CN111434176A - Method and apparatus for random access - Google Patents

Method and apparatus for random access Download PDF

Info

Publication number
CN111434176A
CN111434176A CN201780097347.4A CN201780097347A CN111434176A CN 111434176 A CN111434176 A CN 111434176A CN 201780097347 A CN201780097347 A CN 201780097347A CN 111434176 A CN111434176 A CN 111434176A
Authority
CN
China
Prior art keywords
rar
random access
duration
time length
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201780097347.4A
Other languages
Chinese (zh)
Inventor
石聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN111434176A publication Critical patent/CN111434176A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application discloses a method and equipment for random access, the method is applied to terminal equipment working in an unauthorized frequency band, the terminal equipment is configured with a Random Access Response (RAR) receiving window, and the method comprises the following steps: if the terminal device does not receive the RAR on the carrier wave of the unauthorized frequency band within a first time length, the terminal device re-determines the time length of the RAR receiving window, wherein the first time length is the current time length of the RAR receiving window; the terminal equipment retransmits the random access lead code to the network equipment; and the terminal equipment receives the RAR again within the re-determined time range of the RAR receiving window.

Description

Method and apparatus for random access Technical Field
The present embodiments relate to the field of communications, and in particular, to a method and apparatus for random access.
Background
For example, the terminal device needs to follow the principle of "listen Before Talk (L isten Before Talk, L BT)" Before performing signal transmission on the channel of the unlicensed spectrum, that is, the terminal device needs to perform channel sensing first Before performing signal transmission on the channel of the unlicensed spectrum, and only when the channel sensing result is that the channel is idle, the terminal device can perform signal transmission, and if the channel sensing result is that the channel is busy, the terminal device cannot perform signal transmission.
Therefore, in the random access process, the terminal device and the network device need to preempt the use right of the channel first to perform information interaction, and thus, there may be a problem that the random access fails due to L BT failure.
Disclosure of Invention
A method and equipment for random access are provided, which are beneficial to improving the success probability of random access.
In a first aspect, a method for random access is provided, where the method is applied to a terminal device operating in an unlicensed frequency band, and the terminal device is configured with a Random Access Response (RAR) receiving window, and the method includes:
if the terminal device does not receive the RAR on the carrier wave of the unauthorized frequency band within a first time length, the terminal device re-determines the time length of the RAR receiving window, wherein the first time length is the current time length of the RAR receiving window;
the terminal equipment retransmits the random access lead code to the network equipment;
and the terminal equipment receives the RAR again within the re-determined time range of the RAR receiving window.
Therefore, according to the method for random access in the embodiment of the present application, the terminal device may re-determine the duration of the RAR receiving window under the condition that the RAR receiving fails, and further, when the RAR is received next time, the RAR receiving may be performed within the re-determined duration range of the RAR receiving window, so that the probability of the successful RAR receiving is favorably improved, and the probability of the successful random access can be further improved.
In some possible implementation manners, the re-determining, by the terminal device, the duration of the RAR reception window includes:
and the terminal equipment determines the sum of the first time length and the offset time length as the time length of the RAR receiving window.
Optionally, in this embodiment of the application, the re-determining, by the terminal device, the duration of the RAR receiving window includes:
and the terminal equipment determines the time length obtained by multiplying the first time length by a first ratio as the time length of the RAR receiving window, wherein the first ratio is greater than 1.
That is, the terminal device may determine the time length obtained by multiplying the time length of the current RAR receiving window by a specific ratio as the time length of the RAR receiving window when the RAR receiving is performed next time.
In some possible implementation manners, the first duration is an initial configuration duration of the RAR receiving window, or the first duration is the initial configuration duration plus n offset durations, where n is a positive integer.
In some possible implementations, the offset duration is pre-configured on the terminal device or configured to the terminal device by a network.
In some possible implementations, the duration of the RAR receive window is less than or equal to a maximum duration.
In some possible implementations, the maximum duration is pre-configured on the terminal device or configured to the terminal device by a network.
In some possible implementations, the method further includes:
if the re-determined time length of the RAR receiving window is greater than the maximum time length and the current random access process is initiated in a special cell, the terminal equipment informs the Radio Resource Control (RRC) layer of radio link failure; or
If the re-determined time length of the RAR receiving window is greater than the maximum time length and the current random access process is initiated in the secondary cell, the terminal device determines that the random access fails.
In some possible implementations, the special cell includes a primary cell in a master cell group MCG and/or a primary cell in a secondary cell group SCG.
In some possible implementation manners, if the terminal device does not receive the RAR within the time range of the RAR receiving window, a timer corresponding to the RAR receiving window is invalid.
In a second aspect, a method for random access is provided, where the method is applied to a terminal device operating in an unlicensed frequency band, and the terminal device is configured with a Random Access Response (RAR) receiving window, and the method includes: the terminal equipment determines the time length of the RAR receiving window according to a trigger event of a random access process; and the terminal equipment receives the RAR within the determined time range of the RAR receiving window.
Therefore, according to the method for random access in the embodiment of the application, the terminal device can flexibly determine the time length of the RAR receiving window according to the trigger event in the random access process, and the probability of success of random access is favorably improved.
In some possible implementation manners, the determining, by the terminal device, the duration of the RAR receiving window according to a trigger event of a random access procedure includes:
the terminal device determines the time length of the RAR receiving window according to a triggering event of a random access process and by combining a first corresponding relation, wherein the first corresponding relation is the corresponding relation between a plurality of triggering events and the time lengths of a plurality of RAR receiving windows.
In some possible implementations, the first correspondence is pre-configured on the terminal device or configured by a network to the terminal device.
In a third aspect, an apparatus for random access is provided, configured to perform the method in the first aspect or any possible implementation manner of the first aspect. In particular, the apparatus comprises means for performing the method of the first aspect described above or any possible implementation manner of the first aspect.
In a fourth aspect, an apparatus for random access is provided, the apparatus comprising: memory, processor, input interface and output interface. The memory, the processor, the input interface and the output interface are connected through a bus system. The memory is configured to store instructions and the processor is configured to execute the instructions stored by the memory for performing the method of the first aspect or any possible implementation manner of the first aspect.
In a fifth aspect, an apparatus for random access is provided, configured to perform the method of the second aspect or any possible implementation manner of the second aspect. In particular, the apparatus comprises means for performing the method of the second aspect described above or any possible implementation of the second aspect.
In a sixth aspect, an apparatus for random access is provided, the apparatus comprising: memory, processor, input interface and output interface. The memory, the processor, the input interface and the output interface are connected through a bus system. The memory is configured to store instructions and the processor is configured to execute the instructions stored by the memory for performing the method of the second aspect or any possible implementation manner of the second aspect.
In a seventh aspect, a computer storage medium is provided for storing computer software instructions for executing the method of the first aspect or any possible implementation manner of the first aspect, and the computer storage medium contains a program designed for executing the above aspects.
In an eighth aspect, there is provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of the first aspect or any of the alternative implementations of the first aspect.
In a ninth aspect, there is provided a computer storage medium storing computer software instructions for executing the method of the second aspect or any possible implementation manner of the second aspect, comprising a program designed for executing the above aspects.
A tenth aspect provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of the second aspect described above or any alternative implementation of the second aspect.
Drawings
Fig. 1 is a schematic diagram illustrating an application scenario according to an embodiment of the present application.
Fig. 2 shows a schematic flow chart of a method for random access of an embodiment of the present application.
Fig. 3 shows a schematic flow chart of a method for random access of another embodiment of the present application.
Fig. 4 shows a schematic block diagram of an apparatus for random access according to an embodiment of the present application.
Fig. 5 shows a schematic block diagram of an apparatus for random access of another embodiment of the present application.
Fig. 6 shows a schematic block diagram of an apparatus for random access according to an embodiment of the present application.
Fig. 7 shows a schematic block diagram of an apparatus for random access of another embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
The technical scheme of the embodiment of the application can be applied to various communication systems, such as a long Term Evolution (L ong Term Evolution, referred to as "L TE") System, a L TE Frequency Division Duplex (FDD ") System, a L TE Time Division Duplex (TDD), a Universal Mobile Telecommunications System (UMTS), a Worldwide Interoperability for Microwave Access (WiMAX) communication System, a future 5G System, and the like.
Fig. 1 illustrates a wireless communication system 100 to which an embodiment of the present invention is applied, the wireless communication system 100 may include a Network device 110, the Network device 100 may be a device that communicates with a terminal device, the Network device 100 may provide communication coverage for a specific geographic area, and may communicate with a terminal device (e.g., UE) located within the coverage area, alternatively, the Network device 100 may be an evolved Node B (eNB or eNodeB) in an L TE system, or a wireless controller in a Cloud Radio Access Network (CRAN), or the Network device may be a relay station, an Access point, a vehicle-mounted device, a wearable device, a Network-side device in a future 5G Network, or a Network device in a future-evolution Public land Mobile Network (Public L and Mobile Network, P L), and so on.
The Wireless communication system 100 also includes at least one terminal device 120 located within the coverage of the network device 110. the terminal device 120 may be mobile or fixed. alternatively, the terminal device 120 may refer to an access terminal, a User Equipment (UE), a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a User terminal, a Wireless communication device, a User agent, or a User Equipment.
Alternatively, the 5G system or network may also be referred to as a New Radio (NR) system or network.
Optionally, the wireless communication system 100 may further include other network entities such as a network controller, a mobility management entity, and the like, which is not limited in this embodiment.
Fig. 1 exemplarily shows one network device and two terminal devices, and optionally, the wireless communication system 100 may include a plurality of network devices and may include other numbers of terminal devices within the coverage of each network device, which is not limited in this embodiment of the present application.
The random access technology is the primary content of communication between a terminal device and a network device in a mobile communication system. A terminal device in a wireless cellular network may initiate a connection request to a network side through a random access procedure.
For ease of understanding, the random access procedure is briefly introduced. The random access process mainly comprises the following steps:
s1, firstly, sending random access preamble, mainly used for the network device to correctly estimate the transmission delay of the terminal device and solve the problem of collision when a plurality of terminal devices initiate access requests simultaneously.
S2, the network device sends a Random Access Response (RAR) to the terminal device, where the RAR includes a transmission delay required by uplink synchronization and an Access overload condition of the current system. In addition, the network device may also feed back the uplink resource location information allocated to the terminal device.
And S3, the terminal equipment sends the message corresponding to the random access event and the terminal equipment identification of the terminal equipment on the appointed uplink resource.
And S4, the network equipment feeds the conflict resolution information back to the terminal equipment.
After the terminal device sends the random access preamble (i.e., Msg1), the terminal device opens a RAR receiving Window (ra-Response Window), and in the RAR receiving Window, the terminal device monitors a Physical Downlink Control Channel (PDCCH) to receive the RAR (i.e., Msg2) corresponding to the preamble, since data transmission on an unauthorized resource needs to follow the L BT principle, in this way, it may cause that the network device fails to reply to the RAR in time due to L BT failure, and further causes random access failure.
In view of this, the embodiments of the present application provide a method for random access, which is beneficial to improving the probability of success of random access.
Fig. 2 is a schematic flow chart of a method 200 for random access provided in an embodiment of the present application, where the method 200 may be performed by a terminal device in a communication system, and as shown in fig. 2, the method 200 includes:
s210, if the terminal device does not receive the RAR on the carrier of the unlicensed frequency band within a first time duration, the terminal device re-determines the time duration of the RAR receiving window, where the first time duration is a current time duration of the RAR receiving window;
s220, the terminal equipment retransmits the random access lead code to the network equipment;
and S230, the terminal equipment receives the RAR again within the re-determined time length range of the RAR receiving window.
It should be understood that the terminal device and the network device in the embodiment of the present application may operate in an unlicensed frequency band, and data transmission on the unlicensed frequency band needs to comply with the L BT principle, that is, data transmission may be performed only in a case where a channel is idle.
Before S210, the terminal device may send a first preamble on a carrier of an unlicensed frequency band, and then start an RAR receiving window, where a current duration of the RAR receiving window is a first duration, so that the terminal device may monitor a PDCCH to receive an RAR replied by the network device in the first duration, and if the terminal device does not receive an RAR replied by the network device (possibly caused by failure of the network device L BT), the terminal device may re-determine a duration of the RAR receiving window, and optionally, the re-determined duration of the RAR receiving window may be greater than the first duration, that is, the adjusted duration of the RAR receiving window is greater than the current duration of the RAR receiving window.
After S210, if the terminal device determines that a random access procedure needs to be initiated under some conditions (for example, uplink out-of-step), in S220, the terminal device may send a random access preamble to the network device again, which is denoted as a second preamble, where the first preamble and the second preamble may be the same or different, and this is not limited in this embodiment of the present application. Further, in S230, the terminal device may receive the RAR again within the re-determined time duration range of the RAR receiving window, and since the adjusted time duration of the RAR receiving window is greater than the time duration of the RAR receiving window when the RAR receiving fails, it is beneficial to improve the probability of successful receiving of the RAR, and further, the probability of successful random access can be improved.
Optionally, in this embodiment of the application, the re-determining, by the terminal device, the duration of the RAR receiving window includes:
and the terminal equipment determines the sum of the first time length and the offset time length as the time length of the RAR receiving window.
That is, the time length obtained by adding the specific offset time length (denoted as offset) to the current RAR receiving window time length can be determined as the RAR receiving window time length at the next RAR receiving, i.e. T2=T1+ offset, where T2The time length of RAR receiving window, T, for next RAR receiving1Is the current duration of the RAR receive window.
Optionally, in this embodiment of the application, the re-determining, by the terminal device, the duration of the RAR receiving window includes:
and the terminal equipment determines the time length obtained by multiplying the first time length by a first ratio as the time length of the RAR receiving window, wherein the first ratio is greater than 1.
That is, the terminal device may determine, as an example and without limitation, the time length obtained by multiplying the current time length of the RAR reception window by a specific ratio, to be the time length of the RAR reception window when performing RAR reception next time, where the first ratio may be 1.1 or 1.2, and the like, and this is not limited in this embodiment of the present application.
Optionally, in this embodiment of the application, the first time length may be an initial configuration time length of a RAR receiving window, or may also be an adjusted time length of the RAR receiving window, for example, the first time length may be the initial configuration time length plus n offset time lengths, where n is a positive integer.
Optionally, if the terminal device does not receive the RAR within the re-determined range of the duration of the RAR receiving window, further, the terminal device may further adjust the duration of the RAR receiving window again according to the manner described in the foregoing embodiment, and details of the specific implementation process are not described here again. Optionally, the adjusted time length of the RAR receiving window is not greater than a maximum time length, where the maximum time length may be preconfigured on the terminal device, or may also be configured by the network device, and this is not limited in this embodiment of the present application.
Optionally, in this embodiment of the application, if the terminal device does not receive the RAR replied by the network device within the time range of the RAR receiving window, the timer corresponding to the RAR receiving window is invalid.
Optionally, in some embodiments, the method 200 may further include:
if the re-determined time length of the RAR receiving window is greater than the maximum time length and the current random access process is initiated in a special cell, the physical layer of the terminal equipment informs a Radio Resource Control (RRC) layer that the random access has a problem; or
If the re-determined time length of the RAR receiving window is greater than the maximum time length and the current random access process is initiated in the secondary cell, the terminal device determines that the random access fails.
Specifically, the current random access procedure may be initiated in a special Cell (SpCell) (denoted as scene 1), where the SpCell may be a Master Cell in a Master Cell Group (MCG), or may also be a Master Cell in a Secondary Cell Group (SCG); or, the current random access procedure may also be initiated by a secondary cell (Scell) (denoted as scene 2).
Optionally, if the duration of the re-determined RAR receiving window is greater than the maximum duration, and the current random access process is scenario 2, that is, the random access process is initiated by the Scell, the terminal device does not report the random access problem to a Radio Resource Control (RRC) layer, and may directly determine that the random access fails, and this scenario does not trigger an RRC connection reestablishment process.
Or, if the duration of the re-determined RAR receiving window is greater than the maximum duration and the current random Access process is scene 1, that is, the random Access process is initiated by the SpCell, the Media Access Control (MAC) layer of the terminal device monitors a random Access problem (random Access problem), and then notifies the RRC layer of the terminal device of the random Access problem through inter-layer interaction inside the terminal device.
Case 1: if the MCG MAC notifies the RRC layer (here, MCG refers to a master cell group of Dual Connection (DC)), that is, the random access procedure is MCG initiated, the RRC layer considers that the Radio link of MCG fails (R L F), and triggers the RRC Connection reconfiguration procedure.
Case 2 if it is SCG MAC to inform RRC layer, that is, the random access procedure is SCG initiated, the RRC layer considers R L F of SCG, in which case the RRC layer does not trigger RRC reestablishment procedure.
Therefore, according to the method for random access in the embodiment of the present application, the terminal device may re-determine the duration of the RAR receiving window under the condition that the RAR receiving fails, and further, when the RAR is received next time, the RAR receiving may be performed within the re-determined duration range of the RAR receiving window, so that the probability of the successful RAR receiving is favorably improved, and the probability of the successful random access can be further improved.
Fig. 3 is a schematic flow chart of a method 300 for random access according to another embodiment of the present application, the method 300 may be performed by a terminal device in the communication system shown in fig. 1, as shown in fig. 3, the method 300 includes the following:
s310, the terminal equipment determines the time length of the RAR receiving window according to a trigger event of a random access process;
and S320, the terminal equipment receives the RAR within the determined time range of the RAR receiving window.
It should be understood that the terminal device and the network device in the embodiment of the present application may operate in an unlicensed frequency band, and data transmission on the unlicensed frequency band needs to comply with the L BT principle, that is, data transmission may be performed only in a case where a channel is idle.
In this embodiment, the terminal device may determine the duration of the RAR receiving window according to a trigger event of a random access procedure, so that after the terminal device may send a random access preamble to the network device, the terminal device may start the RAR receiving window, and further, may receive the RAR within the determined duration range of the RAR receiving window.
Optionally, the trigger event of the random access procedure may include a trigger event that needs to initiate a random access procedure, such as an RRC connection establishment procedure, an RRC connection reestablishment procedure, cell handover, uplink out-of-step, and the like, which is not limited in this embodiment of the present application.
As an example and not by way of limitation, the duration of the RAR receiving window corresponding to the random access triggered by cell handover may be set to be shorter, and the duration of the RAR receiving window corresponding to the random access triggered by uplink out-of-step may be longer.
Optionally, in this embodiment of the application, the plurality of trigger events may have a first correspondence with the durations of the plurality of RAR receiving windows, for example, the first correspondence may be a one-to-one correspondence, a one-to-many correspondence, a many-to-one correspondence, or a many-to-many correspondence, which is not limited in this embodiment of the application. The terminal device may determine a duration of a corresponding RAR receiving window according to the trigger event of the current random access procedure in combination with the first correspondence, and further may receive the RAR within the duration of the RAR receiving window.
Optionally, in this embodiment of the present application, the duration of the RAR receiving window determined according to the trigger event may be fixed or adjustable, for example, if the trigger event of the current random access procedure is a first event, the terminal device does not receive the RAR within the duration range of the current RAR receiving window, and if the trigger event of the next random access procedure is also the first event, the terminal device may re-determine the duration of the RAR receiving window, for example, the duration of the RAR receiving window may be re-determined according to the manner described in method 200, further, the RAR may be received according to the re-determined duration of the RAR receiving window, and for specific implementation co-production, reference may be made to relevant descriptions in the foregoing embodiment, and details are not repeated here.
Optionally, in this embodiment of the present application, the first corresponding relationship is preconfigured on the terminal device, or configured to the terminal device by a network, which is not limited in this embodiment of the present application.
Therefore, according to the method for random access in the embodiment of the application, the terminal device can flexibly determine the time length of the RAR receiving window according to the trigger event in the random access process, and the probability of success of random access is favorably improved.
While method embodiments of the present application are described in detail above with reference to fig. 2 and 3, apparatus embodiments of the present application are described in detail below with reference to fig. 4-7, it being understood that apparatus embodiments correspond to method embodiments and that similar descriptions may be had with reference to method embodiments.
Fig. 4 shows a schematic block diagram of an apparatus 400 for random access according to an embodiment of the application. As shown in fig. 4, the apparatus 400 includes:
a determining module 410, configured to re-determine, within a first time duration, a time duration of the RAR receiving window when the device does not receive the RAR on the carrier of the unlicensed frequency band, where the first time duration is a current time duration of the RAR receiving window;
a communication module 420, configured to retransmit a random access preamble to a network device, and receive the RAR again within the re-determined duration range of the RAR reception window.
Optionally, in some embodiments, the determining module 410 is specifically configured to:
and determining the sum of the first time length and the offset time length as the time length of the RAR receiving window.
Optionally, in some embodiments, the first duration is an initial configuration duration of the RAR receiving window, or the first duration is the initial configuration duration plus n offset durations, where n is a positive integer.
Optionally, in some embodiments, the offset duration is preconfigured on the device or configured to the device by the network.
Optionally, in some embodiments, the duration of the RAR reception window is less than or equal to a maximum duration.
Optionally, in some embodiments, the maximum duration is preconfigured on the device or configured to the device by the network.
Optionally, in some embodiments, the communication module 420 is further configured to:
if the re-determined time length of the RAR receiving window is greater than the maximum time length and the current random access process is initiated in a special cell, notifying Radio Resource Control (RRC) layer that a radio link fails;
the determining module 410 is further configured to:
and if the re-determined time length of the RAR receiving window is greater than the maximum time length and the current random access process is initiated in the secondary cell, determining that the random access fails.
Optionally, in some embodiments, the special cell comprises a primary cell in a master cell group MCG and/or a primary cell in a secondary cell group SCG.
Optionally, in some embodiments, if the device does not receive the RAR within the time range of the RAR receiving window, a timer corresponding to the RAR receiving window is invalid.
It should be understood that the device 400 for random access according to the embodiment of the present application may correspond to a terminal device in the embodiment of the method of the present application, and the above and other operations and/or functions of each unit in the device 400 are respectively for implementing a corresponding flow of the terminal device in the method 200 shown in fig. 2, and are not described herein again for brevity.
Fig. 5 is a schematic block diagram of an apparatus for random access according to an embodiment of the present application. The apparatus 500 of fig. 5 comprises:
a determining module 510, configured to determine, according to a trigger event of a random access procedure, a duration of the RAR receiving window;
a communication module 520, configured to receive the RAR within the determined time range of the RAR receiving window.
Optionally, in some embodiments, the determining module 510 is specifically configured to:
and determining the time length of the RAR receiving window according to a triggering event of a random access process and by combining a first corresponding relation, wherein the first corresponding relation is the corresponding relation between a plurality of triggering events and the time lengths of a plurality of RAR receiving windows.
Optionally, in some embodiments, the first correspondence is pre-configured on the device or configured to the device by the network.
Specifically, the device 500 may correspond to (for example, may be configured with or be itself the terminal device described in the method 300), and each module or unit in the device 500 is respectively configured to execute each action or processing procedure executed by the terminal device in the method 300, and here, detailed descriptions thereof are omitted to avoid redundant description.
As shown in fig. 6, an embodiment of the present application further provides an apparatus 600 for random access, where the apparatus 600 may be the apparatus 400 in fig. 4, which can be used to execute the content of the terminal apparatus corresponding to the method 200 in fig. 2. The apparatus 600 comprises: an input interface 610, an output interface 620, a processor 630 and a memory 640, wherein the input interface 610, the output interface 620, the processor 630 and the memory 640 may be connected by a bus system. The memory 640 is used to store programs, instructions or code. The processor 630 is configured to execute the program, instructions or codes in the memory 640 to control the input interface 610 to receive signals, control the output interface 620 to transmit signals, and perform the operations in the foregoing method embodiments.
It should be understood that, in the embodiment of the present application, the processor 630 may be a Central Processing Unit (CPU), and the processor 630 may also be other general processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), ready-made programmable gate arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 640 may include a read-only memory and a random access memory, and provides instructions and data to the processor 630. A portion of the memory 640 may also include non-volatile random access memory. For example, the memory 640 may also store device type information.
In implementation, the various aspects of the methods described above may be performed by instructions in the form of hardware, integrated logic circuits, or software in the processor 630. The contents of the method disclosed in connection with the embodiments of the present application may be directly embodied as a hardware processor, or may be implemented by a combination of hardware and software modules in a processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 640, and the processor 630 reads the information in the memory 640 and performs the above method in combination with the hardware thereof. To avoid repetition, it is not described in detail here.
In a specific embodiment, the determining module 410 included in the apparatus 400 in fig. 4 may be implemented by the processor 630 in fig. 6, and the communicating module 420 included in the apparatus 400 in fig. 4 may be implemented by the input interface 610 and the output interface 620 in fig. 6.
As shown in fig. 7, an embodiment of the present application further provides a device 700 for random access, where the device 700 may be the device 500 in fig. 5, which can be used to execute the content of the terminal device corresponding to the method 300 in fig. 3. The apparatus 700 comprises: an input interface 710, an output interface 720, a processor 730, and a memory 740, wherein the input interface 710, the output interface 720, the processor 730, and the memory 740 may be connected by a bus system. The memory 740 is used to store programs, instructions or code. The processor 730 is configured to execute the program, instructions or codes in the memory 740 to control the input interface 710 to receive signals, control the output interface 720 to send signals, and perform the operations of the foregoing method embodiments.
It should be understood that, in the embodiment of the present application, the processor 730 may be a Central Processing Unit (CPU), and the processor 730 may also be other general processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 740 may include a read-only memory and a random access memory, and provides instructions and data to the processor 730. A portion of memory 740 may also include non-volatile random access memory. For example, the memory 740 may also store device type information.
In implementation, the various aspects of the methods described above may be performed by instructions in the form of hardware, integrated logic circuits, or software in the processor 730. The contents of the method disclosed in connection with the embodiments of the present application may be directly embodied as a hardware processor, or may be implemented by a combination of hardware and software modules in a processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 740, and the processor 730 reads the information in the memory 740 and combines the hardware to implement the method. To avoid repetition, it is not described in detail here.
In a specific embodiment, the determining module 510 included in the apparatus 500 in fig. 5 may be implemented by the processor 730 in fig. 7, and the communicating module 520 included in the apparatus 500 in fig. 5 may be implemented by the input interface 710 and the output interface 720 in fig. 7.
Embodiments of the present application also provide a computer-readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a portable electronic device comprising a plurality of application programs, enable the portable electronic device to perform the method of the embodiment shown in fig. 2 and 3.
The embodiment of the present application also provides a computer program, which includes instructions, when the computer program is executed by a computer, the computer may execute the corresponding flow of the method of the embodiment shown in fig. 2 and fig. 3.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (24)

  1. A method for random access is applied to a terminal device operating in an unlicensed frequency band, wherein the terminal device is configured with a Random Access Response (RAR) receiving window, and the method comprises the following steps:
    if the terminal device does not receive the RAR on the carrier wave of the unauthorized frequency band within a first time length, the terminal device re-determines the time length of the RAR receiving window, wherein the first time length is the current time length of the RAR receiving window;
    the terminal equipment retransmits the random access lead code to the network equipment;
    and the terminal equipment receives the RAR again within the re-determined time range of the RAR receiving window.
  2. The method of claim 1, wherein the step of the terminal device re-determining the duration of the RAR reception window comprises:
    and the terminal equipment determines the sum of the first time length and the offset time length as the time length of the RAR receiving window.
  3. The method of claim 2, wherein the first duration is an initial configuration duration of the RAR receive window, or wherein the first duration is the initial configuration duration plus n offset durations, and wherein n is a positive integer.
  4. A method according to claim 2 or 3, wherein the offset duration is pre-configured on the terminal device or configured to the terminal device by the network.
  5. The method according to any one of claims 1-4, wherein the time duration of the RAR receive window is less than or equal to a maximum time duration.
  6. The method of claim 5, wherein the maximum duration is pre-configured on the terminal device or configured to the terminal device by a network.
  7. The method of claim 5 or 6, further comprising:
    if the re-determined time length of the RAR receiving window is greater than the maximum time length and the current random access process is initiated in a special cell, the terminal equipment informs the Radio Resource Control (RRC) layer of radio link failure; or
    If the re-determined time length of the RAR receiving window is greater than the maximum time length and the current random access process is initiated in the secondary cell, the terminal device determines that the random access fails.
  8. The method according to claim 7, wherein the special cell comprises a primary cell in a Master Cell Group (MCG) and/or a primary cell in a Secondary Cell Group (SCG).
  9. The method according to any one of claims 1 to 8, wherein if the terminal device does not receive the RAR within the time length range of the RAR reception window, a timer corresponding to the RAR reception window is expired.
  10. A method for random access is applied to a terminal device operating in an unlicensed frequency band, wherein the terminal device is configured with a Random Access Response (RAR) receiving window, and the method comprises the following steps:
    the terminal equipment determines the time length of the RAR receiving window according to a trigger event of a random access process;
    and the terminal equipment receives the RAR within the determined time range of the RAR receiving window.
  11. The method according to claim 10, wherein the determining, by the terminal device, the duration of the RAR reception window according to a trigger event of a random access procedure includes:
    the terminal device determines the time length of the RAR receiving window according to a triggering event of a random access process and by combining a first corresponding relation, wherein the first corresponding relation is the corresponding relation between a plurality of triggering events and the time lengths of a plurality of RAR receiving windows.
  12. The method of claim 11, wherein the first correspondence is pre-configured on the terminal device or configured to the terminal device by a network.
  13. A device for random access, which is applied to a terminal device operating in an unlicensed frequency band, wherein the terminal device is configured with a Random Access Response (RAR) receiving window, and the device comprises:
    a determining module, configured to re-determine, within a first time duration, a time duration of the RAR receiving window when the device does not receive the RAR on the carrier of the unlicensed frequency band, where the first time duration is a current time duration of the RAR receiving window;
    and the communication module is used for retransmitting the random access preamble to the network equipment and receiving the RAR again within the re-determined time range of the RAR receiving window.
  14. The device of claim 13, wherein the determination module is specifically configured to:
    and determining the sum of the first time length and the offset time length as the time length of the RAR receiving window.
  15. The apparatus of claim 14, wherein the first duration is an initial configuration duration of the RAR receive window, or wherein the first duration is the initial configuration duration plus n offset durations, and wherein n is a positive integer.
  16. The device of claim 14 or 15, wherein the offset duration is preconfigured on the device or configured to the device by the network.
  17. The apparatus according to any one of claims 13-16, wherein the duration of the RAR receive window is less than or equal to a maximum duration.
  18. The device of claim 17, wherein the maximum duration is preconfigured on the device or configured to the device by the network.
  19. The device of claim 17 or 18, wherein the communication module is further configured to:
    if the re-determined time length of the RAR receiving window is greater than the maximum time length and the current random access process is initiated in a special cell, notifying Radio Resource Control (RRC) layer that a radio link fails;
    the determination module is further to:
    and if the re-determined time length of the RAR receiving window is greater than the maximum time length and the current random access process is initiated in the secondary cell, determining that the random access fails.
  20. The apparatus of claim 19, wherein the special cell comprises a primary cell in a Master Cell Group (MCG) and/or a primary cell in a Secondary Cell Group (SCG).
  21. The apparatus according to any one of claims 13-20, wherein if the apparatus does not receive the RAR within the duration of the RAR receive window, a timer corresponding to the RAR receive window expires.
  22. A device for random access, which is applied to a terminal device operating in an unlicensed frequency band, and is configured with a Random Access Response (RAR) receiving window, and the device includes:
    the determining module is used for determining the time length of the RAR receiving window according to a triggering event of a random access process;
    and the communication module is used for receiving the RAR within the determined time range of the RAR receiving window.
  23. The device of claim 22, wherein the determination module is specifically configured to:
    and determining the time length of the RAR receiving window according to a triggering event of a random access process and by combining a first corresponding relation, wherein the first corresponding relation is the corresponding relation between a plurality of triggering events and the time lengths of a plurality of RAR receiving windows.
  24. The device of claim 23, wherein the first correspondence is pre-configured on the device or configured to the device by the network.
CN201780097347.4A 2017-12-28 2017-12-28 Method and apparatus for random access Pending CN111434176A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/119596 WO2019127285A1 (en) 2017-12-28 2017-12-28 Method and device for random access

Publications (1)

Publication Number Publication Date
CN111434176A true CN111434176A (en) 2020-07-17

Family

ID=67064435

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780097347.4A Pending CN111434176A (en) 2017-12-28 2017-12-28 Method and apparatus for random access

Country Status (2)

Country Link
CN (1) CN111434176A (en)
WO (1) WO2019127285A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113034882A (en) * 2020-12-23 2021-06-25 利尔达科技集团股份有限公司 Centralized meter reading method based on time slice competition reporting

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160174263A1 (en) * 2013-08-05 2016-06-16 Sony Corporation Communications system, infrastructure equipment and method
US20160309506A1 (en) * 2015-04-19 2016-10-20 Seau Sian Lim Dynamic determination and signaling of a rar window size to a coverage enhanced low complexity machine type communication device
CN106993335A (en) * 2016-01-21 2017-07-28 中兴通讯股份有限公司 Lead code sending, receiving method, device, user equipment and base station
WO2017136458A2 (en) * 2016-02-02 2017-08-10 Intel IP Corporation Listen-before-talk (lbt) failure during a random access procedure
CN107079501A (en) * 2014-10-30 2017-08-18 Lg 电子株式会社 The method and apparatus initiated and responded for the access of cell are performed on unauthorized carrier wave in a wireless communication system
US20170290064A1 (en) * 2014-09-26 2017-10-05 Sharp Kabushiki Kaisha Method for configuring random access response window, base station and user equipment
WO2017193341A1 (en) * 2016-05-12 2017-11-16 华为技术有限公司 Random access method and device
CN107371273A (en) * 2016-05-13 2017-11-21 中兴通讯股份有限公司 Accidental access method, device and user equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014127833A1 (en) * 2013-02-22 2014-08-28 Telefonaktiebolaget L M Ericsson (Publ) Sector individual control of access to a cell of a mobile network
CN106341899A (en) * 2015-07-14 2017-01-18 中兴通讯股份有限公司 Method and device for performing random access based on unauthorized carrier

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160174263A1 (en) * 2013-08-05 2016-06-16 Sony Corporation Communications system, infrastructure equipment and method
US20170290064A1 (en) * 2014-09-26 2017-10-05 Sharp Kabushiki Kaisha Method for configuring random access response window, base station and user equipment
CN107079501A (en) * 2014-10-30 2017-08-18 Lg 电子株式会社 The method and apparatus initiated and responded for the access of cell are performed on unauthorized carrier wave in a wireless communication system
US20160309506A1 (en) * 2015-04-19 2016-10-20 Seau Sian Lim Dynamic determination and signaling of a rar window size to a coverage enhanced low complexity machine type communication device
CN106993335A (en) * 2016-01-21 2017-07-28 中兴通讯股份有限公司 Lead code sending, receiving method, device, user equipment and base station
WO2017136458A2 (en) * 2016-02-02 2017-08-10 Intel IP Corporation Listen-before-talk (lbt) failure during a random access procedure
WO2017193341A1 (en) * 2016-05-12 2017-11-16 华为技术有限公司 Random access method and device
CN107371273A (en) * 2016-05-13 2017-11-21 中兴通讯股份有限公司 Accidental access method, device and user equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
RAN1: "RP-171137 "Status Report of WI on New Radio Access Technology; rapporteur: NTT DOCOMO"", 《3GPP TSG_RAN\TSG_RAN》 *
RAN1: "RP-171137 "Status Report of WI on New Radio Access Technology; rapporteur: NTT DOCOMO"", 《3GPP TSG_RAN\TSG_RAN》, 29 May 2017 (2017-05-29) *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113034882A (en) * 2020-12-23 2021-06-25 利尔达科技集团股份有限公司 Centralized meter reading method based on time slice competition reporting

Also Published As

Publication number Publication date
WO2019127285A1 (en) 2019-07-04

Similar Documents

Publication Publication Date Title
US20220061103A1 (en) Method and device for random access
EP4030858A1 (en) Channel access method and apparatus for physical random access channel transmission
US11202322B2 (en) Random access method and terminal device
CN112586078A (en) Window adjusting method and device, network equipment and terminal
CN112075121A (en) Random access method and communication equipment
CN112673676A (en) Random access process selection method, device, chip and computer program
JP7297866B2 (en) Random access method and related equipment
CN112352453B (en) Method and apparatus for transmitting system information
CN111935846B (en) Signal transmission method, terminal equipment and network equipment
CN111727656B (en) Method, network equipment and terminal equipment for random access
EP3820234A1 (en) Random access method, terminal device, network device, and storage medium
CN111757393B (en) Method and apparatus for random access
CN113678562A (en) Communication method, terminal equipment and network equipment
CN111800799B (en) 2-step random access method and device for unlicensed frequency band
CN111434176A (en) Method and apparatus for random access
CN113678560A (en) Method for transmitting information in random access process, terminal equipment and network equipment
CN110731120A (en) Method, network equipment and terminal equipment for random access
CN111801969A (en) Beam failure recovery implementation method, device, chip and computer program
CN112534948A (en) Random access method, equipment and computer storage medium
CN112771967B (en) Transmission parameter determination method and device and user equipment
CN112272926B (en) Link recovery method and device and communication equipment
CN113228786B (en) MSG3 transmission in unlicensed frequency bands
CN115038190A (en) Data transmission method and device
CN116530160A (en) Method for switching search space set packet SSSG by terminal equipment, terminal equipment and network equipment
CN113273299A (en) Method and device for random access

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200717

RJ01 Rejection of invention patent application after publication