/or the third message 525. The third receive window 530 may have a third start time (e.g., time 8) at or after the third time and/or a third end time (e.g., time 17) after the third start time.
In some examples, the first receive window 510 may have the same length as the second receive window 520 and/or the third receive window 530. In some examples, the first receive window 510 may have a different length than the second receive window 520 and/or the third receive window 530. In some examples, the second receive window 520 may have the same length as the third receive window 530. In some examples, the second receive window 520 may have a different length than the third receive window 530.
The first wireless node 210 may determine (e.g., generate) the response message 535 based on the first message 505, the second message 515, and/or the third message 525. The first wireless node 210 may send a response message 535 to the second wireless node 205.
In response to determining that a response message 535 corresponding to (e.g., determined as a response to) the first message 505, the second message 515, and/or the third message 525 is received by the second wireless node 205 within the first reception window 510, the second reception window 520, and/or the third reception window 530 (e.g., between a start time of the first reception window 510 and/or a third end time of the third reception window 530), the random access procedure 540 may be established and/or determined to be completed. In some examples, completion of the random access procedure 540 may correspond to uplink synchronization.
Fig. 6 illustrates an example of a system 600 for facilitating performance of a random access procedure between a first wireless node 210 and a second wireless node 205. The first wireless node 210 may be a network and/or a BS and the second wireless node 205 may be a UE. The second wireless node 205 may (e.g., need to) transmit one or more data packets to the first wireless node 210 using the uplink carrier. To this end, the second wireless node 205 may (e.g., need to) obtain and/or maintain uplink synchronization with the first wireless node 210, e.g., via a random access procedure. Thus, the second wireless node 205 may determine (e.g., generate) the first message 605 (e.g., as part of a first set of messages related to a random access procedure).
The second wireless node 205 may send the first message 605 to the first wireless node 210 at a first time (e.g., time 1). The second wireless node 205 may determine (e.g., generate) a first receive window 610 based on the first time and/or the first message 605. The first receive window 610 may have a start time (e.g., time 2) at or after the first time and/or an end time (e.g., time 6) after the start time.
The second wireless node 205 may determine (e.g., generate) the second message 615 (e.g., as part of a first set of messages related to a random access procedure). The second wireless node 205 may send a second message 615 to the first wireless node 210 at a second time (e.g., time 3). The second wireless node 205 may determine (e.g., generate) a second receive window 620 based on the second time and/or the second message 615. The second receive window 620 may have a second start time (e.g., time 4) at or after the second time and/or a second end time (e.g., time 8) after the second start time.
The first wireless node 210 may send a first response message 625 corresponding to the first message 605 and/or the second message 615 to the second wireless node 205 at the first response time. The second wireless node 205 may determine that the first response message 625 was not received within the first receive window 610 and/or the second receive window 620. Thus, the second wireless node 205 may determine (e.g., generate) the third message 630 (e.g., as part of the second batch of messages related to the random access procedure) in response to determining that the first response 625 was not received and/or was received outside (e.g., after the end of) the first receive window 610 and/or the second window 620.
The second wireless node 205 may send a third message 630 to the first wireless node 210 at a third time (e.g., time 13). The second wireless node 205 may determine (e.g., generate) a third receive window 635 based on the third time and/or the third message 630. The third receive window 635 may have a third start time (e.g., time 14) at or after the third time and/or a third end time (e.g., time 18) after the third start time.
In some examples, the first receive window 610 may have the same length as the second receive window 620 and/or the third receive window 635. In some examples, the first receive window 610 may have a different length than the second receive window 620 and/or the third receive window 635. In some examples, the second receive window 620 may have the same length as the third receive window 635. In some examples, the second receive window 620 may have a different length than the third receive window 635.
The first wireless node 210 may determine (e.g., generate) the response message 640 based on the third message 630. The first wireless node 210 may send a response message 640 to the second wireless node 205.
In response to determining that the response message 640 corresponding to (e.g., determined as a response to) the third message 630 is received by the second wireless node 205 within the third reception window 635 (e.g., between a third start time of the third reception window 635 and/or a third end time of the third reception window 635), the random access procedure 645 may be established and/or determined to be completed. In some examples, completion of the random access procedure 645 may correspond to uplink synchronization.
Fig. 7 illustrates an example of a system 700 for facilitating performance of a random access procedure between a first wireless node 210 and a second wireless node 205. The first wireless node 210 may be a network and/or a BS and the second wireless node 205 may be a UE. The second wireless node 205 may (e.g., need to) send one or more data packets to the first wireless node 210 using an uplink carrier. To this end, the second wireless node 205 may (e.g., need to) obtain and/or maintain uplink synchronization with the first wireless node 210 via, for example, a random access procedure. Thus, the second wireless node 205 may determine (e.g., generate) the first message 705 (e.g., as part of a first set of messages related to a random access procedure).
The second wireless node 205 may send the first message 705 to the first wireless node 210 at a first time (e.g., time 3). The second wireless node 205 may determine (e.g., generate) a first receive window 710 based on the first time and/or the first message 705. The first receive window 710 may have a start time at or after the first time (e.g., time 4) and/or an end time after the start time (e.g., time 13).
The second wireless node 205 may determine (e.g., generate) a second message 715 (e.g., as part of a first set of messages related to a random access procedure). The second wireless node 205 may send a second message 715 to the first wireless node 210 at a second time (e.g., time 5). The second wireless node 205 may determine (e.g., generate) a modified first receive window comprising a combination of the first receive window 710 and the first extension 720, wherein the first extension 720 is based on the second time and/or the second message 715. The modified first receive window may have a start time of the first receive window 710 (e.g., time 4) and/or a second end time of the first extension 720 (e.g., time 15).
The second wireless node 205 may determine (e.g., generate) a third message 725 (e.g., as part of the first set of messages related to the random access procedure). Alternatively and/or additionally, the second wireless node 205 may determine (e.g., generate) the third message 725 (e.g., as part of a second batch of messages relating to the random access procedure) in response to determining that a response message corresponding to (e.g., determined as a response to) the first message 705 and/or the second message 715 has not been received by the second wireless node 205 within the first reception window 710 and/or the modified first reception window (e.g., between a start time of the first reception window 710 and/or a second end time of the first extension 720). The second wireless node 205 may send a third message 725 to the first wireless node 210 at a third time (e.g., time 7). The second wireless node 205 may determine (e.g., generate) a re-modified first receive window comprising the first receive window 710, the first extension 720, and the second extension 730 based on the third time and/or the third message 725. The re-modified first receive window may have a start time of the first receive window (e.g., time 4) and/or a third end time of the second extension 730 (e.g., time 17).
The first wireless node 210 may determine (e.g., generate) a response message 735 based on the first message 705, the second message 715, and/or the third message 725. The first wireless node 210 may send a response message 735 to the second wireless node 205.
In response to determining that a response message 735 is received by the second wireless node 205 corresponding to (e.g., determined to be a response to) the first message 705, the second message 715, and/or the third message 725 within the re-modified first reception window (e.g., between the start time of the first reception window 710 and/or the third end time of the second extension 730), a random access procedure 740 may be established and/or determined to be completed. In some examples, completion of the random access procedure 740 may correspond to uplink synchronization.
Fig. 8 illustrates an example of a system 800 for facilitating performance of a random access procedure between a first wireless node 210 and a second wireless node 205. The first wireless node 210 may be a network and/or a BS and the second wireless node 205 may be a UE. The second wireless node 205 may (e.g., need to) transmit one or more data packets to the first wireless node 210 using the uplink carrier. To this end, the second wireless node 205 may (e.g., need to) obtain and/or maintain uplink synchronization with the first wireless node 210 via, for example, a random access procedure. Thus, the second wireless node 205 may determine (e.g., generate) the first message 805 (e.g., as part of a first set of messages related to a random access procedure).
The second wireless node 205 may send a first message 805 to the first wireless node 210 at a first time (e.g., time 1). The second wireless node 205 may determine (e.g., generate) the first receive window 810 based on the first time and/or the first message 805. The first receive window 810 may have a start time (e.g., time 2) at or after the first time and/or an end time (e.g., time 6) after the start time.
The second wireless node 205 may determine (e.g., generate) the second message 815 (e.g., as part of the first set of messages related to the random access procedure). The second wireless node 205 may send a second message 815 to the first wireless node 210 at a second time (e.g., time 3). The second wireless node 205 may determine (e.g., generate) a modified first receive window comprising a combination of the first receive window 810 and the first extension 820, wherein the first extension 820 is based on the second time and/or the second message 815. The modified first receive window may have a start time (e.g., time 2) of the first receive window 810 and/or a second end time (e.g., time 8) of the first extension 820.
The first wireless node 210 may transmit a first response message 825 corresponding to the first message 805 and/or the second message 815 to the second wireless node 205 at a first response time. The second wireless node 205 may determine that the first response message 825 has not been received within a modified first receive window comprising the first receive window 810 and/or the first extension 820. Thus, the second wireless node 205 may determine (e.g., generate) the third message 830 (e.g., as part of the second batch of messages related to the random access procedure) in response to determining that the first response 825 was not received and/or was received outside (e.g., at the end of) the modified first reception window.
The second wireless node 205 may send a third message 830 to the first wireless node 210 at a third time (e.g., time 13). The second wireless node 205 may determine (e.g., generate) a third receive window 835 based on the third time and/or the third message 830. The third receive window 635 may have a third start time (e.g., time 14) at or after the third time and/or a third end time (e.g., time 18) after the third start time.
The first wireless node 210 may determine (e.g., generate) a response message 840 based on the third message 830. The first wireless node 210 may send a response message 840 to the second wireless node 205.
In response to determining that a response message 840 corresponding to (e.g., determined as a response to) the third message 830 is received by the second wireless node 205 within the third reception window 835 (e.g., between a third start time of the third reception window 835 and/or a third end time of the third reception window 835), the random access procedure 845 may be established and/or determined to be completed. In some examples, completion of the random access procedure 845 may correspond to uplink synchronization.
Fig. 9 presents a schematic architecture diagram 900 of a base station 950 (e.g., a node) that can employ at least a portion of the techniques provided herein. Such base stations 950 can vary widely in configuration and/or capability, alone or in combination with other base stations, nodes, chain end units, and/or servers and/or the like, to provide services such as at least some of one or more of the other disclosed techniques, scenarios, and/or the like. For example, base station 950 can connect one or more User Equipments (UEs) to a (e.g., wireless) network (e.g., which can connect and/or include one or more other base stations), such as a Code Division Multiple Access (CDMA) network, a Time Division Multiple Access (TDMA) network, a Frequency Division Multiple Access (FDMA) network, an orthogonal FDMA (ofdma) network, a single-carrier FDMA (SC-FDMA) network, and/or the like. The network may implement radio technologies such as Universal Terrestrial Radio Access (UTRA), CDMA13000, global system for mobile communications (GSM), evolved UTRA (E-UTRA), IEEE 802.11, IEEE 802.16, IEEE 802.20, flash OFDM, etc. Base station 950 and/or the network may communicate using a standard such as Long Term Evolution (LTE).
Base station 950 may include one or more (e.g., hardware) processors 910 that process instructions. The one or more processors 910 may optionally include: a plurality of cores; one or more coprocessors, such as math coprocessors or integrated Graphics Processing Units (GPUs); and/or one or more levels of local cache memory. The base station 950 may include: a memory 902 that stores various forms of applications such as an operating system 904; one or more base station applications 906; and/or various forms of data such as a database 908 and/or file system, etc. The base station 950 may include: various peripheral components, such as a wired and/or wireless network adapter 914 that may be connected to a local area network and/or a wide area network; one or more storage components 916 such as a hard disk drive, a solid State Storage Device (SSD), a flash memory device, and/or a magnetic and/or optical disk reader; and/or other peripheral components.
The base station 950 may include: a motherboard featuring one or more communication buses 912, the communication buses 912 interconnecting the processor 910, the memory 902, and/or various peripherals using various bus technologies such as variants of the serial or parallel AT attachment (ATA) bus protocol, the Universal Serial Bus (USB) protocol, and/or the small computer system interface (SCI) bus protocol. In a multi-bus scenario, the communication bus 912 may interconnect the base station 950 with at least one other server. Other components that may optionally be included in base station 950 (although not shown in diagram 900 of fig. 9) include a display; a display adapter, such as a Graphics Processing Unit (GPU); input peripherals such as a keyboard and/or mouse; and/or flash memory devices that may store basic input/output system (BIOS) routines that help to start the base station 950 into a ready state, etc.
The base station 950 may operate in various physical enclosures such as a desktop or tower server, and/or may be integrated with a display as an "all in one" device. The base station 950 may be mounted horizontally and/or in a cabinet or rack, and/or may simply comprise a set of interconnected components. The base station 950 may include a dedicated and/or shared power supply 918 that provides and/or regulates power for other components. Base station 950 can provide power to and/or receive power from another base station and/or a server and/or other devices. The base station 950 may include a shared and/or dedicated climate control unit 920 that regulates climate characteristics such as temperature, humidity, and/or airflow. Many such base stations 950 may be configured and/or adapted to utilize at least a portion of the techniques presented herein.
Fig. 10 presents a schematic architecture diagram 1000 of a User Equipment (UE)1050 (e.g., a node) upon which at least a portion of the techniques presented herein may be implemented. Such UEs 1050 may vary widely in configuration and/or capabilities to provide various functionality to users. The UE 1050 may be provided in various form factors, such as: mobile phones (e.g., smart phones); a desk or tower workstation; an "all-in-one" device integrated with the display 1008; a laptop computer, a tablet computer, a convertible tablet computer, or a palm-top device; wearable devices such as may be mounted in headphones, glasses, earpieces, and/or watches, and/or integrated with an article of clothing; and/or a component of a piece of furniture (such as a table top) and/or a component of other equipment (such as a vehicle or a home). The UE 1050 may serve a user in various roles, such as phone, workstation, kiosk, media player, gaming device, and/or appliance.
The UE 1050 may include one or more (e.g., hardware) processors 1010 that process instructions. The one or more processors 1010 may optionally include: a plurality of cores; one or more coprocessors, such as math coprocessors or integrated Graphics Processing Units (GPUs); and/or one or more levels of local cache memory. The UE 1050 may include: a memory 1001 storing various forms of applications such as an operating system 1003; one or more user applications 1002, such as document applications, media applications, file and/or data access applications, communication applications, such as web browsers and/or email clients, utilities, and/or games; and/or drivers for various peripherals. The UE 1050 may include various peripheral components, such as a wired and/or wireless network adapter 1006 that may connect to a local area network and/or a wide area network; one or more output components, such as a display 1008 (optionally including a Graphics Processing Unit (GPU)) coupled to a display adapter, a sound adapter coupled to speakers, and/or a printer; input devices for receiving input from a user, such as a keyboard 1011, a mouse, a microphone, a camera, and/or a touch-sensitive component of the display 1008; and/or environmental sensors such as a GPS receiver 1019 that detects the position, velocity, and/or acceleration of the UE 1050, a compass, an accelerometer, and/or a gyroscope that detects the physical orientation of the UE 1050. Other components that may optionally be included in the UE 1050 (although not shown in the schematic architecture diagram 1000 of fig. 10) include: one or more storage components, such as a hard disk drive, a solid State Storage Device (SSD), a flash memory device, and/or a magnetic and/or optical disk reader; a flash memory device that may store basic input/output system (BIOS) routines that help to boot the UE 1050 to a ready state; and/or a climate control unit that adjusts climate characteristics such as temperature, humidity, and airflow.
The UE 1050 may include: a motherboard featuring one or more communication buses 1012, the communication buses 1012 interconnecting the processor 1010, memory 1001 and/or various peripherals using various bus technologies such as serial or parallel AT attachment (ATA) bus protocol variants, Universal Serial Bus (USB) protocol, and/or small computer system interface (SCI) bus protocol. The UE 1050 may include: a dedicated and/or shared power supply 1018 to provide and/or condition power for other components, and/or a battery 1004 to store power for use when the UE 1050 is not connected to a power source via the power supply 1018. The UE 1050 may provide power to and/or receive power from other client devices.
Fig. 11 is an illustration of a scenario 1100 involving an example non-transitory computer-readable medium 1102. The non-transitory computer-readable medium 1102 may include processor-executable instructions 1112, which, when executed by the processor 1116, cause performance (e.g., by the processor 1116) of at least some of the provisions herein. The non-transitory computer-readable medium 1102 may include a memory semiconductor (e.g., a semiconductor utilizing Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), and/or Synchronous Dynamic Random Access Memory (SDRAM) technology), a platter of a hard disk drive, a flash memory device, or a magnetic or optical disk such as a Compact Disk (CD), a Digital Versatile Disk (DVD), and/or a floppy disk). The example non-transitory computer-readable medium 1102 stores computer-readable data 1104, which expresses processor-executable instructions 1112 when the computer-readable data 1104 is read 1106 by a reader 1110 of a device 1108 (e.g., a read head of a hard disk drive, or a read operation invoked on a solid state storage device). In some embodiments, the processor-executable instructions 1112, when executed, cause performance of operations such as, for example, at least some of the example method 100A of fig. 1A and/or the example method 100B of fig. 1B. In some embodiments, the processor-executable instructions 1112 are configured to cause implementation of a system and/or scenario, such as at least some of the example system 200 of fig. 2, the example system 300 of fig. 3, the example system 400 of fig. 4, the example system 500 of fig. 5, the example system 600 of fig. 6, the example system 700 of fig. 7, and/or the example system 800 of fig. 8, for example.
As used in this application, the terms "component," "module," "system," "interface," and the like are generally intended to refer to a computer-related entity, either hardware, a combination of hardware and software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a controller and the controller can be a component. One or more components can reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers (e.g., node (s)).
Unless otherwise stated, "first," "second," and the like are not intended to imply temporal, spatial, sequential, and the like. Rather, such terms are merely used as identifiers, names, etc. for features, elements, items, etc. For example, the first object and the second object typically correspond to object a and object B or two different or two identical objects or the same object.
Moreover, "exemplary" is used herein to mean serving as an example, illustration, or the like, and is not necessarily advantageous. As used herein, "or" is intended to mean an inclusive "or" rather than an exclusive "or". In addition, the use of "a" and "an" in this application is generally to be construed to mean "one or more" unless specified otherwise or clear from context to be directed to a singular form. Also, at least one of A and B, etc. generally refers to A or B or both A and B. Furthermore, to the extent that "includes," has, "" … …, "" has, "" with, "and/or variants thereof are used in either the detailed description or the claims, such terms are intended to be inclusive in a manner similar to the term" comprising.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing at least some of the claims.
Furthermore, the claimed subject matter may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer (e.g., a node) to implement the disclosed subject matter. The term "article of manufacture" as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. Of course, many modifications may be made to this configuration without departing from the scope or spirit of the claimed subject matter.
Various operations of embodiments and/or examples are provided herein. The order in which some or all of the operations are described herein should not be construed as to imply that these operations are necessarily order dependent. Those skilled in the art who have the benefit of this description will realize alternative sequences. Further, it will be understood that not all operations are necessarily present in each embodiment and/or example provided herein. Moreover, it will be understood that not all operations may be necessary in some embodiments and/or examples.
Moreover, although the disclosure has been shown and described with respect to one or more implementations, equivalent alterations and modifications will occur to others skilled in the art based upon a reading and understanding of this specification and the annexed drawings. The present disclosure includes all such modifications and alterations, and is limited only by the scope of the appended claims. In particular regard to the various functions performed by the above described components (e.g., elements, resources, etc.), the terms used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (e.g., that is functionally equivalent), even though not structurally equivalent to the disclosed structure. In addition, while a particular feature of the disclosure may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application.

Claims (39)

1. A method, comprising:
receiving a command corresponding to a random access procedure from a node;
determining a set of resources including a first time and a second time based on the command;
sending a first message corresponding to the random access procedure to the node at the first time; and
sending a second message corresponding to the random access procedure to the node at the second time.
2. The method of claim 1, comprising:
receiving a configuration from the node; and
determining a threshold number of messages based on the configuration, the first message and the second message corresponding to the threshold number of messages.
3. The method of claim 1, comprising:
determining a first receive window based on the first time; and
a second receive window is determined based on the second time.
4. The method of claim 1, wherein the first and second light sources are selected from the group consisting of,
the first message and the second message are sent in sequence.
5. The method of claim 1, wherein the first and second light sources are selected from the group consisting of,
the first message and the second message are sent in parallel.
6. The method of claim 3, comprising
Determining that the random access procedure is complete in response to determining that a response message corresponding to at least one of the first message or the second message is received within at least one of the first receive window or the second receive window.
7. The method of claim 6, wherein the first and second light sources are selected from the group consisting of,
the determining that the random access procedure is complete is performed in response to determining that a first identifier in the response message matches a second identifier in the set of resources.
8. The method of claim 7, wherein the first and second light sources are selected from the group consisting of,
the first identifier and the second identifier comprise random access preamble identifiers.
9. The method of claim 3, comprising:
in response to determining that a response message corresponding to at least one of the first message or the second message is not received within at least one of the first receive window or the second receive window, determining a second set of resources including a third time based on the command; and
sending a third message corresponding to the random access procedure to the node at the third time.
10. The method of claim 3, comprising:
in response to determining that a response message corresponding to at least one of the first message or the second message is not received within at least one of the first receive window or the second receive window, increasing a transmission attempt by 1.
11. The method of claim 9, wherein the first and second light sources are selected from the group consisting of,
the first set of resources is the same as the second set of resources.
12. The method of claim 9, wherein the first and second light sources are selected from the group consisting of,
the first set of resources is different from the second set of resources.
13. The method of claim 9, comprising:
receiving a configuration from the node;
determining a threshold number of messages based on the configuration, the first message and the second message corresponding to the threshold number of messages; and
determining a second threshold number of messages based on the configuration, the third message corresponding to the second threshold number of messages.
14. The method of claim 9, comprising:
determining a third receive window based on the third time.
15. The method of claim 9, the determining the second set of resources is performed in response to determining that the received one or more responses do not include the first identifier.
16. The method of claim 14, comprising:
determining that the random access procedure is complete in response to determining that a response message corresponding to the third message is received within the third receive window.
17. The method of claim 16, wherein the first and second light sources are selected from the group consisting of,
the determining that the random access procedure is complete is performed in response to determining that a first identifier in the response message matches a second identifier in the second set of resources.
18. The method of claim 1, the command comprising time domain information.
19. The method of claim 18, the determining the set of resources comprising:
determining the first time based on the time domain information; and
determining the second time based on the time domain information.
20. The method of claim 1, the command comprising a preamble.
21. The method of claim 20, comprising:
generating the first message based on the preamble; and
generating the second message based on the preamble.
22. The method of claim 3, the determining the first receive window comprising:
determining a start time for the first receive window after the first time; and
determining an end time for the first receive window after the start time.
23. The method of claim 22, the determining the second receive window comprising:
determining a second start time for the second receive window after the second time; and
determining a second end time for the second receive window after the second start time.
24. The method of claim 1, comprising:
determining a first receive window based on the first time; and
modifying the first receive window based on the second time to generate a modified first receive window.
25. The method of claim 24, comprising:
determining that the random access procedure is complete in response to receiving a response message corresponding to at least one of the first message or the second message within the modified first receive window.
26. The method of claim 25, wherein the first and second portions are selected from the group consisting of,
the determining that the random access procedure is complete is performed in response to determining that a first identifier in the response message matches a second identifier in the set of resources.
27. The method of claim 24, comprising:
in response to determining that a response message corresponding to at least one of the first message or the second message is not received within the modified first receive window, determining, based on the command, a second set of resources comprising a third time; and
sending a third message corresponding to the random access procedure to the node at the third time.
28. The method of claim 27, comprising:
receiving a configuration from the node;
determining a threshold number of messages based on the configuration, the first message and the second message corresponding to the threshold number of messages; and
determining a second threshold number of messages based on the configuration, the third message corresponding to the second threshold number of messages.
29. The method of claim 27, comprising:
determining a third receive window based on the third time.
30. The method of claim 27, the determining the second set of resources is performed in response to the received one or more responses not including the first identifier.
31. The method of claim 29, comprising:
determining that the random access procedure is complete in response to receiving a response message corresponding to the third message within the third receive window.
32. The method of claim 31, wherein the first and second regions are selected from the group consisting of,
the determining that the random access procedure is complete is performed in response to determining that a first identifier in the response message matches a second identifier in the set of resources.
33. The method of claim 24, the determining the first receive window comprising:
determining a start time for the first receive window after the first time; and
determining an end time for the first receive window after the start time.
34. The method of claim 33, the modifying comprising:
determining a modified end time after the end time, the modified first receive window having the start time and the modified end time.
35. The method of claim 24, the modifying comprising:
increasing a window length of the first receive window to generate the modified first receive window.
36. A method, comprising:
sending a configuration corresponding to the plurality of messages to the node;
sending a command corresponding to a random access procedure to the node;
receiving a first message corresponding to the random access procedure from the node;
receiving a second message corresponding to the random access procedure from the node;
generating a response message corresponding to at least one of the first message or the second message; and
and sending the response message to the node.
37. The method of claim 36, comprising:
receiving a third message corresponding to the random access procedure from the node;
generating a second response message corresponding to the third message; and
and sending the second response message to the node.
38. A communication device, comprising:
a processor; and
memory comprising processor-executable instructions that when executed by the processor cause performance of the method recited in any one of claims 1 to 37.
39. A non-transitory computer readable medium having stored thereon processor executable instructions that when executed cause performance of the method recited in any one of claims 1 to 37.
CN201780093825.4A 2017-08-10 2017-08-10 Random access configuration Pending CN110999502A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/096867 WO2019028753A1 (en) 2017-08-10 2017-08-10 Random access configuration

Publications (1)

Publication Number Publication Date
CN110999502A true CN110999502A (en) 2020-04-10

Family

ID=65273149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780093825.4A Pending CN110999502A (en) 2017-08-10 2017-08-10 Random access configuration

Country Status (2)

Country Link
CN (1) CN110999502A (en)
WO (1) WO2019028753A1 (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102238720A (en) * 2010-04-29 2011-11-09 华为技术有限公司 Carrier synchronization method, user equipment and base station
CN106162920B (en) * 2015-04-09 2020-11-03 中兴通讯股份有限公司 Communication method and device
CN106162923A (en) * 2015-04-10 2016-11-23 中兴通讯股份有限公司 Random access signaling resend method and device

Also Published As

Publication number Publication date
WO2019028753A1 (en) 2019-02-14

Similar Documents

Publication Publication Date Title
CN110892657B (en) Transmission of common control blocks
WO2019028847A1 (en) Resource allocation
US11051329B2 (en) Search space monitoring
US11601874B2 (en) Uplink carrier access
US11330578B2 (en) Uplink carrier configuration
US11856626B2 (en) Secondary path configuration
CN110999502A (en) Random access configuration
CN110574318B (en) Channel state information report transmission
CN110637428B (en) Channel state information report transmission
WO2023125304A1 (en) Communication operation execution method, apparatus, terminal, and storage medium
CN110622541A (en) Configuration transmission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination