CN111263462A - Random access method and device - Google Patents
Random access method and device Download PDFInfo
- Publication number
- CN111263462A CN111263462A CN201910093589.7A CN201910093589A CN111263462A CN 111263462 A CN111263462 A CN 111263462A CN 201910093589 A CN201910093589 A CN 201910093589A CN 111263462 A CN111263462 A CN 111263462A
- Authority
- CN
- China
- Prior art keywords
- random access
- target
- terminal device
- msg3
- network side
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 138
- 230000004044 response Effects 0.000 claims abstract description 109
- 230000008569 process Effects 0.000 claims description 62
- 238000004590 computer program Methods 0.000 claims description 18
- 238000013475 authorization Methods 0.000 claims description 10
- 108700026140 MAC combination Proteins 0.000 claims description 3
- 238000004891 communication Methods 0.000 abstract description 23
- 230000006870 function Effects 0.000 description 20
- 101100533725 Mus musculus Smr3a gene Proteins 0.000 description 14
- 101100274486 Mus musculus Cited2 gene Proteins 0.000 description 9
- 101150096622 Smr2 gene Proteins 0.000 description 9
- 238000010586 diagram Methods 0.000 description 9
- 230000005540 biological transmission Effects 0.000 description 4
- 238000010295 mobile communication Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/002—Transmission of channel access control information
- H04W74/004—Transmission of channel access control information in the uplink, i.e. towards network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/002—Transmission of channel access control information
- H04W74/006—Transmission of channel access control information in the downlink, i.e. towards the terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the application provides a random access method and a random access device, relates to the technical field of communication, and is used for solving the problem of how to retransmit a PUSCH part in MsgA. The method comprises the following steps: receiving random access response information sent by network side equipment, wherein the random access response information is random access response information in two-step random access, and the random access response information carries a target RV version of corresponding terminal equipment; and under the condition that the terminal equipment executes two-step random access and backs to four-step random access, sending a third message Msg3 to the network side equipment, wherein Msg3 is the third message in the four-step random access, and the RV version used by Msg3 is the target RV version. The embodiment of the invention is used for random access.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a random access method and apparatus.
Background
The Random Access (Random Access) procedure refers to a procedure in which a terminal device sends a Random Access preamble (preamble) to a network side device to attempt to establish a signaling connection with a network. Random access is used in a plurality of events such as initial access, Radio Resource Control (RRC) connection recovery, handover (handover), and the like, and is a very important process in a network system.
The contention-based random access includes two kinds of four-step random access (4-step RACH) and two-step random access (2-step RACH). The four-step random access process comprises the following steps: the method comprises the steps that a terminal device sends a random access request (Msg1) to a Network side device, after the Network side receives Msg1 sent by the terminal device, a Random Access Response (RAR) (Msg2) is sent to the terminal device, and uplink grant (UL grant) and temporary Cell Radio Network temporary identifier (TC-RNTI) for scrambling the Msg3 are carried in the Msg 2; the terminal device executes a Media Access Control (MAC) packet function to generate a media access Control Protocol data unit (MAC PDU) according to an uplink grant in the Msg2, stores the MAC PDU in a Msg3 cache, and then sends the MAC PDU in the Msg3 cache to the network side device through a Hybrid Automatic Repeat reQuest (HARQ) process; after receiving the Msg3 sent by the terminal equipment, the network side equipment sends Msg4 to the terminal equipment; finally, the terminal device determines whether the contention resolution is successful based on the Msg 4. In addition, in the four-step random access process, if the network side equipment does not receive the Msg3 sent by the terminal equipment, the network side equipment retransmits the Msg3 by using the TC-RNTI carried in the Msg 2.
The two-step random access procedure comprises: the terminal equipment sends random access request information (MsgA) to the network side equipment, wherein the MsgA comprises information carried by Msg1 and Msg 3; after receiving the MsgA sent by the terminal device, the network side device sends a confirmation message (MsgB) to the terminal device, wherein the MsgB comprises information carried by Msg2 and Msg4, and finally the terminal device determines whether contention resolution is successful or not based on the MsgB. In some cases, the terminal device may need to retransmit a Physical Uplink Shared CHannel (PUSCH) portion in MsgA, however, since the network side does not configure the terminal device with TC-RNTI, the retransmission of the PUSCH portion in MsgA cannot be scheduled through TC-RNTI.
In summary, how to retransmit the PUSCH part in MsgA is an urgent problem to be solved.
Disclosure of Invention
The embodiment of the application provides a random access method and a random access device, which are used for solving the problem of how to retransmit a PUSCH part in MsgA.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides a random access method, which is applied to a terminal device, and the method includes:
receiving random access response information sent by network side equipment, wherein the random access response information is random access response information in two-step random access, and the random access response information carries a target RV version corresponding to the terminal equipment;
and under the condition that the terminal equipment executes two-step random access and returns to four-step random access, sending a third message Msg3 to network side equipment, wherein the Msg3 is the third message in the four-step random access, and the RV version used by the Msg3 is the target RV version.
In a second aspect, an embodiment of the present application provides a random access method, which is applied to a network side device, and the method includes:
sending a random access response message to a terminal device, wherein the random access response message is random access response information in two-step random access, and the random access response message carries a target RV version corresponding to the terminal device;
and under the condition that the terminal equipment executes two-step random access and backs to four-step random access, receiving a third message Msg3 sent by the terminal equipment, wherein the Msg3 is the third message in the four-step random access, and the RV version used by the Msg3 is the target RV version.
In a third aspect, an embodiment of the present application provides a terminal device, including:
a receiving unit, configured to receive random access response information sent by a network side device, where the random access response information is random access response information in two-step random access, and the random access response information carries a target RV version corresponding to the terminal device;
a sending unit, configured to send a third message Msg3 to a network side device when the terminal device executes two-step random access and backs to four-step random access, where the Msg3 is the third message in the four-step random access, and the RV version used by the Msg3 is the target RV version.
In a fourth aspect, an embodiment of the present application provides a network side device, including:
a sending unit, configured to send a random access response message to a terminal device, where the random access response message is a random access response message in two-step random access, and the random access response message carries a target RV version corresponding to the terminal device;
a receiving unit, configured to receive a third message Msg3 sent by the terminal device when the terminal device performs two-step random access and fallback to four-step random access, where the Msg3 is the third message in the four-step random access, and an RV version used by the Msg3 is the target RV version.
In a fifth aspect, an embodiment of the present application provides a terminal device, including a processor, a memory, and a computer program stored on the memory and executable on the processor, where the computer program, when executed by the processor, implements the steps of the random access method according to the first aspect.
In a sixth aspect, an embodiment of the present application provides a network-side device, including a processor, a memory, and a computer program stored on the memory and executable on the processor, where the computer program, when executed by the processor, implements the steps of the random access method according to the second aspect.
In a seventh aspect, this application embodiment provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the random access method according to the first aspect or the second aspect.
In the random access method provided by the embodiment of the invention, terminal equipment firstly receives random access response information sent by network side equipment, and then sends Msg3 to the network side equipment under the condition that the terminal equipment executes two-step random access and returns to four-step random access; the random access response message is a random access response message in two-step random access, the random access response message carries a target RV version corresponding to the terminal device, the Msg3 is a third message in four-step random access, and the RV version used by the Msg3 is the target RV version; because the terminal device sends Msg3 to the network side device by using the target RV version carried in the random access response message when executing two-step random access to four-step random access fallback, the network side device can determine the content of retransmission carried by Msg3 according to the target RV version, and thus the embodiment of the present invention can solve the problem how to retransmit the PUSCH portion in MsgA when executing two-step random access to four-step random access fallback, thereby increasing the effective load resolution probability of the PUSCH portion in MsgA and increasing the success rate of random access.
Drawings
Fig. 1 is a schematic diagram of a possible structure of a communication system according to an embodiment of the present application;
fig. 2 is an interaction flowchart of a random access method according to an embodiment of the present application;
fig. 3 is a second interaction flowchart of the random access method according to the embodiment of the present application;
fig. 4 is a schematic structural diagram of a terminal device according to an embodiment of the present application;
fig. 5 is a schematic diagram of a hardware structure of a terminal device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a network side device according to an embodiment of the present application;
fig. 7 is a schematic diagram of a hardware structure of a network-side device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the following, some terms related in the embodiments of the present invention are explained to facilitate understanding of the technical solutions in the embodiments of the present application:
one, four step random access (4-step RACH)
4-step RACH (i.e., referring to the ordinary RACH procedure of the prior art) generally includes the following five steps:
step 1: the terminal device sends Msg1 (random access preamble) to the network side device.
Step 2: after receiving the Msg1, the network device sends Msg2 to the terminal device. That is, a Random Access Response (RAR) message, where the RAR is scrambled with a Random Access Radio Network temporary Identity (RA-RNTI), and includes a Backoff Indicator (BI), an Uplink grant (UL grant), a Random Access Preamble Identity (RAPID), a temporary cell Radio Network temporary Identity (TC-RNTI), and the like.
And step 3: and the terminal device which detects the RAPID corresponding to the preamble sent by itself sends Msg3 according to the position of the UL grant (the terminal device which does not detect the RAPID corresponding to the preamble sent by itself uses BI delay access).
And 4, step 4: the terminal device receives Msg4 sent by a Network side, the Msg4 comprises a competition resolving identifier, TC-RNTI is upgraded to a Cell Radio Network temporary identifier (C-RNTI), and a subsequent Network side can adopt the C-RNTI to schedule the terminal device.
And 5: typically, the end device needs to send Msg 5. I.e. an access complete message.
It should be noted that the four-step access generally refers to a process of completing the first four steps of contention resolution, and the first four steps generally represent a conventional random access procedure of the wireless network.
Further, for four-step random access (4-step RACH), the random access procedure of the terminal device includes:
A. a contention-based random access procedure;
B. a non-contention based random access procedure.
For the contention-based random access process, the terminal device sends Msg1 to the network side device, that is, the terminal device sends a random access request to the network side device; a network side device; and after receiving the Msg1, sending Msg2 to the terminal device, that is, the network side device sends an RAR message to the terminal device, where the message carries UL grant information. The terminal device executes a Media Access Control (MAC) layer packet function to generate a MAC Protocol Data Unit (PDU) according to the ULgrant in the Msg2, stores the MAC PDU in the Msg3 buffer, and then sends the MAC PDU in the Msg3 buffer through a Hybrid Automatic Repeat Request (HARQ) process. And after receiving the Msg3, the network side device sends Msg4 (such as a contention resolution identifier) to the terminal device. And the terminal equipment receives the Msg4 and judges whether the competition solution is successful or not, if so, the random access process is successful, and otherwise, the random access process is initiated again. For the reinitiated random access process, after the terminal device receives the ULgrant in the Msg2 again, the terminal device directly fetches the previously stored MAC PDU from the Msg3 buffer and sends the MAC PDU through the HARQ process. The terminal device will clear the HARQ buffer of Msg3 transmission of the random access procedure after the random access procedure is completed.
For the "random access process based on non-contention", the terminal device sends Msg1 to the network side device, that is, the terminal device sends a random access request to the network side device. After receiving the Msg1, the network side device sends Msg2 to the terminal device, that is, the network side device sends a RAR message to the terminal device, where the message carries UL grant information and identification information of the terminal device (e.g., a random access preamble (preamble) number of Msg 1). And if the number of the random access preamble is the same as that of the random access preamble sent by the Msg1 of the terminal equipment, the terminal equipment considers that the random access process is successful, otherwise, the random access process is initiated again.
When the terminal device initiates (or re-initiates) the random access process each time, the terminal device selects the random access resource according to the corresponding downlink Signal quality (e.g., Reference Symbol Received Power (RSRP)) of each random access Msg1 resource, so as to improve the success rate of the random access. Therefore, each time the terminal device initiates (or re-initiates) a random access procedure, the terminal device may select either a "contention-based random access procedure" or a "non-contention-based random access procedure".
Two, two step random access (2-step RACH)
The 2-step RACH specifically comprises the following two steps:
step 1: the terminal equipment triggers a 2-step RACH process and sends request information (MsgA) to the network side equipment. For example, the preamble is transmitted through a Physical Uplink Shared Channel (PUSCH) + preamble.
Step 2: the network side sends confirmation information (MsgB) to the terminal equipment.
If the terminal device fails to receive the MsgB (failure means that the RAPID or contention resolution flag in the MsgA corresponding to the terminal device's own transmission is not received), the terminal device retransmits Msg1 (MsgA, Msg3, or Msg1 may also be retransmitted, which may be determined according to the usage scenario).
Generally, before step 1, the network side device configures configuration information of two-step random access for the terminal device, where the configuration information includes: and sending resource information corresponding to the MsgA and the MsgB.
Conventionally, for ease of understanding, MsgA in two-step random access includes Msg1 and Msg3 in four-step random access, and MsgB in two-step random access includes Msg2 and Msg4 in four-step random access. Meanwhile, before step 1 is executed, the network side device configures configuration information of two-step random access for the terminal device, for example, sending resource information corresponding to MsgA and MsgB.
Third, other terms
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship; in the formula, the character "/" indicates that the preceding and following related objects are in a relationship of "division". The term "plurality" herein means two or more, unless otherwise specified.
For the convenience of clearly describing the technical solutions of the embodiments of the present application, in the embodiments of the present application, the terms "first" and "second" are used to distinguish the same items or similar items with basically the same functions or actions, and those skilled in the art can understand that the terms "first" and "second" are not limited to the quantity and execution order.
In the embodiments of the present application, words such as "exemplary" or "for example" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion. In the embodiments of the present application, the meaning of "a plurality" means two or more unless otherwise specified.
In some cases, the terminal device may need to retransmit the PUSCH portion in MsgA, however, since the network side does not configure TC-RNTI to the terminal device, the retransmission of the PUSCH portion in MsgA cannot be scheduled by TC-RNTI.
In order to solve the problem, an embodiment of the present application provides a random access method and an apparatus, in the random access method, a terminal device first receives random access response information sent by a network side device, and then sends Msg3 to the network side device when the terminal device executes two-step random access and fallback to four-step random access; the random access response message is a random access response message in two-step random access, the random access response message carries a target RV version corresponding to the terminal device, the Msg3 is a third message in four-step random access, and the RV version used by the Msg3 is the target RV version; because the terminal device sends Msg3 to the network side device by using the target RV version carried in the random access response message when executing two-step random access to four-step random access fallback, the network side device can determine the content of retransmission carried by Msg3 according to the target RV version, and thus the embodiment of the present invention can solve the problem how to retransmit the PUSCH portion in MsgA when executing two-step random access to four-step random access fallback, thereby increasing the effective load resolution probability of the PUSCH portion in MsgA and increasing the success rate of random access.
The technical scheme provided by the application can be applied to various wireless communication systems, such as a 5G communication system, a future evolution system or a plurality of communication convergence systems and the like. A variety of application scenarios may be included, for example, scenarios such as Machine-to-Machine (M2M), D2M, macro-micro Communication, enhanced Mobile Broadband (eMBB), ultra high reliability and ultra Low Latency Communication (urrllc), and mass internet of things Communication (mtc). These scenarios include, but are not limited to: the communication between the terminal device and the terminal device, the communication between the network side device and the network side device, the communication between the network side device and the terminal device, and the like.
Fig. 1 shows a schematic diagram of a possible architecture of a communication system according to an embodiment of the present application. As shown in fig. 1, the communication system may include: a terminal device 11 and a network side device 12. The terminal device 11 and the network side device 12 may perform information transmission via a wireless network.
The terminal device 11 in the communication system shown in fig. 1 may be a wireless terminal device, which may be a device providing voice and/or other traffic data connectivity to a user, a handheld device with wireless communication functionality, a computing device or other processing device connected to a wireless modem, a vehicle mounted device, a wearable device, a terminal device in a future 5G network or a terminal device in a future evolved PLMN network, etc. A Wireless terminal device may communicate with one or more core networks via a Radio Access Network (RAN), and may be a Mobile terminal, such as a Mobile phone (or "cellular" phone) and a computer with a Mobile terminal, for example, a portable, pocket, hand-held, computer-embedded or vehicle-mounted Mobile device, which exchanges languages and/or data with the RAN, and Personal Communication Service (PCS) phones, cordless phones, Session Initiation Protocol (SIP) phones, Wireless Local Loop (WLL) stations, Personal Digital Assistants (PDAs), and the like, and may also be a Mobile device, a UE terminal, an access terminal, a Wireless communication device, a terminal unit, a terminal Station, a Mobile Station (Mobile Station), a Wireless terminal unit, a terminal Station, a Mobile terminal (Mobile Station), and the like, A Remote Station (Remote Station), a Remote Station, a Remote Terminal (Remote Terminal), a Subscriber unit (Subscriber unit), a Subscriber Station (Subscriber Station), a User Agent (User Agent), a Terminal device, and the like. As an example, in the embodiment of the present application, fig. 1 illustrates that the terminal device is a mobile phone.
Further, the network-side device 12 in the communication system shown in fig. 1 may be a base station, a core network device, a Transmission and Reception Point (TRP), a relay station, an access Point, or the like. The network side device may be a Base Transceiver Station (BTS) in a Global System for Mobile communication (GSM) or Code Division Multiple Access (CDMA) network, may be an nb (nodeb) in Wideband Code Division Multiple Access (WCDMA), and may be an eNB or enodeb (evolved nodeb) in LTE. The Network side device may also be a wireless controller in a Cloud Radio Access Network (CRAN) scenario. The network side device may also be a network side device in a 5G communication system or a network side device in a future evolution network. In addition, in systems employing different radio access technologies, the names of devices with base station functionality may vary, for example, in third Generation mobile communication (3-Generation, 3G) networks, referred to as NodeB; in LTE systems, referred to as enodebs; in fifth generation mobile communication (5G) networks, referred to as a gNB, and so on. As communication technology evolves, the name "base station" may change.
An embodiment of the present application provides a random access method, and fig. 2 shows an interaction flowchart of the random access method provided in the embodiment of the present application, and as shown in fig. 2, the random access method may include:
and S21, the network side equipment sends a random access response message to the terminal equipment.
Correspondingly, the terminal equipment receives the random access response message sent by the network side equipment.
The random access response message is a random access response message in two-step random access, and the random access response message carries a target RV version corresponding to the terminal equipment.
Since the random access response message is a random access response message in two-step random access, step S21 may be implemented by the network side device sending the MsgB in two-step random access to the terminal device.
And S22, when the terminal equipment executes two-step random access and four-step random access fallback (fallback), the terminal equipment sends the Msg3 to the network side equipment.
Correspondingly, the network side equipment receives the Msg3 sent by the terminal equipment.
The Msg3 is a third message in four-step random access, and the RV version used by the Msg3 is the target RV version.
Namely, the MsgB in the two-step random access sent by the network side device to the terminal device carries the target RV version, and schedules the Msg3 retransmission by the target RV version.
Further, the terminal device may perform a two-step random access to four-step random access backoff in the following scenario a and/or scenario b.
Scene a, the terminal equipment fails to receive the random access response message (MsgB) in the two-step random access.
Specifically, the failure of the terminal device to receive the random access response message (MsgB) includes: the terminal device does not receive a RAPID or a contention resolution ID corresponding to the random access request message (MsgA) sent by the terminal device, or receives a RAPID without receiving a corresponding contention resolution ID, or the terminal receives one or more of uplink grants preconfigured for uplink Msg3 sending.
And b, carrying target information by the random access response information, wherein the target information is used for indicating the terminal equipment to back the two-step random access to the four-step random access.
Specifically, the target information in the foregoing embodiment may implicitly indicate that the terminal device executes two-step random access to four-step random access backoff, or explicitly indicate that the terminal device executes two-step random access to four-step random access backoff.
For example, a specific implementation manner of explicitly instructing, by the target information, the terminal device to perform a fallback from two-step random access to four-step random access may be: the network side equipment indicates the terminal equipment corresponding to the RAPID to execute two-step random access and return to four-step random access under the RA-RNTI through X bits; wherein X may be a positive integer.
For example, the specific implementation manner of the target information hiding indication that the terminal device executes the backoff from the two-step random access to the four-step random access may be: : the network side equipment instructs the terminal equipment to retransmit the PUSCH part in the MsgA by giving a UL grant to the terminal equipment (not receiving the corresponding competition resolving ID) corresponding to the RAPID under the RA-RNTI; or the network side equipment gives other parameters, and the terminal equipment can judge that the terminal equipment retransmits the PUSCH part in the MsgA according to other combination conditions.
In the random access method provided by the embodiment of the invention, terminal equipment firstly receives random access response information sent by network side equipment, and then sends Msg3 to the network side equipment under the condition that the terminal equipment executes two-step random access and returns to four-step random access; the random access response message is a random access response message in two-step random access, the random access response message carries a target RV version corresponding to the terminal device, the Msg3 is a third message in four-step random access, and the RV version used by the Msg3 is the target RV version; because the terminal device sends Msg3 to the network side device by using the target RV version carried in the random access response message when executing two-step random access to four-step random access fallback, the network side device can determine the content of retransmission carried by Msg3 according to the target RV version, and thus the embodiment of the present invention can solve the problem how to retransmit the PUSCH portion in MsgA when executing two-step random access to four-step random access fallback, thereby increasing the effective load resolution probability of the PUSCH portion in MsgA and increasing the success rate of random access.
Further, referring to fig. 3, before step S21 (where the network side device sends a random access response message to the terminal device), the random access method provided in the embodiment of the present invention further includes:
and S31, the terminal equipment sends random access request information to the network side equipment.
Correspondingly, before the network side equipment sends a random access response message to the terminal equipment, the network side equipment also receives random access request information sent by the terminal equipment.
Wherein, the random access request information is the random access request information in the two-step random access.
That is, before the network side device sends the random access response message to the terminal device, the terminal device sends MsgA in the two-step random access to the network side device.
Illustratively, the terminal device may send MsgA to the network side device through PUSCH + Preamble.
In addition, when the terminal device sends the random access request information to the network side device, the terminal device also needs to select a proper resource first. That is, before sending the random access request information to the network side device, the method further includes:
the terminal equipment determines a target resource;
wherein the target resource comprises: at least one of a Preamble (Preamble), a random access Occasion (RACH Obccasion), and a PUSCH.
Optionally, in step S31, the sending, by the terminal device, the random access request information to the network side device may specifically be:
and the terminal equipment sends random access request information to the network side equipment through a target HARQ process.
That is, the terminal device may send MsgA in two-step random access to the network side device through the HARQ process.
On the basis that the terminal device sends the random access request message to the network-side device through the target HARQ process, the step S22, in which the terminal device sends Msg3 to the network-side device, includes:
and the terminal equipment sends the Msg3 to network side equipment through the target HARQ process.
That is, the terminal device sends the same identifier of the HARQ process of MsgA in the two-step random access as the identifier of the HARQ process of Msg3 in the four-step random access; or the terminal device retransmits Msg3 using the same HARQ process as sent MsgA.
Since the terminal device retransmits Msg3 using the same HARQ process as the send MsgA, the network side device can determine Msg3 to be the retransmission for the random access request message according to the identity of the HARQ process of send MsgA and the identity of the HARQ process of send Msg 3.
Optionally, the identifier of the target HARQ process is a preset value, or the identifier of the target HARQ process is configured for the terminal device by a network side device, or the identifier of the target HARQ process is configured by a broadcast message.
That is, the identifier of the MsgA HARQ process in the two-step random access sent by the terminal device may be a preset value, or configured for the terminal device in advance by the network side device, or configured for the terminal device by the broadcast message.
Illustratively, the identification of the target HARQ process may be 0.
Still further, the Msg3 carries a target MAC PDU, and the target MAC PDU is a MAC PDU carried by a PUSCH in the random access request.
Since the target MAC PDU carried in the Msg3 is a MAC PDU corresponding to the PUSCH in the random access request (MsgA), the retransmission to the network side device Msg3 is the retransmission of the PUSCH portion in the MsgA.
Since the end device needs to carry the target MAC PDU in Msg3, the end device needs to first get the target MAC PDU before sending Msg 3. For example, in the embodiment of the present invention, the manner for the terminal device to obtain the target MAC PDU may be:
and the terminal equipment reads the target MAC PDU from the HARQ buffer.
It should be further noted that, the manner for the terminal device to obtain the target MAC PDU may be as follows: and reading the target MAC PDU from the HARQ cache, so that the MAC PDU in the HARQ cache needs to be emptied after the random access is successful, thereby avoiding the MAC PDU read from the HARQ cache from being the MAC PDU cached in other random access processes.
Some embodiments of the present invention may perform the division of the functional modules on the terminal device according to the above method example. For example, the functional blocks may be divided for the respective functions, or two or more functions may be integrated into one block. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in some embodiments of the present invention, the division of the modules is schematic, and is only one division of logic functions, and there may be another division in actual implementation.
In the case of an integrated unit, fig. 4 shows a schematic diagram of a possible structure of the terminal device involved in the above embodiment, where the terminal device 400 includes:
a receiving unit 41, configured to receive random access response information sent by a network side device, where the random access response information is random access response information in two-step random access, and the random access response information carries a target RV version corresponding to the terminal device;
a sending unit 42, configured to send a third message Msg3 to a network side device when the terminal device performs two-step random access and performs fallback to four-step random access, where the Msg3 is the third message in the four-step random access, and the RV version used by the Msg3 is the target RV version.
Optionally, the sending unit 42 is further configured to send random access request information to the network side device before the receiving unit receives the random access response information sent by the network side device, where the random access request information is random access request information in two-step random access.
Optionally, the sending unit 42 is specifically configured to send the random access request information to the network side device through a target HARQ process.
Optionally, the sending unit 42 is specifically configured to send the Msg3 to a network side device through the target HARQ process.
Optionally, the identifier of the target HARQ process is a preset value, or the identifier of the target HARQ process is configured for the terminal device by a network side device, or the identifier of the target HARQ process is configured by a broadcast message.
Optionally, the identifier of the target HARQ process is 0.
Optionally, the Msg3 carries a target MAC protocol data unit PDU, where the target MAC PDU is an MAC PDU carried by a PUSCH of a physical uplink shared channel in the random access request.
Optionally, the sending unit 42 is further configured to read the target MAC PDU from a HARQ buffer before sending the third message Msg3 to the network side device.
Optionally, the random access request information carries a target preamble;
and the random access response message also carries a target uplink authorization, wherein the target uplink authorization is an uplink authorization corresponding to the identifier of the target lead code.
Optionally, the sending unit 42 is specifically configured to send the Msg3 to the network-side device by using the target uplink grant.
Optionally, the sending unit 42 is further configured to determine a target resource before sending the random access request information to the network side device;
wherein the target resource comprises: at least one of a preamble, a random access occasion, and a PUSCH.
Optionally, the random access response information further carries target information, where the target information is used to instruct the terminal device to perform a fallback from two-step random access to four-step random access.
Optionally, the scenario that the terminal device is triggered to perform a backoff from two-step random access to four-step random access includes:
the terminal equipment fails to receive the random access response message;
and/or;
the random access response information carries target information, and the target information is used for indicating the terminal equipment to execute two-step random access and rollback to four-step random access.
The method comprises the steps that terminal equipment firstly receives random access response information sent by network side equipment, and then sends Msg3 to the network side equipment under the condition that the terminal equipment executes two-step random access and returns to four-step random access; the random access response message is a random access response message in two-step random access, the random access response message carries a target RV version corresponding to the terminal device, the Msg3 is a third message in four-step random access, and the RV version used by the Msg3 is the target RV version; because the terminal device sends Msg3 to the network side device by using the target RV version carried in the random access response message when executing two-step random access to four-step random access fallback, the network side device can determine the content of retransmission carried by Msg3 according to the target RV version, and thus the embodiment of the present invention can solve the problem how to retransmit the PUSCH portion in MsgA when executing two-step random access to four-step random access fallback, thereby increasing the effective load resolution probability of the PUSCH portion in MsgA and increasing the success rate of random access.
Fig. 5 is a schematic diagram of a hardware structure of a terminal device for implementing various embodiments of the present application, where the terminal device 100 includes, but is not limited to: radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111.
Further, the terminal device 100 further includes: a computer program stored on the memory 109 and executable on the processor 110, which computer program, when executed by the processor 110, implements the respective processes performed by the terminal device in the above-described random access method.
Specifically, the processor 110 is configured to control the radio frequency unit 101 to receive a random access response message sent by a network side device, and control the radio frequency unit 101 to send a third message Msg3 to the network side device when the terminal device executes a two-step random access to four-step random access fallback.
The random access response message is a random access response message in two-step random access, the random access response message carries a target RV version corresponding to the terminal device, the Msg3 is a third message in four-step random access, and the RV version used by the Msg3 is the target RV version.
The method comprises the steps that terminal equipment firstly receives random access response information sent by network side equipment, and then sends Msg3 to the network side equipment under the condition that the terminal equipment executes two-step random access and returns to four-step random access; the random access response message is a random access response message in two-step random access, the random access response message carries a target RV version corresponding to the terminal device, the Msg3 is a third message in four-step random access, and the RV version used by the Msg3 is the target RV version; because the terminal device sends Msg3 to the network side device by using the target RV version carried in the random access response message when executing two-step random access to four-step random access fallback, the network side device can determine the content of retransmission carried by Msg3 according to the target RV version, and thus the embodiment of the present invention can solve the problem how to retransmit the PUSCH portion in MsgA when executing two-step random access to four-step random access fallback, thereby increasing the effective load resolution probability of the PUSCH portion in MsgA and increasing the success rate of random access.
It should be further noted that, the terminal device 100 shown in fig. 5 may implement each process implemented by the terminal device in the random method, and may achieve the same technical effect, and for avoiding repetition, details are not repeated here.
Those skilled in the art will appreciate that the terminal device configuration shown in fig. 5 does not constitute a limitation of the terminal device, and that the terminal device may include more or fewer components than shown, or combine certain components, or a different arrangement of components. In the embodiment of the present application, the terminal device includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
It should be understood that, in the embodiment of the present application, the radio frequency unit 101 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through a wireless communication system.
The terminal device provides wireless broadband internet access to the user through the network module 102, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the network module 102 or stored in the memory 109 into an audio signal and output as sound. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the terminal device 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 includes a speaker, a buzzer, a receiver, and the like.
The input unit 104 is used to receive an audio or video signal. The input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the Graphics processor 1041 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the network module 102. The microphone 1042 may receive sound and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode.
The terminal device 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or the backlight when the terminal device 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal device posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 105 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal device. Specifically, the user input unit 107 includes a touch panel 1071 and other input devices 1072. Touch panel 1071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 1071 (e.g., operations by a user on or near touch panel 1071 using a finger, stylus, or any suitable object or attachment). The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and receives and executes commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. Specifically, other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 1071 may be overlaid on the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although in fig. 5, the touch panel 1071 and the display panel 1061 are two independent components to implement the input and output functions of the terminal device, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the terminal device, and is not limited herein.
The interface unit 108 is an interface for connecting an external device to the terminal apparatus 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the terminal apparatus 100 or may be used to transmit data between the terminal apparatus 100 and the external device.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the terminal device, connects various parts of the entire terminal device by using various interfaces and lines, and performs various functions of the terminal device and processes data by running or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the terminal device. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The terminal device 100 may further include a power supply 111 (such as a battery) for supplying power to each component, and preferably, the power supply 111 may be logically connected to the processor 110 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system.
In addition, the terminal device 100 includes some functional modules that are not shown, and are not described in detail here.
Some embodiments of the present invention may perform the division of the functional modules on the network side device according to the above method example. For example, the functional blocks may be divided for the respective functions, or two or more functions may be integrated into one block. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in some embodiments of the present invention, the division of the modules is schematic, and is only one division of logic functions, and there may be another division in actual implementation.
In the case of using an integrated unit, fig. 6 shows a schematic diagram of a possible structure of the network-side device involved in the foregoing embodiment, where the network-side device 600 includes:
a sending unit 61, configured to send a random access response message to a terminal device, where the random access response message is a random access response message in two-step random access, and the random access response message carries a target RV version corresponding to the terminal device;
a receiving unit 62, configured to receive a third message Msg3 sent by the terminal device when the terminal device performs a fallback from two-step random access to four-step random access, where the Msg3 is the third message in the four-step random access, and the RV version used by the Msg3 is the target RV version.
Optionally, the receiving unit 62 is further configured to receive random access request information sent by the terminal device before the sending unit sends a random access response message to the terminal device, where the random access request information is random access request information in two-step random access.
Optionally, the random access response information further carries target information, where the target information is used to instruct the terminal device to perform a fallback from two-step random access to four-step random access.
An embodiment of the present application further provides a network side device, and as shown in fig. 7, the network side device includes: the processor 71, the memory 72, and a computer program stored in the memory 72 and capable of running on the processor 71, where the computer program, when executed by the processor 71, implements each process executed by the network side device in the random access method, and can achieve the same technical effect, and are not described herein again to avoid repetition.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements multiple processes of the random access method in the foregoing embodiments, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present application or portions thereof contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (e.g., a mobile phone, a computer, a server, an air conditioner, or a network-side device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (35)
1. A random access method is applied to a terminal device, and the method comprises the following steps:
receiving random access response information sent by network side equipment, wherein the random access response information is random access response information in two-step random access, and the random access response information carries a target RV version corresponding to the terminal equipment;
and under the condition that the terminal equipment executes two-step random access and returns to four-step random access, sending a third message Msg3 to network side equipment, wherein the Msg3 is the third message in the four-step random access, and the RV version used by the Msg3 is the target RV version.
2. The method according to claim 1, wherein before receiving the random access response information sent by the network side device, the method further comprises:
and sending random access request information to the network side equipment, wherein the random access request information is the random access request information in the two-step random access.
3. The method according to claim 2, wherein the sending random access request information to the network side device includes:
and sending random access request information to the network side equipment through a target HARQ hybrid automatic retransmission process.
4. The method of claim 3, wherein the sending Msg3 to the network-side device comprises:
and sending the Msg3 to a network side device through the target HARQ process.
5. The method of claim 4,
the identifier of the target HARQ process is a preset value, or the identifier of the target HARQ process is configured for the terminal equipment by network side equipment, or the identifier of the target HARQ process is configured by broadcast messages.
6. The method of claim 5, wherein the identification of the target HARQ process is 0.
7. The method according to claim 2, wherein the Msg3 carries a target media access control, MAC, protocol data unit, PDU, and the target MAC PDU is a MAC PDU carried on a physical uplink shared channel, PUSCH, in the random access request.
8. The method according to claim 7, wherein before sending the third message Msg3 to the network-side device, the method further comprises:
and reading the target MAC PDU from an HARQ buffer.
9. The method of claim 2,
the random access request information carries a target lead code;
and the random access response message also carries a target uplink authorization, wherein the target uplink authorization is an uplink authorization corresponding to the identifier of the target lead code.
10. The method according to claim 9, wherein the sending a third message Msg3 to the network-side device comprises:
and sending the Msg3 to the network side equipment by using the target uplink authorization.
11. The method according to claim 2, wherein before sending the random access request information to the network side device, the method further comprises:
determining a target resource, the target resource comprising: at least one of a preamble, a random access occasion, and a PUSCH.
12. The method according to any one of claims 1 to 11, wherein the random access response information further carries target information, and the target information is used for instructing the terminal device to perform a two-step random access to a four-step random access backoff.
13. The method according to any one of claims 1 to 11, wherein the scenario of triggering the terminal device to perform a two-step random access fallback to a four-step random access comprises:
the terminal equipment fails to receive the random access response message;
and/or;
the random access response information carries target information, and the target information is used for indicating the terminal equipment to execute two-step random access and rollback to four-step random access.
14. A random access method is applied to a network side device, and the method comprises the following steps:
sending a random access response message to a terminal device, wherein the random access response message is random access response information in two-step random access, and the random access response message carries a target RV version corresponding to the terminal device;
and under the condition that the terminal equipment executes two-step random access and backs to four-step random access, receiving a third message Msg3 sent by the terminal equipment, wherein the Msg3 is the third message in the four-step random access, and the RV version used by the Msg3 is the target RV version.
15. The method of claim 14, wherein before sending the random access response message to the terminal device, the method further comprises:
and receiving random access request information sent by the terminal equipment, wherein the random access request information is random access request information in two-step random access.
16. The method according to claim 14 or 15, wherein the random access response information further carries target information, and the target information is used to instruct the terminal device to perform a two-step random access to four-step random access backoff.
17. A terminal device, comprising:
a receiving unit, configured to receive random access response information sent by a network side device, where the random access response information is random access response information in two-step random access, and the random access response information carries a target RV version corresponding to the terminal device;
a sending unit, configured to send a third message Msg3 to a network side device when the terminal device executes two-step random access and backs to four-step random access, where the Msg3 is the third message in the four-step random access, and the RV version used by the Msg3 is the target RV version.
18. The terminal device of claim 17,
the sending unit is further configured to send random access request information to the network side device before the receiving unit receives the random access response information sent by the network side device, where the random access request information is random access request information in two-step random access.
19. The terminal device of claim 18,
the sending unit is specifically configured to send random access request information to the network side device through a target HARQ process.
20. The terminal device of claim 19,
the sending unit is specifically configured to send the Msg3 to a network side device through the target HARQ process.
21. The terminal device of claim 20,
the identifier of the target HARQ process is a preset value, or the identifier of the target HARQ process is configured for the terminal equipment by network side equipment, or the identifier of the target HARQ process is configured by broadcast messages.
22. The terminal device of claim 21, wherein the identification of the target HARQ process is 0.
23. The terminal device of claim 18, wherein the Msg3 carries a target medium access control MAC protocol data unit PDU, and the target MAC PDU is a MAC PDU carried on a physical uplink shared channel, PUSCH, in the random access request.
24. The terminal device of claim 23, wherein the sending unit is further configured to read the target MAC PDU from a HARQ buffer before sending a third message Msg3 to a network side device.
25. The terminal device of claim 18, wherein the random access request information carries a target preamble;
and the random access response message also carries a target uplink authorization, wherein the target uplink authorization is an uplink authorization corresponding to the identifier of the target lead code.
26. The terminal device of claim 25,
the sending unit is specifically configured to send the Msg3 to the network-side device using the target uplink grant.
27. The terminal device according to claim 18, wherein the sending unit is further configured to determine a target resource before sending random access request information to the network side device;
wherein the target resource comprises: at least one of a preamble, a random access occasion, and a PUSCH.
28. The terminal device according to any one of claims 16 to 26, wherein the random access response information further carries target information, and the target information is used to instruct the terminal device to perform a two-step random access fallback to a four-step random access fallback.
29. The terminal device according to any of claims 16 to 26, wherein the scenario of triggering the terminal device to perform a two-step random access fallback to a four-step random access comprises:
the terminal equipment fails to receive the random access response message;
and/or;
the random access response information carries target information, and the target information is used for indicating the terminal equipment to execute two-step random access and rollback to four-step random access.
30. A network-side device, comprising:
a sending unit, configured to send a random access response message to a terminal device, where the random access response message is a random access response message in two-step random access, and the random access response message carries a target RV version corresponding to the terminal device;
a receiving unit, configured to receive a third message Msg3 sent by the terminal device when the terminal device performs two-step random access and fallback to four-step random access, where the Msg3 is the third message in the four-step random access, and an RV version used by the Msg3 is the target RV version.
31. The network-side device of claim 30,
the receiving unit is further configured to receive random access request information sent by the terminal device before the sending unit sends a random access response message to the terminal device, where the random access request information is random access request information in two-step random access.
32. The network side device according to claim 30 or 31, wherein the random access response information further carries target information, and the target information is used to instruct the terminal device to perform a two-step random access fallback to a four-step random access fallback.
33. A terminal device comprising a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the random access method according to any one of claims 1 to 13.
34. A network side device comprising a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the random access method according to any one of claims 14 to 16.
35. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the random access method according to any one of claims 1 to 16.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910093589.7A CN111263462B (en) | 2019-01-30 | 2019-01-30 | Random access method and device |
PCT/CN2020/073650 WO2020156395A1 (en) | 2019-01-30 | 2020-01-21 | Random access method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910093589.7A CN111263462B (en) | 2019-01-30 | 2019-01-30 | Random access method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111263462A true CN111263462A (en) | 2020-06-09 |
CN111263462B CN111263462B (en) | 2022-02-22 |
Family
ID=70953801
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910093589.7A Active CN111263462B (en) | 2019-01-30 | 2019-01-30 | Random access method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111263462B (en) |
WO (1) | WO2020156395A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113938901A (en) * | 2020-06-29 | 2022-01-14 | 华为技术有限公司 | Information transmission method, communication device and computer readable storage medium |
WO2023065244A1 (en) * | 2021-10-21 | 2023-04-27 | Oppo广东移动通信有限公司 | Random access method, terminal device, and network device |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022067614A1 (en) * | 2020-09-30 | 2022-04-07 | Oppo广东移动通信有限公司 | Wireless communication method, terminal device, and network device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108282899A (en) * | 2017-01-05 | 2018-07-13 | 电信科学技术研究院 | Two step competitive random access methods of one kind and device |
US20180279375A1 (en) * | 2017-03-22 | 2018-09-27 | Comcast Cable Communications, Llc | Random Access Process in New Radio |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109845378B (en) * | 2016-09-28 | 2023-10-10 | 索尼公司 | Random Access in Next Generation Wireless Systems |
-
2019
- 2019-01-30 CN CN201910093589.7A patent/CN111263462B/en active Active
-
2020
- 2020-01-21 WO PCT/CN2020/073650 patent/WO2020156395A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108282899A (en) * | 2017-01-05 | 2018-07-13 | 电信科学技术研究院 | Two step competitive random access methods of one kind and device |
US20180279375A1 (en) * | 2017-03-22 | 2018-09-27 | Comcast Cable Communications, Llc | Random Access Process in New Radio |
Non-Patent Citations (2)
Title |
---|
LG ELECTRONICS INC: "2-Step RACH procedure for NR-U", 《3GPP TSG-RAN WG2 #103BIS R2-1818098》 * |
ZTE等人: "Considerations on channel access procedure for NR-U", 《3GPP TSG RAN WG2 MEETING #102 R2-1807253》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113938901A (en) * | 2020-06-29 | 2022-01-14 | 华为技术有限公司 | Information transmission method, communication device and computer readable storage medium |
WO2023065244A1 (en) * | 2021-10-21 | 2023-04-27 | Oppo广东移动通信有限公司 | Random access method, terminal device, and network device |
Also Published As
Publication number | Publication date |
---|---|
WO2020156395A1 (en) | 2020-08-06 |
CN111263462B (en) | 2022-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111800888B (en) | SDT processing method, device and system | |
CN111800856B (en) | Data transmission method, paging method, terminal, base station and core network equipment | |
CN111800886B (en) | Random access process rollback method, equipment and system | |
CN110913499B (en) | Random access method, terminal and computer readable storage medium | |
CN110769517B (en) | Random access method and related equipment | |
CN111278153B (en) | Random access method and device, and communication equipment | |
CN110719628A (en) | Transmission method, terminal equipment and network equipment | |
CN110719647B (en) | Random access method, terminal and network equipment | |
CN110167041B (en) | Beam failure recovery request sending method and user equipment | |
US20210352744A1 (en) | Random access method and device | |
CN111263462B (en) | Random access method and device | |
CN111835458A (en) | Information transmission and receiving method, terminal and network side equipment | |
CN111836280A (en) | Data transmission method and terminal | |
US20230300897A1 (en) | Random access method, terminal, and network device | |
CN110636627B (en) | Resource request method and user equipment | |
CN110035473B (en) | System information transmission method and user terminal | |
CN111836397B (en) | Random access method, terminal and network side equipment | |
CN111800831B (en) | Path conversion method, device, communication system and computer readable storage medium | |
CN111278032B (en) | PUCCH (physical uplink control channel) sending method, receiving method, terminal and network side equipment | |
CN113677038A (en) | Random access processing method and terminal | |
CN111436138A (en) | Signal transmission method, device and system | |
CN112770406B (en) | Listen-before-talk (LBT) failure recovery method, user equipment and base station | |
CN110621081B (en) | Random access method and terminal equipment | |
CN116724513A (en) | Information indication method, device, system, communication equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |